Beruflich Dokumente
Kultur Dokumente
System
V200R016C60
Issue 13
Date 2018-08-31
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Related Version
The following table lists the product version related to this document.
Intended Audience
This document describes how to install the U2000 and obtain the reference information
required during the installation.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.
– Added the cold standby delivery scenario and single-server delivery scenario.
– Changed the document name to iManager U2000 V200R016C60 Cold Standby &
Single-Server System Software Installation and Commissioning Guide (SUSE
Linux).
l Fixed some bugs.
Contents
2 Installing and Commissioning the U2000 (Factory Installation of the Cold Standby
Solution)............................................................................................................................................. 8
2.1 Solution Description....................................................................................................................................................... 9
2.2 Commissioning Process................................................................................................................................................12
2.3 Preparing for Commissioning.......................................................................................................................................13
2.3.1 Collecting Commissioning Information.................................................................................................................... 14
2.3.2 Checking Required Software.....................................................................................................................................22
2.3.3 Applying for a U2000 License.................................................................................................................................. 23
2.3.4 Applying for the SSR License................................................................................................................................... 24
2.4 Checking Hardware Connections................................................................................................................................. 25
2.5 Powering On a Server...................................................................................................................................................28
2.6 Configuring Controller IP Addresses........................................................................................................................... 30
2.6.1 Configuring the iMana/iBMC IP Address of Huawei server.................................................................................... 31
2.6.1.1 Configuring the iMana IP Address Through iMana Management Interface (HUAWEI RH5885H V3 and
HUAWEI RH2288H V2)....................................................................................................................................................31
2.6.1.2 Configuring the iBMC IP Address Through iBMC Management Interface(HUAWEI RH2288H V3 and
HUAWEI RH5885H V3)....................................................................................................................................................34
2.6.1.3 Configuring the iMana/iBMC IP Address Through BIOS..................................................................................... 37
2.6.2 Setting the SC IP Address for the OceanStor 5500 V3 Disk Array.......................................................................... 38
2.7 Commissioning the U2000........................................................................................................................................... 42
2.7.1 Obtaining Commissioning Parameters...................................................................................................................... 43
2.7.2 Configuring System Commissioning Parameters......................................................................................................81
2.7.3 Loading a U2000 License..........................................................................................................................................85
2.7.4 Commissioning U2000 Parameters........................................................................................................................... 89
2.7.5 Checking the Installation of the U2000..................................................................................................................... 91
2.8 Configuring the Cold Standby Solution....................................................................................................................... 94
2.8.1 Configuring Automatic Backup Tasks on the Primary Site.......................................................................................94
2.8.2 Configuring Automatic Restoration on the Secondary Site...................................................................................... 97
4.6.1.2 Configuring the iBMC IP Address Through iBMC Management Interface(HUAWEI RH2288H V3 and
HUAWEI RH5885H V3)..................................................................................................................................................229
4.6.1.3 Configuring the iMana/iBMC IP Address Through BIOS................................................................................... 232
4.6.2 Configuring the IMM IP Address............................................................................................................................233
4.6.2.1 Configuring the IMM IP Address Through IMM Management Interface(IBM X3650 M4)...............................234
4.6.2.2 Configuring the IMM IP Address Through IMM Management Interface (IBM X3850 X5 and IBM X3650 M3)
.......................................................................................................................................................................................... 237
4.6.2.3 Configuring the IMM IP Address Through BIOS................................................................................................240
4.6.3 Configuring Controller IP Addresses for Disk Arrays............................................................................................ 245
4.6.3.1 Setting the SC IP Address for the OceanStor 5500 V3 Disk Array..................................................................... 245
4.6.3.2 Setting the SC IP Address for the OceanStor S3900 Disk Array......................................................................... 249
4.7 Configuring RAID...................................................................................................................................................... 254
4.7.1 Configuring the RAID in Remote Mode (Huawei RH2288H V3 and Huawei RH5885H V3, ISO)......................254
4.7.2 Configuring the RAID in Remote Mode (Huawei RH5885H V3 or Huawei RH2288H V2, ISO)........................ 259
4.7.3 Configuring the RAID in Local Mode (IBM X3850 X5 and IBM X3650 M3, Manually).................................... 265
4.7.4 Configuring the RAID in Local Mode (IBM X3650 M4, Manually)..................................................................... 274
4.8 Installing the SUSE Linux OS by Using the Quick Installation CD-ROM................................................................283
4.8.1 Remotely Installing the SUSE Linux Operating System (Huawei RH series rack server, DVD/ISO)................... 284
4.8.2 Remotely Installing the SUSE Linux Operating System (IBM X3650 M4, DVD/ISO).........................................291
4.8.3 Remotely Installing the SUSE Linux Operating System (IBM X3850 X5 and IBM X3650 M3, DVD/ISO)........299
4.8.4 Locally Installing the SUSE Linux Operating System (IBM Server, DVD)...........................................................307
4.8.5 Locally Installing the SUSE Linux Operating System (Huawei RH series rack server, DVD)..............................312
4.9 Installing the U2000 Software.................................................................................................................................... 317
4.9.1 Preparing Software Packages.................................................................................................................................. 317
4.9.2 Preconfiguring the OS ............................................................................................................................................ 319
4.9.3 Starting the U2000 Installation Program................................................................................................................. 330
4.9.3.1 Installing the U2000 on the GUI.......................................................................................................................... 330
4.9.3.2 Installing the U2000 Through the CLI................................................................................................................. 336
4.10 Commissioning the U2000....................................................................................................................................... 341
4.10.1 Obtaining Commissioning Parameters.................................................................................................................. 341
4.10.2 Configuring System Commissioning Parameters..................................................................................................379
4.10.3 Loading a U2000 License......................................................................................................................................383
4.10.4 Commissioning U2000 Parameters....................................................................................................................... 387
4.10.5 Checking the Installation of the U2000................................................................................................................. 389
4.11 Configuring the Cold Standby Solution (Cold Standby Solution)........................................................................... 392
4.11.1 Configuring Automatic Backup Tasks on the Primary Site...................................................................................392
4.11.2 Configuring Automatic Restoration on the Secondary Site...................................................................................395
A FAQs............................................................................................................................................399
A.1 SUSE Linux OS......................................................................................................................................................... 399
A.1.1 How to Change the OS User Password.................................................................................................................. 399
A.1.2 How to Start/Stop the FTP/SFTP/Telnet Service in the SUSE Linux OS.............................................................. 401
A.1.3 How to Enable and Disable the FTP Authority of the root User in the SUSE Linux OS...................................... 402
A.1.4 How to manually Add the Default Route (SUSE Linux)....................................................................................... 403
A.3.4 How to View the IMM IP Address on the IBM Server.......................................................................................... 484
A.3.5 How to Change the Password of the IMM User USERID(IBM X3650 M4).........................................................488
A.3.6 How to Change the Password of the IMM User USERID(IBM X3850 X5 and IBM X3650 M3)........................491
A.3.7 How to Solve IMM Problems.................................................................................................................................492
A.3.8 Mappings Between Physical and Logical Network Interfaces on an IBM Server Running SUSE Linux............. 494
A.3.9 Viewing Hard Disk Information in Local Mode (IBM Server).............................................................................. 495
A.3.10 Viewing Hard Disk Informationin Remote Mode (IBM X3650 M4)...................................................................497
A.3.11 Viewing Hard Disk Informationin Remote Mode (IBM X3850 X5 and IBM X3650 M3)..................................501
A.3.12 Formatting disks in Local Mode (IBM Server).................................................................................................... 504
A.3.13 Formatting the disks in Remote Mode (IBM X3650 M4).................................................................................... 510
A.3.14 Formatting the disks in Remote Mode (IBM X3850 X5 and IBM X3650 M3)...................................................517
A.3.15 How to Configure the HTTPS on the IMM(IBM X3650 M4)............................................................................. 523
A.3.16 How to Configure the HTTPS on the IMM(IBM X3850 X5 and IBM X3650 M3)............................................ 526
A.4 Sybase Database........................................................................................................................................................ 528
A.4.1 Startup and Shutdown of the Sybase Database.......................................................................................................528
A.4.1.1 How to Disable the Sybase Database Service..................................................................................................... 528
A.4.1.2 How to Start the Sybase Database Service.......................................................................................................... 529
A.4.1.3 How to Verify That the Sybase Database Is Running..........................................................................................529
A.4.2 Sybase Database Maintenance................................................................................................................................530
A.4.2.1 How to Verify That the Sybase Database Has Been Installed............................................................................. 530
A.4.2.2 How to Check the Sybase Database Version....................................................................................................... 530
A.4.2.3 How to View the Server Name of the Sybase Database...................................................................................... 531
A.4.2.4 How to Change the sa User Password for the Sybase Database If the U2000 Is Not Installed...........................532
A.4.2.5 How to Change the Database Administrator Password for the Sybase Database If the U2000 Is Installed....... 533
A.4.2.6 How to View the Bit Number of the Sybase Database........................................................................................ 535
A.4.2.7 How to View the Details of the Sybase Database................................................................................................536
A.4.2.8 How to Create a Replacement User for the Sybase Database Administrator sa User......................................... 537
A.5 U2000 System............................................................................................................................................................539
A.5.1 How to Start the MSuite Client.............................................................................................................................. 539
A.5.2 How to End Processes on the MSuite Server......................................................................................................... 541
A.5.3 Changing the Password of the MSuite....................................................................................................................541
A.5.4 Starting the Process of the MSuite Server.............................................................................................................. 542
A.5.5 How to Verify That the Processes of the U2000 Single-Server System Are Running on SUSE Linux.................543
A.5.6 How to Start the Processes of the U2000 Single-Server System on SUSE Linux................................................. 543
A.5.7 How to End the Processes of the U2000 Single-Server System on (SUSE Linux)................................................544
A.5.8 How to Determine Which Types of Software Are Preinstalled..............................................................................544
A.5.9 Which Installation Packages Are Required for U2000 Installation........................................................................545
A.5.10 How to Set the Communication Mode on the U2000 server for the Single-Server System (SUSE Linux).........547
A.5.11 How to Confirm the Encoding Format of the U2000 License File.......................................................................548
A.5.12 How to Transfer Files by Means of FTP.............................................................................................................. 548
A.5.13 How to Check and Change an OS User ID...........................................................................................................549
A.5.14 How to Burn the ISO File to DVD....................................................................................................................... 550
F Getting Started...........................................................................................................................657
G Planning Disk Partitions........................................................................................................ 662
H Configuring Disk Arrays........................................................................................................ 666
H.1 Configuring the OceanStor 5500 V3 Disk Array Using the OceanStor DeviceManager......................................... 666
H.2 Configuring the OceanStor S3900 Disk Array by Using the ISM............................................................................ 673
1 Installation Overview
Before installing and commissioning the U2000, you must get an understanding of the
software and hardware configuration requirements and networking requirements of the U2000
as well as the restrictions on installing and commissioning the U2000.
Terms
To ensure the U2000 install successfully, definitions for terms as used in this document before
introducing the installation scheme.
l Server: A server can refer to either hardware or software. In the client/server structure, a
server refers to the server program. The term refers to hardware when used in reference
to a computer where a server program runs.
l Client: Refers to the client application of the software in a client/server structure. The
client application can run on a computer along with the server application or on a
separate computer. The term refers to hardware when used in reference to the computer
where a client application runs.
l Workstation and host: A workstation functions the same as a host. Generally, a
workstation or host refers to the computer where services run in a SUSE Linux OS.
l Primary (Secondary) site: The primary (secondary) site refers to the physical primary
(secondary) site. Whether a site is a primary site or a secondary site is specified when it
is installed, and the role does not change when the active/standby switchover occurs. In
most of the time, a primary site is in the active state, whereas a secondary site is in the
standby state for protecting the primary site.
l Active (Standby) site: The active (standby) site refers to the site in the active (standby)
state. The site in the standby state protects the site in the active state.
l Active (Standby) state: The active (standby) state refers to the working (protection) state.
For example, when a site is currently responsible for network management, this site is in
the active state.
Networking Description:
Terms
To ensure the U2000 install successfully, definitions for terms as used in this document before
introducing the installation scheme.
l Server: A server can refer to either hardware or software. In the client/server structure, a
server refers to the server program. The term refers to hardware when used in reference
to a computer where a server program runs.
l Client: Refers to the client application of the software in a client/server structure. The
client application can run on a computer along with the server application or on a
separate computer. The term refers to hardware when used in reference to the computer
where a client application runs.
l Workstation and host: A workstation functions the same as a host. Generally, a
workstation or host refers to the computer where services run in a SUSE Linux OS.
Networking Description:
l The U2000 client communicates with the server using a DCN.
l NEs and the OSS communicate using a DCN.
Hardware Configuration
The following table shows the configuration requirements on the hardware of the U2000
server.
Table 1-1 Configuration requirements on the hardware for the U2000 server
Network Scale Server Description
NOTE
l The preceding table shows the recommended delivery configuration. The compatible configuration
varies according to managed NEs and network size. For details, see chapter Management
Capabilities of the U2000 on Different Hardware Platforms in the U2000 Planning Guide.
l U2000 installation, deployment, or running may fail on incompatible servers or servers with non-
recommended configurations.
Software Configuration
The following table shows the configuration requirements on the software of the U2000
server.
Table 1-3 Configuration requirements on the software for the U2000 server
Configuration Item Typical Configuration
NOTE
The preceding table shows the recommended delivery configuration. Compatible software platform:
SUSE Linux Enterprise Server 10 SP4 + SYBASE 15.5, and SYBASE 15.7 with EBF23724 + SP131
cannot be installed on SUSE Linux Enterprise Server 10 SP4 OS. For details about compatible
configuration, see chapter Software Configuration Planning for the NMS Server in the U2000
Planning Guide.
l To prevent program conflict, do not install the software that fails to pass the verification
test in Huawei Lab on the U2000 server.
l Only one U2000 can be installed on a server.
l The U2000 can be installed only on an OS with either the simplified Chinese character
set zh_CN or the English character set en_US.
l A virtual machine supports the installation only of a single-server U2000 running on the
SUSE Linux OS. The U2000 using other solutions cannot be installed on the virtual
machine.
l The working temperature of the IBM server cannot exceed 41°C. Otherwise, the IBM
server may be automatically stopped.
This topic describes how to collect information required for commissioning the cold standby
solution with factory installation information and how to commission the primary and
secondary sites.
2.1 Solution Description
This topic briefly describes the cold standby solution with factory installation information.
2.2 Commissioning Process
This topic describes the process and required time for commissioning primary and secondary
sites in the cold standby solution with factory installation information.
2.3 Preparing for Commissioning
This topic describes the preparations to be made before the primary and secondary sites of the
cold standby solution with factory installation information is commissioned, including
collecting commissioning information, checking mandatory software, and applying for the
U2000 and SSR licenses.
2.4 Checking Hardware Connections
This topic describes how to check hardware installation and cable connections before
installing a U2000. If hardware is improperly installed or cable is improperly connected,
unexpected error may occur during installation of the U2000.
2.5 Powering On a Server
This topic describes how to power on a server and the position of the power button.
2.6 Configuring Controller IP Addresses
Controller IP addresses are used to manage and maintain servers remotely. Configure
controller IP addresses for servers before commissioning the operating system (OS).
2.7 Commissioning the U2000
This topic describes how to commission the cold standby solution with factory installation
information. In the cold standby solution with factory installation information, the U2000 has
been installed on the servers before delivery. In this manner, you do not need to install the
U2000 again but commission it directly. Specifically, you can use the U2000 normally only
after changing system and U2000 parameters to meet site requirements. To allow the U2000
to manage your network, you must commission the U2000 before using the U2000 to manage
NEs and configure services.
2.8 Configuring the Cold Standby Solution
The U2000 cold standby solution supports manual and automatic backup and restore. If
manual backup and restore is used, you need to manually start the backup or restoration task
each time. If automatic backup and restore is used, you only need to configure a scheduled
backup task and a scheduled restoration task. Automatic backup and restore is recommended.
In automatic backup and restore mode, you need to configure a scheduled backup task on the
primary site and a scheduled restoration task on the secondary site to implement fast
restoration with cold backup data. For specific operations of manual backup and restore, see
the Manually Execute Backup and Restoration Tasks section of the U2000 Administrator
Guide.
Context
If only one single server U2000 is deployed at a site, network management functions will
become unavailable if the U2000 fails. To implement fast restoration when the U2000 single-
server system fails, Huawei launches the cold standby solution.
In the cold standby solution, two single server U2000 systems with the same version,
deployment domain, language, OS type, server time, and time zone are deployed. One system
is run on the primary site and the other is run on the secondary site.
l In normal conditions, the primary site provides the network management functions. The
network management process and maintenance tool on the secondary site are stopped
while the database is running. The primary site backs up the network management data
periodically, and the secondary site obtains the backup file from the primary site at
regular intervals.
l If the U2000 on the primary site fails, the U2000 on the secondary site starts
immediately to provide network management functions.
NOTE
l The backup object is the entire database, including the custom data at the U2000 side (excluding the
custom options of the system), network layer trail data, NE-side configuration data, alarm data and
performance data. In addition, a backup is created for the structure of the entire database, all
database tables (including the system tables and the user tables), table structure, and stored
procedures. The personal information (including personal name, phone numbers and addresses) on
the U2000 and all user names and passwords are also backed up. Therefore, you are obligated to
take considerable measures, in compliance with the laws of the countries concerned and the user
privacy policies of your company, to ensure that the personal data of users is fully protected.
l The following data is not backed up when you back up the U2000 database:
l The data that is not saved at the NE side, that is, the data that cannot be uploaded.
l The custom options of the system. For example, font, color setting, and audio setting.
l The function of the fast restoration scheme for the cold standby system and the scheduled tasks on
the U2000 MSuite or U2000 overlaps. You are recommended to execute those tasks at different
time.
Restriction
l Before starting the secondary site, ensure that the license of the U2000 has been loaded
on the secondary site.
NOTE
Please refer 3.3.3 Applying for a U2000 License to generate both the primary and secondary sites
ESNs and send the contract number and the server ESNs to Huawei engineers or the local Huawei
office to apply for a U2000 license.
The U2000 license is loaded at both sites.
l If the database at the primary site has been expanded, the database at the secondary site
must be expanded to the same size; otherwise, restoration may fail.
l If cold standby is performed for the first time in an upgrade scenario, back up data at the
primary site and restore data at the secondary site using the MSuite before configuring a
cold standby task. This prevents a restoration failure due to inconsistent database sizes.
l Automatic backup and restoration scenario:
The OSs of the primary and secondary sites must be the same. That is, if the OS of the
primary site is SUSE Linux, the OS of the secondary site is also SUSE Linux.
Process Introduction to Fast Restoration Scheme for the U2000 Cold Standby
System
The U2000 cold standby solution supports manual and automatic backup and restore. If
manual backup and restore is used, you need to manually start the backup or restoration task
each time. If automatic backup and restore is used, you only need to configure a scheduled
backup and a scheduled restoration task. Automatic backup and restore is recommended.
l Automatic backup and restoration scheme: To automatically back up and restore data,
you need to configure scheduled backup tasks on the primary site and automatic
restoration tasks on the secondary site. The process is as follows:
a. On the secondary site, install a single server U2000 whose version, deployment
domain, language and database username are the same as those on the primary site.
b. Configure scheduled backup tasks on the primary site. The backup files are
generated through backup modules and stored on the primary site.
c. Configure scheduled restoration tasks on the secondary site. Obtain the backup files
through SFTP from the primary site and restore the files on the secondary site.
d. When the primary site malfunctions, start the U2000 on the secondary site to fast
restore the U2000.
l Manual backup and restoration scheme: The manual backup and restoration scheme
requires a cold standby tool to back up and restore data. The process is as follows:
a. On the secondary site, install a single server U2000 whose version, deployment
domain, language and database username are the same as those on the primary site.
b. Use a cold standby tool to back up the U2000 data on the primary site as backup
files and store the files on the primary site.
c. Copy the backup files from the primary site to the secondary site, and use the cold
standby tool to restore the files on the secondary site.
d. Start the U2000 on the secondary site.
NOTE
If this is the first time you perform operations on the SUSE Linux OS or you are not familiar with the
SUSE Linux OS, see F Getting Started to get an overall understanding of the basic operations on the
SUSE Linux OS.
A series of parameters need to be modified during commissioning. You must ensure that on-
site parameters have been planned based on the U2000 Planning Guide before commissioning
is performed. Figure 2-3 shows the installation commissioning process.
Print the following tables and fill in the blanks with the site-specific planning information.
NOTICE
To ensure that the NMS can run properly, host name planning must comply with the following
rules and restrictions:
l The host name of the U2000 server must be unique on the network.
l On Solaris/SUSE Linux OS.
l The host name must be a string consisting of no more than 24 characters that can
only be letters (A to Z, a to z), digits (0 to 9) and hyphen (-).
l The first character must be a letter and the last character cannot be a hyphen.
l The host name cannot contain --.
l The host name cannot contain only one character.
l The host name must be case-sensitive.
l The host name cannot be empty or contain spaces.
IP Address Planning
IP address of the For Huawei RH series rack server, IP address of the iMana can be
iMana on the PC used to remotely log in to a PC server to manage and maintain PC
server server in Web mode. For example, you can use this IP address for
remote OS installation, or use it to maintain the PC server if the OS
fails to start properly.
IP address for the This IP address is used to remotely manage and maintain disk
disk array controller arrays.
System IP address This IP address is the IP address of the OS. You can use it to log in
to the server to manage and maintain the OS.
NMS application IP This IP address is used for external NMS services such as
address communication between the NMS server and clients or between the
NMS server and NEs.
l The iMana IP address and system IP address can be located either on the same network
segment or on different network segments.
l The IP address is in the format of IP address/subnet mask/gateway.
l Planning Principles for IP Addresses are:
– The IP addresses must be unique on the network.
– The NMS application IP address communicates with the managed equipment in the
normal state.
– The NMS application IP address communicates with the OSS in the normal state.
– The NMS application IP address communicates with U2000 clients in the normal
state.
NOTE
Log in to the server OS as user root, run the command ping -S NMS_application_IP
Destination_IP to ensure that NMS application IP address can be normally communicated.
l Single-NIC Scheme
Only one network interface is required and bond cannot be configured.
– Advantage: NIC resources are saved.
– Disadvantage: NIC protection is unavailable.
Table 2-3 shows a planning example.
IP l Primary controller: -
address 10.9.1.10/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.11/255.255.255.
0/10.9.1.254
IP l Primary controller: -
address 10.9.1.12/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.13/255.255.255.
0/10.9.1.254
l Double-NIC Scheme
Two network interfaces are required for configuring bond.
– Advantage: NIC protection is available. If one NIC is faulty, data processing is
switched to the other NIC.
– Disadvantage: One more NIC is used than the single-NIC scheme.
NOTE
Bond: On the SUSE Linux OS, the bond technology is used to form a virtual layer between the
physical layer and the data link layer. This technology allows two server NICs connecting to a
switch to be bound to one IP address. The MAC addresses of the two NICs are also automatically
bound as one MAC address. In this manner, a virtual NIC is formed. The bond technology
supports two modes: double-live and primary/secondary. In double-live mode, after receiving
request data from a remote server, the virtual NIC on the server determines data transmission
based on an algorithm, improving network throughput and usability of the server. In primary/
secondary mode, if an NIC does not function properly, services will be automatically switched to
the other NIC, ensuring service protection. The SUSE Linux OS supports the binding of NICs in
primary/secondary mode.
Table 2-4 shows a planning example.
IP l Primary controller: -
address 10.9.1.10/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.11/255.255.255.
0/10.9.1.254
IP l Primary controller: -
address 10.9.1.12/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.13/255.255.255.
0/10.9.1.254
Route Planning
... ...
NOTE
Installation engineers need to add routes to the client and management network to ensure
communication between the U2000 and the client, and between the U2000 and the management
network.
Time 14:00
NOTICE
The passwords are examples only. To ensure system security, change the password promptly,
update it periodically, and save it properly. The default password indicates the initial password
used when the U2000 is installed for the first time. Production preinstallation indicates the
U2000 software has been installed initially.
2 PuTTY The Download the latest version from official websites http://
software www.chiark.greenend.org.uk/~sgtatham/putty/
uses download.html of the third-party software.
commands For more information about software operation, see the
(telnet and software Help or go to the official website of the software
SSH) to log http://www.chiark.greenend.org.uk/~sgtatham/putty/
in to the docs.html for technical support.
server.
Using SSH
(more
secure,
recommend
ed) to log
in to the
server is
recommend
ed.
3 FileZilla The Download the latest version from official websites http://
tool FileZilla is filezilla-project.org of the third-party software.
used to For more information about software operation, see the
transfer software Help or go to the official website of the software
files by http://filezilla-project.org for technical support.
SFTP.
Context
l The license file is not delivered to customers along with a U2000 installation DVD.
Contact Huawei engineers for the application of a server license according to the
contract number and ESNs of the server.
l To prevent the failure in finding the license file for possible U2000 reinstallation, save
the license application email and the license file properly.
l Before using the U2000, apply for the formal U2000 license in advance because the
U2000 license application goes through a long process.
l An ESN is a string consisting of 40-digit numerals or letters obtained by encrypted
calculation on the MAC addresses of the U2000 server network interface. The number of
ESNs is the same as the number of network interfaces on the U2000 server. To avoid
applying for a new license due to replacing certain network interface cards (NICs), save
all the ESNs to ensure proper use of the U2000 license.
– Generally, the ESN for a server does not change. It can be used for the U2000
license that is normally applied for.
– If the ESN for a U2000 license is changed due to NIC or server replacement or ESN
application error, apply for a U2000 license again and contact Huawei technical
support engineers.
l In the cold standby solution, the primary and secondary sites share the same U2000
license. The U2000 license is bound to the ESNs of the primary and secondary sites at
the same time. When applying for a license, you need to obtain the ESNs of the primary
and secondary sites separately.
Procedure
Step 1 Obtain the project contract number.
Mode 2: View the ESN using the ESN tool of the NMS after installing the U2000.
1. Log in to the OS as user root.
2. Run the following commands to view the ESN:
# cd /opt/oss/server/platform/bin
# ./esn
Mode 3: Query information about the software and hardware installation and ESNs of a
Huawei rack server at http://texpert.huawei.com/TExpert/Pages/PageContainer.htm. For
details, see A.5.20 How to Query Information About the Software and Hardware
Installation and ESNs of a Huawei Rack Server.
Step 3 After the esn command is executed, the Esn.txt file is automatically generated in the current
path. Send the contract number and the server ESNs to Huawei engineers or the local Huawei
office.
NOTE
Huawei engineers access http://w3.huawei.com/sdp/ to obtain the license based on the contract number
and ESNs.
Step 4 Huawei engineers send the license file to you after obtaining it.
NOTE
The license file provided with the U2000 exists as a .dat file.
----End
Prerequisites
l GTS rights for ESDP login are available.
l The license confirmation form or contact number has been obtained.
NOTE
The license confirmation form is delivered in paper format along with the DVD. The license
confirmation form functions as the license file and should be kept properly on site.
Procedure
Step 1 Obtain information used for license download.
l If the license confirmation form has been obtained, send the information to related
Huawei engineers or the local office of Huawei.
l If the license confirmation form has not been obtained, obtain the contract number and
send it to related Huawei engineers or the local office of Huawei.
Step 2 Huawei engineers log in to the ESDP website http://w3.huawei.com/sdp/ (Huawei intranet)
or http://app.huawei.com/isdp/ (Internet) according to the obtained information.
Step 3 In Carrier Navigation, select the ESDP product module.
Step 4 Choose Order Management > Entitlement Management from the left-hand navigation tree.
The Entitlement Management page is displayed.
Step 5 On the Entitlement Management page, enter the following conditions and click Search.
l Entitlement Type: Select The 3rd Party Software.
l Huawei Contract No.: Enter the 14-digit Huawei Contract No..
Step 6 View license information, select the required license, and click Download The 3rd Party
License.
Step 7 Download the license according to the right-hand button status.
l If the Download License button is orange, the license can be downloaded.
l If the Download License button is gray, the requirement has not been confirmed, and
you must wait for a period of time to download the license.
l If the Download License button is unavailable, the license cannot be downloaded.
l If the Reapply button is available, the license has been downloaded, and you can re-
apply for license download. After clicking this button, enter the approver and application
reason and sign a letter of commitment on the Reapply page. Then click Sure to
Download to download the license.
Step 8 After clicking the download button, verify that the information is consistent with information
about installed software. Select I have read already and enter Receiving E-mail address.
Then click Sure to Download.
Step 9 The related Huawei engineer sends the SSR license obtained by email to the user.
NOTE
Keep the license properly. If the license is lost, you can re-download it only after being approved.
----End
Prerequisites
The server hardware must have been installed and equipment cables must have been
connected, for details, see U2000 Hardware Installation Guide (N610E).
Procedure
Step 1 Ensure that the power cables and ground wires for all components are tightly connected and in
good contact and that the polarities are properly placed.
NOTE
Generally, the server has two or more power modules which are used to provide power supply
protection. Connect each power module to a specific power input. For details, see U2000 Hardware
Installation Guide (Huawei N610E cabinet).
Step 2 Ensure that all cables are bundled and free of visible damage.
Connect the network interface that is configured with a system IP address during pre-installation to the
network. If the network interface is not connected to the network, the U2000 fails to synchronize
network configurations or be started. Configuring the system IP address for the network interface with
the smallest interface serial number is preferred. For example,the network interface eth0 with serial
number of 1 can be used for the Huawei RH5885H V3, Huawei RH2288H V3 and Huawei RH2288H
V2 servers.
l Figure 2-4 shows hardware connections for the Huawei RH5885H V3 server.
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 2-5 show the hardware connections between the Huawei RH5885H V3 server
and the OceanStor 5500 V3 disk array.
Figure 2-5 Hardware connections between the Huawei RH5885H V3 server and the
OceanStor 5500 V3 disk array
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 2-6 shows hardware connections for the Huawei RH2288H V3 server.
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 2-7 shows hardware connections for the Huawei RH2288H V2 server.
NOTE
For details about the mapping between physical network interfaces and logical network interfaces,
see A.2.5 Mappings Between Physical and Logical Network Interfaces on an Huawei RH
series rack server Running SUSE Linux.
----End
Follow-up Procedure
Ensure that all debris (cable straps, stubs, or moisture-absorbent packets) are picked up.
Remove unnecessary items from the telecommunications room. The workbench must be neat
and the movable floor must be level and clean.
Server
1. Power on a Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3 server.
NOTICE
l Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3 server supports
100 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
2. Press the power buttons on the peripherals and monitor connected to a server.
3. Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks
every 1s, press the power button on the shelf of the server.
NOTE
If the power button is steady on, the server has been successfully powered on. For details about
IBM server indicators, see the manual for IBM servers or log in to the official IBM website. For
details about Huawei server indicators, see the manual for Huawei servers or log in to the official
Huawei website. For official websites of software and hardware documents, see A.5.17 How Do I
Obtain Third-Party Software and Hardware Materials.
The red boxes in the following figures show the positions of power buttons on Huawei
RH2288H V2, Huawei RH5885H V3, IBM X3650 M4, IBM X3650 M3 and, IBM
X3850 X5.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network
cables, or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning
it on.
l Normal power-on sequence: 1. Turn on the power switches of the external power
supplies connected to all the devices. 2. Press the power button on either controller. 3.
Turn on the LAN switch or FC switch (if any LAN switch or FC switch is deployed but
is not powered on). 4. Turn on the application server (if the application server is not
powered on).
l Normal power-down sequence: 1. Stop the services of the application server. 2. Hold the
power button for 5 seconds on the controller enclosure. 3. Disconnect the controller
enclosure and disk enclosures from the external power supplies.
NOTE
Power supply must be provided for the two power modules of the OceanStor 5500 V3; otherwise, the
OceanStor 5500 V3 fails to be used. Press the power button on controller A/B. Wait 5 to 10 minutes
until the power indicator is steady green and no longer flashing, indicating the power-on success.
Physical indications that the storage system is up and running without error:
l The power indicators of the controllers, controller enclosure, and disk enclosures are
steady green.
l The alarm indicators of the controllers, controller enclosure, and disk enclosures are off.
l The running indicators of the coffer disks are steady green, and their alarm/location
indicators are off.
If a server is not equipped with the KVM, the mode through iMana/iBMC management
interface is recommended.
l For more operations on the Huawei RH5885H V3 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9768163&idAbsPath=7919749|9856522|9856792|9768163.
l For more operations on the Huawei RH2288H V3 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9901881&idAbsPath=7919749|9856522|9856792|9901881.
l For more operations on the Huawei RH2288H V2 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9581539&idAbsPath=7919749|9856522|9856792|9581539.
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
If an IE or Remote Virtual Console fault occurs in the iMana, see A.2.4 How to Solve iMana/iBMC
Problems to rectify the fault.
Context
l The system allows a maximum of four users to log in concurrently, one user to use the
Remote Control function at a time.
l By default, the system timeout period is five minutes. That is, if you do not perform any
operation on the Web UI within five minutes, you are logged out of the Web UI of the
system automatically. In this case, you need to enter the user name and password to log
in again.
l The system locks a user if the user fails to enter a correct password for consecutive five
times. The user is automatically unlocked five minutes later, and the administrator user
can unlock the user in command line.
l To ensure system security, change the initial password after the first login, and then
change your password periodically.
Procedure
Step 1 View the position of the iMana interface on the Huawei RH series rack server.
A management network port for iMana is at the end of the Huawei RH series rack server. You
can visit iMana through this port, as shown in the following figure.
Step 2 Use a network cable to connect the PC and the iMana management interface of the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the iMana must be in the same network segment.
NOTE
The default IP address of the iMana is 192.168.2.100 and the default subnet mask is 255.255.255.0. If
the default IP address of the iMana is changed, see A.2.2 How to View the IP Address of the iMana/
iBMC on the Huawei RH series rack server.
Step 4 Run the Internet Explorer, and then enter "https://ipaddress" in the address box.
NOTE
The ipaddress is the IP address of the iMana management network interface.
Step 6 Enter the user name and password, choose whether to log in to the local computer or to the
user domain. Then click Log In.
NOTE
Step 8 Choose Manually Set an IP Address in the IPv4 area. Set the IP, the subnet mask, and the
default gateway of the iMana as required.
l The window stays at the page for changing IP, ignore it.
l Type the new iMana IP in the address bar of Internet Explorer. The Web management page of iMana
is displayed.
Step 10 Disconnect the iMana management interface of the server from the PC and connect the iMana
management interface to the network.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l A network cable is available. As network interfaces on a server are enabled with auto-
negotiation, either parallel or crossover network cables can be used.
NOTE
If an IE or Remote Virtual Console fault occurs in the iBMC, see A.2.4 How to Solve iMana/iBMC
Problems to rectify the fault.
Context
l The system allows a maximum of four users to log in concurrently, one user to use the
Remote Control function at a time.
l By default, the system timeout period is five minutes. That is, if you do not perform any
operation on the Web UI within five minutes, you are logged out of the Web UI of the
system automatically. In this case, you need to enter the user name and password to log
in again.
l The system locks a user if the user fails to enter a correct password for consecutive five
times. The user is automatically unlocked five minutes later, and the administrator user
can unlock the user in command line.
l To ensure system security, change the initial password after the first login, and then
change your password periodically.
Procedure
Step 1 View the position of the iBMC interface on the Huawei RH2288H V3 server and Huawei
RH5885H V3 server.
A management network port for iBMC is at the end of the Huawei RH2288H V3 server and
Huawei RH5885H V3 server. You can visit iBMC through this port, as shown in the
following figure.
Step 2 Use a network cable to connect the PC and the iBMC management interface of the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the iBMC must be in the same network segment.
NOTE
The default IP address of the iBMC is 192.168.2.100 and the default subnet mask is 255.255.255.0. If
the default IP address of the iBMC is changed, see A.2.2 How to View the IP Address of the iMana/
iBMC on the Huawei RH series rack server.
Step 4 Run the Internet Explorer, and then enter "https://ipaddress" in the address box.
NOTE
The ipaddress is the IP address of the iBMC management network interface.
Step 7 In the upper corner of the iBMC home page, click the Config tab. On the displayed page,
choose NetWork Settings from the navigation tree.
Step 8 In the IPv4 area in Select IP Version and Set IP, select Manually set IP address and set the
iBMC IP address, subnet mask, and default gateway based on actual requirements.
Step 9 Click Save in the IPv4 area. In the Confirm dialog box, click OK.
NOTE
l The window stays at the page for changing IP, ignore it.
l Type the new iBMC IP in the address bar of Internet Explorer. The Web management page of iBMC
is displayed.
Step 10 Disconnect the iBMC management interface of the server from the PC and connect the iBMC
management interface to the network.
----End
Prerequisites
l You must ensure that the server is connected to the KVM.
l Use a network cable to connect the switch and the iMana/iBMC management interface
of the server.
Procedure
Step 1 Press the power button to restart the PC server.
Step 2 When the BIOS start page appears, press Delete until the BIOS Setup Utility program is
started.
NOTE
If the BIOS password has been modified, a dialog box asking you to enter a password will be displayed
during startup. Enter the required password to access the Setup Utility application.
c. Select IP Source under IPV4 Configuration, and press Enter. The menu dialog
box is displayed.
Step 4 Select Static, and press Enter.
Step 5 Enter the planned iMana IP, subnet mask, and gateway in IPv4 IP Address, IPv4 Subnet
Mask, and IPv4 Gateway Address respectively.
Step 6 Set the IP address, subnet mask, and gateway.
l For Huawei RH5885H V3 or Huawei RH2288H V2 server, enter the planned iMana IP
address, subnet mask, and gateway in IPv4 IP Address, IPv4 Subnet Mask, and IPv4
Gateway Address respectively.
l For Huawei RH2288H V3 server, enter the planned iBMC IP address, subnet mask, and
gateway in IP Address, Subnet Mask, and Gateway Address on the IPV4
Configuration tab respectively.
Step 7 Press Enter to accomplish the IP configuration of the iMana/iBMC management module.
Step 8 Press F10 and select Yes from the dialog box to save the configurations and quit the
configuration page.
----End
Prerequisites
l The controller IP addresses are obtained.
l The power cable of the disk array is connected.
l Optional: For a PC without a DB-9 port, a USB-DB-9 serial cable is available, and the
USB serial port drive has been installed.
l Perform the following operations to query the communication port number on the PC's
serial port:
NOTE
For the laptop, connect the serial port of the local controller to the serial port of the disk array (SERIAL
MGT) first, or can not query the communication port number on the laptop.
a. Right-click Computer on the PC desktop and choose Manage from the shortcut
menu.
b. In the Computer Manage window, choose Computer Manage (local) > System
Tools > Device Manager.
c. Choose ports (COM&LPT) in the right pane of Device Manager to check the
communication port on the PC's serial port, such as COM1.
Context
The OceanStor 5500 V3, a disk array, has two controllers. The IP addresses configured in this
section are examples only. For example, set the IP address of the management network of
Procedure
Step 1 Connect the computer and controller A of the disk array physically.
Use a serial port cable (DB9-RJ45) to connect the serial port of the local controller to the
serial port of the disk array ( ).
Use an RJ45 connector at one end of the serial port cable to connect to the serial port of the
disk array ( ) and a DB-9 connector at the other end of the cable to connect to the serial
port of the computer.
5. Click Open.
If the connection succeeds, the following information will be displayed:
Storage login:
– The default administrator name is admin and the initial password of the admin user is
Admin@storage. If the U2000 is preinstalled before being delivered, the password has been
changed to Changeme_123. After the initial login, change the default password immediately. To
ensure the security of the U2000, passwords must be complex enough. For example, a password
must contain eight or more characters of two types. The allowed characters are digits, letters, and
special characters. Remember to change passwords regularly.
– After an admin user enters an incorrect password for three consecutive times, the admin user will
be locked and therefore cannot be used to log in to the disk array controller. The admin account
will be automatically unlocked after 15 minutes.
– Run the following command to change the password for the current user.
admin:/>change user_password
Old password:old password
New password:new password
Reenter password:new password
Command executed successfully.
Step 6 Run the following command to exit the controller of the disk array.
admin:/> exit
Are you sure to exit?(y/n):y
----End
been installed on the servers before delivery. In this manner, you do not need to install the
U2000 again but commission it directly. Specifically, you can use the U2000 normally only
after changing system and U2000 parameters to meet site requirements. To allow the U2000
to manage your network, you must commission the U2000 before using the U2000 to manage
NEs and configure services.
NOTE
This topic applies only to the U2000 server in the cold standby solution with factory installation
information.
Access - As some of
the domains
Transport may not be
deployed
during
U2000
installation,
you can use
the domain
deployment
function to
deploy a
Deploy new domain
as needed so
IP that the
U2000 can
manage NEs
in this
domain.
NOTE
If some
domains are
gray, the
domains
have been
deployed.
Access - To disable
the U2000
Undeploy from
Transport managing
NEs in a
domain,
undeploy
the domain
to improve
system
operation
efficiency.
Do not
select all the
domains
because
IP
there must
be at least
one domain
deployed.
NOTE
If some
domains are
gray, the
domains
have not
been
deployed.
- This
commissioni
ng item is
available for
a Linux
single-
server
system
Set SSR without the
SSR License
License disk array.
The SSR
license must
be set for
full system
backup
configuratio
n.
l If only
the time
zone
needs to
For details, see be
section Time and modified
Time Zone , restart
Planning in U2000 the
Planning Guide. operatin
g system
l Time zone: Set
Set Date after the
Time Zone: this parameter to
Time Zone modifica
the local time
tion so
zone, such as
that the
Asia/Beijing.
time is
l Time: Set this automati
parameter to the cally
local time. adjusted
based on
the new
time
zone.
l If the
time
zone and
time
both
need to
be
changed,
change
the time
first and
then the
time
zone.
Time:
After the
operatin
g system
is
restarted,
the new
time is
automati
cally
adjusted
based on
the new
time
zone.
Single-
Server
System
Software
MSuite Old New
Installation
Administrato Passwo Password
and
r rd: :
Commission
ing Guide
(SUSE
Linux).
Include two
Internal Certificates:
NMS Certificate List
l Trust Certificate.
Certificate
l CRL.
Networ
k card
(Logic
al IP
Single-NIC
networ Address/
Scheme
k Netmask
interfa For details, see
ces section IP Address
Other
name): Planning for a
parameters
Set Network Single-Server
Networ use default
System (SUSE
k card values.
Linux) in U2000
(Logic Planning Guide.
al IP
Two-NIC
networ Address/
Scheme
k Netmask
interfa
ces
name):
NIC:
IP Address:
Active NIC
Netmask:
Host Name:
indicator
template and only
new indicators
are added to the
original indicator
template. Export:
The performance
indicator
template is
exported, backed
up, or provided to
another U2000
server.
l Manual
configuration:
Before
commissioning,
you must confirm
the performance
indicators to be
monitored and
print the
performance
data. Modify: In
the dialog box
that is displayed,
configure the
indicators as
required.
Prerequisites
NOTICE
l Manually changing the system IP address causes a failure to use the commissioning tool.
Therefore, configure the system IP address through the commissioning tool.
l All network information will be cleared when you adjust the networking by using the Set
Network commissioning item of the Commissioning Tool. If southbound and northbound
IP addresses are configured independently on the customer's network, reconfigure them
after the networking is adjusted.
Context
The commissioning tool is used only after the initial installation of the U2000 is complete. Do
not use the commissioning tool after the U2000 has running for a period of time. If system
parameters need to be commissioned, see section MSuite in the U2000 Administrator Guide.
Procedure
Step 1 Select the network interface identified as 1 on the server back plane and use a network cable
to connect the network interface to the PC or laptop.
NOTE
During preinstallation, the system IP is configured for network interfaces marked as 1 by default.
Step 2 Modify the IP address and subnet mask of the PC or laptop to be on the same network
segment where the system IP address of the U2000 server is located.
NOTE
The preinstallation by default configures the system IP address as 192.168.128.110 and the subnet mask
as255.255.255.0.
Step 3 On the PC or laptop, use the remote GUI login software, such as VNC, to log in to the SUSE
Linux OS GUI as the ossuser user. For details, see Configure the VNC service as the
ossuser user.
NOTE
The default password of the ossuser user is Changeme_123. The default password is not changed
during preinstallation.
Step 4 Right-click the blank area of the desktop and choose Open in Terminal from the shortcut
menu to open the CLI.
Step 5 Ensure that the U2000 is not running.
To check the running status of U2000 processes, run the following command:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start.
The process is stopped if the displayed information is empty.
If the U2000 is still running, run the following commands to stop it:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
Step 7 Ensure that the MSuite servers on the primary and secondary sites have been started.
Run the following command as the root user to check whether the MSuite servers are started:
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
# ps -ef | grep java
A message similar to the following will be displayed in the SUSE Linux system:
...
root 7593 7130 0 06:31 pts/7 00:00:00 grep java
ossuser 8937 12803 0 04:13 pts/8 00:00:42 /opt/oss/OSSJRE/jre_linux/bin/
java -Dprocname=AgentIntegrate -Dfile.encoding=UTF8 -Xmx1024m -
XX:MetaspaceSize=16m -XX:MaxMetaspaceSize=256m -XX:+UseCompressedClassPointers -
XX:+UseCompressedOops -XX:CompressedClassSpaceSize=128m -XX:
+HeapDumpOnOutOfMemoryError -DabsCfgPath=/opt/oss/server/etc/oss_cfg/frame -cp
nbi/agentintegrate/thirdparty/*:3rdlib/*:common/uflightdispatcher/lib/
jdom.jar:cbb/qasn/lib/*:common/uflight/frame_app/plugins/
com.huawei.uflight.platformadapter/*:common/uflight/web_app/plugins/pax-web-
runtime-2.1.2.jar:common/uflight/web_app/plugins/web_app/plugins/pax-web-
spi-2.1.2.jar:nbi/agentintegrate/lib/*:nbi/agentintegrate/bin/*
com.huawei.u2000.inventory.webserver.JettyStarter
...
NOTE
If the displayed information contains /opt/oss/OSSJRE/jre_linux/bin/java -server, the MSuite servers have
been started.
If the MSuite servers have not been started, switch to the ossuser and run the following
commands as the root user to start the MSuite servers:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./startserver.sh
– When you log in to the MSuite client, a progress bar is displayed showing the progress of
Refresh Deployment Information. Wait until the operation is complete.
– The MSuite works in single-user mode. Specifically, only one MSuite client can log in to the
MSuite at one time.
NOTICE
l If a message asking you to refer to the associated section in the installation guide is
displayed during system commissioning, the system needs to be manually commissioned.
l After the host name is configured, you cannot come back to modify other configuration.
Otherwise, the commissioning may be abnormal. Configure the host name after other
commission items are configured.
l After security hardening is enabled, you cannot use the commissioning tool to change the
password of the OS user. For details about the method of changing a password, see A.1.1
How to Change the OS User Password.
Step 11 Click Finish on the Finsh window, the Commissioning finished successfully, please use
UEasy tool to perform routine inspection. information is displayed. Click OK and perform
routine inspection if needed.
Step 12 After system parameters are commissioned, run the following commands to restart the OS as
the root user to make the modification take effect:
# sync;sync;sync;sync
# shutdown -r now
Step 13 Disconnect the PC or laptop from the U2000 server and then see 4.4 Checking Hardware
Connections to connect the U2000 server to the network.
----End
Follow-up Procedure
l If the server IP address is changed during commissioning, you must manually configure
the hardware alarm monitoring function. For details about the replacement procedure,
see C.3.1 Configuring the Monitoring Function for an OceanStor 5500 V3 Disk
Array and C.3.2 Configuring the Monitoring Function for an S3900 Disk Array.
l If NTP is configured during commissioning, check whether NTP service configurations
are correct. For details, see A.1.26 Checking the NTP Service on Linux.
l If you want to stop the NTP, see A.5.19 Starting or Stopping the NTP Service on
SUSE Linux.
Prerequisites
l The U2000 client is installed by referring to iManager U2000 version Client Software
Installation Guide.
l The U2000 license file must be ready.
NOTICE
The license file name can contain digits, letters, and special characters excluding the
space or \ /:*?"<>|.
Context
l During installation of the U2000 software, the OS user ossuser is created automatically.
The ossuser user is used to regularly maintain a U2000.
l Two methods are available for loading a U2000 license.
– Method one:
Use commands to load the license. This method is applicable to users who cannot
log in to GUI OSs.
Deployment scenario: The GUI is unavailable. Users cannot log in to the U2000
client but have to use commands for remote operations.
– Method two:
Load the license in the GUI. This method is applicable to users who are not familiar
with common commands of the SUSE Linux OS.
Deployment scenario: Loading the license in the GUI is recommended. If the GUI
is available and the login to the U2000 client is successful, use this method.
NOTE
l You can select a method as required. No matter which method is selected, ensure that the U2000
server process has been started.
l In the SUSE Linux OS, See How to Fix Garbled Characters in the SUSE Linux Command
Output to fix garbled characters if the SUSE Linux command output displays garbled characters.
You can select a method as required. No matter which method is selected, ensure that the U2000 server
process has been started.
Procedure
Step 1 Log in to the OS as the ossuser user.
NOTE
The initial password of the ossuser user is Changeme_123. For details about For system security,
modify the default password and remember the new password., see A.1.1 How to Change the OS User
Password.
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Step 4 Run the following commands to check whether a license file exists. If a license file exists,
back it up. If the license file does not exist, skip this step.
$ cd /opt/oss/server/etc/conf/license
$ ls
If the folder contains any other license file, run the following commands to back up the any
other license file to the /opt/oss/server/etc/conf/license_backup path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
NOTE
If the name of the license file contains a space, add quotation marks for license_file_name in the above
command.
Step 5 The encoding format of the U2000 license file must be UNIX, not DOS. For details about
how to confirm the encoding format of the U2000 license file, see A.5.11 How to Confirm
the Encoding Format of the U2000 License File.
To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.
1. Use SFTP to upload the license file to the /export/home/ossuser directory on the server
as the ossuser user. For details, see A.1.27 How to Use the FileZilla to Transfer Files
by SFTP.
NOTE
If the license file uploaded by the root user is used, the ossuser user may not have the read
permission and therefore the license fails to be updated. Use the license uploaded by the ossuser
user. If security hardening is performed on the OS, FTP/SFTP rights of ossuser will be disabled.
In this case, you need to upload files to the backup directory in the FTP root directory as the
ftpuser user (the FTP root directory of ftpuser is /opt/backup/ftpboot).
2. To activate the license file, run the following commands:
a. Log in to the OS of the server as the ossuser user.
b. Run the following commands to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
1. Save the license to be loaded to the server where the U2000 client is located.
2. Log in to the OS as a user with the administrator rights where the client program is
installed.
3. On the OS desktop, double-click the U2000 Client shortcut icon. The Login dialog box
is displayed.
4. In the Server drop-down list, select the server to be logged in to. Then, set User Name
and Password to the valid values, and click Login. The initial password of the admin
user is Changeme_123. The password must be changed during the first login to ensure
system security. Keep the password confidential and change it regularly.
– If a message indicating that no license is available is displayed when you log in to
the U2000 client.
i. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
ii. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
iii. Click OK.
iv. Click Yes and confirm the loaded license.
v. Click OK.
– If U2000 license is loaded before.
i. Choose Help > License Management > License Information from the main
menu (traditional style); alternatively, double-click System Management in
Application Center and choose License Management > Licenes
Information from the main menu (application style).
ii. In the License Information dialog box, click Update License.
iii. Select the new license file and click Open.
iv. Click Next.
v. Select a scenario and perform the associated operations as required:
○ If Incremental is unavailable, click Next.
○ If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
○ If Incremental is available and both the new and in-use U2000 licenses
need to be effective, select Incremental and click Next. If the in-use
U2000 license has a commercial license and a temporary license, the new
license will replace the license of the same type. For example, if the new
license is a commercial license, the commercial license in the in-use
U2000 license will be replaced.
vi. Click Finish.
vii. Click Yes and confirm the updated license.
viii. Click Yes to close all windows.
ix. Click Yes to log out of the system.
----End
Result
After the preceding operations are performed, the license file is automatically loaded to
the /opt/oss/server/etc/conf/license path.
Prerequisites
l If the delivered server has been preinstalled, ensure that system commissioning is
complete. For details, see 2.7.2 Configuring System Commissioning Parameters.
l Ensure that the U2000 license has been loaded. For details, see 2.7.3 Loading a U2000
License.
l The remote command login software, such as PuTTY, has been obtained.
NOTE
The recommended resolution range is 1024 * 768 to 1920 * 1080.
Context
The U2000 commissioning parameters cover communication security, U2000 user security
policy, communication between the U2000 and NEs, alarm function, and common U2000
configurations.
Procedure
Step 1 Use the PuTTY to enable the VNC service for the ossuser user. Log in to the GUI desktop as
the ossuser user. For details, see Configure the VNC service as the ossuser user.
Step 2 On the GUI desktop, right-click and choose Open in Terminal from the shortcut menu.
Step 3 Run the following command to check whether the U2000 is started:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Step 4 If the U2000 process is not started, run the following commands to start it:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
----End
Result
After U2000 parameters are commissioned, the U2000 and NEs can communicate with each
other properly, and the U2000 works properly.
Context
l During installation of the U2000 software, the OS user ossuser is created automatically.
The ossuser user is used to regularly maintain a U2000.
l During installation of the U2000 software, only one default NMS user, that is, user
admin, is provided. The admin user is the administrator of the U2000 and has the
highest rights of the U2000.
Procedure
Step 1 Log in to the server OS as user ossuser.
NOTE
The initial password of the ossuser user is Changeme_123. For details about For system security,
modify the default password and remember the new password., see A.1.1 How to Change the OS User
Password.
NOTICE
A U2000 client does not support the Linux OS. Manually starting a U2000 client and running
a script on the Linux OS may bring risks. Therefore, exercise caution when performing these
operations.
l /etc/ICMR
l /var/ICMR
Step 4 To check the U2000 version, run the following commands:
$ cd /opt/oss/engr/install/etc/conf
$ cat MacroFileNW.properties
The preceding displayed information shows the U2000 version. If the version information
does not meet the actual requirement, uninstall the U2000 and install the U2000 again.
Step 5 Ensure that the database is running.
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). Security(SSL) is
recommended for the high security requirements. You can run a command on the server to query
the data transmission mode.
For details about how to set the communication mode for the U2000 server in a SUSE Linux
single-server system, see A.5.10 How to Set the Communication Mode on the U2000 server for
the Single-Server System (SUSE Linux).
----End
Follow-up Procedure
l To save the server disk space, run the following command to delete /opt/install
directory.
$ su - root
Password: root user password
# rm -r /opt/install
NOTICE
After installation, do not change the installation directory. If the installation directory is
changed, the U2000 fails to work properly or uninstalled.
l If login to a U2000 client fails, see A.6.4 Failure to Log In to the U2000 Server from a
U2000 Client to resolve the problem.
l The installation is not complete if any of the preceding checks are not passed. For
details, see A.6.8 How to Address the U2000 Installation or Uninstallation Failure.
Prerequisites
l A single server U2000 system whose version, deployment domain, language, OS type,
server time, and time zone are the same as those on the primary site is installed on the
secondary site.
l The U2000 processes and the database are running on the primary site.
l Network communication between the primary site and the secondary site is normal, and
the minimum bandwidth is 10 Mbit/s.
l The SFTP Server service has been activated on the primary site, and related ports
(including the SFTP service port 22) have been enabled.
NOTE
For details on enabling the SFTP Server service on a SUSE Linux operating system, see A.1.2
How to Start/Stop the FTP/SFTP/Telnet Service in the SUSE Linux OS.
l If a firewall is deployed between the primary site and the secondary site, the SFTP
service port (by default, port 22) on the firewall must be enabled. For details on enabling
the SFTP service port on a firewall, see the firewall user guide.
l Only one scheduled backup or restoration task is allowed on a single server. For
example, if you create a new automatic backup task on the primary site, the old backup
task on the primary site will become invalid and only the new one will be retained.
Context
In upgrade, reconstruction, and data migration scenarios, you may need to back up or restore
U2000 data manually. For details, see the Manually Execute Backup and Restoration
Tasks section of the U2000 Administrator Guide.
Procedure
Step 1 Run the following steps to execute the configuration script.
NOTE
If execution of the configuration script fails, apply troubleshooting as prompted or contact Huawei
technical support engineers.
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
NOTE
The time configured for the cold backup task does not overlap with the time when data is being restored
using the MSuite. Cold backup may fail if the MSuite is restoring data.
Step 4 Enter the backup frequency, for example, if the frequency is 2:00 every day, enter 2 and press
Enter.
NOTE
l The maximum number of backup files must match the size of disk that will hold the backup files,
and is recommended to be 30.
l It is recommended that you set the scheduled backup time to the time when network service traffic is
light, such as at midnight (00:00 to 06:00).
Step 5 Enter the maximum number of backup files, such as 30, and press Enter.
The scheduled task is successfully created if the following information is displayed.
Scheduled task created successfully.
NOTE
----End
Result
After a backup task is created on the primary site, use one of the following methods to verify
whether the configuration of backup task is successful:
l Using query commands
– Check the backup task.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -task
NOTE
The displayed value of cycle varies depending on the backup interval. For example:
l If the configured backup interval is daily, the displayed value of Day is similar to
daily.
l If the configured backup interval is weekly, the displayed value of Day is similar
to weekly: Sunday.
l If the configured backup interval is monthly, the displayed value of Day is similar
to monthly: 22.
– Check the backup result.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -result
NOTE
The fields in the command output indicate the backup date and time, operation result
(Successful/Failure), operation type (backupDB/restoreDB), and backup package (the
timestamp in the file name indicates the backup time).
NOTE
The directory /opt/oss/engr/tools/coldbackuptool in the preceding command assumes that the
U2000 is installed in the default directory /opt/oss. If the U2000 is not installed in the default
directory, replace the directory in the command accordingly.
l Check the log.
When the scheduled time of the backup task is reached, run tail -f /opt/oss/engr/tools/
coldbackuptool/silent/coldbackupresult.txt to check the backup log.
l Check the backup files.
The backup directory is /opt/backup/ftpboot/coldbackupdata and the backup files are
in the 7z format.
Follow-up Procedure
For how to end the backup task, run the following steps.
1. Log in to the OS as the ossuser user through SSH by using PuTTY.
2. Run the following commands to switch to the root user and end the backup task on the
secondary site:
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./stopCron.sh
Prerequisites
l A single server U2000 system whose version, deployment domain, language, OS type,
server time, and time zone are the same as those on the primary site is installed on the
secondary site. For details about the installation procedure, see the U2000 Single-Server
System Software Installation and Commissioning Guide.
l On the secondary site, network management process and the maintenance tool are
standby and the database is running. If the U2000 has started when the restoration task is
performed, the U2000 process is automatically stopped.
l Network communication between the primary site and the secondary site is normal, and
the minimum bandwidth is 10 Mbit/s.
l The primary site is running correctly. (If the primary site becomes faulty before
automatic restoration starts, data cannot be restored on the secondary site.)
l Only one scheduled backup or restoration task is allowed on a single server. For
example, if you create a new automatic backup task on the primary site, the old backup
task on the primary site will become invalid and only the new one will be retained.
Context
In upgrade, reconstruction, and data migration scenarios, you may need to back up or restore
U2000 data manually. For details, see the Manually Execute Backup and Restoration
Tasks section of the U2000 Administrator Guide.
Procedure
Step 1 Run the configuration script on the secondary site.
NOTE
If execution of the configuration script fails, apply troubleshooting as prompted or contact Huawei
technical support engineers.
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
Step 3 Enter the automatic restoration interval, for example, if the automatic restoration task is
performed once every day, enter 1 and press Enter.
Information similar to the following is displayed:
Set execution time (0-23)|1:
Step 4 Enter the time to start the automatic restoration task, such as 5 and press Enter.
Information similar to the following is displayed:
>>>>>Enter the peer SFTP user<<<<<
Enter the peer SFTP IP address:
Enter the password for SFTP user:
NOTE
l The interval between the automatic restoration time and the automatic backup time is fixed at 3
hours. For example, if the automatic backup time is 2 a.m., set the automatic restoration time to 5
a.m.
l If connection to the primary site fails due to Primary Site Authentication Error when you enter
the primary site's SFTP information, see How Do I Handle the Failure to Connect Two Servers Due
to a Mutual Trust Authentication Error? for troubleshooting.
l Reconfigure the automatic restoration task if the SFTP user's password is changed.
Step 5 Enter the IP address and SFTP user name of the primary site, and press Enter. In this
example, IP address is 192.168.0.0 and default password of the SFTP user is
Changeme_123. The information is used by the secondary site to obtain the backup file from
the primary site by using the SFTP.
The scheduled task is successfully created if the following information is displayed.
Scheduled restoration will automatically shut down the U2000 and MSuite.
Scheduled task created successfully.
----End
Result
After an automatic restore task is created on the secondary site, use one of the following
methods to verify whether the configuration of restore task is successful:
l Using query commands
– Check the restoration task.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -task
NOTE
The displayed value of cycle varies depending on the restoration interval. For example:
l If the configured restoration interval is daily, the displayed value of Day is similar
to daily.
l If the configured restoration interval is weekly, the displayed value of Day is
similar to weekly: Sunday.
l If the configured restoration interval is monthly, the displayed value of Day is
similar to monthly: 22.
– Check the restoration result.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -result
NOTE
The fields in the command output indicate the restoration date and time, operation
result (Successful/Failure), operation type (backupDB/restoreDB), and backup
package (the timestamp in the file name indicates the backup time of the data to be
restored).
NOTE
The directory /opt/oss/engr/tools/coldbackuptool in the preceding command assumes that the
U2000 is installed in the default directory /opt/oss. If the U2000 is not installed in the default
directory, replace the directory in the command accordingly.
l Checking the log
When the scheduled time of the backup task is reached, run tail -f /opt/oss/engr/tools/
coldbackuptool/silent/coldrestoreresult.txt to check the restore log.
Follow-up Procedure
l For how to end the restoration task, run the following steps.
a. Log in to the OS as the ossuser user through SSH by using PuTTY.
b. Run the following commands to switch to the root user and end the restoration task
on the secondary site:
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./stopCron.sh
l After automatic restoration is implemented for the first time, stop the U2000 process on
the primary site and start the U2000 process on the secondary site to ensure that the
process can function properly.
– If the U2000 process runs properly on the secondary site, stop the U2000 process on
the secondary sites start the U2000 process on the primary site.
– If the U2000 process not runs properly on the secondary site, re-execute the restore
task on the secondary sites or contact Huawei technical support personnel.
NOTE
After data restoration fails, if the missing database files fault is found in the log file, rectify the
fault by following the instructions provided in How to Rectify the Data Restoration Failure on a
Secondary Site Because of Missing Databases.
NOTE
l If the CORBA NBI, XML NBI, SNMP NBI, or text NBI is configured for the U2000, you must
reconfigure the IP address used by the NBI to interconnect with the upper-layer OSS after
successfully restoring the database. For details, see the related NBI user manual.
l After the preceding operations are complete, login passwords for the U2000 client and NE Software
Management are restored to be consistent with the U2000 data.
This topic describes how to collect information required for commissioning the Single-Server
System (SUSE Linux) with factory installation information and how to commission the
Single-Server System (SUSE Linux).
3.1 Solution Description
This topic briefly describes the single-server solution with factory installation information.
3.2 Commissioning Process
This topic describes the commissioning process and required time of the Single-Server
System (SUSE Linux) with factory installation installation.
3.3 Commissioning Preparation
This topic describes the preparations to be made before the Single-Server System (SUSE
Linux) with factory installation information is commissioned, including collecting
commissioning information, checking mandatory software, and applying for the U2000 and
SSR licenses.
3.4 Checking Hardware Connections
This topic describes how to check hardware installation and cable connections before
installing a U2000. If hardware is improperly installed or cable is improperly connected,
unexpected error may occur during installation of the U2000.
3.5 Powering On a Server
This topic describes how to power on a server and the position of the power button.
3.6 Configuring Controller IP Addresses
Controller IP addresses are used to manage and maintain servers remotely. Configure
controller IP addresses for servers before commissioning the operating system (OS).
3.7 Commissioning the U2000
This topic describes how to commission the single-server system with factory installation
information. In the single-server solution with factory installation information, the U2000 has
been installed on the server before delivery. In this manner, you do not need to install the
U2000 again but commission it directly. Specifically, you can use the U2000 normally only
after changing system and U2000 parameters to meet site requirements. To allow the U2000
to manage your network, you must commission the U2000 before using the U2000 to manage
NEs and configure services.
NOTE
If this is the first time you perform operations on the SUSE Linux OS or you are not familiar with the
SUSE Linux OS, see F Getting Started to get an overall understanding of the basic operations on the
SUSE Linux OS.
A series of parameters need to be modified during commissioning. You must ensure that on-
site parameters have been planned based on the U2000 Planning Guide before commissioning
is performed.
NOTE
Print the following tables and fill in the blanks with the site-specific planning information.
NOTICE
To ensure that the NMS can run properly, host name planning must comply with the following
rules and restrictions:
l The host name of the U2000 server must be unique on the network.
l On Solaris/SUSE Linux OS.
l The host name must be a string consisting of no more than 24 characters that can
only be letters (A to Z, a to z), digits (0 to 9) and hyphen (-).
l The first character must be a letter and the last character cannot be a hyphen.
l The host name cannot contain --.
l The host name cannot contain only one character.
l The host name must be case-sensitive.
l The host name cannot be empty or contain spaces.
Server NMSserver
IP Address Planning
IP Address Description
IP address of the For Huawei RH series rack server, IP address of the iMana can be
iMana on the PC used to remotely log in to a PC server to manage and maintain PC
server server in Web mode. For example, you can use this IP address for
remote OS installation, or use it to maintain the PC server if the OS
fails to start properly.
IP address for the This IP address is used to remotely manage and maintain disk
disk array controller arrays.
System IP address This IP address is the IP address of the OS. You can use it to log in
to the server to manage and maintain the OS.
IP Address Description
NMS application IP This IP address is used for external NMS services such as
address communication between the NMS server and clients or between the
NMS server and NEs.
l The iMana IP address and system IP address can be located either on the same network
segment or on different network segments.
l The IP address is in the format of IP address/subnet mask/gateway.
l Planning Principles for IP Addresses are:
– The IP addresses must be unique on the network.
– The NMS application IP address communicates with the managed equipment in the
normal state.
– The NMS application IP address communicates with the OSS in the normal state.
– The NMS application IP address communicates with U2000 clients in the normal
state.
NOTE
Log in to the server OS as user root, run the command ping -S NMS_application_IP
Destination_IP to ensure that NMS application IP address can be normally communicated.
l Single-NIC Scheme
Only one network interface is required and bond cannot be configured.
– Advantage: NIC resources are saved.
– Disadvantage: NIC protection is unavailable.
Table 3-3 shows a planning example.
l Double-NIC Scheme
Two network interfaces are required for configuring bond.
– Advantage: NIC protection is available. If one NIC is faulty, data processing is
switched to the other NIC.
Bond: On the SUSE Linux OS, the bond technology is used to form a virtual layer between the
physical layer and the data link layer. This technology allows two server NICs connecting to a
switch to be bound to one IP address. The MAC addresses of the two NICs are also automatically
bound as one MAC address. In this manner, a virtual NIC is formed. The bond technology
supports two modes: double-live and primary/secondary. In double-live mode, after receiving
request data from a remote server, the virtual NIC on the server determines data transmission
based on an algorithm, improving network throughput and usability of the server. In primary/
secondary mode, if an NIC does not function properly, services will be automatically switched to
the other NIC, ensuring service protection. The SUSE Linux OS supports the binding of NICs in
primary/secondary mode.
Table 3-4 shows a planning example.
Route Planning
... ...
NOTE
Installation engineers need to add routes to the client and management network to ensure
communication between the U2000 and the client, and between the U2000 and the management
network.
Time 14:00
NOTICE
The passwords are examples only. To ensure system security, change the password promptly,
update it periodically, and save it properly. The default password indicates the initial password
used when the U2000 is installed for the first time. Production preinstallation indicates the
U2000 software has been installed initially.
2 PuTTY The Download the latest version from official websites http://
software www.chiark.greenend.org.uk/~sgtatham/putty/
uses download.html of the third-party software.
commands For more information about software operation, see the
(telnet and software Help or go to the official website of the software
SSH) to log http://www.chiark.greenend.org.uk/~sgtatham/putty/
in to the docs.html for technical support.
server.
Using SSH
(more
secure,
recommend
ed) to log
in to the
server is
recommend
ed.
3 FileZilla The Download the latest version from official websites http://
tool FileZilla is filezilla-project.org of the third-party software.
used to For more information about software operation, see the
transfer software Help or go to the official website of the software
files by http://filezilla-project.org for technical support.
SFTP.
Context
l The license file is not delivered to customers along with a U2000 installation DVD.
Contact Huawei engineers for the application of a server license according to the
contract number and ESNs of the server.
l To prevent the failure in finding the license file for possible U2000 reinstallation, save
the license application email and the license file properly.
l Before using the U2000, apply for the formal U2000 license in advance because the
U2000 license application goes through a long process.
l An ESN is a string consisting of 40-digit numerals or letters obtained by encrypted
calculation on the MAC addresses of the U2000 server network interface. The number of
ESNs is the same as the number of network interfaces on the U2000 server. To avoid
applying for a new license due to replacing certain network interface cards (NICs), save
all the ESNs to ensure proper use of the U2000 license.
– Generally, the ESN for a server does not change. It can be used for the U2000
license that is normally applied for.
– If the ESN for a U2000 license is changed due to NIC or server replacement or ESN
application error, apply for a U2000 license again and contact Huawei technical
support engineers.
Procedure
Step 1 Obtain the project contract number.
Step 2 View ESNs of the server.
Method 1(Recommended): Use the ESN tool to generate ESNs before installing a U2000.
NOTE
ESN2:****************************************
ESN3:****************************************
...
Mode 2: View the ESN using the ESN tool of the NMS after installing the U2000.
1. Log in to the OS as user root.
2. Run the following commands to view the ESN:
# cd /opt/oss/server/platform/bin
# ./esn
Step 3 After the esn command is executed, the Esn.txt file is automatically generated in the current
path. Send the contract number and the server ESNs to Huawei engineers or the local Huawei
office.
NOTE
Huawei engineers access http://w3.huawei.com/sdp/ to obtain the license based on the contract number
and ESNs.
Step 4 Huawei engineers send the license file to you after obtaining it.
NOTE
The license file provided with the U2000 exists as a .dat file.
----End
Prerequisites
l GTS rights for ESDP login are available.
l The license confirmation form or contact number has been obtained.
NOTE
The license confirmation form is delivered in paper format along with the DVD. The license
confirmation form functions as the license file and should be kept properly on site.
Procedure
Step 1 Obtain information used for license download.
l If the license confirmation form has been obtained, send the information to related
Huawei engineers or the local office of Huawei.
l If the license confirmation form has not been obtained, obtain the contract number and
send it to related Huawei engineers or the local office of Huawei.
Step 2 Huawei engineers log in to the ESDP website http://w3.huawei.com/sdp/ (Huawei intranet)
or http://app.huawei.com/isdp/ (Internet) according to the obtained information.
Step 4 Choose Order Management > Entitlement Management from the left-hand navigation tree.
The Entitlement Management page is displayed.
Step 5 On the Entitlement Management page, enter the following conditions and click Search.
l Entitlement Type: Select The 3rd Party Software.
l Huawei Contract No.: Enter the 14-digit Huawei Contract No..
Step 6 View license information, select the required license, and click Download The 3rd Party
License.
Step 7 Download the license according to the right-hand button status.
l If the Download License button is orange, the license can be downloaded.
l If the Download License button is gray, the requirement has not been confirmed, and
you must wait for a period of time to download the license.
l If the Download License button is unavailable, the license cannot be downloaded.
l If the Reapply button is available, the license has been downloaded, and you can re-
apply for license download. After clicking this button, enter the approver and application
reason and sign a letter of commitment on the Reapply page. Then click Sure to
Download to download the license.
Step 8 After clicking the download button, verify that the information is consistent with information
about installed software. Select I have read already and enter Receiving E-mail address.
Then click Sure to Download.
Step 9 The related Huawei engineer sends the SSR license obtained by email to the user.
NOTE
Keep the license properly. If the license is lost, you can re-download it only after being approved.
----End
Prerequisites
The server hardware must have been installed and equipment cables must have been
connected, for details, see U2000 Hardware Installation Guide (N610E).
Procedure
Step 1 Ensure that the power cables and ground wires for all components are tightly connected and in
good contact and that the polarities are properly placed.
NOTE
Generally, the server has two or more power modules which are used to provide power supply
protection. Connect each power module to a specific power input. For details, see U2000 Hardware
Installation Guide (Huawei N610E cabinet).
Step 2 Ensure that all cables are bundled and free of visible damage.
Connect the network interface that is configured with a system IP address during pre-installation to the
network. If the network interface is not connected to the network, the U2000 fails to synchronize
network configurations or be started. Configuring the system IP address for the network interface with
the smallest interface serial number is preferred. For example,the network interface eth0 with serial
number of 1 can be used for the Huawei RH5885H V3, Huawei RH2288H V3 and Huawei RH2288H
V2 servers.
l Figure 3-2 shows hardware connections for the Huawei RH5885H V3 server.
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 3-3 show the hardware connections between the Huawei RH5885H V3 server
and the OceanStor 5500 V3 disk array.
Figure 3-3 Hardware connections between the Huawei RH5885H V3 server and the
OceanStor 5500 V3 disk array
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 3-4 shows hardware connections for the Huawei RH2288H V3 server.
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 3-5 shows hardware connections for the Huawei RH2288H V2 server.
NOTE
For details about the mapping between physical network interfaces and logical network interfaces,
see A.2.5 Mappings Between Physical and Logical Network Interfaces on an Huawei RH
series rack server Running SUSE Linux.
----End
Follow-up Procedure
Ensure that all debris (cable straps, stubs, or moisture-absorbent packets) are picked up.
Remove unnecessary items from the telecommunications room. The workbench must be neat
and the movable floor must be level and clean.
Server
1. Power on a Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3 server.
NOTICE
l Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3 server supports
100 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
2. Press the power buttons on the peripherals and monitor connected to a server.
3. Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks
every 1s, press the power button on the shelf of the server.
NOTE
If the power button is steady on, the server has been successfully powered on. For details about
IBM server indicators, see the manual for IBM servers or log in to the official IBM website. For
details about Huawei server indicators, see the manual for Huawei servers or log in to the official
Huawei website. For official websites of software and hardware documents, see A.5.17 How Do I
Obtain Third-Party Software and Hardware Materials.
The red boxes in the following figures show the positions of power buttons on Huawei
RH2288H V2, Huawei RH5885H V3, IBM X3650 M4, IBM X3650 M3 and, IBM
X3850 X5.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network
cables, or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning
it on.
l Normal power-on sequence: 1. Turn on the power switches of the external power
supplies connected to all the devices. 2. Press the power button on either controller. 3.
Turn on the LAN switch or FC switch (if any LAN switch or FC switch is deployed but
is not powered on). 4. Turn on the application server (if the application server is not
powered on).
l Normal power-down sequence: 1. Stop the services of the application server. 2. Hold the
power button for 5 seconds on the controller enclosure. 3. Disconnect the controller
enclosure and disk enclosures from the external power supplies.
NOTE
Power supply must be provided for the two power modules of the OceanStor 5500 V3; otherwise, the
OceanStor 5500 V3 fails to be used. Press the power button on controller A/B. Wait 5 to 10 minutes
until the power indicator is steady green and no longer flashing, indicating the power-on success.
Physical indications that the storage system is up and running without error:
l The power indicators of the controllers, controller enclosure, and disk enclosures are
steady green.
l The alarm indicators of the controllers, controller enclosure, and disk enclosures are off.
l The running indicators of the coffer disks are steady green, and their alarm/location
indicators are off.
If a server is not equipped with the KVM, the mode through iMana/iBMC management
interface is recommended.
l For more operations on the Huawei RH5885H V3 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9768163&idAbsPath=7919749|9856522|9856792|9768163.
l For more operations on the Huawei RH2288H V3 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9901881&idAbsPath=7919749|9856522|9856792|9901881.
l For more operations on the Huawei RH2288H V2 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9581539&idAbsPath=7919749|9856522|9856792|9581539.
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
If an IE or Remote Virtual Console fault occurs in the iMana, see A.2.4 How to Solve iMana/iBMC
Problems to rectify the fault.
Context
l The system allows a maximum of four users to log in concurrently, one user to use the
Remote Control function at a time.
l By default, the system timeout period is five minutes. That is, if you do not perform any
operation on the Web UI within five minutes, you are logged out of the Web UI of the
system automatically. In this case, you need to enter the user name and password to log
in again.
l The system locks a user if the user fails to enter a correct password for consecutive five
times. The user is automatically unlocked five minutes later, and the administrator user
can unlock the user in command line.
l To ensure system security, change the initial password after the first login, and then
change your password periodically.
Procedure
Step 1 View the position of the iMana interface on the Huawei RH series rack server.
A management network port for iMana is at the end of the Huawei RH series rack server. You
can visit iMana through this port, as shown in the following figure.
Step 2 Use a network cable to connect the PC and the iMana management interface of the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the iMana must be in the same network segment.
NOTE
The default IP address of the iMana is 192.168.2.100 and the default subnet mask is 255.255.255.0. If
the default IP address of the iMana is changed, see A.2.2 How to View the IP Address of the iMana/
iBMC on the Huawei RH series rack server.
Step 4 Run the Internet Explorer, and then enter "https://ipaddress" in the address box.
NOTE
The ipaddress is the IP address of the iMana management network interface.
Step 6 Enter the user name and password, choose whether to log in to the local computer or to the
user domain. Then click Log In.
NOTE
Step 8 Choose Manually Set an IP Address in the IPv4 area. Set the IP, the subnet mask, and the
default gateway of the iMana as required.
l The window stays at the page for changing IP, ignore it.
l Type the new iMana IP in the address bar of Internet Explorer. The Web management page of iMana
is displayed.
Step 10 Disconnect the iMana management interface of the server from the PC and connect the iMana
management interface to the network.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l A network cable is available. As network interfaces on a server are enabled with auto-
negotiation, either parallel or crossover network cables can be used.
NOTE
If an IE or Remote Virtual Console fault occurs in the iBMC, see A.2.4 How to Solve iMana/iBMC
Problems to rectify the fault.
Context
l The system allows a maximum of four users to log in concurrently, one user to use the
Remote Control function at a time.
l By default, the system timeout period is five minutes. That is, if you do not perform any
operation on the Web UI within five minutes, you are logged out of the Web UI of the
system automatically. In this case, you need to enter the user name and password to log
in again.
l The system locks a user if the user fails to enter a correct password for consecutive five
times. The user is automatically unlocked five minutes later, and the administrator user
can unlock the user in command line.
l To ensure system security, change the initial password after the first login, and then
change your password periodically.
Procedure
Step 1 View the position of the iBMC interface on the Huawei RH2288H V3 server and Huawei
RH5885H V3 server.
A management network port for iBMC is at the end of the Huawei RH2288H V3 server and
Huawei RH5885H V3 server. You can visit iBMC through this port, as shown in the
following figure.
Step 2 Use a network cable to connect the PC and the iBMC management interface of the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the iBMC must be in the same network segment.
NOTE
The default IP address of the iBMC is 192.168.2.100 and the default subnet mask is 255.255.255.0. If
the default IP address of the iBMC is changed, see A.2.2 How to View the IP Address of the iMana/
iBMC on the Huawei RH series rack server.
Step 4 Run the Internet Explorer, and then enter "https://ipaddress" in the address box.
NOTE
The ipaddress is the IP address of the iBMC management network interface.
Step 7 In the upper corner of the iBMC home page, click the Config tab. On the displayed page,
choose NetWork Settings from the navigation tree.
Step 8 In the IPv4 area in Select IP Version and Set IP, select Manually set IP address and set the
iBMC IP address, subnet mask, and default gateway based on actual requirements.
Step 9 Click Save in the IPv4 area. In the Confirm dialog box, click OK.
NOTE
l The window stays at the page for changing IP, ignore it.
l Type the new iBMC IP in the address bar of Internet Explorer. The Web management page of iBMC
is displayed.
Step 10 Disconnect the iBMC management interface of the server from the PC and connect the iBMC
management interface to the network.
----End
Prerequisites
l You must ensure that the server is connected to the KVM.
l Use a network cable to connect the switch and the iMana/iBMC management interface
of the server.
Procedure
Step 1 Press the power button to restart the PC server.
Step 2 When the BIOS start page appears, press Delete until the BIOS Setup Utility program is
started.
NOTE
If the BIOS password has been modified, a dialog box asking you to enter a password will be displayed
during startup. Enter the required password to access the Setup Utility application.
c. Select IP Source under IPV4 Configuration, and press Enter. The menu dialog
box is displayed.
Step 4 Select Static, and press Enter.
Step 5 Enter the planned iMana IP, subnet mask, and gateway in IPv4 IP Address, IPv4 Subnet
Mask, and IPv4 Gateway Address respectively.
Step 6 Set the IP address, subnet mask, and gateway.
l For Huawei RH5885H V3 or Huawei RH2288H V2 server, enter the planned iMana IP
address, subnet mask, and gateway in IPv4 IP Address, IPv4 Subnet Mask, and IPv4
Gateway Address respectively.
l For Huawei RH2288H V3 server, enter the planned iBMC IP address, subnet mask, and
gateway in IP Address, Subnet Mask, and Gateway Address on the IPV4
Configuration tab respectively.
Step 7 Press Enter to accomplish the IP configuration of the iMana/iBMC management module.
Step 8 Press F10 and select Yes from the dialog box to save the configurations and quit the
configuration page.
----End
Prerequisites
l The controller IP addresses are obtained.
l The power cable of the disk array is connected.
l Optional: For a PC without a DB-9 port, a USB-DB-9 serial cable is available, and the
USB serial port drive has been installed.
l Perform the following operations to query the communication port number on the PC's
serial port:
NOTE
For the laptop, connect the serial port of the local controller to the serial port of the disk array (SERIAL
MGT) first, or can not query the communication port number on the laptop.
a. Right-click Computer on the PC desktop and choose Manage from the shortcut
menu.
b. In the Computer Manage window, choose Computer Manage (local) > System
Tools > Device Manager.
c. Choose ports (COM&LPT) in the right pane of Device Manager to check the
communication port on the PC's serial port, such as COM1.
Context
The OceanStor 5500 V3, a disk array, has two controllers. The IP addresses configured in this
section are examples only. For example, set the IP address of the management network of
Procedure
Step 1 Connect the computer and controller A of the disk array physically.
Use a serial port cable (DB9-RJ45) to connect the serial port of the local controller to the
serial port of the disk array ( ).
Use an RJ45 connector at one end of the serial port cable to connect to the serial port of the
disk array ( ) and a DB-9 connector at the other end of the cable to connect to the serial
port of the computer.
5. Click Open.
If the connection succeeds, the following information will be displayed:
Storage login:
– The default administrator name is admin and the initial password of the admin user is
Admin@storage. If the U2000 is preinstalled before being delivered, the password has been
changed to Changeme_123. After the initial login, change the default password immediately. To
ensure the security of the U2000, passwords must be complex enough. For example, a password
must contain eight or more characters of two types. The allowed characters are digits, letters, and
special characters. Remember to change passwords regularly.
– After an admin user enters an incorrect password for three consecutive times, the admin user will
be locked and therefore cannot be used to log in to the disk array controller. The admin account
will be automatically unlocked after 15 minutes.
– Run the following command to change the password for the current user.
admin:/>change user_password
Old password:old password
New password:new password
Reenter password:new password
Command executed successfully.
Step 6 Run the following command to exit the controller of the disk array.
admin:/> exit
Are you sure to exit?(y/n):y
----End
been installed on the server before delivery. In this manner, you do not need to install the
U2000 again but commission it directly. Specifically, you can use the U2000 normally only
after changing system and U2000 parameters to meet site requirements. To allow the U2000
to manage your network, you must commission the U2000 before using the U2000 to manage
NEs and configure services.
NOTE
This topic applies only to the U2000 server in the single-server solution with factory installation
information.
Access - As some of
the domains
Transport may not be
deployed
during
U2000
installation,
you can use
the domain
deployment
function to
deploy a
Deploy new domain
as needed so
IP that the
U2000 can
manage NEs
in this
domain.
NOTE
If some
domains are
gray, the
domains
have been
deployed.
Access - To disable
the U2000
Undeploy from
Transport managing
NEs in a
domain,
undeploy
the domain
to improve
system
operation
efficiency.
Do not
select all the
domains
because
IP
there must
be at least
one domain
deployed.
NOTE
If some
domains are
gray, the
domains
have not
been
deployed.
- This
commissioni
ng item is
available for
a Linux
single-
server
system
Set SSR without the
SSR License
License disk array.
The SSR
license must
be set for
full system
backup
configuratio
n.
l If only
the time
zone
needs to
For details, see be
section Time and modified
Time Zone , restart
Planning in U2000 the
Planning Guide. operatin
g system
l Time zone: Set
Set Date after the
Time Zone: this parameter to
Time Zone modifica
the local time
tion so
zone, such as
that the
Asia/Beijing.
time is
l Time: Set this automati
parameter to the cally
local time. adjusted
based on
the new
time
zone.
l If the
time
zone and
time
both
need to
be
changed,
change
the time
first and
then the
time
zone.
Time:
After the
operatin
g system
is
restarted,
the new
time is
automati
cally
adjusted
based on
the new
time
zone.
Single-
Server
System
Software
MSuite Old New
Installation
Administrato Passwo Password
and
r rd: :
Commission
ing Guide
(SUSE
Linux).
Include two
Internal Certificates:
NMS Certificate List
l Trust Certificate.
Certificate
l CRL.
Networ
k card
(Logic
al IP
Single-NIC
networ Address/
Scheme
k Netmask
interfa For details, see
ces section IP Address
Other
name): Planning for a
parameters
Set Network Single-Server
Networ use default
System (SUSE
k card values.
Linux) in U2000
(Logic Planning Guide.
al IP
Two-NIC
networ Address/
Scheme
k Netmask
interfa
ces
name):
NIC:
IP Address:
Active NIC
Netmask:
Host Name:
indicator
template and only
new indicators
are added to the
original indicator
template. Export:
The performance
indicator
template is
exported, backed
up, or provided to
another U2000
server.
l Manual
configuration:
Before
commissioning,
you must confirm
the performance
indicators to be
monitored and
print the
performance
data. Modify: In
the dialog box
that is displayed,
configure the
indicators as
required.
Prerequisites
NOTICE
l Manually changing the system IP address causes a failure to use the commissioning tool.
Therefore, configure the system IP address through the commissioning tool.
l All network information will be cleared when you adjust the networking by using the Set
Network commissioning item of the Commissioning Tool. If southbound and northbound
IP addresses are configured independently on the customer's network, reconfigure them
after the networking is adjusted.
Context
The commissioning tool is used only after the initial installation of the U2000 is complete. Do
not use the commissioning tool after the U2000 has running for a period of time. If system
parameters need to be commissioned, see section MSuite in the U2000 Administrator Guide.
Procedure
Step 1 Select the network interface identified as 1 on the server back plane and use a network cable
to connect the network interface to the PC or laptop.
NOTE
During preinstallation, the system IP is configured for network interfaces marked as 1 by default.
Step 2 Modify the IP address and subnet mask of the PC or laptop to be on the same network
segment where the system IP address of the U2000 server is located.
NOTE
The preinstallation by default configures the system IP address as 192.168.128.110 and the subnet mask
as255.255.255.0.
Step 3 On the PC or laptop, use the remote GUI login software, such as VNC, to log in to the SUSE
Linux OS GUI as the ossuser user. For details, see Configure the VNC service as the
ossuser user.
NOTE
The default password of the ossuser user is Changeme_123. The default password is not changed
during preinstallation.
Step 4 Right-click the blank area of the desktop and choose Open in Terminal from the shortcut
menu to open the CLI.
Step 5 Ensure that the U2000 is not running.
To check the running status of U2000 processes, run the following command:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start.
The process is stopped if the displayed information is empty.
If the U2000 is still running, run the following commands to stop it:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
Step 7 Ensure that the MSuite servers on the primary and secondary sites have been started.
Run the following command as the root user to check whether the MSuite servers are started:
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
# ps -ef | grep java
A message similar to the following will be displayed in the SUSE Linux system:
...
root 7593 7130 0 06:31 pts/7 00:00:00 grep java
ossuser 8937 12803 0 04:13 pts/8 00:00:42 /opt/oss/OSSJRE/jre_linux/bin/
java -Dprocname=AgentIntegrate -Dfile.encoding=UTF8 -Xmx1024m -
XX:MetaspaceSize=16m -XX:MaxMetaspaceSize=256m -XX:+UseCompressedClassPointers -
XX:+UseCompressedOops -XX:CompressedClassSpaceSize=128m -XX:
+HeapDumpOnOutOfMemoryError -DabsCfgPath=/opt/oss/server/etc/oss_cfg/frame -cp
nbi/agentintegrate/thirdparty/*:3rdlib/*:common/uflightdispatcher/lib/
jdom.jar:cbb/qasn/lib/*:common/uflight/frame_app/plugins/
com.huawei.uflight.platformadapter/*:common/uflight/web_app/plugins/pax-web-
runtime-2.1.2.jar:common/uflight/web_app/plugins/web_app/plugins/pax-web-
spi-2.1.2.jar:nbi/agentintegrate/lib/*:nbi/agentintegrate/bin/*
com.huawei.u2000.inventory.webserver.JettyStarter
...
NOTE
If the displayed information contains /opt/oss/OSSJRE/jre_linux/bin/java -server, the MSuite servers have
been started.
If the MSuite servers have not been started, switch to the ossuser and run the following
commands as the root user to start the MSuite servers:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./startserver.sh
– When you log in to the MSuite client, a progress bar is displayed showing the progress of
Refresh Deployment Information. Wait until the operation is complete.
– The MSuite works in single-user mode. Specifically, only one MSuite client can log in to the
MSuite at one time.
NOTICE
l If a message asking you to refer to the associated section in the installation guide is
displayed during system commissioning, the system needs to be manually commissioned.
l After the host name is configured, you cannot come back to modify other configuration.
Otherwise, the commissioning may be abnormal. Configure the host name after other
commission items are configured.
l After security hardening is enabled, you cannot use the commissioning tool to change the
password of the OS user. For details about the method of changing a password, see A.1.1
How to Change the OS User Password.
Step 11 Click Finish on the Finsh window, the Commissioning finished successfully, please use
UEasy tool to perform routine inspection. information is displayed. Click OK and perform
routine inspection if needed.
Step 12 After system parameters are commissioned, run the following commands to restart the OS as
the root user to make the modification take effect:
# sync;sync;sync;sync
# shutdown -r now
Step 13 Disconnect the PC or laptop from the U2000 server and then see 4.4 Checking Hardware
Connections to connect the U2000 server to the network.
----End
Follow-up Procedure
l If the server IP address is changed during commissioning, you must manually configure
the hardware alarm monitoring function. For details about the replacement procedure,
see C.3.1 Configuring the Monitoring Function for an OceanStor 5500 V3 Disk
Array and C.3.2 Configuring the Monitoring Function for an S3900 Disk Array.
l If NTP is configured during commissioning, check whether NTP service configurations
are correct. For details, see A.1.26 Checking the NTP Service on Linux.
l If you want to stop the NTP, see A.5.19 Starting or Stopping the NTP Service on
SUSE Linux.
Prerequisites
l The U2000 client is installed by referring to iManager U2000 version Client Software
Installation Guide.
l The U2000 license file must be ready.
NOTICE
The license file name can contain digits, letters, and special characters excluding the
space or \ /:*?"<>|.
Context
l During installation of the U2000 software, the OS user ossuser is created automatically.
The ossuser user is used to regularly maintain a U2000.
l Two methods are available for loading a U2000 license.
– Method one:
Use commands to load the license. This method is applicable to users who cannot
log in to GUI OSs.
Deployment scenario: The GUI is unavailable. Users cannot log in to the U2000
client but have to use commands for remote operations.
– Method two:
Load the license in the GUI. This method is applicable to users who are not familiar
with common commands of the SUSE Linux OS.
Deployment scenario: Loading the license in the GUI is recommended. If the GUI
is available and the login to the U2000 client is successful, use this method.
NOTE
l You can select a method as required. No matter which method is selected, ensure that the U2000
server process has been started.
l In the SUSE Linux OS, See How to Fix Garbled Characters in the SUSE Linux Command
Output to fix garbled characters if the SUSE Linux command output displays garbled characters.
You can select a method as required. No matter which method is selected, ensure that the U2000 server
process has been started.
Procedure
Step 1 Log in to the OS as the ossuser user.
NOTE
The initial password of the ossuser user is Changeme_123. For details about For system security,
modify the default password and remember the new password., see A.1.1 How to Change the OS User
Password.
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Step 4 Run the following commands to check whether a license file exists. If a license file exists,
back it up. If the license file does not exist, skip this step.
$ cd /opt/oss/server/etc/conf/license
$ ls
If the folder contains any other license file, run the following commands to back up the any
other license file to the /opt/oss/server/etc/conf/license_backup path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
NOTE
If the name of the license file contains a space, add quotation marks for license_file_name in the above
command.
Step 5 The encoding format of the U2000 license file must be UNIX, not DOS. For details about
how to confirm the encoding format of the U2000 license file, see A.5.11 How to Confirm
the Encoding Format of the U2000 License File.
To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.
1. Use SFTP to upload the license file to the /export/home/ossuser directory on the server
as the ossuser user. For details, see A.1.27 How to Use the FileZilla to Transfer Files
by SFTP.
NOTE
If the license file uploaded by the root user is used, the ossuser user may not have the read
permission and therefore the license fails to be updated. Use the license uploaded by the ossuser
user. If security hardening is performed on the OS, FTP/SFTP rights of ossuser will be disabled.
In this case, you need to upload files to the backup directory in the FTP root directory as the
ftpuser user (the FTP root directory of ftpuser is /opt/backup/ftpboot).
2. To activate the license file, run the following commands:
a. Log in to the OS of the server as the ossuser user.
b. Run the following commands to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
1. Save the license to be loaded to the server where the U2000 client is located.
2. Log in to the OS as a user with the administrator rights where the client program is
installed.
3. On the OS desktop, double-click the U2000 Client shortcut icon. The Login dialog box
is displayed.
4. In the Server drop-down list, select the server to be logged in to. Then, set User Name
and Password to the valid values, and click Login. The initial password of the admin
user is Changeme_123. The password must be changed during the first login to ensure
system security. Keep the password confidential and change it regularly.
– If a message indicating that no license is available is displayed when you log in to
the U2000 client.
i. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
ii. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
iii. Click OK.
iv. Click Yes and confirm the loaded license.
v. Click OK.
– If U2000 license is loaded before.
i. Choose Help > License Management > License Information from the main
menu (traditional style); alternatively, double-click System Management in
Application Center and choose License Management > Licenes
Information from the main menu (application style).
ii. In the License Information dialog box, click Update License.
iii. Select the new license file and click Open.
iv. Click Next.
v. Select a scenario and perform the associated operations as required:
○ If Incremental is unavailable, click Next.
○ If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
○ If Incremental is available and both the new and in-use U2000 licenses
need to be effective, select Incremental and click Next. If the in-use
U2000 license has a commercial license and a temporary license, the new
license will replace the license of the same type. For example, if the new
license is a commercial license, the commercial license in the in-use
U2000 license will be replaced.
vi. Click Finish.
vii. Click Yes and confirm the updated license.
viii. Click Yes to close all windows.
ix. Click Yes to log out of the system.
----End
Result
After the preceding operations are performed, the license file is automatically loaded to
the /opt/oss/server/etc/conf/license path.
Prerequisites
l If the delivered server has been preinstalled, ensure that system commissioning is
complete. For details, see 3.7.2 Configuring System Commissioning Parameters.
l Ensure that the U2000 license has been loaded. For details, see 3.7.3 Loading a U2000
License.
l The remote command login software, such as PuTTY, has been obtained.
NOTE
The recommended resolution range is 1024 * 768 to 1920 * 1080.
Context
The U2000 commissioning parameters cover communication security, U2000 user security
policy, communication between the U2000 and NEs, alarm function, and common U2000
configurations.
Procedure
Step 1 Use the PuTTY to enable the VNC service for the ossuser user. Log in to the GUI desktop as
the ossuser user. For details, see Configure the VNC service as the ossuser user.
Step 2 On the GUI desktop, right-click and choose Open in Terminal from the shortcut menu.
Step 3 Run the following command to check whether the U2000 is started:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Step 4 If the U2000 process is not started, run the following commands to start it:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
----End
Result
After U2000 parameters are commissioned, the U2000 and NEs can communicate with each
other properly, and the U2000 works properly.
Context
l During installation of the U2000 software, the OS user ossuser is created automatically.
The ossuser user is used to regularly maintain a U2000.
l During installation of the U2000 software, only one default NMS user, that is, user
admin, is provided. The admin user is the administrator of the U2000 and has the
highest rights of the U2000.
Procedure
Step 1 Log in to the server OS as user ossuser.
NOTE
The initial password of the ossuser user is Changeme_123. For details about For system security,
modify the default password and remember the new password., see A.1.1 How to Change the OS User
Password.
NOTICE
A U2000 client does not support the Linux OS. Manually starting a U2000 client and running
a script on the Linux OS may bring risks. Therefore, exercise caution when performing these
operations.
l /etc/ICMR
l /var/ICMR
Step 4 To check the U2000 version, run the following commands:
$ cd /opt/oss/engr/install/etc/conf
$ cat MacroFileNW.properties
The preceding displayed information shows the U2000 version. If the version information
does not meet the actual requirement, uninstall the U2000 and install the U2000 again.
Step 5 Ensure that the database is running.
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). Security(SSL) is
recommended for the high security requirements. You can run a command on the server to query
the data transmission mode.
For details about how to set the communication mode for the U2000 server in a SUSE Linux
single-server system, see A.5.10 How to Set the Communication Mode on the U2000 server for
the Single-Server System (SUSE Linux).
----End
Follow-up Procedure
l To save the server disk space, run the following command to delete /opt/install
directory.
$ su - root
Password: root user password
# rm -r /opt/install
NOTICE
After installation, do not change the installation directory. If the installation directory is
changed, the U2000 fails to work properly or uninstalled.
l If login to a U2000 client fails, see A.6.4 Failure to Log In to the U2000 Server from a
U2000 Client to resolve the problem.
l The installation is not complete if any of the preceding checks are not passed. For
details, see A.6.8 How to Address the U2000 Installation or Uninstallation Failure.
This topic describes how to collect information required for installation and commissioning
and how to install and commission the U2000, including Single-Server System (SUSE Linux)
and cold standby solutions.
4.1 Solution Description
This topic briefly describes the fresh installation scenario.
4.2 Installation and Commissioning Process
This topic describes the process and required time for installing and commissioning the
Single-Server System (SUSE Linux) and the cold standby solution.
4.3 Preparing for Installation
This topic describes the preparations to be made before the single-server system (SUSE
Linux) or the cold standby solution is installed, including collecting installation information,
checking mandatory software and hardware connections, and applying for the U2000 and SSR
licenses.
4.4 Checking Hardware Connections
This topic describes how to check hardware installation and cable connections before
installing a U2000. If hardware is improperly installed or cable is improperly connected,
unexpected error may occur during installation of the U2000.
4.5 Powering On a Server
This topic describes how to power on a server and the position of the power button.
4.6 Configuring Controller IP Addresses
Controller IP addresses are used to manage and maintain servers remotely. Configure
controller IP addresses for servers before installing the operating system (OS).
4.7 Configuring RAID
RAID needs to be configured before an operating system is installed in order to improve the
efficiency and security of using server hard disks.
4.8 Installing the SUSE Linux OS by Using the Quick Installation CD-ROM
This topic describes how to use a quick installation DVD-ROM delivered with Huawei
devices to install the SUSE Linux OS.
4.9 Installing the U2000 Software
This topic describes how to start the U2000 installation.
4.10 Commissioning the U2000
This topic describes how to commission the U2000. To allow the U2000 to manage your
network, you must commission the U2000 before using the U2000 to manage NEs and
configure services.
4.11 Configuring the Cold Standby Solution (Cold Standby Solution)
The U2000 cold standby solution supports manual and automatic backup and restore. If
manual backup and restore is used, you need to manually start the backup or restoration task
each time. If automatic backup and restore is used, you only need to configure a scheduled
backup task and a scheduled restoration task. Automatic backup and restore is recommended.
In automatic backup and restore mode, you need to configure a scheduled backup task on the
primary site and a scheduled restoration task on the secondary site to implement fast
restoration with cold backup data. For specific operations of manual backup and restore, see
the Manually Execute Backup and Restoration Tasks section of the U2000 Administrator
Guide. This topic applies only to the cold standby solution. If the cold standby solution is not
required, skip this topic.
NOTE
If this is the first time you perform operations on the SUSE Linux OS or you are not familiar with the
SUSE Linux OS, see F Getting Started to get an overall understanding of the basic operations on the
SUSE Linux OS.
A series of parameters need to be modified during commissioning. You must ensure that on-
site parameters have been planned based on the U2000 Planning Guide before commissioning
is performed.
Figure 4-1 shows the installation and commissioning process of the Single-Server System
(SUSE Linux).
Figure 4-1 Installation and commissioning process of the Single-Server System (SUSE
Linux)
NOTE
If this is the first time you perform operations on the SUSE Linux OS or you are not familiar with the
SUSE Linux OS, see F Getting Started to get an overall understanding of the basic operations on the
SUSE Linux OS.
A series of parameters need to be modified during commissioning. You must ensure that on-
site parameters have been planned based on the U2000 Planning Guide before commissioning
is performed.
Figure 4-2 shows the installation and commissioning process of the cold standby solution.
Figure 4-2 Installation and commissioning process of the cold standby solution
checking mandatory software and hardware connections, and applying for the U2000 and SSR
licenses.
Complete planning for the information listed in the following tables according to the U2000
Planning Guide. Collect and record the installation information in the tables.
NOTE
Print the following tables and fill in the blanks with the site-specific planning information.
NOTICE
To ensure that the NMS can run properly, host name planning must comply with the following
rules and restrictions:
l The host name of the U2000 server must be unique on the network.
l On Solaris/SUSE Linux OS.
l The host name must be a string consisting of no more than 24 characters that can
only be letters (A to Z, a to z), digits (0 to 9) and hyphen (-).
l The first character must be a letter and the last character cannot be a hyphen.
l The host name cannot contain --.
l The host name cannot contain only one character.
l The host name must be case-sensitive.
l The host name cannot be empty or contain spaces.
Server NMSserver
IP Address Planning
IP Address Description
IP address of the For Huawei RH series rack server, IP address of the iMana can be
iMana on the PC used to remotely log in to a PC server to manage and maintain PC
server server in Web mode. For example, you can use this IP address for
remote OS installation, or use it to maintain the PC server if the OS
fails to start properly.
IP address for the This IP address is used to remotely manage and maintain disk
disk array controller arrays.
System IP address This IP address is the IP address of the OS. You can use it to log in
to the server to manage and maintain the OS.
NMS application IP This IP address is used for external NMS services such as
address communication between the NMS server and clients or between the
NMS server and NEs.
l The IMM/iMana IP address and system IP address can be located either on the same
network segment or on different network segments.
l The IP address is in the format of IP address/subnet mask/gateway.
l Planning Principles for IP Addresses are:
– The IP addresses must be unique on the network.
– The NMS application IP address communicate with the managed equipment in the
normal state.
– The NMS application IP address communicate with the OSS in the normal state.
– The NMS application IP address communicate with U2000 clients in the normal
state.
NOTE
Log in to the server OS as user root, run the command ping -S NMS_application_IP
Destination_IP to ensure that NMS application IP address can be normal communicated.
l Single-NIC Scheme
Only one network interface is required and bond cannot be configured.
– Advantage: NIC resources are saved.
– Disadvantage: NIC protection is unavailable.
Table 4-3 shows a planning example.
l Double-NIC Scheme
Two network interfaces are required for configuring bond.
– Advantage: NIC protection is available. If one NIC is faulty, data processing is
switched to the other NIC.
– Disadvantage: One more NIC is used than the single-NIC scheme.
NOTE
Bond: On the SUSE Linux OS, the bond technology is used to form a virtual layer between the
physical layer and the data link layer. This technology allows two server NICs connecting to a
switch to be bound to one IP address. The MAC addresses of the two NICs are also automatically
bound as one MAC address. In this manner, a virtual NIC is formed. The bond technology
supports two modes: double-live and primary/secondary. In double-live mode, after receiving
request data from a remote server, the virtual NIC on the server determines data transmission
based on an algorithm, improving network throughput and usability of the server. In primary/
secondary mode, if an NIC does not function properly, services will be automatically switched to
the other NIC, ensuring service protection. The SUSE Linux OS supports the binding of NICs in
primary/secondary mode.
Table 4-4 shows a planning example.
Route Planning
... ...
NOTE
Installation engineers need to add routes to the client and management network to ensure
communication between the U2000 and the client, and between the U2000 and the management
network.
Time 14:00
NOTICE
The passwords are examples only. To ensure system security, change the password promptly,
update it periodically, and save it properly. The default password indicates the initial password
used when the U2000 is installed for the first time. Production preinstallation indicates the
U2000 software has been installed initially.
A quick installation DVD is used to install an OS, the installation software automatically
partitions disks according to the disk size. For details about disk partitioning planning, see G
Planning Disk Partitions.
Print the following tables and fill in the blanks with the site-specific planning information.
NOTICE
To ensure that the NMS can run properly, host name planning must comply with the following
rules and restrictions:
l The host name of the U2000 server must be unique on the network.
l On Solaris/SUSE Linux OS.
l The host name must be a string consisting of no more than 24 characters that can
only be letters (A to Z, a to z), digits (0 to 9) and hyphen (-).
l The first character must be a letter and the last character cannot be a hyphen.
l The host name cannot contain --.
l The host name cannot contain only one character.
l The host name must be case-sensitive.
l The host name cannot be empty or contain spaces.
IP Address Planning
IP Address Description
IP address of the For Huawei RH series rack server, IP address of the iMana can be
iMana on the PC used to remotely log in to a PC server to manage and maintain PC
server server in Web mode. For example, you can use this IP address for
remote OS installation, or use it to maintain the PC server if the OS
fails to start properly.
IP address for the This IP address is used to remotely manage and maintain disk
disk array controller arrays.
IP Address Description
System IP address This IP address is the IP address of the OS. You can use it to log in
to the server to manage and maintain the OS.
NMS application IP This IP address is used for external NMS services such as
address communication between the NMS server and clients or between the
NMS server and NEs.
l The IMM/iMana IP address and system IP address can be located either on the same
network segment or on different network segments.
l The IP address is in the format of IP address/subnet mask/gateway.
l Planning Principles for IP Addresses are:
– The IP addresses must be unique on the network.
– The NMS application IP address communicates with the managed equipment in the
normal state.
– The NMS application IP address communicates with the OSS in the normal state.
– The NMS application IP address communicates with U2000 clients in the normal
state.
NOTE
Log in to the server OS as user root, run the command ping -S NMS_application_IP
Destination_IP to ensure that NMS application IP address can be normally communicated.
l Single-NIC Scheme
Only one network interface is required and bond cannot be configured.
– Advantage: NIC resources are saved.
– Disadvantage: NIC protection is unavailable.
Table 4-10 shows a planning example.
IP l Primary controller: -
address 10.9.1.10/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.11/255.255.255.
0/10.9.1.254
IP l Primary controller: -
address 10.9.1.12/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.13/255.255.255.
0/10.9.1.254
l Double-NIC Scheme
Two network interfaces are required for configuring bond.
– Advantage: NIC protection is available. If one NIC is faulty, data processing is
switched to the other NIC.
– Disadvantage: One more NIC is used than the single-NIC scheme.
NOTE
Bond: On the SUSE Linux OS, the bond technology is used to form a virtual layer between the
physical layer and the data link layer. This technology allows two server NICs connecting to a
switch to be bound to one IP address. The MAC addresses of the two NICs are also automatically
bound as one MAC address. In this manner, a virtual NIC is formed. The bond technology
supports two modes: double-live and primary/secondary. In double-live mode, after receiving
request data from a remote server, the virtual NIC on the server determines data transmission
based on an algorithm, improving network throughput and usability of the server. In primary/
secondary mode, if an NIC does not function properly, services will be automatically switched to
the other NIC, ensuring service protection. The SUSE Linux OS supports the binding of NICs in
primary/secondary mode.
Table 4-11 shows a planning example.
IP l Primary controller: -
address 10.9.1.10/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.11/255.255.255.
0/10.9.1.254
IP l Primary controller: -
address 10.9.1.12/255.255.255.
for the 0/10.9.1.254
disk array l Secondary controller:
controller 10.9.1.13/255.255.255.
0/10.9.1.254
Route Planning
... ...
NOTE
Installation engineers need to add routes to the client and management network to ensure
communication between the U2000 and the client, and between the U2000 and the management
network.
Time 14:00
NOTICE
The passwords are examples only. To ensure system security, change the password promptly,
update it periodically, and save it properly. The default password indicates the initial password
used when the U2000 is installed for the first time. Production preinstallation indicates the
U2000 software has been installed initially.
A quick installation DVD is used to install an OS, the installation software automatically
partitions disks according to the disk size. For details about disk partitioning planning, see G
Planning Disk Partitions.
If the cold standby solution is used, ensure that the U2000 version, deployment domain,
language, OS type, server time zone, and time are the same on the primary and secondary
sites.
If the Read Me_U2000 Version(English) file exists, read the Read Me_U2000 Version(English) file
before downloading the software packages. The Read Me_U2000 Version(English) file is stored in the
same path as software packages.
2. Download required software packages listed in Table 4-15. It is recommended that you
use the download tool (for example, NetAnts). If you use Windows Internet Explorer,
some software packages may be renamed automatically after being downloaded to the
local computer. In this case, you must manually change the software package names to
the same as those on the website.
NOTE
The PGP verification file of the software file in the .asc format must be obtained by clicking the
in the Operation column at the same time. For example, the software package is
U2000version_server_nmsbase_sles_x64.7z, the corresponding PGP verification file is
U2000version_server_nmsbase_sles_x64.7z.asc.
3. Use the PGPverify to verify correctness of the software packages. For details, see A.1.24
How Do I Verify Downloaded Software Packages Using the PGPVerify Software.
4. http://support.huawei.com can store files with a maximum size of 8 GB. The file with
the size larger than 8 GB will be separated into different software packages. The file
name extension is zip.001 for the first package, zip.002 for the second, zip.003 for the
third, and so on.
– Download all the required packages. Read the Read Me_U2000 Version(English)
file before downloading the software package. The Read Me file contains key
instructions and restrictions on downloaded files.
– Before selecting the zip.001 file to decompress, obtain the 7-zip tool with the latest
version from Web site http://downloads.sourceforge.net/sevenzip and install the
tool.
For more information about software operation, see the software Help or go to the
official website of the software http://www.7-zip.org/support.html for technical
support.
NOTE
l In an installation DVD or installation package, version indicates the detailed version number of the
U2000.
l The commonly used recording software is Nero. Nero 8 is used as an example here. To ensure that
the contents of the burnt DVD are the same as those in the ISO file, select the Verify data on disc
after burning check box. For details, see How to Burn the ISO File to DVD.
Using DVDs
Before installing the U2000 by using DVDs, ensure that the following DVDs are available.
Terminal Physical Software, Patch DVD. Optional. Select this software package
iManager U2000, iManager when installing the OS patch.
U2000 version_server_sles, U2000version_server_patch_sles11_x64_dvd2
Physical Software Package For
Linux Network Management
System, CD 2/4
Obtaining Tools
Table 4-17 shows the tools required to be available before the U2000 is installed using
software packages or DVDs.
2 For IBM On the PC l If a JRE has been installed, run the java -version
server, or laptop, command in the CLI to view the JRE version. If a JRE
JRE with JRE is used has not been installed, running the command fails.
the to access l If the version of the installed JRE is not 1.8.0_101,
version the remote downloading and installing JRE 1.8.0_101 is
of control recommended. You can uninstall the existing JRE in
1.8.0_10 desktop Control Panel.
1. through IE.
l If a message is displayed asking you to enter a user name
and a password. Enter the user name administrator and
the user password.
If the JRE version does not meet requirements, use any of
the following methods to reinstall the JRE:
l Method one: Download the JRE 1.8.0_101 version from
official websites http://www.java.com/en/download/
ie_manual.jsp?locale=en&host=java.com:80 of the
third-party software and install it. For more information
about software operation, see the software Help or go to
the official website of the software http://
www.java.com/en/download/help/ for technical support.
l Method two: Obtain the latest JRE version from the ISO
image file Sles_server_raid_x64_for_IBM_dvd.iso in the
quick RAID configuration DVD-ROM. The procedure is
as follows:
1. Copy and paste the ISO image file in the quick RAID
configuration DVD-ROM to the PC or laptop.
2. Right-click the ISO image file and choose 7-zip >
Open archive from the shortcut menu.
3. Double-click the executable file in the Java_jre
directory.
3 PuTTY The Download the latest version from official websites http://
software www.chiark.greenend.org.uk/~sgtatham/putty/
uses download.html of the third-party software.
commands For more information about software operation, see the
(telnet and software Help or go to the official website of the software
SSH) to log http://www.chiark.greenend.org.uk/~sgtatham/putty/
in to the docs.html for technical support.
server.
Using SSH
(more
secure,
recommend
ed) to log
in to the
server is
recommend
ed.
4 FileZilla The Download the latest version from official websites http://
tool FileZilla is filezilla-project.org of the third-party software.
used to For more information about software operation, see the
transfer software Help or go to the official website of the software
files by http://filezilla-project.org for technical support.
SFTP.
Context
l The license file is not delivered to customers along with a U2000 installation DVD.
Contact Huawei engineers for the application of a server license according to the
contract number and ESNs of the server.
l To prevent the failure in finding the license file for possible U2000 reinstallation, save
the license application email and the license file properly.
l Before using the U2000, apply for the formal U2000 license in advance because the
U2000 license application goes through a long process.
l An ESN is a string consisting of 40-digit numerals or letters obtained by encrypted
calculation on the MAC addresses of the U2000 server network interface. The number of
ESNs is the same as the number of network interfaces on the U2000 server. To avoid
applying for a new license due to replacing certain network interface cards (NICs), save
all the ESNs to ensure proper use of the U2000 license.
– Generally, the ESN for a server does not change. It can be used for the U2000
license that is normally applied for.
– If the ESN for a U2000 license is changed due to NIC or server replacement or ESN
application error, apply for a U2000 license again and contact Huawei technical
support engineers.
l In the cold standby solution, the primary and secondary sites share the same U2000
license. The U2000 license is bound to the ESNs of the primary and secondary sites at
the same time. When applying for a license, you need to obtain the ESNs of the primary
and secondary sites separately.
Procedure
Step 1 Obtain the project contract number.
Mode 2: View the ESN using the ESN tool of the NMS after installing the U2000.
1. Log in to the OS as user root.
2. Run the following commands to view the ESN:
# cd /opt/oss/server/platform/bin
# ./esn
Mode 3: Query information about the software and hardware installation and ESNs of a
Huawei rack server at http://texpert.huawei.com/TExpert/Pages/PageContainer.htm. For
details, see A.5.20 How to Query Information About the Software and Hardware
Installation and ESNs of a Huawei Rack Server.
Step 3 After the esn command is executed, the Esn.txt file is automatically generated in the current
path. Send the contract number and the server ESNs to Huawei engineers or the local Huawei
office.
NOTE
Huawei engineers access http://w3.huawei.com/sdp/ to obtain the license based on the contract number
and ESNs.
Step 4 Huawei engineers send the license file to you after obtaining it.
NOTE
The license file provided with the U2000 exists as a .dat file.
----End
Prerequisites
l GTS rights for ESDP login are available.
l The license confirmation form or contact number has been obtained.
NOTE
The license confirmation form is delivered in paper format along with the DVD. The license
confirmation form functions as the license file and should be kept properly on site.
Procedure
Step 1 Obtain information used for license download.
l If the license confirmation form has been obtained, send the information to related
Huawei engineers or the local office of Huawei.
l If the license confirmation form has not been obtained, obtain the contract number and
send it to related Huawei engineers or the local office of Huawei.
Step 2 Huawei engineers log in to the ESDP website http://w3.huawei.com/sdp/ (Huawei intranet)
or http://app.huawei.com/isdp/ (Internet) according to the obtained information.
Step 3 In Carrier Navigation, select the ESDP product module.
Step 4 Choose Order Management > Entitlement Management from the left-hand navigation tree.
The Entitlement Management page is displayed.
Step 5 On the Entitlement Management page, enter the following conditions and click Search.
l Entitlement Type: Select The 3rd Party Software.
l Huawei Contract No.: Enter the 14-digit Huawei Contract No..
Step 6 View license information, select the required license, and click Download The 3rd Party
License.
Step 7 Download the license according to the right-hand button status.
l If the Download License button is orange, the license can be downloaded.
l If the Download License button is gray, the requirement has not been confirmed, and
you must wait for a period of time to download the license.
l If the Download License button is unavailable, the license cannot be downloaded.
l If the Reapply button is available, the license has been downloaded, and you can re-
apply for license download. After clicking this button, enter the approver and application
reason and sign a letter of commitment on the Reapply page. Then click Sure to
Download to download the license.
Step 8 After clicking the download button, verify that the information is consistent with information
about installed software. Select I have read already and enter Receiving E-mail address.
Then click Sure to Download.
Step 9 The related Huawei engineer sends the SSR license obtained by email to the user.
NOTE
Keep the license properly. If the license is lost, you can re-download it only after being approved.
----End
Prerequisites
The server hardware must have been installed and equipment cables must have been
connected, for details, see U2000 Hardware Installation Guide (N610E).
Procedure
Step 1 Ensure that the power cables and ground wires for all components are tightly connected and in
good contact and that the polarities are properly placed.
NOTE
Generally, the server has two or more power modules which are used to provide power supply
protection. Connect each power module to a specific power input. For details, see U2000 Hardware
Installation Guide (Huawei N610E cabinet).
Step 2 Ensure that all cables are bundled and free of visible damage.
Connect the network interface that is configured with a system IP address during pre-installation to the
network. If the network interface is not connected to the network, the U2000 fails to synchronize
network configurations or be started. Configuring the system IP address for the network interface with
the smallest interface serial number is preferred. For example,the network interface eth0 with serial
number of 1 can be used for the Huawei RH5885H V3, Huawei RH2288H V3, Huawei RH2288H V2,
IBM X3650 M4, IBM X3650 M3 and IBM X3850 X5 servers.
l Figure 4-3 shows hardware connections for the Huawei RH5885H V3 server.
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 4-4 show the hardware connections between the Huawei RH5885H V3 server
and the OceanStor S3900 disk array.
Figure 4-4 Hardware connections between the Huawei RH5885H V3 server and the
OceanStor S3900 disk array
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 4-5 show the hardware connections between the Huawei RH5885H V3 server
and the OceanStor 5500 V3 disk array.
Figure 4-5 Hardware connections between the Huawei RH5885H V3 server and the
OceanStor 5500 V3 disk array
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 4-6 shows hardware connections for the Huawei RH2288H V3 server.
NOTE
For the mappings between physical and logical network interfaces on a Huawei server, see A.2.5
Mappings Between Physical and Logical Network Interfaces on an Huawei RH series rack
server Running SUSE Linux.
l Figure 4-7 shows hardware connections for the Huawei RH2288H V2 server.
NOTE
For details about the mapping between physical network interfaces and logical network interfaces,
see A.2.5 Mappings Between Physical and Logical Network Interfaces on an Huawei RH
series rack server Running SUSE Linux.
l Figure 4-8 shows hardware connections for the IBM X3650 M4 server.
NOTE
For the mappings between physical and logical network interfaces on an IBM server, seeA.3.8
Mappings Between Physical and Logical Network Interfaces on an IBM Server Running
SUSE Linux.
l Figure 4-9 shows hardware connections for the IBM X3650 M3 server.
NOTE
For the mappings between physical and logical network interfaces on an IBM server running SUSE
Linux, see A.3.8 Mappings Between Physical and Logical Network Interfaces on an IBM Server
Running SUSE Linux.
l Figure 4-10 shows hardware connections for the IBM X3850 X5 server.
NOTE
For the mappings between physical and logical network interfaces on an IBM server running SUSE
Linux, see A.3.8 Mappings Between Physical and Logical Network Interfaces on an IBM Server
Running SUSE Linux.
l Figure 4-11 show the hardware connections between the IBM X3850 X5 server and the
OceanStor S3900 disk array.
Figure 4-11 Hardware connections between the IBM X3850 X5 server and the
OceanStor S3900 disk array
NOTE
For the mappings between physical and logical network interfaces on an IBM server running SUSE
Linux, see A.3.8 Mappings Between Physical and Logical Network Interfaces on an IBM Server
Running SUSE Linux.
l Figure 4-12 show the hardware connections between the IBM X3850 X5 server and the
OceanStor 5500 V3 disk array.
Figure 4-12 Hardware connections between the IBM X3850 X5 server and the
OceanStor 5500 V3 disk array
NOTE
For the mappings between physical and logical network interfaces on an IBM server running SUSE
Linux, see A.3.8 Mappings Between Physical and Logical Network Interfaces on an IBM Server
Running SUSE Linux.
----End
Follow-up Procedure
Ensure that all debris (cable straps, stubs, or moisture-absorbent packets) are picked up.
Remove unnecessary items from the telecommunications room. The workbench must be neat
and the movable floor must be level and clean.
Server
1. Power on a Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3/IBM
X3650 M4/IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3 server supports
100 to 240 VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC
and 200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
2. Press the power buttons on the peripherals and monitor connected to a server.
3. Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks
every 1s, press the power button on the shelf of the server.
NOTE
If the power button is steady on, the server has been successfully powered on. For details about
IBM server indicators, see the manual for IBM servers or log in to the official IBM website. For
details about Huawei server indicators, see the manual for Huawei servers or log in to the official
Huawei website. For official websites of software and hardware documents, see A.5.17 How Do I
Obtain Third-Party Software and Hardware Materials.
The red boxes in the following figures show the positions of power buttons on Huawei
RH2288H V2, Huawei RH2288H V3, Huawei RH5885H V3, IBM X3650 M4, IBM
X3650 M3 and, IBM X3850 X5.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network
cables, or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning
it on.
l Power supply must be provided for the two power modules of the OceanStor S3900; otherwise,
the OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5
to 10 minutes until the power indicator is steady green, no longer flashing, indicating the success
of the power-on.
l Power supply must be provided for the two power modules of the OceanStor 5500 V3; otherwise,
the OceanStor 5500 V3 fails to be used. Press the power button on controller A/B. Wait 5 to 10
minutes until the power indicator is steady green and no longer flashing, indicating the power-on
success.
Physical indications that the storage system is up and running without error:
l The power indicators of the controllers, controller enclosure, and disk enclosures are
steady green.
l The alarm indicators of the controllers, controller enclosure, and disk enclosures are off.
l The running indicators of the coffer disks are steady green, and their alarm/location
indicators are off.
If a server is not equipped with the KVM, the mode through iMana/iBMC management
interface is recommended.
l For more operations on the Huawei RH5885H V3 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9768163&idAbsPath=7919749|9856522|9856792|9768163.
l For more operations on the Huawei RH2288H V3 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9901881&idAbsPath=7919749|9856522|9856792|9901881.
l For more operations on the Huawei RH2288H V2 server, log in to the server's official website at
http://support.huawei.com/enterprise/productsupport?
lang=en&pid=9581539&idAbsPath=7919749|9856522|9856792|9581539.
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l A network cable is available. As network interfaces on a Huawei RH series rack server
are enabled with auto-negotiation, either parallel or crossover network cables can be
used.
NOTE
If an IE or Remote Virtual Console fault occurs in the iMana, see A.2.4 How to Solve iMana/iBMC
Problems to rectify the fault.
Context
l The system allows a maximum of four users to log in concurrently, one user to use the
Remote Control function at a time.
l By default, the system timeout period is five minutes. That is, if you do not perform any
operation on the Web UI within five minutes, you are logged out of the Web UI of the
system automatically. In this case, you need to enter the user name and password to log
in again.
l The system locks a user if the user fails to enter a correct password for consecutive five
times. The user is automatically unlocked five minutes later, and the administrator user
can unlock the user in command line.
l To ensure system security, change the initial password after the first login, and then
change your password periodically.
Procedure
Step 1 View the position of the iMana interface on the Huawei RH series rack server.
A management network port for iMana is at the end of the Huawei RH series rack server. You
can visit iMana through this port, as shown in the following figure.
Step 2 Use a network cable to connect the PC and the iMana management interface of the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the iMana must be in the same network segment.
NOTE
The default IP address of the iMana is 192.168.2.100 and the default subnet mask is 255.255.255.0. If
the default IP address of the iMana is changed, see A.2.2 How to View the IP Address of the iMana/
iBMC on the Huawei RH series rack server.
Step 4 Run the Internet Explorer, and then enter "https://ipaddress" in the address box.
NOTE
The ipaddress is the IP address of the iMana management network interface.
Step 8 Choose Manually Set an IP Address in the IPv4 area. Set the IP, the subnet mask, and the
default gateway of the iMana as required.
l The window stays at the page for changing IP, ignore it.
l Type the new iMana IP in the address bar of Internet Explorer. The Web management page of iMana
is displayed.
Step 10 Disconnect the iMana management interface of the server from the PC and connect the iMana
management interface to the network.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l A network cable is available. As network interfaces on a server are enabled with auto-
negotiation, either parallel or crossover network cables can be used.
NOTE
If an IE or Remote Virtual Console fault occurs in the iBMC, see A.2.4 How to Solve iMana/iBMC
Problems to rectify the fault.
Context
l The system allows a maximum of four users to log in concurrently, one user to use the
Remote Control function at a time.
l By default, the system timeout period is five minutes. That is, if you do not perform any
operation on the Web UI within five minutes, you are logged out of the Web UI of the
system automatically. In this case, you need to enter the user name and password to log
in again.
l The system locks a user if the user fails to enter a correct password for consecutive five
times. The user is automatically unlocked five minutes later, and the administrator user
can unlock the user in command line.
l To ensure system security, change the initial password after the first login, and then
change your password periodically.
Procedure
Step 1 View the position of the iBMC interface on the Huawei RH2288H V3 server and Huawei
RH5885H V3 server.
A management network port for iBMC is at the end of the Huawei RH2288H V3 server and
Huawei RH5885H V3 server. You can visit iBMC through this port, as shown in the
following figure.
Step 2 Use a network cable to connect the PC and the iBMC management interface of the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the iBMC must be in the same network segment.
NOTE
The default IP address of the iBMC is 192.168.2.100 and the default subnet mask is 255.255.255.0. If
the default IP address of the iBMC is changed, see A.2.2 How to View the IP Address of the iMana/
iBMC on the Huawei RH series rack server.
Step 4 Run the Internet Explorer, and then enter "https://ipaddress" in the address box.
NOTE
The ipaddress is the IP address of the iBMC management network interface.
Step 7 In the upper corner of the iBMC home page, click the Config tab. On the displayed page,
choose NetWork Settings from the navigation tree.
Step 8 In the IPv4 area in Select IP Version and Set IP, select Manually set IP address and set the
iBMC IP address, subnet mask, and default gateway based on actual requirements.
Step 9 Click Save in the IPv4 area. In the Confirm dialog box, click OK.
NOTE
l The window stays at the page for changing IP, ignore it.
l Type the new iBMC IP in the address bar of Internet Explorer. The Web management page of iBMC
is displayed.
Step 10 Disconnect the iBMC management interface of the server from the PC and connect the iBMC
management interface to the network.
----End
Prerequisites
l You must ensure that the server is connected to the KVM.
l Use a network cable to connect the switch and the iMana/iBMC management interface
of the server.
Procedure
Step 1 Press the power button to restart the PC server.
Step 2 When the BIOS start page appears, press Delete until the BIOS Setup Utility program is
started.
NOTE
If the BIOS password has been modified, a dialog box asking you to enter a password will be displayed
during startup. Enter the required password to access the Setup Utility application.
c. Select IP Source under IPV4 Configuration, and press Enter. The menu dialog
box is displayed.
Step 5 Enter the planned iMana IP, subnet mask, and gateway in IPv4 IP Address, IPv4 Subnet
Mask, and IPv4 Gateway Address respectively.
Step 7 Press Enter to accomplish the IP configuration of the iMana/iBMC management module.
Step 8 Press F10 and select Yes from the dialog box to save the configurations and quit the
configuration page.
----End
If a server is not equipped with the KVM, the mode through IMM management interface is
recommended.
NOTE
l For more operations on the IBM X3650 M4 server, log in to the server's official website at http://
www-947.ibm.com/support/entry/portal/product/system_x/system_x3650_m4?
productContext=1128598353.
l For more operations on the IBM X3850 X5 server, log in to the server's official website at http://
www-947.ibm.com/support/entry/portal/documentation_expanded_list/hardware/systems/
system_x/system_x3850_x5.
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l A network cable is available. As network interfaces on a server are enabled with auto-
negotiation, either parallel or crossover network cables can be used.
NOTE
If an IE or Video Viewer fault occurs in the IMM, see A.3.7 How to Solve IMM Problems to rectify
the fault.
Procedure
Step 1 View the position of the IMM interface on the IBM server.
The management interface SYS MGMT specific to the IMM is available at the rear of the
server. You can use the SYS MGMT interface to access the IMM.
Step 2 Use a network cable to connect the PC and the IMM management interface SYS MGMT of
the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the IMM must be in the same network segment.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 4 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
The IMM uses HTTP by default. To ensure system security, use HTTPS. For details about how to
configure HTTPS, see A.3.15 How to Configure the HTTPS on the IMM(IBM X3650 M4).
Step 5 Enter an IMM user name and a password, and click Log In.
NOTE
Step 7 In the dialog box, select Use static IP address from the Configure IP address settings drop-
down list, set parameters in the Static IP Address Settings.
Step 10 Click IMM Management > Restart IMM to restart the IMM. After the IMM is restarted,
enter a new IMM IP address on the Internet Explorer address bar to access the IMM
management web page.
NOTE
During restart of the IMM, run the ping IMM IP address -t command on the CLI of the PC or laptop. If
the IMM IP address can be pinged through, the IMM is successfully restarted. Restarting IMM takes
about 3 minutes.
Step 11 Disconnect the IMM management interface of the server from the PC and connect the IMM
management interface to the network.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l A network cable is available. As network interfaces on a server are enabled with auto-
negotiation, either parallel or crossover network cables can be used.
NOTE
If an Internet Explorer or Video Viewer fault occurs in the IMM, see A.3.7 How to Solve IMM
Problems to rectify the fault.
Procedure
Step 1 View the position of the IMM interface on the IBM server.
The management interface SYS MGMT specific to the IMM is available at the rear of the
server. You can use the SYS MGMT interface to access the IMM. The following figure uses
the IBM X3650 M3 as an example.
Step 2 Use a network cable to connect the PC and the IMM management interface SYS MGMT of
the server.
Step 3 Change the IP address and subnet mask of the PC. The IP address of the PC and the default IP
address of the IMM must be in the same network segment.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 4 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
The IMM uses HTTP by default. To ensure system security, use HTTPS. For details about how to
configure HTTPS, see A.3.16 How to Configure the HTTPS on the IMM(IBM X3850 X5 and IBM
X3650 M3).
Step 5 Enter an IMM user name and a password, and click Login.
NOTE
Step 6 Click Continue to access the Integrated Management Module web page.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
Step 7 Choose Network Interfaces from the navigation tree. In the right-hand pane, clear the
selection of IPv6 Enabled, select Disabled - Use static IP Configuration from the DHCP
drop-down list, set parameters in the Static IP Configuration area, and click Save.
Step 9 Restart the IMM to make the changed IP address take effect. Choose Restart IMM from the
navigation tree. In the right-hand pane, click Restart to restart the IMM. After the IMM is
restarted, enter a new IMM IP address on the Internet Explorer address bar to access the IMM
management web page.
NOTE
During restart of the IMM, run the ping IMM IP address -t command on the CLI of the PC or laptop. If the
IMM IP address can be pinged through, the IMM is successfully restarted. Restarting IMM takes about 3
minutes.
Step 10 Disconnect the IMM management interface of the server from the PC and connect the IMM
management interface to the network.
----End
Prerequisites
l You must ensure that the server is connected to the KVM.
l Use a network cable to connect the switch and the IMM management interface SYS
MGMT of the server. (As network interfaces on an IBM X series server are enabled with
auto-negotiation, either parallel or crossover network cables can be used.)
Procedure
Step 1 Press the power button to restart the PC server.
Step 2 After the IBM System X dialog box is displayed, wait about 1 minute until <F1> Setup is
displayed.
Step 4 Use arrow keys to select System Settings, and press Enter.
l For IBM X3650 M3 or IBM X3850 X5, show as follows:
Step 5 Use arrow keys to select Integrated Management Module, and press Enter.
l For IBM X3650 M3 or IBM X3850 X5, show as follows:
Step 6 Use arrow keys to select Network Configuration press Enter and access the page for
modifying the IMM IP address.
l For IBM X3850 X5, show as follows:
Step 7 Select Static IP in DHCP Control and enter the planned IMM IP address, subnet mask, and
gateway address in IP Address, Subnet Mask, and Default Gateway.
Step 8 Optional: For IBM X3650 M3 or IBM X3850 X5, run the following steps.
1. Use arrow keys to select Save Network Settings, and press Enter. The dialog box
asking you to restart the IMM is displayed.
2. Enter Y. The IMM reset command has been sent successfully dialog box is displayed.
3. Press Enter to restart the IMM.
NOTE
During restart of the IMM, run the ping IMM IP address -t command on the CLI of the PC or
laptop. If the IMM IP address can be pinged through, the IMM is successfully restarted. Restarting
IMM takes about 3 minutes.
4. Press Esc to exit Network Configuration.
5. Press Esc to exit Integrated Management Module.
6. Press Esc to exit System Settings.
7. Press Esc to exit System Configuration and Boot Management. The Do you want to
exit Setup Utility? dialog box is displayed.
8. Enter Y to exit BIOS.
Step 9 Optional: For IBM X3650 M4, run the following steps.
1. Use arrow keys to select Save Network Settings, and press Enter. The Network
Settings have been saved successfully dialog box is displayed.
2. Press Enter. Wait about 3 minutes for the changes to take effect.
NOTE
Run the ping IMM IP address -t command on the CLI of the PC or laptop. If the IMM IP address
can be pinged through, the changes take effect.
3. Press Esc to exit Network Configuration.
4. Press Esc to exit Integrated Management Module.
5. Press Esc to exit System Settings.
6. Press Esc to exit System Configuration and Boot Management. The Do you want to
exit Setup Utility? dialog box is displayed.
7. Enter Y to exit BIOS.
NOTE
This operation takes wait about 30 seconds. Wait patiently.
----End
4.6.3.1 Setting the SC IP Address for the OceanStor 5500 V3 Disk Array
This topic describes how to set the SC IP address for the OceanStor 5500 V3 disk array
before using OceanStor 5500 V3 disk array. After the SC IP address has been set, you can use
the Web browser to remotely access and control the disk array.
Prerequisites
l The controller IP addresses are obtained.
l The power cable of the disk array is connected.
l Optional: For a PC without a DB-9 port, a USB-DB-9 serial cable is available, and the
USB serial port drive has been installed.
l Perform the following operations to query the communication port number on the PC's
serial port:
NOTE
For the laptop, connect the serial port of the local controller to the serial port of the disk array (SERIAL
MGT) first, or can not query the communication port number on the laptop.
a. Right-click Computer on the PC desktop and choose Manage from the shortcut
menu.
b. In the Computer Manage window, choose Computer Manage (local) > System
Tools > Device Manager.
c. Choose ports (COM&LPT) in the right pane of Device Manager to check the
communication port on the PC's serial port, such as COM1.
Context
The OceanStor 5500 V3, a disk array, has two controllers. The IP addresses configured in this
section are examples only. For example, set the IP address of the management network of
controller A to 10.9.1.10 and the IP address of the management network of controller B to
10.9.1.11.
Procedure
Step 1 Connect the computer and controller A of the disk array physically.
Use a serial port cable (DB9-RJ45) to connect the serial port of the local controller to the
serial port of the disk array ( ).
Use an RJ45 connector at one end of the serial port cable to connect to the serial port of the
disk array ( ) and a DB-9 connector at the other end of the cable to connect to the serial
port of the computer.
5. Click Open.
If the connection succeeds, the following information will be displayed:
Storage login:
– The default administrator name is admin and the initial password of the admin user is
Admin@storage. If the U2000 is preinstalled before being delivered, the password has been
changed to Changeme_123. After the initial login, change the default password immediately. To
ensure the security of the U2000, passwords must be complex enough. For example, a password
must contain eight or more characters of two types. The allowed characters are digits, letters, and
special characters. Remember to change passwords regularly.
– After an admin user enters an incorrect password for three consecutive times, the admin user will
be locked and therefore cannot be used to log in to the disk array controller. The admin account
will be automatically unlocked after 15 minutes.
– Run the following command to change the password for the current user.
admin:/>change user_password
Old password:old password
New password:new password
Reenter password:new password
Command executed successfully.
Step 6 Run the following command to exit the controller of the disk array.
admin:/> exit
Are you sure to exit?(y/n):y
----End
4.6.3.2 Setting the SC IP Address for the OceanStor S3900 Disk Array
This topic describes how to set the SC IP address for the OceanStor S3900 disk array before
using OceanStor S3900 disk array. After the SC IP address has been set, you can use the Web
browser to remotely access and control the disk array.
Prerequisites
l The controller IP addresses are obtained.
l The power cable of the disk array is connected.
l Optional: For a PC without a DB-9 port, a USB-DB-9 serial cable is available, and the
USB serial port drive has been installed.
l Perform the following operations to query the communication port number on the PC's
serial port:
NOTE
For the laptop, connect the serial port of the local controller to the serial port of the disk array (SERIAL
MGT) first, or can not query the communication port number on the laptop.
a. Right-click Computer on the PC desktop and choose Manage from the shortcut
menu.
b. In the Computer Manage window, choose Computer Manage (local) > System
Tools > Device Manager.
c. Choose ports (COM&LPT) in the right pane of Device Manager to check the
communication port on the PC's serial port, such as COM1.
Context
The OceanStor S3900, a disk array, has two controllers. The IP addresses configured in this
section are examples only. For example, set the IP address of the management network of
controller A to 192.168.128.203 and the IP address of the management network of controller
B to 192.168.128.204.
Procedure
Step 1 Connect the computer and controller A of the disk array physically.
Use a serial port cable (DB9-RJ45) to connect the serial port of the local controller to the
serial port of the disk array ( ).
Use an RJ45 connector at one end of the serial port cable to connect to the serial port of the
disk array ( ) and a DB-9 connector at the other end of the cable to connect to the serial
port of the computer.
5. Click Open.
The following message will be displayed on the Windows management terminal if the
connection was established:
Storage login:
After an admin user enters an incorrect password for three consecutive times, the admin user will be
locked and therefore cannot be used to log in to the disk array controller. The admin account will be
automatically unlocked after 15 minutes.
The default user name and password of the system administrator are admin and Admin@storage. To
ensure the security of the U2000, passwords must be complex enough. For example, a password must
contain eight or more characters of two types. The allowed characters are digits, letters, and special
characters. Remember to change passwords regularly.
NOTE
Change the password as prompted. For example, change the password to Changeme_123. To
ensure the security of the U2000, passwords must be complex enough. For example, a password
must contain eight or more characters of two types. The allowed characters are digits, letters, and
special characters. Remember to change passwords regularly.
Step 3 In the CLI, run the chgctrlip command to configure the IP address for the network interface
of controller A. See Table 4-19.
Table 4-19 Command format and parameter description of the chgctrlip command
Command Format Parameter Description
Configure the IP address for the management network interface of controller B. Specifically,
the IP address is 192.168.128.204, the subnet mask is 255.255.255.0, and the gateway IP
address is 192.168.128.1. Run the following command:
admin:/> chgctrlip -c b -ip 192.168.128.204 -mask 255.255.255.0 -gw 192.168.128.1
NOTE
Run the showctrlip command to query the IP address of the management network interface of a
controller after the chgctrlip command.
The following is an example for querying the IP addresses of the management network interfaces of all
controllers:
admin:/> showctrlip
Controller IP Address Subnet Mask Gateway MAC Address
A 192.168.128.203 255.255.255.0 192.168.128.1
00:12:34:56:70:46
B 192.168.128.204 255.255.255.0 192.168.128.1
00:12:34:56:79:92
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l The version of the Internet Explorer browser must be 9.0 or above and the Internet
Explorer cannot be configured with a proxy server.
l The IP address of the iBMC is available. For details about how to set the IP address of
the iBMC, see 4.6.1.2 Configuring the iBMC IP Address Through iBMC
Management Interface(HUAWEI RH2288H V3 and HUAWEI RH5885H V3).
l ISO image file of the quick RAID configuration DVD
Sles_server_raid_x64_for_Huawei_dvd.iso must be ready.
l Ensure that eight hard disks of the server are available (if a disk array is configured,
ensure that the two hard disks of the server are available). Otherwise, RAID
configuration fails. For details, see A.2.9 Viewing Hard Disk Information (Huawei
RH2288H V3 or Huawei RH5885H V3).
Context
RAID is a technology used to combine multiple independent physical hard disks in various
modes to form logical hard disk groups. A logical hard disk group provides storage capacity
greater than that of a single hard disk and allows implementation of data redundancy
protection.
NOTICE
Ensure that the server has two or eight hard disks, otherwise, automatically configuring a
RAID using the ISO image file may fail. If the server has over eight hard disks, manually
configure a RAID using the controller card.
l If the delivered server is not connected to a disk array, ensure that the Huawei
RH2288H V3 server and Huawei RH5885H V3 server for standard delivery have
eight 600G hard disks, and the RAID level plan and partition plan are as follows.
– The first and second hard disks are configured as RAID 1 for installing OS software
and data.
– The third, fourth, fifth, and sixth hard disks are configured as RAID 10 for storing
service data and software.
– The seventh hard disk is used to system back up. It is configured as RAID 0.
– The eighth hard disk is configured as RAID 0 to back up the database.
l If the delivered server is connected to a disk array, ensure that the Huawei
RH5885H V3 server for standard delivery has two 600G hard disks, the disk array
OceanStor 5500 V3 or OceanStor S3900 have 12 hard disks, and the RAID level
plan and partition plan are as follows.
– Configure the two hard disks on the server as RAID 1. Install the OS software and
U2000 project-related software and configure OS data.
– Configure the first 10 hard disks of the OceanStor S3900 disk array as RAID 10.
The first 10 hard disks are used to store database software, database data, U2000
software, and backup data. The remaining two hard disks are used for global hot
backup for the first 10 hard disks.
NOTE
l Using an ISO image file of the quick RAID configuration DVD to configure a RAID is
recommended because it improves the configuration efficiency and reduces misoperations.
l If an Internet Explorer, two pointers, or Remote Virtual Console fault occurs in the iBMC, see A.
2.4 How to Solve iMana/iBMC Problems.
l The procedure for configuring RAID for the server with eight hard disks is the similar to that for the
server with two hard disks. The only difference is the command output. The following uses a server
with eight hard disks as an example.
Procedure
Step 1 Optional: If OS has been installed on the server, manually format disks; otherwise, OS
installation will fail because the old data is not clear. For details, see A.2.7 Formatting disks
(Huawei RH2288H V3 or Huawei RH5885H V3).
Step 2 Save the ISO mirroring file to any directory on the PC or laptop.
Step 3 Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log In to a
Remote Huawei RH series rack server.
Step 4 Click on the toolbar which is right above Remote Virtual Console.
Step 5 In the virtual disk dialog box, select Image File and click Browse.
Step 6 In the Open dialog box, select the ISO file of the quick RAID configuration DVD
Sles_server_raid_x64_for_Huawei_dvd.iso and click Open.
Step 8 Click on the toolbar which is right above Remote Virtual Console and select Reset or
Forced System Reset.
Step 9 In the dialog box that is displayed, click Yes to restart the server.
Step 12 Wait about 5 minutes. The RAID configuration is completed, as shown in the following
figure.
Step 14 Click on the toolbar which is right above Remote Virtual Console. Click Disconnect.
NOTICE
If you don't click Disconnect, it will configure the RAID repeatedly.
This screen stays for a short period of time. Press Ctrl+R the moment you see Ctrl+R on the
screen. If Ctrl+R is not pressed, restart the system.
1. Click on the toolbar which is right above Remote Virtual Console and select Reset
or Forced System Reset.
2. In the dialog box that is displayed, click Yes to restart the server.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l The IP address of the iMana is available. For details about how to set the IP address of
the iMana, see 4.6.1.1 Configuring the iMana IP Address Through iMana
Management Interface (HUAWEI RH5885H V3 and HUAWEI RH2288H V2).
l ISO image file of the quick RAID configuration DVD
Sles_server_raid_x64_for_Huawei_dvd.iso must be ready.
l Ensure that eight hard disks of the server are available (if a disk array is configured,
ensure that the two hard disks of the server are available). Otherwise, RAID
configuration fails. If a disk array is available, ensure that two hard disks of the server
are available. For details, see A.2.8 Viewing Hard Disk Information (Huawei
RH5885H V3 or Huawei RH2288H V2).
Context
RAID is a technology used to combine multiple independent physical hard disks in various
modes to form logical hard disk groups. A logical hard disk group provides storage capacity
greater than that of a single hard disk and allows implementation of data redundancy
protection.
NOTICE
Ensure that the server has two or eight hard disks, otherwise, automatically configuring a
RAID using the ISO image file may fail. If the server has over eight hard disks, manually
configure a RAID using the controller card.
l If the delivered server is not connected to a disk array, ensure that the Huawei
RH5885H V3 or Huawei RH2288H V2 server for standard delivery have eight
300G hard disks, and the RAID level plan and partition plan are as follows.
– The first and second hard disks are configured as RAID 1 for installing OS software
and data.
– The third, fourth, fifth, and sixth hard disks are configured as RAID 10 for storing
service data and software.
– •The seventh hard disk functions as a standby disk that substitutes for a damaged
hard disk. It is configured as RAID 0.
– The eighth hard disk is configured as RAID 0 to back up the database.
l If the delivered server is connected to a disk array, ensure that the Huawei
RH5885H V3 server for standard delivery has two 300G hard disks, the disk array
OceanStor 5500 V3 or OceanStor S3900 have 12 hard disks, and the RAID level
plan and partition plan are as follows.
– Configure the two hard disks on the server as RAID 1. Install the OS software and
U2000 project-related software and configure OS data.
– Configure the first 10 hard disks of the OceanStor S3900 disk array as RAID 10.
The first 10 hard disks are used to store database software, database data, U2000
software, and backup data. The remaining two hard disks are used for global hot
backup for the first 10 hard disks.
NOTE
l Using an ISO image file of the quick RAID configuration DVD to configure a RAID is
recommended because it improves the configuration efficiency and reduces misoperations.
l If an Internet Explorer, two pointers, or Remote Virtual Console fault occurs in the iMana, see A.
2.4 How to Solve iMana/iBMC Problems.
l The procedure for configuring RAID for the server with eight hard disks is the similar to that for the
server with two hard disks. The only difference is the command output. The following uses a server
with eight hard disks as an example.
Procedure
Step 1 Optional: If OS has been installed on the server, manually format disks; otherwise, OS
installation will fail because the old data is not clear. For details, see A.2.6 Formatting disks
(Huawei RH5885H V3 or Huawei RH2288H V2).
Step 2 Save the ISO mirroring file to any directory on the PC or laptop.
Step 3 Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log In to a
Remote Huawei RH series rack server.
Step 4 Click on the toolbar which is right above Remote Virtual Console.
Step 5 In the virtual disk dialog box, select Image File and click Browse.
Step 6 In the Open dialog box, select the ISO file of the quick RAID configuration DVD
Sles_server_raid_x64_for_Huawei_dvd.iso and click Open.
Step 7 In the virtual disk dialog box, click Connect. If Connect is displayed as Disconnect, the
virtual disk is connected to the server.
Step 8 Click on the toolbar which is right above Remote Virtual Console and select Cold
Reset.
Step 9 In the dialog box that is displayed, click Yes to restart the server.
a. Due to different BIOS versions, the content display and operations on the Please
select boot device: page may be different, as follows:
b. Select HUAWEI DVD-ROM VM 1.1.0 to start from the virtual drive and press
Enter.
Step 12 On Huawei RH5885H V3 server, wait about 5 minutes. On Huawei RH2288H V2 server, wait
about 20 minutes. The RAID configuration is completed, as shown in the following figure.
Step 14 Click on the toolbar which is right above Remote Virtual Console. Click Disconnect.
NOTICE
If you don't click Disconnect, it will configure the RAID repeatedly.
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the
screen. If Ctrl+H is not pressed, restart the system.
NOTE
Two pointers will be displayed. You can click on the toolbar above Remote Virtual Console
and select the Single Mouse check box to make only one pointer displayed in the window. To exit
from the Remote Virtual Console, click Ctrl+Alt+Shift. To exit from the single-pointer mode,
Step 16 Click Exit to exit the WebBIOS window. The Exit Application dialog box is displayed.
1. Click on the toolbar which is right above Remote Virtual Console and select Cold
Reset.
2. In the dialog box that is displayed, click Yes to restart the server.
----End
Prerequisites
l If configure the RAID in local mode, you must ensure that the server is connected to the
KVM.
l If configure the RAID in remote mode, you must ensure that the following preparations
are ready:
– The IP address of the IMM is available. For details about how to set the IP address
of the IMM, see 4.6.2.2 Configuring the IMM IP Address Through IMM
Management Interface (IBM X3850 X5 and IBM X3650 M3).
– A PC or laptop on which the Internet Explorer browser is installed is ready.
– Internet Explorer browsers do not support a proxy server.
– Ensure that eight hard disks of the server are available (if a disk array is configured,
ensure that the two hard disks of the server are available). Otherwise, RAID
configuration fails. For details, see A.3.9 Viewing Hard Disk Information in
Local Mode (IBM Server) or A.3.11 Viewing Hard Disk Informationin Remote
Mode (IBM X3850 X5 and IBM X3650 M3).
Context
l If the delivered server is not connected to a disk array, ensure that the IBM servers
(IBM X3850 X5 and IBM X3650 M3) for standard delivery have eight 300G hard
disks, and the RAID level plan and partition plan are as follows.
– The first and second hard disks are configured as RAID 1 for installing OS software
and data.
– The third, fourth, fifth, and sixth hard disks are configured as RAID 10 for storing
service data and software.
– •The seventh hard disk functions as a standby disk that substitutes for a damaged
hard disk. It is configured as RAID 0.
– The eighth hard disk is configured as RAID 0 to back up the database.
l If the delivered server is connected to a disk array, ensure that the IBM server
(IBM X3850 X5) for standard delivery has two 300G hard disks, the disk array
OceanStor 5500 V3 or OceanStor S3900 have 12 hard disks, and the RAID level
plan and partition plan are as follows.
– Configure the two hard disks on the server as RAID 1. Install the OS software and
U2000 project-related software and configure OS data.
– Configure the first 10 hard disks of the OceanStor S3900 disk array as RAID 10.
The first 10 hard disks are used to store database software, database data, U2000
software, and backup data. The remaining two hard disks are used for global hot
backup for the first 10 hard disks.
NOTE
l Using an ISO image file of the quick RAID configuration DVD to configure a RAID is
recommended because it improves the configuration efficiency and reduces misoperations.
l If an Internet Explorer, two pointers, or Remote Virtual Console fault occurs in the iMana, see A.
2.4 How to Solve iMana/iBMC Problems.
Procedure
Step 1 Optional: If OS has been installed on the server, manually format disks; otherwise, OS
installation will fail because the old data is not clear. For details, see A.3.12 Formatting
disks in Local Mode (IBM Server) or A.3.14 Formatting the disks in Remote Mode (IBM
X3850 X5 and IBM X3650 M3).
Step 3 Perform the following operations to access the manual RAID configuration window:
1. After the system BIOS self-check is complete, the BIOS information about the RAID
card is displayed, as shown in the following figure.
2. Press Ctrl+H to access the WebBIOS configuration window for the RAID card. The
following dialog box is played.
3. Select the RAID card adapter to be configured and click Start to access the
configuration window. The following dialog box is played.
5. Click Next to access the RAID configuration wizard window. The following dialog box
is played.
1. Select Slot 0 and Slot 1, and click Add To Array to add them to Drive Groups. Then
click Accept DG, as shown in the following figure.
2. Select Slot 2 and Slot 3, and click Add To Array to add them to Drive Groups. Then
click Accept DG to complete the Drive Group configuration.
3. Select Slot 4 and Slot 5, and click Add To Array to add them to Drive Groups. Then
click Accept DG to complete the Drive Group configuration.
4. Select Slot 6, and click Add To Array to add them to Drive Groups. Then click Accept
DG to complete the Drive Group configuration.
5. Select Slot 7, and click Add To Array to add them to Drive Groups. Then click Accept
DG to complete the Drive Group configuration.
– If the number pad is unavailable, press Num Lock or use the main keyboard.
– If the Update Size button is unavailable, enter a value in Select Size as prompted.
4. Click Accept. The following dialog box is played.
6. Click Back to return to Span Definition. Then, add another virtual drive.
7. In Array With Free Space, select Drive Group:1 and Drive Group:2 and click Add to
SPAN to add DG to Span in the right pane.
8. Repeat Step 5.2 to Step 5.5 to configure Drive Group:1 and Drive Group:2 as a virtual
drive.
9. Click Back to return to Span Definition. Then, add another virtual drive.
10. In Array With Free Space, select Drive Group:3 and click Add to SPAN to add DG to
Span in the right pane.
11. Repeat Step 5.2 to Step 5.5 to configure Drive Group:3 as a virtual drive.
12. Click Back to return to Span Definition. Then, add another virtual drive.
13. In Array With Free Space, select Drive Group:4 and click Add to SPAN to add DG to
Span in the right pane.
14. Repeat Step 5.2 to Step 5.5 to configure Drive Group:4 as a virtual drive.
15. Add Virtual Drives by using the default settings for all parameters. Click Next. The
following dialog box is played.
19. The following dialog is played, click Yes to initialize the created virtual drives.
20. Complete the RAID 10 configuration. Click Home and check that the status of the
virtual drives is Optimal and the status of the four hard disks is Online, as shown in the
following figure.
Step 6 Complete the RAID configuration. Click Home and check that the status of the four virtual
drives is Optimal and the status of the eight hard disks is Online, as shown in the following
figure.
Step 7 After the configuration is complete, click Exit. The Exit Application dialog box is displayed.
Step 9 Choose Tools > Power > Reboot from the main menu to reboot the system.
NOTE
----End
Prerequisites
l If configure the RAID in local mode, you must ensure that the server is connected to the
KVM.
l If configure the RAID in remote mode, you must ensure that the following preparations
are ready:
– The IP address of the IMM is available. For details about how to set the IP address
of the IMM, see 4.6.2.1 Configuring the IMM IP Address Through IMM
Management Interface(IBM X3650 M4).
– A PC or laptop on which the Internet Explorer browser is installed is ready.
– Internet Explorer browsers do not support a proxy server.
– Ensure that eight hard disks of the server are available. Otherwise, RAID
configuration fails. For details, see A.3.9 Viewing Hard Disk Information in
Local Mode (IBM Server) or A.3.10 Viewing Hard Disk Informationin Remote
Mode (IBM X3650 M4).
Context
If the delivered server is not connected to a disk array, ensure that the IBM servers
(IBM X3650 M4) for standard delivery have eight 300G hard disks, and the RAID level
plan and partition plan are as follows.
l The first and second hard disks are configured as RAID 1 for installing OS software and
data.
l The third, fourth, fifth, and sixth hard disks are configured as RAID 10 for storing
service data and software.
l •The seventh hard disk functions as a standby disk that substitutes for a damaged hard
disk. It is configured as RAID 0.
l The eighth hard disk is configured as RAID 0 to back up the database.
NOTICE
l Open one Video Viewer window on a PC or laptop. Open the Video Viewer window on a
PC or laptop for each server when you operate multiple servers. Otherwise, the failure to
open multiple Video Viewer windows on a PC or laptop or the failure that the Video
Viewer window does not respond may occur.
l If an Internet Explorer or Video Viewer fault occurs in the IMM, see A.3.7 How to Solve
IMM Problems to rectify the fault.
Procedure
Step 1 Optional: If OS has been installed on the server, manually format disks; otherwise, OS
installation will fail because the old data is not clear. For details, see A.3.12 Formatting
disks in Local Mode (IBM Server) orA.3.13 Formatting the disks in Remote Mode (IBM
X3650 M4).
Step 3 Perform the following operations to access the manual RAID configuration window:
1. After the system BIOS self-check is complete, the BIOS information about the RAID
card is displayed.
2. Press Ctrl+H to access the WebBIOS configuration window for the RAID card.
3. Select the RAID card adapter to be configured and click Start to access the
configuration window.
5. Select New Configuration and click Next to access the RAID configuration wizard
window. The following dialog box is played.
2. Click Accept DG, click Next. The following dialog box is played.
3. Click Yes.
4. Select Slot 2 and Slot 3, and click Add To Array to add them to Drive Groups. Click
Accept DG to complete the Drive Groups configuration. Click Next.
5. Click Yes.
6. Select Slot 4 and Slot 5, and click Add To Array to add them to Drive Groups. Click
Accept DG to complete the Drive Groups configuration. Click Next.
7. Click Yes.
8. Select Slot 6, and click Add To Array to add them to Drive Groups. Click Accept DG
to complete the Drive Groups configuration. Click Next.
9. Click Yes.
10. Select Slot 6, and click Add To Array to add them to Drive Groups. Click Accept DG
to complete the Drive Groups configuration. Click Next.
11. Click Yes. Click Next.
2. Click Next.
3. Click Update Size as prompted. Keep default settings for other options, as shown in the
following figure.
NOTE
If the number pad is unavailable, press Num Lock or use the main keyboard.
NOTE
If the Update Size button is unavailable, enter a value in Select Size as prompted.
4. Click Accept. The following dialog box is played.
20. The following dialog box is played. Click Yes to initialize the created virtual drives.
Step 6 Complete the RAID configuration. Click Home. Return to the Home window and check that
the status of the four virtual drives is Optimal and the status of the eight hard disks is Online.
Step 7 After the configuration is complete, click Exit. The Exit Application dialog box is displayed.
Step 9 Choose Tools > Power > Reboot from the main menu to reboot the IBM server.
NOTE
----End
NOTE
The installation DVD-ROM delivered with the SUSE Linux OS is used to install the SUSE Linux OS is
unavailable.
A quick installation DVD-ROM can be used to install the OS and patches. During installation,
you do not need to manually partition hard disks, reducing the probability of misoperation and
improves the installation efficiency. Using a quick installation DVD-ROM to install the SUSE
Linux OS is recommended.
You can use a quick installation DVD-ROM to install the OS on the IBM X series servers or
Huawei RH series rack servers in two modes: remote and local. If a server is not configured
with the KVM, using the remote mode is recommended.
Prerequisites
l The IP address of the iMana\iBMC is available. In Huawei RH5885H V3 or Huawei
RH2288H V2 server, for details about how to set the IP address of the iMana, see 4.6.1.1
Configuring the iMana IP Address Through iMana Management Interface
(HUAWEI RH5885H V3 and HUAWEI RH2288H V2). In Huawei RH2288H V3
server and Huawei RH5885H V3 server, for details about how to set the IP address of
the iBMC, see 4.6.1.2 Configuring the iBMC IP Address Through iBMC
Management Interface(HUAWEI RH2288H V3 and HUAWEI RH5885H V3).
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l Choose Tool > Internet options. Click Connections tab, you must clear settings for the
proxy server before logging in to the browser.
l Quick OS installation DVD U2000version_server_os_sles11_x64_dvd1 or ISO image
file of the quick installation DVD U2000version_server_os_sles11_x64_dvd1.iso.
l The system IP addresses including the IP address, subnet mask, and gateway must have
been planned.
Context
NOTE
If an Internet Explorer, two pointers, or Remote Virtual Console fault occurs in the iMana, see A.2.4
How to Solve iMana/iBMC Problems.
Procedure
Step 1 Insert the quick installation DVD-ROM (Terminal Physical Software, iManager U2000,
iManager U2000 version_server_sles, Physical Software Package For Linux Network
Management System, CD) to the drive on a PC or laptop. If an ISO mirroring file is used to
install the operating system, save the ISO mirroring file to any directory on the PC or laptop.
Step 2 Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log In to a
Remote Huawei RH series rack server.
Step 3 Click on the toolbar which is right above Remote Virtual Console.
Connect. If the drive has successfully connected to the server, the Connect changes to
Disconnect.
l If the ISO file is used, perform the following operations:
a. In the virtual disk dialog box, select Image File and click Browse.
b. In the Open dialog box, select the ISO file of the quick RAID configuration DVD
U2000version_server_os_sles11_x64_dvd1.iso and click Open.
c. In the virtual disk dialog box, click Connect. If the virtual drive has successfully
connected to the server, the Connect changes to Disconnect.
Step 5 Click on the toolbar which is right above Remote Virtual Console and select Reset,
Cold Reset or Forced System Reset.
Step 6 In the dialog box that is displayed, click Yes to restart the server.
Step 7 Configure the server to start from the drive.
l If log in to the Huawei RH5885H V3 server through iMana, perform the following
operations:
After the server is started, press F11 or F3 (on Remote Keyboard). Wait about 3
minutes, the Please select boot device: window is displayed.
NOTE
If a dialog box asking you to enter a password displayed during startup, enter the required password.
The default password is Huawei12#$, if the password has been changed, enter the new password. If the
password has not been changed, for system security, modify the default password and remember the
new password.
a. Due to different BIOS versions, the content display and operations on the Please
select boot device: page may be different, as follows:
n If the BIOS is a new version, the following page is displayed.
NOTICE
Do not perform any operation before the SUSE Linux Enterprise Server page is displayed.
Step 9 Use the up or down arrow key to select Installation--Single-Server System and press Enter
to begin to load the Linux core. The system starts the automatic installation of the OS. The
installation of the SUSE Linux kernel is completed until the operating system login window is
displayed. The entire OS installation process lasts approximately 40 minutes.
NOTE
l The installation process and remaining time are displayed in the installation window.
l During installation of the SUSE Linux kernel, do not manually perform any operation until the OS login
window is displayed.
l During installation of the SUSE Linux kernel, the OS automatically restarts. If the Boot from Hard Disk
screen stays for more than 2 minutes, press Enter to go to next window. And press Enter again to
continue automatic restart until the OS login window is displayed.
l If the following window is displayed during OS installation, the sdc hard disk has not been formatted,
which does not affect installation. Click OK directly until the OS login window is displayed.
Step 10 Click on the toolbar which is right above Remote Virtual Console. Click Eject.
The default OS user name is root and the default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1
How to Change the OS User Password.
NOTE
l Do not use the integrated number pad keyboards. This is because Num Lock may fail to work when
a SUSE Linux OS is installed on certain machines.
l By default, the system enables the root user to perform remote login and use the SFTP tool.
l If you can log in to the SUSE Linux OS as the root user and the OS version and kernel version are
correct, it indicates that the SUSE Linux OS is successfully installed. Otherwise, install the OS
again.
– On the desktop, right-click in the blank area and choose Open in Terminal from the shortcut
menu to access the CLI.
– Run the following command to view the OS version:
# cat /etc/SuSE-release
If the following information is displayed, the SUSE Linux version is correct:
SUSE Linux Enterprise Server 11 (x86_64)
VERSION = 11
PATCHLEVEL = 3
– Run the following command to view the OS kernel version:
# uname -rv
The information similar to 3.0.101-0.47.105-default is displayed. Here, 3.0.101-0.47.105-
default indicates the kernel version of the OS.
If the kernel version is 3.0.101-0.47.105-default , the kernel version is correct.
2. In the YaST Control Center dialog box, choose Network Devices > Network Settings.
3. In the Network Settings dialog box, select Overview.
4. Select the network port whose Device is eth0 and click Edit.
NOTE
– Select the network port whose Device is eth0 and connect network interfaces identified as 1 to
the network.
– If bond has been configured for multiple network interfaces, only one MAC address is
displayed for these network interfaces. For example, if the server has four network interfaces
and bond has not been configured for them, four MAC addresses will be displayed. If bond has
been configured for two network interfaces, three MAC addresses will be displayed.
5. In the Network Card Setup dialog box, select Address.
6. Select Statically assigned IP Address. Set system IP address and subnet mask, and
click Next.
NOTICE
Hostname can not be null.
A route must be added if a user needs to connect to the network. A static route is recommended.
– If network connection security is highly required, add a static route and allow users on some
IP network segments to connect to the server.
– If network connection security is not highly required, add a default route and allow all users
to connect to the server. For details, see A.1.4 How to manually Add the Default Route
(SUSE Linux).
NOTE
Set the following parameters:
n Destination: An IP address on the network segment of the computer connected to the
U2000 server.
n Device: use the default value. The default value is eth0.
n Gateway: network management IP address for the network on which the U2000 server
is located.
n Netmask: subnet mask of the network segment on which the computer connected to the
U2000 server is located.
Leave other parameters empty.
c. Click OK.
d. Click OK.
8. Close the YaST Control Center dialog box.
NOTE
l After the system IP addresses and the routes are set, run the netstat -nr command through the CLI
to check whether the route is successfully added. Wait for about 1 to 2 minutes, then run the ping
system IP address command to check whether the network of the system is set. If the system IP
address can be pinged, the network of the system is successfully set.
l If a static route exists and a new static route needs to be added, use the MSuite to add a static route
after the U2000 is installed, see A.1.6 How to Add a Static Route If the U2000 Is Installed.
Using yast2 to add a static route is prohibited to prevent several-second network disconnection and
service interruption.
Step 13 Run the following command to restart the OS. It takes approximately 5 to 8 minutes to restart
the system.
# sync;sync;sync;sync
# shutdown -r now
----End
Follow-up Procedure
If a host name needs to be changed, enter the new host name during system preconfiguration.
Prerequisites
l The IP address of the IMM is available. For details about how to set the IP address of the
IMM, see 4.6.2.1 Configuring the IMM IP Address Through IMM Management
Interface(IBM X3650 M4).
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l Quick OS installation DVD U2000version_server_os_sles11_x64_dvd1 or ISO image
file of the quick installation DVD U2000version_server_os_sles11_x64_dvd1.iso must
be ready.
l The system IP addresses including the IP address, subnet mask, and gateway must have
been planned.
Context
NOTICE
l Open one Video Viewer window on a PC or laptop. Open the Video Viewer window on a
PC or laptop for each server when you operate multiple servers. Otherwise, the failure to
open multiple Video Viewer windows on a PC or laptop or the failure that the Video
Viewer window does not respond may occur.
l If an Internet Explorer or Video Viewer fault occurs in the IMM, see A.3.7 How to Solve
IMM Problems to rectify the fault.
Procedure
Step 1 Insert the quick installation DVD-ROM (Terminal Physical Software, iManager U2000,
iManager U2000 version_server_sles, Physical Software Package For Linux Network
Management System, CD) to the drive on a PC or laptop. If an ISO mirroring file is used to
install the operating system, save the ISO mirroring file to any directory on the PC or laptop.
Step 2 Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar to
access the page for logging into the IMM.
NOTE
l You must clear settings for the proxy server before logging in to the browser.
l The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0.
If the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on
the IBM Server.
Step 3 Enter an IMM user name and a password, and click Log In.
NOTE
Step 4 Click Remote Control, select Use the ActiveX Client > Start remote control in single-user
mode to access the remote control desktop.
NOTE
l When logging in to the IBM server for the first time, perform the following operations:
1. Click Start remote control in single-user mode and wait about 2 minutes. In the dialog box
asking you whether to install the IMM_KVMVM32.cab, click Install.
2. During the installation, click Run in the Warning-Security dialog box asking you whether to
trust this site.
l Do not close the ActiveX KVM Client dialog box. Otherwise, the Video Viewer dialog box cannot
be displayed.
l If the remote control desktop appears and then disappears immediately, see A.3.1 How to Solve the
Problem Where the Remote Control Desktop Appears and Then Disappears Immediately to
solve the problem.
l If Use the ActiveX Client is unavailable, just click Start remote control in single-user mode to
access the remote control desktop.
l Keep the default values of other parameters unchanged.
l For the IBM X3650 M4 server, if CAPS is displayed in the lower right corner of the Video Viewer
window, letters are entered in upper case; if CAPS is not displayed in the lower right corner of the
Video Viewer window, letters are entered in lower case. The Caps indicator on the keyboard cannot
indicate whether letters are entered in upper or lower case.
l For the IBM X3650 M4 server, if NUM is displayed in the lower right corner of the Video Viewer
window, digits can be entered; if NUM is not displayed in the lower right corner of the Video
Viewer window, digits cannot be entered. The Num indicator on the keyboard cannot indicate
whether the number keypad is available.
l If a message is displayed indicating that the application is prohibited to run, choose Start > Control
Panel and click Java. In the Java Control Panel dialog box, click the Security tab, Edit Site List,
and Add, enter an iMana/iBMC IP address, such as http://192.168.2.100, and click OK. Click OK,
restart the IE Explorer, and log in to iMana/iBMC again.
Step 5 The desktop windows Video Viewer is displayed. Choose Tools > Launch Virtual Media
from the main menu. The virtual media window is displayed.
Step 6 Load the installation DVD-ROM or ISO mirroring file. Perform the following operation
according to the method used:
l If a burnt quick installation DVD-ROM is used, select Map on the line where CD/DVD
is located.
l If the ISO mirroring file of the quick installation DVD-ROM is used, click Add Image
to add the SUSE Linux operating system DVD-ROM and select Map.
NOTICE
l Do not close the virtual media window Virtual Media Session until the SUSE Linux OS
is installed. If Map is not selected, or the virtual media window Virtual Media Session is
closed, the installation fails and the message An error occurred during the installation
is displayed.
l Do not close the desktop display window Video Viewer until all operations in the chapter
are completed. You can operate the server using the desktop display window.
Step 7 Click Mount Selected to mount the SUSE Linux operating system DVD-ROM file to the
IMM.
Step 8 Choose Tools > Power > Reboot from the main menu to reboot the IBM server.
NOTE
Step 9 After the IBM System X window is displayed, wait for about 2 minute until <F12> Select
Boot Device is displayed.
Step 10 Press F12 to choose Select Boot Device dialog box. If you miss the F12, choose Tools >
Power > Reboot from the main menu and click Yes in the dialog box that is displayed to
reboot the IBM server.
Step 11 Use arrow keys to select Legacy Only and press Enter. Then use arrow keys to select
CD/DVD and press Enter to start the system from the DVD-ROM.
Step 12 Wait about two minutes, the system restarts and the SUSE Linux Enterprise Server window
is displayed.
NOTICE
Do not perform any operation before the SUSE Linux Enterprise Server page is displayed.
Step 13 Use the up or down arrow key to select Installation--Single-Server System and press Enter
to begin to load the Linux core. The system starts the automatic installation of the OS. The
installation of the SUSE Linux kernel is completed until the operating system login window is
displayed. The entire OS installation process lasts approximately 40 minutes.
NOTE
l If the operation fails to be performed using the up and down arrow keys, choose Macros > Soft Key >
Down, select Installation--Single-Server System in the Video Viewer window. If Down is unavailable
for Soft Key, choose Add > New and press the down arrow key to add Down for Soft Key. Click OK.
l The installation process and remaining time are displayed in the installation window.
l During installation of the SUSE Linux kernel, do not manually perform any operation until the OS login
window is displayed.
l During installation of the SUSE Linux kernel, the OS automatically restarts. If the Boot from Hard Disk
screen stays for more than 2 minutes, press Enter to go to next window. And press Enter again to
continue automatic restart until the OS login window is displayed.
l If the following window is displayed during OS installation, the sdc hard disk has not been formatted,
which does not affect installation. Click OK directly until the OS login window is displayed.
Step 14 In the Virtual Media Session window, if the Map for the disk is still selected, clear the
selection of Map. And click Exit to close the virtual media window. If unmap is prompted,
click Yes. If the burnt quick installation DVD-ROM is used, remove the DVD-ROM from the
drive on the PC or laptop.
Step 15 Log in to the GUI of the OS as the root user.
The default OS user name is root and the default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1
How to Change the OS User Password.
NOTE
l Do not use the integrated number pad keyboards. This is because Num Lock may fail to work when
a SUSE Linux OS is installed on certain machines.
l Two pointers will be displayed. You can choose Tools > Single Cursor from the main menu to
change to the single pointer mode. Select the pointer mode according to individual operation habits.
To quit single pointer mode, press F12.
l When the Video Viewer window is used, contents outside the Video Viewer window cannot be
copied and pasted into the Video Viewer window.
l By default, the system enables the root user to perform remote login and use the SFTP tool.
l If you can log in to the SUSE Linux OS as the root user and the OS version and kernel version are
correct, it indicates that the SUSE Linux OS is successfully installed. Otherwise, install the OS
again.
– On the desktop, right-click in the blank area and choose Open in Terminal from the shortcut
menu to access the CLI.
– Run the following command to view the OS version:
# cat /etc/SuSE-release
If the following information is displayed, the SUSE Linux version is correct:
SUSE Linux Enterprise Server 11 (x86_64)
VERSION = 11
PATCHLEVEL = 3
– Run the following command to view the OS kernel version:
# uname -rv
The information similar to 3.0.101-0.47.105-default is displayed. Here, 3.0.101-0.47.105-
default indicates the kernel version of the OS.
If the kernel version is 3.0.101-0.47.105-default , the kernel version is correct.
2. In the YaST Control Center dialog box, choose Network Devices > Network Settings.
3. In the Network Settings dialog box, select Overview.
4. Select the network port whose Device is eth0 and click Edit.
NOTE
– Select the network port whose Device is eth0 and connect network interfaces identified as 1 to
the network.
– If bond has been configured for multiple network interfaces, only one MAC address is
displayed for these network interfaces. For example, if the server has four network interfaces
and bond has not been configured for them, four MAC addresses will be displayed. If bond has
been configured for two network interfaces, three MAC addresses will be displayed.
5. In the Network Card Setup dialog box, select Address.
6. Select Statically assigned IP Address. Set system IP address and subnet mask, and
click Next.
NOTICE
Hostname can not be null.
A route must be added if a user needs to connect to the network. A static route is recommended.
– If network connection security is highly required, add a static route and allow users on some
IP network segments to connect to the server.
– If network connection security is not highly required, add a default route and allow all users
to connect to the server. For details, see A.1.4 How to manually Add the Default Route
(SUSE Linux).
a. In the Network Settings window, select Routing.
b. Click Add in the Routing Table area. The following dialog box for configuring a
static route is displayed.
NOTE
Set the following parameters:
n Destination: An IP address on the network segment of the computer connected to the
U2000 server.
n Device: use the default value. The default value is eth0.
n Gateway: network management IP address for the network on which the U2000 server
is located.
n Netmask: subnet mask of the network segment on which the computer connected to the
U2000 server is located.
Leave other parameters empty.
c. Click OK.
d. Click OK.
8. Close the YaST Control Center dialog box.
NOTE
l After the system IP addresses and the routes are set, run the netstat -nr command through the CLI
to check whether the route is successfully added. Wait for about 1 to 2 minutes, then run the ping
system IP address command to check whether the network of the system is set. If the system IP
address can be pinged, the network of the system is successfully set.
l If a static route exists and a new static route needs to be added, use the MSuite to add a static route
after the U2000 is installed, see A.1.6 How to Add a Static Route If the U2000 Is Installed.
Using yast2 to add a static route is prohibited to prevent several-second network disconnection and
service interruption.
Step 17 Run the following command to restart the OS. It takes approximately 5 to 8 minutes to restart
the system.
# sync;sync;sync;sync
# shutdown -r now
----End
Follow-up Procedure
If a host name needs to be changed, enter the new host name during system preconfiguration.
Prerequisites
l The IP address of the IMM is available. For details about how to set the IP address of the
IMM, see 4.6.2.2 Configuring the IMM IP Address Through IMM Management
Interface (IBM X3850 X5 and IBM X3650 M3).
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l Choose Tool > Internet options. Click Connections tab, you must clear settings for the
proxy server before logging in to the browser.
l Quick OS installation DVD U2000version_server_os_sles11_x64_dvd1 or ISO image
file of the quick installation DVD U2000version_server_os_sles11_x64_dvd1.iso must
be ready.
l The system IP addresses including the IP address, subnet mask, and gateway must have
been planned.
Context
NOTICE
l Open one Video Viewer window on a PC or laptop. Open the Video Viewer window on a
PC or laptop for each server when you operate multiple servers. Otherwise, the failure to
open multiple Video Viewer windows on a PC or laptop or the failure that the Video
Viewer window does not respond may occur.
l If an Internet Explorer or Video Viewer fault occurs in the IMM, see A.3.7 How to Solve
IMM Problems to rectify the fault.
Procedure
Step 1 Insert the quick installation DVD-ROM (Terminal Physical Software, iManager U2000,
iManager U2000 version_server_sles, Physical Software Package For Linux Network
Management System, CD) to the drive on a PC or laptop. If an ISO mirroring file is used to
install the operating system, save the ISO mirroring file to any directory on the PC or laptop.
Step 2 Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar to
access the page for logging into the IMM.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 3 Enter an IMM user name and a password, and click Login.
NOTE
Step 4 Click Continue to access the Integrated Management Module web page.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
Step 5 Enable remote control. Choose Tasks > Remote Control from the navigation tree. In the
right-hand pane, click Use the ActiveX Client with Microsoft Internet Explorer > Start
Remote Control in Single User Mode to access the remote control desktop.
The remote control desktop consists of two parts: virtual media window and desktop display
window.
NOTE
l When logging in to the IBM server for the first time, perform the following operations:
1. Click Start remote control in single-user mode and wait about 2 minutes. In the dialog box
asking you whether to install the IMM_KVMVM32.cab, click Install.
2. During the installation, click Run in the Warning-Security dialog box asking you whether to
trust this site.
l If the remote control desktop appears and then disappears immediately, see A.3.1 How to Solve the
Problem Where the Remote Control Desktop Appears and Then Disappears Immediately to
solve the problem.
l If Use the ActiveX Client with Microsoft Internet Explorer is unavailable, just click Start
Remote Control in Single User Mode to access the remote control desktop.
l Do not close the ActiveX KVM Client dialog box. Otherwise, the Video Viewer dialog box cannot
be displayed.
l If a message is displayed indicating that the application is prohibited to run, choose Start > Control
Panel and click Java. In the Java Control Panel dialog box, click the Security tab, Edit Site List,
and Add, enter an iMana/iBMC IP address, such as http://192.168.2.100, and click OK. Click OK,
restart the IE Explorer, and log in to iMana/iBMC again.
Step 6 The desktop window Video Viewer is displayed, choose Tools > Launch Virtual Media
from the main menu. The virtual media window is displayed.
NOTICE
l Do not close the virtual media window Virtual Media Session until the SUSE Linux OS
is installed. If Map is not selected, or the virtual media window Virtual Media Session is
closed, the installation fails and the message An error occurred during the installation
is displayed.
l Do not close the desktop display window Video Viewer until all operations in the chapter
are completed. You can operate the server using the desktop display window.
Step 8 Click Mount Selected to mount the SUSE Linux operating system DVD-ROM file to the
IMM.
Step 9 Choose Tools > Power > Reboot from the main menu to reboot the system.
NOTE
Step 10 After the IBM System X window is displayed, wait for about 2 minutes until <F12> Select
Boot Device is displayed.
Step 11 Press F12 to choose Select Boot Device. If you miss the F12, choose Tools > Power >
Reboot from the main menu and click Yes in the dialog box that is displayed to reboot the
IBM server.
Step 12 Use arrow keys to select CD/DVD Rom and press Enter to start the system from the DVD-
ROM.
Step 13 Wait about two minutes, the system restarts and the SUSE Linux Enterprise Server window
is displayed.
NOTICE
Do not perform any operation before the SUSE Linux Enterprise Server page is displayed.
Step 14 Use the up or down arrow key to select Installation--Single-Server System and press Enter
to begin to load the Linux core. The system starts the automatic installation of the OS. The
installation of the SUSE Linux kernel is completed until the operating system login window is
displayed. The entire OS installation process lasts approximately 40 minutes.
NOTE
l If the operation fails to be performed using the up and down arrow keys, choose Macros > Soft Key >
Down, select Installation--Single-Server System in the Video Viewer window. If Down is unavailable
for Soft Key, choose Add > New and press the down arrow key to add Down for Soft Key. Click OK.
l The installation process and remaining time are displayed in the installation window.
l During installation of the SUSE Linux kernel, do not manually perform any operation until the OS login
window is displayed.
l During installation of the SUSE Linux kernel, the OS automatically restarts. If the Boot from Hard Disk
screen stays for more than 2 minutes, press Enter to go to next window. And press Enter again to
continue automatic restart until the OS login window is displayed.
l If the following window is displayed during OS installation, the sdc hard disk has not been formatted,
which does not affect installation. Click OK directly until the OS login window is displayed.
Step 15 In the Virtual Media Session window, if the Map for the disk is still selected, clear the
selection of Map. And click Exit to close the virtual media window. If the burnt quick
installation DVD-ROM is used, remove the DVD-ROM from the drive on the PC or laptop.
The default OS user name is root and the default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1
How to Change the OS User Password.
NOTE
l Do not use the integrated number pad keyboards. This is because Num Lock may fail to work when
a SUSE Linux OS is installed on certain machines.
l Two pointers will be displayed. You can choose Tools > Single Cursor from the main menu to
change to the single pointer mode. Select the pointer mode according to individual operation habits.
To quit single pointer mode, press F12.
l When the Video Viewer window is used, contents outside the Video Viewer window cannot be
copied and pasted into the Video Viewer window.
l By default, the system enables the root user to perform remote login and use the SFTP tool.
l If you can log in to the SUSE Linux OS as the root user and the OS version and kernel version are
correct, it indicates that the SUSE Linux OS is successfully installed. Otherwise, install the OS
again.
– On the desktop, right-click in the blank area and choose Open in Terminal from the shortcut
menu to access the CLI.
– Run the following command to view the OS version:
# cat /etc/SuSE-release
If the following information is displayed, the SUSE Linux version is correct:
SUSE Linux Enterprise Server 11 (x86_64)
VERSION = 11
PATCHLEVEL = 3
– Run the following command to view the OS kernel version:
# uname -rv
The information similar to 3.0.101-0.47.105-default is displayed. Here, 3.0.101-0.47.105-
default indicates the kernel version of the OS.
If the kernel version is 3.0.101-0.47.105-default , the kernel version is correct.
2. In the YaST Control Center dialog box, choose Network Devices > Network Settings.
3. In the Network Settings dialog box, select Overview.
4. Select the network port whose Device is eth0 and click Edit.
NOTE
– Select the network port whose Device is eth0 and connect network interfaces identified as 1 to
the network.
– If bond has been configured for multiple network interfaces, only one MAC address is
displayed for these network interfaces. For example, if the server has four network interfaces
and bond has not been configured for them, four MAC addresses will be displayed. If bond has
been configured for two network interfaces, three MAC addresses will be displayed.
5. In the Network Card Setup dialog box, select Address.
6. Select Statically assigned IP Address. Set system IP address and subnet mask, and
click Next.
NOTICE
Hostname can not be null.
A route must be added if a user needs to connect to the network. A static route is recommended.
– If network connection security is highly required, add a static route and allow users on some
IP network segments to connect to the server.
– If network connection security is not highly required, add a default route and allow all users
to connect to the server. For details, see A.1.4 How to manually Add the Default Route
(SUSE Linux).
a. In the Network Settings window, select Routing.
b. Click Add in the Routing Table area. The following dialog box for configuring a
static route is displayed.
NOTE
Set the following parameters:
n Destination: An IP address on the network segment of the computer connected to the
U2000 server.
n Device: use the default value. The default value is eth0.
n Gateway: network management IP address for the network on which the U2000 server
is located.
n Netmask: subnet mask of the network segment on which the computer connected to the
U2000 server is located.
Leave other parameters empty.
c. Click OK.
d. Click OK.
8. Close the YaST Control Center dialog box.
NOTE
l After the system IP addresses and the routes are set, run the netstat -nr command through the CLI
to check whether the route is successfully added. Wait for about 1 to 2 minutes, then run the ping
system IP address command to check whether the network of the system is set. If the system IP
address can be pinged, the network of the system is successfully set.
l If a static route exists and a new static route needs to be added, use the MSuite to add a static route
after the U2000 is installed, see A.1.6 How to Add a Static Route If the U2000 Is Installed.
Using yast2 to add a static route is prohibited to prevent several-second network disconnection and
service interruption.
Step 18 Run the following command to restart the OS. It takes approximately 5 to 8 minutes to restart
the system.
# sync;sync;sync;sync
# shutdown -r now
----End
Follow-up Procedure
If a host name needs to be changed, enter the new host name during system preconfiguration.
Prerequisites
l Ensure that the server is connected to the KVM.
l Ensure that server driver is available and can read CDs and DVDs properly.
l U2000version_server_os_sles11_x64_dvd1 must be ready.
l The system IP addresses including the IP address, subnet mask, and gateway must have
been planned.
Context
NOTE
The installation DVD-ROM delivered with the SUSE Linux OS is used to install the SUSE Linux OS is
unavailable. A quick installation DVD-ROM can be used to install the OS and patches. During
installation, you do not need to manually partition hard disks, reducing the probability of misoperation
and improves the installation efficiency. Using a quick installation DVD-ROM to install the SUSE
Linux OS is recommended.
Procedure
Step 1 Insert the operating system DVD-ROM (Terminal Physical Software, iManager U2000,
iManager U2000 version_server_sles, Physical Software Package For Linux Network
Management System, CD) to the IBM server drive.
Step 2 Press the power button to restart the PC server.
Step 3 After the IBM System X window is displayed, wait for about 2 minutes until <F12> Select
Boot Device is displayed.
Step 4 Press F12 to choose Select Boot Device. If you miss the F12, choose Tools > Power >
Reboot from the main menu and click Yes in the dialog box that is displayed to reboot the
IBM server.
Step 5 Start the system from the DVD-ROM.
l For IBM X3850 X5 or IBM X3650 M3, use arrow keys to select CD/DVD and press
Enter to start the system from the DVD-ROM. See the following figure:
l For IBM X3650 M4, use arrow keys to select Legacy Only and press Enter. Then use
arrow keys to select CD/DVD and press Enter to start the system from the DVD-ROM.
See the following figure:
Step 6 Wait about two minutes, the system restarts and the SUSE Linux Enterprise Server window
is displayed.
NOTICE
Do not perform any operation before the SUSE Linux Enterprise Server page is displayed.
Step 7 Use the up or down arrow key to select Installation--Single-Server System and press Enter
to begin to load the Linux core. The system starts the automatic installation of the OS. The
installation of the SUSE Linux kernel is completed until the operating system login window is
displayed. The entire OS installation process lasts approximately 40 minutes.
NOTE
l The installation process and remaining time are displayed in the installation window.
l Do not manually perform any operation during installation of the SUSE Linux kernel.
l After the SUSE Linux kernel is installed, the OS automatically restarts. If the Boot from Hard Disk
screen stays for more than 2 minutes, press Enter to go to next window. And press Enter again to
continue automatic restart until the OS login window is displayed.
l If the following window is displayed during OS installation, the sdc hard disk has not been
formatted, which does not affect installation. Click OK directly until the OS login window is
displayed.
The default OS user name is root and the default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1
How to Change the OS User Password.
NOTE
l Do not use the integrated number pad keyboards. This is because Num Lock may fail to work when
a SUSE Linux OS is installed on certain machines.
l By default, the system enables the root user to perform remote login and use the SFTP tool.
l If you can log in to the SUSE Linux OS as the root user and the OS version and kernel version are
correct, it indicates that the SUSE Linux OS is successfully installed. Otherwise, install the OS
again.
– On the desktop, right-click in the blank area and choose Open in Terminal from the shortcut
menu to access the CLI.
– Run the following command to view the OS version:
# cat /etc/SuSE-release
Step 9 Run the following command to remove the operating system DVD-ROM:
# eject
NOTE
If the DVD cannot be ejected after the eject command is executed, you must add the drive mounting
position next to the command, You can run the df -h command to query the drive mounting position.
# df -h
...
/dev/dsk/c3t7d0/linux
2.8G 2.8G 0k 100% /cdrom/linux
The drive mounting position is linux. Run the eject linux command to eject the DVD.
2. In the YaST Control Center dialog box, choose Network Devices > Network Settings.
3. In the Network Settings dialog box, select Overview.
4. Select the network port whose Device is eth0 and click Edit.
NOTE
– Select the network port whose Device is eth0 and connect network interfaces identified as 1 to
the network.
– If bond has been configured for multiple network interfaces, only one MAC address is
displayed for these network interfaces. For example, if the server has four network interfaces
and bond has not been configured for them, four MAC addresses will be displayed. If bond has
been configured for two network interfaces, three MAC addresses will be displayed.
5. In the Network Card Setup dialog box, select Address.
6. Select Statically assigned IP Address. Set system IP address and subnet mask, and
click Next.
NOTICE
Hostname can not be null.
A route must be added if a user needs to connect to the network. A static route is recommended.
– If network connection security is highly required, add a static route and allow users on some
IP network segments to connect to the server.
– If network connection security is not highly required, add a default route and allow all users
to connect to the server. For details, see A.1.4 How to manually Add the Default Route
(SUSE Linux).
NOTE
Set the following parameters:
n Destination: An IP address on the network segment of the computer connected to the
U2000 server.
n Device: use the default value. The default value is eth0.
n Gateway: network management IP address for the network on which the U2000 server
is located.
n Netmask: subnet mask of the network segment on which the computer connected to the
U2000 server is located.
Leave other parameters empty.
c. Click OK.
d. Click OK.
8. Close the YaST Control Center dialog box.
NOTE
l After the system IP addresses and the routes are set, run the netstat -nr command through the CLI
to check whether the route is successfully added. Wait for about 1 to 2 minutes, then run the ping
system IP address command to check whether the network of the system is set. If the system IP
address can be pinged, the network of the system is successfully set.
l If a static route exists and a new static route needs to be added, use the MSuite to add a static route
after the U2000 is installed, see A.1.6 How to Add a Static Route If the U2000 Is Installed.
Using yast2 to add a static route is prohibited to prevent several-second network disconnection and
service interruption.
Step 11 Run the following command to restart the OS. It takes approximately 5 to 8 minutes to restart
the system.
# sync;sync;sync;sync
# shutdown -r now
----End
Follow-up Procedure
If a host name needs to be changed, enter the new host name during system preconfiguration.
Prerequisites
l Ensure that the server is connected to the KVM.
l Ensure that server driver is available and can read CDs and DVDs properly.
l U2000version_server_os_sles11_x64_dvd1 must be ready.
l The system IP addresses including the IP address, subnet mask, and gateway must have
been planned.
Context
NOTE
The installation DVD-ROM delivered with the SUSE Linux OS is used to install the SUSE Linux OS is
unavailable. A quick installation DVD-ROM can be used to install the OS and patches. During
installation, you do not need to manually partition hard disks, reducing the probability of misoperation
and improves the installation efficiency. Using a quick installation DVD-ROM to install the SUSE
Linux OS is recommended.
Procedure
Step 1 Insert the operating system DVD-ROM (Terminal Physical Software, iManager U2000,
iManager U2000 version_server_sles, Physical Software Package For Linux Network
Management System, CD) to the Huawei RH series rack server drive.
Step 2 Press the power button to restart the PC server.
Step 3 Configure the server to start from the drive.
l If log in to the Huawei RH5885H V3 server through iMana, perform the following
operations:
a. After the server is started, press F11 or F3 (on Remote Keyboard). Wait about 3
minutes, the Please select boot device: window is displayed.
NOTE
If a dialog box asking you to enter a password displayed during startup, enter the required
password. The default password is Huawei12#$, if the password has been changed, enter the new
password. If the password has not been changed, for system security, modify the default password
and remember the new password.
b. Select P5: TSSTcorp CDDVDW SN-208DB to start from the drive and press
Enter.
l If log in to the Huawei RH2288H V2 server through iMana, perform the following
operations:
a. After the server is started, press F11 to access the Boot Manager window.
b. Select SATA P5 TSSTcorp CDDVDW SN-208DB to start from the virtual drive
and press Enter.
l If log in to the Huawei RH5885H V3 server through iBMC, perform the following
operations:
a. After the server is started, press F11 or F3 (on Remote Keyboard). Wait about 3
minutes, the Please select boot device: window is displayed.
b. Select P5: Slimtype DVD A DS8ACSH to start from the virtual drive and press
Enter.
l If log in to the Huawei RH2288H V3 server through iBMC, perform the following
operations:
a. After the server is started, press F11 to access the Boot Manager window.
b. Select SATA P5 Slimtype DVD A DS8ACSH to start from the virtual drive and
press Enter.
Step 4 Wait about two minutes, the system restarts and the SUSE Linux Enterprise Server window
is displayed.
NOTE
Do not perform any operation before the SUSE Linux Enterprise Server page is displayed.
Step 5 Use the up or down arrow key to select Installation--Single-Server System and press Enter
to begin to load the Linux core. The system starts the automatic installation of the OS. The
installation of the SUSE Linux kernel is completed until the operating system login window is
displayed. The entire OS installation process lasts approximately 40 minutes.
NOTE
l The installation process and remaining time are displayed in the installation window.
l Do not manually perform any operation during installation of the SUSE Linux kernel.
l After the SUSE Linux kernel is installed, the OS automatically restarts. If the Boot from Hard Disk
screen stays for more than 2 minutes, press Enter to go to next window. And press Enter again to
continue automatic restart until the OS login window is displayed.
l If the following window is displayed during OS installation, the sdc hard disk has not been
formatted, which does not affect installation. Click OK directly until the OS login window is
displayed.
NOTE
l Do not use the integrated number pad keyboards. This is because Num Lock may fail to work when
a SUSE Linux OS is installed on certain machines.
l By default, the system enables the root user to perform remote login and use the SFTP tool.
l If you can log in to the SUSE Linux OS as the root user and the OS version and kernel version are
correct, it indicates that the SUSE Linux OS is successfully installed. Otherwise, install the OS
again.
– On the desktop, right-click in the blank area and choose Open in Terminal from the shortcut
menu to access the CLI.
– Run the following command to view the OS version:
# cat /etc/SuSE-release
If the following information is displayed, the SUSE Linux version is correct:
SUSE Linux Enterprise Server 11 (x86_64)
VERSION = 11
PATCHLEVEL = 3
– Run the following command to view the OS kernel version:
# uname -rv
The information similar to 3.0.101-0.47.105-default is displayed. Here, 3.0.101-0.47.105-
default indicates the kernel version of the OS.
If the kernel version is 3.0.101-0.47.105-default , the kernel version is correct.
2. In the YaST Control Center dialog box, choose Network Devices > Network Settings.
3. In the Network Settings dialog box, select Overview.
4. Select the network port whose Device is eth0 and click Edit.
NOTE
– Select the network port whose Device is eth0 and connect network interfaces identified as 1 to
the network.
– If bond has been configured for multiple network interfaces, only one MAC address is
displayed for these network interfaces. For example, if the server has four network interfaces
and bond has not been configured for them, four MAC addresses will be displayed. If bond has
been configured for two network interfaces, three MAC addresses will be displayed.
5. In the Network Card Setup dialog box, select Address.
6. Select Statically assigned IP Address. Set system IP address and subnet mask, and
click Next.
NOTICE
Hostname can not be null.
A route must be added if a user needs to connect to the network. A static route is recommended.
– If network connection security is highly required, add a static route and allow users on some
IP network segments to connect to the server.
– If network connection security is not highly required, add a default route and allow all users
to connect to the server. For details, see A.1.4 How to manually Add the Default Route
(SUSE Linux).
NOTE
Set the following parameters:
n Destination: An IP address on the network segment of the computer connected to the
U2000 server.
n Device: use the default value. The default value is eth0.
n Gateway: network management IP address for the network on which the U2000 server
is located.
n Netmask: subnet mask of the network segment on which the computer connected to the
U2000 server is located.
Leave other parameters empty.
c. Click OK.
d. Click OK.
8. Close the YaST Control Center dialog box.
NOTE
l After the system IP addresses and the routes are set, run the netstat -nr command through the CLI
to check whether the route is successfully added. Wait for about 1 to 2 minutes, then run the ping
system IP address command to check whether the network of the system is set. If the system IP
address can be pinged, the network of the system is successfully set.
l If a static route exists and a new static route needs to be added, use the MSuite to add a static route
after the U2000 is installed, see A.1.6 How to Add a Static Route If the U2000 Is Installed.
Using yast2 to add a static route is prohibited to prevent several-second network disconnection and
service interruption.
Step 9 Run the following command to restart the OS. It takes approximately 5 to 8 minutes to restart
the system.
# sync;sync;sync;sync
# shutdown -r now
----End
Follow-up Procedure
If a host name needs to be changed, enter the new host name during system preconfiguration.
Prerequisites
l Installation software is on-hand. For details, see Checking Required Software.
l Make sure that the SFTP (more secure, recommended) services are enabled. For details,
see A.1.2 How to Start/Stop the FTP/SFTP/Telnet Service in the SUSE Linux OS.
Procedure
Step 1 Perform the following operations to upload software packages and the mappings PGP
verification files (the file format is .asc) to the /opt/install path on the server.
1. Log in to the SUSE Linux OS as user root through remote login software or the
Windows OS CLI.
2. Run the following command to create the /opt/install directory:
# mkdir /opt/install
NOTICE
If the /opt/install directory already exists, ensure that it is empty; otherwise, the newly
installed U2000 may be abnormal.
3. Use SFTP to upload the software packages and the mappings PGP verification files (the
file format is .asc) to the /opt/install directory on the server as the root user. FileZilla
tool is recommended to transfer files. For details about how to use FileZilla to transfer
files, see A.1.27 How to Use the FileZilla to Transfer Files by SFTP.
NOTE
The installation packages to be uploaded are as follows:
1. Database software (Mandatory): U2000version_server_db_linux_sybase.tar
2. Security enhancement software SetSuse (Mandatory):
U2000version_VPPSetSuse11V300R003C22SPC200.tar
3. Preconfigured component(Mandatory):U2000version_server_ICMR_sles_x64.tar
4. Basic components (Mandatory): U2000version_server_nmsbase_sles_x64.7z
5. Core components (Mandatory): U2000version_server_nmscore_sles_x64.7z
6. Components of the transport domain (Select it if you want to manage transport or PTN
equipment): U2000version_server_nmstrans_sles_x64.7z
7. Components of the IP domain (Select it if you want to manage routers, switches, or security
equipment): U2000version_server_nmsip_sles_x64.7z
8. Components of the access domain (Select it if you want to manage access equipment):
U2000version_server_nmsaccess_sles_x64.7z
Ensure that all mandatory software packages are uploaded. If a software package is not uploaded,
the U2000 installation may be interrupted because a file is lacked. Selecting the components of the
transport, IP, and access domains is recommended. After the components are selected, you only
need not to download software again when adding domains. In this situation, only the disk space,
not the database space, is occupied.
Step 2 Use the PGPverify software to verify the uploaded software packages.
NOTE
NOTE
l For a certain file, if the command output does not contain "WARN" or "FAIL", the signature file is valid.
l If a version has multiple signature files to be verified, the version is secure only when the verification
results of all files are "PASS". If the verification results contain "WARN" or "FAIL", the verification is
not passed and security risks exist. In that event, re-download the software packages.
Step 3 Run the following commands to switch to the directory where the software packages are
stored, and run the tar command to decompress Preconfigured component on the server.
# cd /opt/install
# tar xvf U2000version_server_ICMR_sles_x64.tar
NOTE
Only the preconfigured component package needs to be decompressed here. The .7z packages will be
decompressed automatically during follow-up system preconfiguration.
----End
Prerequisites
l Installation engineers are familiar with the IP address planning scheme of the U2000. For
more information, see 4.3.1.1 Collecting Installation Information (Single-Server
System).
l The hardware is properly connected. For more information, see 4.4 Checking Hardware
Connections.
l If the U2000 is installed using software packages, the installation software must have
been prepared. For more information, see 4.9.1 Preparing Software Packages.
l The SUSE Linux version must be SUSE Linux Enterprise Server 11 SP3, and the OS
kernel version must be 3.0.101-0.47.105-default . For more information, see
Configuration requirements.
l Ensure that the current OS does not use the ID of a U2000 user. For details, see A.5.13
How to Check and Change an OS User ID.
l Log in to the OS as the root user and run the df -h command to view disk partition
conditions. Ensure that the disk partition conditions are the same as information in G
Planning Disk Partitions. Otherwise, reinstall the OS.
Context
The following operations are involved:
l Install OSSICMR.
l Install database.
l Modify the network settings of the system: You can modify the network settings of the
system, including the system IP address, the system host name, the subnet mask of the
system IP address, the default gateway IP address, and choose whether to configure
bond.
NOTE
l Operations mentioned in this topic can be performed through "Logging in to the SUSE Linux OS
Through Remote Login Software" or "Logging in to the SUSE Linux OS Through the Windows OS
CLI" in F Getting Started.
l After the system is preconfigured, the command association function using the up and down arrows
is disabled in the Linux operating system.
l Do not use the integrated number pad keyboards. This is because Num Lock may fail to work when
a SUSE Linux OS is installed on certain machines.
l After a CLI is opened, modify the CLI attributes to prevent garbled images caused by the issue that
the size of the output character is larger than the screen width. If the size of the CLI is changed after
commands are executed, the information display will be affected. Do not change the size of the CLI
after commands are executed.
l If the PuTTY is used, perform the following operations to modify CLI attributes:
1. Right-click the title bar of the CLI of the PuTTY and choose Change Settings from the
shortcut menu.
2. In the PuTTY Reconfiguration dialog box, select Window from the navigation tree and
set Columns to 120.
l If the system is running Windows, run the following command to modify CLI attributes:
1. Right-click the title bar of the CLI and choose Properties from the shortcut menu. The
Properties dialog box will be displayed.
2. On the Option tab page, set Buffer Size to 100 in the Command History area.
3. On the Layout tab page, set Width to 120 in the Screen Buffer Size area.
Procedure
Step 1 Log in to the OS as user root.
Step 2 Optional: If the U2000 is installed using the software package, run the following commands
to switch to the directory where OSSICMR is located and assign permissions.
# cd /opt/install/OSSICMR
# chmod -R 750 /opt/install/OSSICMR
Step 3 Optional: If the disk array is available, the hardware connections and IP configuration for the
disk array are complete, and the disk array has been powered on, use the automatic
configuration scripts of OSSICMR to configure the disk array.
NOTE
The automatic configuration scripts of OSSICMR support only the disk arrays with the following
configurations:
l 12 x 600 GB OceanStor 5500 V3
If a disk array whose configurations are out of the preceding range, contact Huawei technical support
engineers.
To configure the OceanStor 5500 V3 disk array using the automatic configuration script,
perform the following operations:
1. Switch to the directory where the AutoSetup5500.sh file is located. Execute the
AutoSetup5500.sh file to start OceanStor 5500 V3 disk array configuration.
– If the U2000 is installed using the installation package, run the following
commands:
# cd /opt/install/OSSICMR/bin/array
# ./AutoSetup5500.sh
– If the U2000 is installed using the installation DVD, run the following commands:
i. Insert the installation DVD of the U2000 server (Terminal Physical Software,
iManager U2000, iManager U2000 version_server_sles, Physical Software
Package For Linux Network Management System, CD 4/4) to the DVD-ROM
drive.
ii. Run the following commands and execute the AutoSetup5500.sh file to start
the OceanStor 5500 V3 disk array configuration.
# bash
# cd /media/CDROM/OSSICMR/bin/array
# . ./AutoSetup5500.sh
NOTE
○ You must run the bash command in the root directory before navigating to the
OSSICMR directory. Otherwise, the DVD-ROM cannot automatically eject the
DVD.
○ There must be a space between the dot (.) and the command ./AutoSetup5500.sh.
3. Enter the IP address of the primary controller of the disk array, such as 10.9.1.10 and
press Enter.
A message similar to the following will be displayed:
Please enter the admin user password of the array:
4. Enter the user password of the disk array and press Enter. The default password is
Admin@storage. If the disk array is preinstalled, the password is Changeme_123. (If
the password has already been changed, enter the new password. If the password is never
changed, refer 4.6.3.1 Setting the SC IP Address for the OceanStor 5500 V3 Disk
Array to change it regularly and keep it privately.)
===========================================
Installing the disk array...
.............................................
.............................................
.............................................
.............................................
.............................................
.............................................
.............................................
.............................................
.............................................
.............................................
The disk array has not been completed started. The system will automatically
retry 10 seconds later.
Disk array installed successfully.
NOTE
Wait about five minutes. The configuration result will be displayed. If the displayed information
contains "Configured the diskarray successfully", the diskarray is configured successfully. If the
configuration fails again, use the ISM to configure the OceanStor 5500 V3 disk array. For more
information, see H.1 Configuring the OceanStor 5500 V3 Disk Array Using the OceanStor
DeviceManager.
5. Run the following commands to restart the OS:
# sync;sync;sync;sync
# shutdown -r now
NOTE
The automatic configuration scripts of OSSICMR support only the disk arrays with the following
configurations:
l 12 x 600 GB OceanStor S3900
If a disk array whose configurations are out of the preceding range, contact Huawei technical support
engineers.
To configure the OceanStor S3900 disk array using the automatic configuration script,
perform the following operations:
1. Switch to the directory where the AutoSetupS3900.sh file is located. Execute the
AutoSetupS3900.sh file to start OceanStor S3900 disk array configuration.
– If the U2000 is installed using the installation package, run the following
commands:
# cd /opt/install/OSSICMR/bin/array
# ./AutoSetupS3900.sh
– If the U2000 is installed using the installation DVD, run the following commands:
i. Insert the installation DVD of the U2000 server (Terminal Physical Software,
iManager U2000, iManager U2000 version_server_sles, Physical Software
Package For Linux Network Management System, CD 4/4) to the DVD-ROM
drive.
ii. Run the following commands and execute the AutoSetupS3900.sh file to start
the OceanStor S3900 disk array configuration.
# bash
# cd /media/CDROM/OSSICMR/bin/array
# . ./AutoSetupS3900.sh
NOTE
○ You must run the bash command in the root directory before navigating to the
OSSICMR directory. Otherwise, the DVD-ROM cannot automatically eject the
DVD.
○ There must be a space between the dot (.) and the command ./AutoSetupS3900.sh.
NOTICE
Ensure that the entered IP address is correct. Disk partitioning in the next step will use
the IP address.
2. Enter the IP address of the primary controller of the disk array, such as 10.9.1.10 and
press Enter.
NOTE
Wait about five minutes. The configuration result will be displayed. If the displayed information
contains "Configured the diskarray successfully", the diskarray is configured successfully. If the
configuration fails again, use the ISM to configure the OceanStor S3900 disk array. For more
information, see H.2 Configuring the OceanStor S3900 Disk Array by Using the ISM.
5. Run the following commands to restart the OS:
# sync;sync;sync;sync
# shutdown -r now
Step 4 Optional: If the system preconfiguration terminates, you must perform the preconfiguration
again, which consumes time. To prevent system preconfiguration termination caused by an
unexpected disconnection between the PC or laptop and the server, the GUI software VNC is
recommended for remotely logging in to the SUSE Linux operating system as the root user.
For details about the procedure, see Configure the VNC service as the root user.
NOTE
After logging in to the OS GUI, right-click and choose Open in Terminal from the shortcut menu. You
can perform the follow-up system preconfiguration in the displayed CLI.
Step 5 Run the following commands to switch to the directory where the OSSICMR is located. Then,
run the install.sh file to start the OSSICMR for system preconfiguration.
l If the U2000 is installed using the installation package, run the following commands:
# cd /opt/install/OSSICMR
# ./install.sh -r
A message similar to the following will be displayed:
======OS's language======
l If the U2000 is installed using the installation DVD, run the following commands:
a. Insert the installation DVD of the U2000 server (Terminal Physical Software,
iManager U2000, iManager U2000 version_server_sles, Physical Software Package
For Linux Network Management System, CD 4/4) to the DVD-ROM drive.
b. Run the following commands and execute the install.sh file to start OSSICMR to
perform system configuration.
# bash
# cd /media/CDROM/OSSICMR/
# . ./install.sh
NOTE
n You must run the bash command in the root directory before navigating to the
OSSICMR directory. Otherwise, the DVD-ROM cannot automatically eject the DVD.
n There must be a space between the dot (.) and the command ./install.sh.
c. The DVD-ROM will eject the installation DVD for the U2000 server software after
configuration is complete. Insert the installation DVD for the database software
(Terminal Physical Software, iManager U2000, iManager U2000
version_server_sles, Physical Software Package For Linux Network Management
System, CD 3/4) into the server DVD-ROM, and then press Enter.
A message similar to the following will be displayed:
Deal with Database installation file to /opt/install ...
> Finish
............
======OS's language======
Step 6 Configure the language of the operating system as required. To set the language to English,
enter 2 and press Enter.
NOTE
If the language is set to English, install the U2000 of the English version.
Enter the path and press Enter, or press Enter to use the
default directory[/opt/sybase]:
NOTICE
The database installation path may vary according to disk partitions. By default, the database
is installed in the /opt/sybase path. Using the default installation path is recommended. When
using a self-defined path, ensure that the path has enough space for installation.
l If the database has not been installed on the system, enter the U2000 installation path.
A message similar to the following will be displayed:
==== OSS path =======
Enter the path and press Enter, or press Enter to use the
default directory[/opt/oss]:
l If the database has been installed on the system, a message is displayed asking you
whether to reuse database information.
A message similar to the following will be displayed:
If need to reuse the sybase
1. yes
2. no
Select[1]:
– To reuse the database, perform the following operations:
NOTE
Before perform the following operations make sure the database is running, or start a new Putty
session and refer to A.4.1.2 How to Start the Sybase Database Service to start the database.
i. If the database must be reused, enter 1 and press Enter.
A message similar to the following will be displayed:
Please input the database administrator account[sa] :
ii. Enter the user name of the database administrator, such as sa. Press Enter.
A message similar to the following will be displayed:
Please input the password of database administrator account :
NOTE
In order to enhance the security of the Sybase database, the sa user may be manually
disabled and replaced with a customized administrator name, such as dbadmin.
iii. Enter the password of the database administrator and press Enter. The system
automatically checks whether the password is correct. If the password is
incorrect, perform this step again. If the password is correct, information
similar to the following is displayed:
==== OSS path =======
Enter the path and press Enter, or press Enter to use the
default directory[/opt/oss]:
NOTE
n Run the following command to delete the database file. If the error message
rm:cannot remove directory '/opt/sybase/data': Device or
resource busy is displayed during file deletion, ignore it.
# rm -rf /opt/sybase
n After the database file is deleted, ensure that the /opt/sybase directory contains only one
empty /opt/sybase/data folder.
n After the database file is deleted, you do not need to install the Sybase again. The Sybase
will be automatically installed when the U2000 is installed.
NOTICE
The OSS installation path may vary according to disk partitions. By default, the OSS is
installed in the /opt/oss path. Using the default installation path is recommended. When using
a self-defined path, ensure that the path has enough space for installation.
1. Yes
2. No
Select[2]:
Step 9 According to the conditions at your site, determine if the system network needs to be
reconfigured.
NOTE
System network settings include: the system IP address, the system host name, the subnet mask of the
system IP address, the default gateway IP address, and bond. If an incorrect characters is entered and the
character cannot be deleted after Backspace is pressed, hold down Ctrl+Backspace to delete the
characters and then enter a correct character.
The displayed configuration result depends on the configurations of the disk array and the configurations
of the system network. Watch out for failed configurations.
l If the system network does not need to be reconfigured, do as following.
NOTE
If the system network is not reconfigured, bond cannot be configured and redundancy protection is
not available between network interfaces.
...
Modifying the system
parameters.................................................
Modifying system network
configuration..........................................
Mounting
diskarray.............................................................
Install database
Software......................................................
Build the database server and install the
patches..............................
unpacking NMS
packages........................................................
NOTE
n If All operations defined in the task flow have been completed is displayed, it
indicates that the system is successfully configured. If the system configuration fails,
send the operation log to Huawei engineers for fault locating.
n When one or more of the following conditions are met, the OS automatically restarts.
If the OS does not automatically restart, restart is not required in this scenario. You can
directly perform the subsequent operations.
○ The OS language is changed.
○ A disk array is connected.
○ The system network settings are changed, including reusing system network
settings.
l If the system network needs to be reconfigured, do as following.
NOTE
If the system network is reconfigured, bond can be configured and redundancy protection is
available between network interfaces.
a. Enter 1 and press Enter.
A message similar to the following will be displayed:
======= Host Name =======
Enter[linux]:
Enter[10.9.1.1]:
Enter[255.255.255.0]:
d. Enter the planned subnet mask for the system IP address. Then, press Enter.
A message similar to the following will be displayed:
======= Configure bond =======
NOTE
n As the interface eth0 has been connected to the network and the system IP address has been
set during the installation of the OS, select another network interface. Recommended that the
selected network interface and eth0 are not located on the same NIC before connecting the
interface to the network.
n View information about the connection of the physical network interface of the server. For
details, see A.3.8 Mappings Between Physical and Logical Network Interfaces on an IBM
Server Running SUSE Linux.
n Bond: On the SUSE Linux OS, the bond technology is used to form a virtual layer between
the physical layer and the data link layer. This technology allows two server NICs connecting
to a switch to be bound to one IP address. The MAC addresses of the two NICs are also
automatically bound as one MAC address. In this manner, a virtual NIC is formed. The bond
technology supports two modes: double-live and primary/secondary. In double-live mode,
after receiving request data from a remote server, the virtual NIC on the server determines
data transmission based on an algorithm, improving network throughput and usability of the
server. In primary/secondary mode, if an NIC does not function properly, services will be
automatically switched to the other NIC, ensuring service protection. The SUSE Linux OS
supports the binding of NICs in primary/secondary mode.
e. Enter NIC IDs. The NIC IDs need to be separated by comma. Then press Enter.
A message similar to the following will be displayed:
Please confirm the following configurations...
******************************************************************
system IP
10.9.1.1
system hostname
linux
system netmask
255.255.255.0
bond member NIC
eth0 eth1
******************************************************************
Enter 'y' to apply these values and proceed to the next step, or 'n' to
return to make any changes (y/n):
>
f. Enter y after you confirm that the information is correct and press Enter.
A message similar to the following will be displayed:
...
Modifying the system
parameters..............................................
Modifying system network
configuration............................................
The configurations take effect only after the system is restarted. The
system will restart.
...
NOTE
If a message is displayed indicating that the security hardening software SetSuse is
unavailable, do not shut down the dialog box but use the FileZilla to transfer the security
hardening package U2000version_VPPSetSuse11V300R003C22SPC200.tar to the /opt/
install/ directory through SFTP. Then open another terminal to log in to the OS as root user
and decompress the security hardening package to the /opt/install/ directory. After
confirming that the decompression is complete, press Enter to continue with system
preconfiguration.
g. After the configuration is finished, the OS restarts automatically and after the restart
is completed, the installation program automatically runs.It takes approximately 5
to 8 minutes to restart the system.
NOTE
n During the wait, run the ping system IP address command to check whether the server
is restarted. If the system IP address can be pinged, the server is successfully restarted.
n When one or more of the following conditions are met, the OS automatically restarts.
If the OS does not automatically restart, restart is not required in this scenario. You can
directly perform the subsequent operations.
○ The OS language is changed.
○ A disk array is connected.
○ The system network settings are changed, including reusing system network
settings.
h. After the OS restarts, log in to the OS as user root.
i. To check the installation progress after the system restarts, run the following
command. If All operations defined in the task flow have been completed. is
displayed, the configuration is successful. It takes approximately 60 minutes to
complete the configuration.
# tail -f /var/ICMR/install.log
...
Modifying the system
parameters.................................................
Modifying system network
configuration..........................................
Mounting
diskarray.............................................................
Install database
Software......................................................
Build the database server and install the
patches..............................
unpacking NMS
packages.........................................................
n If All operations defined in the task flow have been completed is displayed, the
configuration is successful.
n If Failed is displayed, the configuration fails. Save the operation logs and contact
Huawei engineers for fault location.
n If no Checking the system info information, after the configuration is complete, run the
command cat /var/ICMR/install.log to view all contents of install.log.
----End
Follow-up Procedure
If the OS must be reconfigured because of incorrect parameter settings (such as incorrect IP
addresses), perform the following operations:
1. Press Ctrl+C to stop the program from configuring the OS.
2. Run the following commands to reconfigure the OS:
# cd /opt/install/OSSICMR
# ./install.sh -r
Prerequisites
l Ensure that the U2000 is pre-configured. The U2000 will fail to install if it is not pre-
configured.
l Ensure that the size of the installation directory of the server meets the requirement. The
U2000 software and engineering-related software stores at /opt directory, the remaining
space of the installation directory must be larger than 30 GB.
NOTE
Run the df -h /opt command to view the remaining space of the /opt directory.
l The GUI software VNC is recommended for remotely logging in to the SUSE Linux
operating system, must be ready. For details about how to configure and use the VNC,
see Configure the VNC service as the root user.
l The network interface used in system preconfiguration has been enabled.
NOTE
Run the ifconfig -a command to view the NIC running status. Ensure that the network interface
eth used in system preconfiguration is UP and RUNNING.
If the NIC running status is abnormal, perform the following operations:
l Check network cable connections on the NIC. Ensure that the network cables are connected
properly.
l Run the ifconfig ethX up command to enable the specified NIC.
l Ensure that the database has been started. For details about how to check whether the
database has been started, see A.4.1.3 How to Verify That the Sybase Database Is
Running. If the database is not started, refer to A.4.1.2 How to Start the Sybase
Database Service to start the database.
Context
NOTE
l To prevent the keyboard from being locked, the SCIM process is stopped after the U2000
installation program is started. After the U2000is installed, the SCIM process starts automatically.
l The number pad keyboard is not recommended. This is because Num Lock may fail to work
normally when the OS is installed on certain machines.
l During the U2000 installation, the FTP service will be disabled for the root and ossuser users. To
transfer files as the root or ossuser user after installing the U2000, you need to use the SFTP
service.
Procedure
Step 1 Log in to the server OS as user root using the remote desktop control software.
Step 2 On the desktop, right-click and choose Open in Terminal from the shortcut menu to display a
CLI.
Step 3 Run the following commands to assign permissions to the installation directory.
# chmod -R 750 /opt/oss
Step 4 Run the following commands to go to the path where the install.sh file is stored and run the
install.sh file:
# cd /opt/oss
# ./install.sh
Wait about one minute. The Copyright dialog box will be displayed.
NOTE
Step 5 Click I accept the terms, and click Next to continue. The Select Language dialog box will
be displayed.
NOTE
l If a dialog box is displayed prompting you to select the directory of the installation package, enter
the directory where the installation files were uploaded to the server. For example, /opt/install.
l In a Chinese OS, the language can be set to Chinese or English. In an English OS, the language can
be set only to English.
Step 6 Select the language according to the conditions at your site, such as English. Then click Next.
The Configure Database dialog box will be displayed.
Set the installation parameters and the following table shows the basic settings of the database
server and NMS database user.
NOTICE
The passwords are examples only. To ensure system security, change the password promptly,
update it periodically, and save it properly.
Parameter Description
Parameter Description
Parameter Description
OSS Database User Password Set a new password for OSS database user. For example,
Changeme_123.
NOTE
The OSS database user password must meet the requirements:
l The password contains a minimum of eight characters and a
maximum of 30 characters.
l The password must contain at least four of the following
combinations:
– At least one lower-case letter
– At least one upper-case letter
– At least one digit
– At least one special character ~@#^*-_+[{}]:./?
Other special characters are not supported. Do not include
other special characters, such as ()|<>&`!$\"%'=;,space
in passwords.
l The password must be different from the user name or the
user name in reverse order and cannot contain the complete
user name (case-insensitive).
NOTE
Plan and enter a new password according to the preceding
password rules to ensure system security. Make a note of your
password and keep it in a safe place. Do not share your password
with anyone.
Confirm OSS Database User Confirms the password of the OSS database user.
Password
Step 7 Click Next. The Configure Server dialog box will be displayed.
NOTE
Server IP Address is set to the U2000's application IP address, which is used for external services, such
as communication between the U2000 server and clients as well as communication between NEs.
Step 8 Click Next. The Select Domain dialog box will be displayed.
NOTE
This section assumes that the access, IP, and transport packages are uploaded and decompressed. If only
the access package is uploaded and decompressed, the page will display Access domain alone. Select the
domain need to be deployed based on the managed devices. Selecting all the displayed domains is
recommended. To add other domains, upload and decompress the corresponding packages and perform
the installation again. Software packages for the transport and IP components must be selected so as to
manage PTN 6900 and PTN 7900 series NEs.
1. If the uploaded and decompressed package involves the transport domain, the Version Style dialog
box is displayed. Select the Version Style as required.
2. Click Next. The Version Timeslot Mode will be displayed.
3. Select the time slot mode as required, such as Sequential mode. The Sequential mode, a timeslot
numbering policy recommended by the ITU-T.
Step 11 Click Next. A progress bar will be displayed. The time required for the installation depends
on the number of components to be installed and the server configuration. The entire process
takes about 90 minutes. Wait patiently.
NOTE
l The OSS can automatically expand the capacity of a database according to the growth parameters
defined when the database is created. The disk space for installing the database must be greater than
the maximum size to which the file is permitted to grow. If the disk space is insufficient, the system
will display a prompt message in red. The U2000 can manage the maximum number of NEs as
supported by the server model.
l If a message indicating an installation failure or interruption is displayed during installation, see A.
6.1 How do I solve the problem where a failure message is displayed during the installation or
the installation is abnormally interrupted to solve the problem.
The system will display a prompt indicating that installation was successfully completed.
Step 12 Click Finish to complete the U2000 installation.
Step 13 Run the following commands to restart the OS. It takes approximately 5 to 8 minutes to
restart the system.
# sync;sync;sync;sync
# shutdown -r now
Step 14 Optional: In order to enhance the security of the Sybase database after the U2000 is installed,
you need to manually create a user to replace the database administrator sa and assign the user
with same permissions as the sa user. After the permissions are assigned to the user, disable
the sa user. For details, see A.4.2.8 How to Create a Replacement User for the Sybase
Database Administrator sa User.
----End
Prerequisites
l Ensure that the U2000 is pre-configured. The U2000 will fail to install if it is not pre-
configured.
l Ensure that the size of the installation directory of the server meets the requirement. The
U2000 software and engineering-related software stores at /opt directory. For example, if
all domains need to be deployed, the remaining space of the installation directory must
be larger than 30 GB.
NOTE
Run the df -hk /opt command to view the remaining space of the /opt directory.
l The network interface used in system preconfiguration has been enabled.
NOTE
Run the ifconfig -a command to view the NIC running status. Ensure that the network interface
eth used in system preconfiguration is UP and RUNNING.
If the NIC running status is abnormal, perform the following operations:
l Check network cable connections on the NIC. Ensure that the network cables are connected
properly.
l Run the ifconfig ethX up command to enable the specified NIC.
l Ensure that the database has been started. For details about how to check whether the
database has been started, see A.4.1.3 How to Verify That the Sybase Database Is
Running. If the database is not started, refer to A.4.1.2 How to Start the Sybase
Database Service to start the database.
Context
NOTICE
During the U2000 installation, the FTP service will be disabled for the root and ossuser
users. To transfer files as the root or ossuser user after installing the U2000, you need to use
the SFTP service.
After a CLI is opened, modify the CLI attributes to prevent garbled images caused by the
issue that the size of the output character is larger than the screen width. If the size of the CLI
is changed after commands are executed, the information display will be affected. Do not
change the size of the CLI after commands are executed.
l If the PuTTY is used, perform the following operations to modify CLI attributes:
a. Right-click the title bar of the CLI of the PuTTY and choose Change Settings from
the shortcut menu.
b. In the PuTTY Reconfiguration dialog box, select Window from the navigation
tree and set Columns to 120.
l If the system is running Windows, run the following command to modify CLI attributes:
a. Right-click the title bar of the CLI and choose Properties from the shortcut menu.
The Properties dialog box will be displayed.
b. On the Option tab page, set Buffer Size to 100 in the Command History area.
c. On the Layout tab page, set Width to 120 in the Screen Buffer Size area.
Procedure
Step 1 Log in to OS as user root.
Step 2 Run the following commands to assign permissions to the installation directory.
# chmod -R 750 /opt/oss
Step 3 Run the following commands to switch to the path where the install.sh file is stored and run
the install.sh script:
# cd /opt/oss
# ./install.sh -cmd
NOTE
Step 6 Enter 2 and then press Enter to select the English version.
A message similar to the following will be displayed:
Step 7 Enter n.
A message similar to the following will be displayed:
===============< Configure Database >===============
Server Address:[127.0.0.1]:
Server Name:[DBSVR]
Server Port:[4100]
Administrator Name:[sa]:
NOTICE
The passwords are examples only. To ensure system security, change the password promptly,
update it periodically, and save it properly.
Server Address:[127.0.0.1]:
Server Name:[DBSVR]
Server Port:[4100]
Administrator Name:[sa]:
Administrator Password:[]:**********
OSS Database User Password:[]:**********
Confirm OSS Database User Password:[]:**********
Install [c: Cancel, <p:Previous, n:Next>, n]:
l When configuring the information about the database service, you can press Ctrl+H to
delete incorrectly entered information.
l The default value of Administrator Name is sa.
l Enter a password of the database administrator and refer to the following operations to
verify the password.
– If no database is reused in the system preconfiguration procedure, enter the
administrator password for the newly installed database. The default value is
Changeme_123.
– If a database is reused in the system preconfiguration procedure and the database
administrator password meet the following requirements, please enter the
administrator password of reused database.
– If a database is reused in the system preconfiguration procedure and the database
administrator password does not meet the following requirements, change the
password. For details, see A.4.2.4 How to Change the sa User Password for the
Sybase Database If the U2000 Is Not Installed.
NOTE
NOTE
Server IP Address is set to the U2000's application IP address, which is used for external services, such
as communication between the U2000 server and clients as well as communication between NEs.
NOTE
This section assumes that the access, IP, and transport packages are uploaded and decompressed. If only
the access package is uploaded and decompressed, the page will display Access domain alone. Select the
domain need to be deployed based on the managed devices. Selecting all the displayed domains is
recommended. To add other domains, upload and decompress the corresponding packages and perform
the installation again. Software packages for the transport and IP components must be selected so as to
manage PTN 6900 and PTN 7900 series NEs.
Step 12 Enter the serial number of the domain to be deployed. If multiple serial numbers are to be
entered, use comma (,) to separate them. For example, 1,2,3. Press Enter.
A message similar to the following will be displayed:
Install [c:Cancel, <p:Previous, n:Next>, n]:
NOTE
1. If the uploaded and decompressed package involves the transport domain, the Version Style dialog
box is displayed. Select the Version Style as required.
2. Click Next. The Version Timeslot Mode will be displayed.
3. Select the time slot mode as required, such as Sequential mode. The Sequential mode, a timeslot
numbering policy recommended by the ITU-T.
Step 15 Confirm that the installation information is correct, enter n and press Enter. The time
required for the installation depends on the number of components to be installed and the
server configuration. The entire process takes about 90 minutes. Wait patiently.
A message similar to the following will be displayed:
===============< Installation. >===============
NOTE
l The OSS can automatically expand the capacity of a database according to the growth parameters
defined when the database is created. The disk space for installing the database must be greater than
the maximum size to which the file is permitted to grow. If the disk space is insufficient, the system
will display a prompt message in red. The U2000 can manage the maximum number of NEs as
supported by the server model.
l If a message indicating an installation failure or interruption is displayed during installation, see A.
6.1 How do I solve the problem where a failure message is displayed during the installation or
the installation is abnormally interrupted to solve the problem.
Step 16 After the installation, the message similar to the following will be displayed:
===============< Installation Finished >===============
NOTE
If You have new mail is displayed, it belongs to the system message does not affect the oss, please
ignore this message.
Step 17 Run the following commands to restart the OS. It takes approximately 5 to 8 minutes to
restart the system.
# sync;sync;sync;sync
# shutdown -r now
Step 18 Optional: In order to enhance the security of the Sybase database after the U2000 is installed,
you need to manually create a user to replace the database administrator sa and assign the user
with same permissions as the sa user. After the permissions are assigned to the user, disable
the sa user. For details, see A.4.2.8 How to Create a Replacement User for the Sybase
Database Administrator sa User.
----End
NOTE
This topic applies only to the U2000 server that is newly installed.
Access - As some of
the domains
may not be
deployed
during
Deploy
Transport U2000
installation,
you can use
the domain
deployment
function to
deploy a
new domain
as needed so
that the
U2000 can
manage NEs
IP in this
domain.
NOTE
If some
domains are
gray, the
domains
have been
deployed.
Access - To disable
the U2000
Transport from
managing
NEs in a
domain,
undeploy
the domain
to improve
system
operation
efficiency.
Do not
Undeploy select all the
domains
IP because
there must
be at least
one domain
deployed.
NOTE
If some
domains are
gray, the
domains
have not
been
deployed.
- This
commissioni
ng item is
available for
a Linux
single-
server
system
Set SSR without the
SSR License
License disk array.
The SSR
license must
be set for
full system
backup
configuratio
n.
l If only
the time
zone
needs to
be
modified
, restart
the
operatin
g system
after the
modifica
tion so
that the
time is
automati
For details, see cally
section Time and adjusted
Time Zone based on
Planning in U2000 the new
Planning Guide. time
zone.
l Time zone: Set
Set Date l If the
Time Zone: this parameter to
Time Zone time
the local time
zone, such as zone and
Asia/Beijing. time
both
l Time: Set this need to
parameter to the be
local time. changed,
change
the time
first and
then the
time
zone.
After the
operatin
g system
is
restarted,
the new
time is
automati
cally
adjusted
based on
the new
Time:
time
zone.
Include two
Internal Certificates:
NMS Certificate List
l Trust Certificate.
Certificate
l CRL.
Networ
k card
(Logic
al IP Other
Single-NIC
networ Address/ parameters
Scheme
k Netmask use default
interfa values.
ces NOTE
name): You can
select a
Networ networking
k card For details, see solution
(Logic section IP Address only when
al Planning for a the single-
NIC scheme
Set Network networ Single-Server is used. If
k System (SUSE the two-
interfa Linux) in U2000 NIC scheme
ces Planning Guide. is used, you
name): IP can modify
Two-NIC only
Address/
Scheme Networ Logical
Netmask
k card network
interfaces
(Logic name, IP
al Address,
networ and
k Netmask.
interfa
ces
name):
NIC:
IP Address:
Active NIC
Netmask:
Host Name:
indicator
template and only
new indicators
are added to the
original indicator
template. Export:
The performance
indicator
template is
exported, backed
up, or provided to
another U2000
server.
l Manual
configuration:
Before
commissioning,
you must confirm
the performance
indicators to be
monitored and
print the
performance
data. Modify: In
the dialog box
that is displayed,
configure the
indicators as
required.
Prerequisites
NOTICE
l Manually changing the system IP address causes a failure to use the commissioning tool.
Therefore, configure the system IP address through the commissioning tool.
l All network information will be cleared when you adjust the networking by using the Set
Network commissioning item of the Commissioning Tool. If southbound and northbound
IP addresses are configured independently on the customer's network, reconfigure them
after the networking is adjusted.
Context
The commissioning tool is used only after the initial installation of the U2000 is complete. Do
not use the commissioning tool after the U2000 has running for a period of time. If system
parameters need to be commissioned, see section MSuite in the U2000 Administrator Guide.
Procedure
Step 1 Select the network interface identified as 1 on the server back plane and use a network cable
to connect the network interface to the PC or laptop.
NOTE
During preinstallation, the system IP is configured for network interfaces marked as 1 by default.
Step 2 Modify the IP address and subnet mask of the PC or laptop to be on the same network
segment where the system IP address of the U2000 server is located.
NOTE
The preinstallation by default configures the system IP address as 192.168.128.110 and the subnet mask
as255.255.255.0.
Step 3 On the PC or laptop, use the remote GUI login software, such as VNC, to log in to the SUSE
Linux OS GUI as the ossuser user. For details, see Configure the VNC service as the
ossuser user.
NOTE
The default password of the ossuser user is Changeme_123. The default password is not changed
during preinstallation.
Step 4 Right-click the blank area of the desktop and choose Open in Terminal from the shortcut
menu to open the CLI.
Step 5 Ensure that the U2000 is not running.
To check the running status of U2000 processes, run the following command:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start.
The process is stopped if the displayed information is empty.
If the U2000 is still running, run the following commands to stop it:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
Step 7 Ensure that the MSuite servers on the primary and secondary sites have been started.
Run the following command as the root user to check whether the MSuite servers are started:
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
# ps -ef | grep java
A message similar to the following will be displayed in the SUSE Linux system:
...
root 7593 7130 0 06:31 pts/7 00:00:00 grep java
ossuser 8937 12803 0 04:13 pts/8 00:00:42 /opt/oss/OSSJRE/jre_linux/bin/
java -Dprocname=AgentIntegrate -Dfile.encoding=UTF8 -Xmx1024m -
XX:MetaspaceSize=16m -XX:MaxMetaspaceSize=256m -XX:+UseCompressedClassPointers -
XX:+UseCompressedOops -XX:CompressedClassSpaceSize=128m -XX:
+HeapDumpOnOutOfMemoryError -DabsCfgPath=/opt/oss/server/etc/oss_cfg/frame -cp
nbi/agentintegrate/thirdparty/*:3rdlib/*:common/uflightdispatcher/lib/
jdom.jar:cbb/qasn/lib/*:common/uflight/frame_app/plugins/
com.huawei.uflight.platformadapter/*:common/uflight/web_app/plugins/pax-web-
runtime-2.1.2.jar:common/uflight/web_app/plugins/web_app/plugins/pax-web-
spi-2.1.2.jar:nbi/agentintegrate/lib/*:nbi/agentintegrate/bin/*
com.huawei.u2000.inventory.webserver.JettyStarter
...
NOTE
If the displayed information contains /opt/oss/OSSJRE/jre_linux/bin/java -server, the MSuite servers have
been started.
If the MSuite servers have not been started, switch to the ossuser and run the following
commands as the root user to start the MSuite servers:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./startserver.sh
– When you log in to the MSuite client, a progress bar is displayed showing the progress of
Refresh Deployment Information. Wait until the operation is complete.
– The MSuite works in single-user mode. Specifically, only one MSuite client can log in to the
MSuite at one time.
NOTICE
l If a message asking you to refer to the associated section in the installation guide is
displayed during system commissioning, the system needs to be manually commissioned.
l After the host name is configured, you cannot come back to modify other configuration.
Otherwise, the commissioning may be abnormal. Configure the host name after other
commission items are configured.
l After security hardening is enabled, you cannot use the commissioning tool to change the
password of the OS user. For details about the method of changing a password, see A.1.1
How to Change the OS User Password.
Step 11 Click Finish on the Finsh window, the Commissioning finished successfully, please use
UEasy tool to perform routine inspection. information is displayed. Click OK and perform
routine inspection if needed.
Step 12 After system parameters are commissioned, run the following commands to restart the OS as
the root user to make the modification take effect:
# sync;sync;sync;sync
# shutdown -r now
Step 13 Disconnect the PC or laptop from the U2000 server and then see 4.4 Checking Hardware
Connections to connect the U2000 server to the network.
----End
Follow-up Procedure
l If the server IP address is changed during commissioning, you must manually configure
the hardware alarm monitoring function. For details about the replacement procedure,
see C.3.1 Configuring the Monitoring Function for an OceanStor 5500 V3 Disk
Array and C.3.2 Configuring the Monitoring Function for an S3900 Disk Array.
l If NTP is configured during commissioning, check whether NTP service configurations
are correct. For details, see A.1.26 Checking the NTP Service on Linux.
l If you want to stop the NTP, see A.5.19 Starting or Stopping the NTP Service on
SUSE Linux.
Prerequisites
l The U2000 client is installed by referring to iManager U2000 version Client Software
Installation Guide.
l The U2000 license file must be ready.
NOTICE
The license file name can contain digits, letters, and special characters excluding the
space or \ /:*?"<>|.
Context
l During installation of the U2000 software, the OS user ossuser is created automatically.
The ossuser user is used to regularly maintain a U2000.
l Two methods are available for loading a U2000 license.
– Method one:
Use commands to load the license. This method is applicable to users who cannot
log in to GUI OSs.
Deployment scenario: The GUI is unavailable. Users cannot log in to the U2000
client but have to use commands for remote operations.
– Method two:
Load the license in the GUI. This method is applicable to users who are not familiar
with common commands of the SUSE Linux OS.
Deployment scenario: Loading the license in the GUI is recommended. If the GUI
is available and the login to the U2000 client is successful, use this method.
NOTE
l You can select a method as required. No matter which method is selected, ensure that the U2000
server process has been started.
l In the SUSE Linux OS, See How to Fix Garbled Characters in the SUSE Linux Command
Output to fix garbled characters if the SUSE Linux command output displays garbled characters.
You can select a method as required. No matter which method is selected, ensure that the U2000 server
process has been started.
Procedure
Step 1 Log in to the OS as the ossuser user.
NOTE
The initial password of the ossuser user is Changeme_123. For details about For system security,
modify the default password and remember the new password., see A.1.1 How to Change the OS User
Password.
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Step 4 Run the following commands to check whether a license file exists. If a license file exists,
back it up. If the license file does not exist, skip this step.
$ cd /opt/oss/server/etc/conf/license
$ ls
If the folder contains any other license file, run the following commands to back up the any
other license file to the /opt/oss/server/etc/conf/license_backup path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
NOTE
If the name of the license file contains a space, add quotation marks for license_file_name in the above
command.
Step 5 The encoding format of the U2000 license file must be UNIX, not DOS. For details about
how to confirm the encoding format of the U2000 license file, see A.5.11 How to Confirm
the Encoding Format of the U2000 License File.
To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.
1. Use SFTP to upload the license file to the /export/home/ossuser directory on the server
as the ossuser user. For details, see A.1.27 How to Use the FileZilla to Transfer Files
by SFTP.
NOTE
If the license file uploaded by the root user is used, the ossuser user may not have the read
permission and therefore the license fails to be updated. Use the license uploaded by the ossuser
user. If security hardening is performed on the OS, FTP/SFTP rights of ossuser will be disabled.
In this case, you need to upload files to the backup directory in the FTP root directory as the
ftpuser user (the FTP root directory of ftpuser is /opt/backup/ftpboot).
2. To activate the license file, run the following commands:
a. Log in to the OS of the server as the ossuser user.
b. Run the following commands to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
1. Save the license to be loaded to the server where the U2000 client is located.
2. Log in to the OS as a user with the administrator rights where the client program is
installed.
3. On the OS desktop, double-click the U2000 Client shortcut icon. The Login dialog box
is displayed.
4. In the Server drop-down list, select the server to be logged in to. Then, set User Name
and Password to the valid values, and click Login. The initial password of the admin
user is Changeme_123. The password must be changed during the first login to ensure
system security. Keep the password confidential and change it regularly.
– If a message indicating that no license is available is displayed when you log in to
the U2000 client.
i. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
ii. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
iii. Click OK.
iv. Click Yes and confirm the loaded license.
v. Click OK.
– If U2000 license is loaded before.
i. Choose Help > License Management > License Information from the main
menu (traditional style); alternatively, double-click System Management in
Application Center and choose License Management > Licenes
Information from the main menu (application style).
ii. In the License Information dialog box, click Update License.
iii. Select the new license file and click Open.
iv. Click Next.
v. Select a scenario and perform the associated operations as required:
○ If Incremental is unavailable, click Next.
○ If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
○ If Incremental is available and both the new and in-use U2000 licenses
need to be effective, select Incremental and click Next. If the in-use
U2000 license has a commercial license and a temporary license, the new
license will replace the license of the same type. For example, if the new
license is a commercial license, the commercial license in the in-use
U2000 license will be replaced.
vi. Click Finish.
vii. Click Yes and confirm the updated license.
viii. Click Yes to close all windows.
ix. Click Yes to log out of the system.
----End
Result
After the preceding operations are performed, the license file is automatically loaded to
the /opt/oss/server/etc/conf/license path.
Prerequisites
l If the delivered server has been preinstalled, ensure that system commissioning is
complete. For details, see 4.10.2 Configuring System Commissioning Parameters.
l Ensure that the U2000 license has been loaded. For details, see 4.10.3 Loading a U2000
License.
l The remote command login software, such as PuTTY, has been obtained.
NOTE
The recommended resolution range is 1024 * 768 to 1920 * 1080.
Context
The U2000 commissioning parameters cover communication security, U2000 user security
policy, communication between the U2000 and NEs, alarm function, and common U2000
configurations.
Procedure
Step 1 Use the PuTTY to enable the VNC service for the ossuser user. Log in to the GUI desktop as
the ossuser user. For details, see Configure the VNC service as the ossuser user.
Step 2 On the GUI desktop, right-click and choose Open in Terminal from the shortcut menu.
Step 3 Run the following command to check whether the U2000 is started:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Step 4 If the U2000 process is not started, run the following commands to start it:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
----End
Result
After U2000 parameters are commissioned, the U2000 and NEs can communicate with each
other properly, and the U2000 works properly.
Context
l During installation of the U2000 software, the OS user ossuser is created automatically.
The ossuser user is used to regularly maintain a U2000.
l During installation of the U2000 software, only one default NMS user, that is, user
admin, is provided. The admin user is the administrator of the U2000 and has the
highest rights of the U2000.
Procedure
Step 1 Log in to the server OS as user ossuser.
NOTE
The initial password of the ossuser user is Changeme_123. For details about For system security,
modify the default password and remember the new password., see A.1.1 How to Change the OS User
Password.
NOTICE
A U2000 client does not support the Linux OS. Manually starting a U2000 client and running
a script on the Linux OS may bring risks. Therefore, exercise caution when performing these
operations.
l /etc/ICMR
l /var/ICMR
Step 4 To check the U2000 version, run the following commands:
$ cd /opt/oss/engr/install/etc/conf
$ cat MacroFileNW.properties
The preceding displayed information shows the U2000 version. If the version information
does not meet the actual requirement, uninstall the U2000 and install the U2000 again.
Step 5 Ensure that the database is running.
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). Security(SSL) is
recommended for the high security requirements. You can run a command on the server to query
the data transmission mode.
For details about how to set the communication mode for the U2000 server in a SUSE Linux
single-server system, see A.5.10 How to Set the Communication Mode on the U2000 server for
the Single-Server System (SUSE Linux).
----End
Follow-up Procedure
l To save the server disk space, run the following command to delete /opt/install
directory.
$ su - root
Password: root user password
# rm -r /opt/install
NOTICE
After installation, do not change the installation directory. If the installation directory is
changed, the U2000 fails to work properly or uninstalled.
l If login to a U2000 client fails, see A.6.4 Failure to Log In to the U2000 Server from a
U2000 Client to resolve the problem.
l The installation is not complete if any of the preceding checks are not passed. For
details, see A.6.8 How to Address the U2000 Installation or Uninstallation Failure.
Prerequisites
l A single server U2000 system whose version, deployment domain, language, OS type,
server time, and time zone are the same as those on the primary site is installed on the
secondary site.
l The U2000 processes and the database are running on the primary site.
l Network communication between the primary site and the secondary site is normal, and
the minimum bandwidth is 10 Mbit/s.
l The SFTP Server service has been activated on the primary site, and related ports
(including the SFTP service port 22) have been enabled.
NOTE
For details on enabling the SFTP Server service on a SUSE Linux operating system, see A.1.2
How to Start/Stop the FTP/SFTP/Telnet Service in the SUSE Linux OS.
l If a firewall is deployed between the primary site and the secondary site, the SFTP
service port (by default, port 22) on the firewall must be enabled. For details on enabling
the SFTP service port on a firewall, see the firewall user guide.
l Only one scheduled backup or restoration task is allowed on a single server. For
example, if you create a new automatic backup task on the primary site, the old backup
task on the primary site will become invalid and only the new one will be retained.
Context
In upgrade, reconstruction, and data migration scenarios, you may need to back up or restore
U2000 data manually. For details, see the Manually Execute Backup and Restoration
Tasks section of the U2000 Administrator Guide.
Procedure
Step 1 Run the following steps to execute the configuration script.
NOTE
If execution of the configuration script fails, apply troubleshooting as prompted or contact Huawei
technical support engineers.
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
NOTE
The time configured for the cold backup task does not overlap with the time when data is being restored
using the MSuite. Cold backup may fail if the MSuite is restoring data.
Step 4 Enter the backup frequency, for example, if the frequency is 2:00 every day, enter 2 and press
Enter.
NOTE
l The maximum number of backup files must match the size of disk that will hold the backup files,
and is recommended to be 30.
l It is recommended that you set the scheduled backup time to the time when network service traffic is
light, such as at midnight (00:00 to 06:00).
Step 5 Enter the maximum number of backup files, such as 30, and press Enter.
The scheduled task is successfully created if the following information is displayed.
Scheduled task created successfully.
NOTE
----End
Result
After a backup task is created on the primary site, use one of the following methods to verify
whether the configuration of backup task is successful:
l Using query commands
– Check the backup task.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -task
NOTE
The displayed value of cycle varies depending on the backup interval. For example:
l If the configured backup interval is daily, the displayed value of Day is similar to
daily.
l If the configured backup interval is weekly, the displayed value of Day is similar
to weekly: Sunday.
l If the configured backup interval is monthly, the displayed value of Day is similar
to monthly: 22.
– Check the backup result.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -result
NOTE
The fields in the command output indicate the backup date and time, operation result
(Successful/Failure), operation type (backupDB/restoreDB), and backup package (the
timestamp in the file name indicates the backup time).
NOTE
The directory /opt/oss/engr/tools/coldbackuptool in the preceding command assumes that the
U2000 is installed in the default directory /opt/oss. If the U2000 is not installed in the default
directory, replace the directory in the command accordingly.
l Check the log.
When the scheduled time of the backup task is reached, run tail -f /opt/oss/engr/tools/
coldbackuptool/silent/coldbackupresult.txt to check the backup log.
l Check the backup files.
The backup directory is /opt/backup/ftpboot/coldbackupdata and the backup files are
in the 7z format.
Follow-up Procedure
For how to end the backup task, run the following steps.
1. Log in to the OS as the ossuser user through SSH by using PuTTY.
2. Run the following commands to switch to the root user and end the backup task on the
secondary site:
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./stopCron.sh
Prerequisites
l A single server U2000 system whose version, deployment domain, language, OS type,
server time, and time zone are the same as those on the primary site is installed on the
secondary site. For details about the installation procedure, see the U2000 Single-Server
System Software Installation and Commissioning Guide.
l On the secondary site, network management process and the maintenance tool are
standby and the database is running. If the U2000 has started when the restoration task is
performed, the U2000 process is automatically stopped.
l Network communication between the primary site and the secondary site is normal, and
the minimum bandwidth is 10 Mbit/s.
l The primary site is running correctly. (If the primary site becomes faulty before
automatic restoration starts, data cannot be restored on the secondary site.)
l Only one scheduled backup or restoration task is allowed on a single server. For
example, if you create a new automatic backup task on the primary site, the old backup
task on the primary site will become invalid and only the new one will be retained.
Context
In upgrade, reconstruction, and data migration scenarios, you may need to back up or restore
U2000 data manually. For details, see the Manually Execute Backup and Restoration
Tasks section of the U2000 Administrator Guide.
Procedure
Step 1 Run the configuration script on the secondary site.
NOTE
If execution of the configuration script fails, apply troubleshooting as prompted or contact Huawei
technical support engineers.
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
Step 3 Enter the automatic restoration interval, for example, if the automatic restoration task is
performed once every day, enter 1 and press Enter.
Information similar to the following is displayed:
Set execution time (0-23)|1:
Step 4 Enter the time to start the automatic restoration task, such as 5 and press Enter.
Information similar to the following is displayed:
>>>>>Enter the peer SFTP user<<<<<
Enter the peer SFTP IP address:
Enter the password for SFTP user:
NOTE
l The interval between the automatic restoration time and the automatic backup time is fixed at 3
hours. For example, if the automatic backup time is 2 a.m., set the automatic restoration time to 5
a.m.
l If connection to the primary site fails due to Primary Site Authentication Error when you enter
the primary site's SFTP information, see How Do I Handle the Failure to Connect Two Servers Due
to a Mutual Trust Authentication Error? for troubleshooting.
l Reconfigure the automatic restoration task if the SFTP user's password is changed.
Step 5 Enter the IP address and SFTP user name of the primary site, and press Enter. In this
example, IP address is 192.168.0.0 and default password of the SFTP user is
Changeme_123. The information is used by the secondary site to obtain the backup file from
the primary site by using the SFTP.
The scheduled task is successfully created if the following information is displayed.
Scheduled restoration will automatically shut down the U2000 and MSuite.
Scheduled task created successfully.
----End
Result
After an automatic restore task is created on the secondary site, use one of the following
methods to verify whether the configuration of restore task is successful:
l Using query commands
– Check the restoration task.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -task
NOTE
The displayed value of cycle varies depending on the restoration interval. For example:
l If the configured restoration interval is daily, the displayed value of Day is similar
to daily.
l If the configured restoration interval is weekly, the displayed value of Day is
similar to weekly: Sunday.
l If the configured restoration interval is monthly, the displayed value of Day is
similar to monthly: 22.
– Check the restoration result.
i. Log in to the OS as the ossuser user through SSH by using PuTTY.
ii. Run the following command to switch to the root user and run the
coldbackupInfo.sh script.
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./coldbackupInfo.sh -result
NOTE
The fields in the command output indicate the restoration date and time, operation
result (Successful/Failure), operation type (backupDB/restoreDB), and backup
package (the timestamp in the file name indicates the backup time of the data to be
restored).
NOTE
The directory /opt/oss/engr/tools/coldbackuptool in the preceding command assumes that the
U2000 is installed in the default directory /opt/oss. If the U2000 is not installed in the default
directory, replace the directory in the command accordingly.
l Checking the log
When the scheduled time of the backup task is reached, run tail -f /opt/oss/engr/tools/
coldbackuptool/silent/coldrestoreresult.txt to check the restore log.
Follow-up Procedure
l For how to end the restoration task, run the following steps.
a. Log in to the OS as the ossuser user through SSH by using PuTTY.
b. Run the following commands to switch to the root user and end the restoration task
on the secondary site:
$ su - root
Password: Password of the root user
# cd /opt/oss/engr/tools/coldbackuptool
# ./stopCron.sh
l After automatic restoration is implemented for the first time, stop the U2000 process on
the primary site and start the U2000 process on the secondary site to ensure that the
process can function properly.
– If the U2000 process runs properly on the secondary site, stop the U2000 process on
the secondary sites start the U2000 process on the primary site.
– If the U2000 process not runs properly on the secondary site, re-execute the restore
task on the secondary sites or contact Huawei technical support personnel.
NOTE
After data restoration fails, if the missing database files fault is found in the log file, rectify the
fault by following the instructions provided in How to Rectify the Data Restoration Failure on a
Secondary Site Because of Missing Databases.
NOTE
l If the CORBA NBI, XML NBI, SNMP NBI, or text NBI is configured for the U2000, you must
reconfigure the IP address used by the NBI to interconnect with the upper-layer OSS after
successfully restoring the database. For details, see the related NBI user manual.
l After the preceding operations are complete, login passwords for the U2000 client and NE Software
Management are restored to be consistent with the U2000 data.
A FAQs
This topic provides answers to the most frequent questions concerning the installation.
Question
How to change the OS user password?
Answer
l Method 1:
a. Log in to the OS as the user whose password needs to be changed, for example,
root, ossuser, or webuser.
NOTE
c. Enter the current ossuser user password as prompted, the default password is
Changeme_123.
d. Enter a new password as prompted, for example, Changeme_123.
To ensure the security of the U2000, passwords must be complex enough. For
example, a password must contain eight or more characters of two types. The
allowed characters are digits, letters, and special characters. Remember to change
passwords regularly.
NOTE
Any character that you enter using the keyboard will be considered a password component,
including Backspace. For example, if you enter the string cBackspaceChangeme_123, the
password is cBackspaceChangeme_123, but not Changeme_123.
e. Enter the new password again as prompted. Press Enter to make the change take
effect.
NOTICE
After the new password takes effect, do not close the CLI.
Open another CLI and log in using the new password to verify the new password. If
the new password is correct, close all the CLIs. If the new password is incorrect,
repeat the preceding steps to change the password again.
l Method 2 (Change the passwords for other OS users, as the root user):
a. Log in to the OS as the root user.
b. Open the command terminal, run the following command to set the OS user
password:
# passwd OS user
NOTICE
After the new password takes effect, do not close the CLI.
Open another CLI and log in using the new password to verify the new password. If
the new password is correct, close all the CLIs. If the new password is incorrect,
repeat the preceding steps to change the password again.
----End
Question
How do I start/stop the FTP/SFTP/Telnet service in the SUSE Linux OS?
NOTE
Using SFTP is recommended, operations in this topic applies to the following scenarios:
l See operations in this topic on the U2000 server when files, such as the installation package and
license file, need to be uploaded to the U2000 server during U2000 installation.
l See operations in this topic on the SUSE Linux server before U2000 data is backed up or restored.
Answer
Step 1 Use the remote login software such as PuTTY to log in to the OS by means of SSH as the
root user.
NOTE
If the SetSuse policy has been enabled, you can log in to the OS only by means of SSH. Because after
the SetSuse policy has been enabled, only the SSH service for the ossuser user has the login right. The
PuTTY is recommended.
Run the following command to switch to the root user:
$ su - root
Enter a login password for the root user.
Step 2 Start and stop the FTP/SFTP (more secure, recommended)/Telnet service.
l Starting and stopping the FTP service:
– NMS is not installed, do as the following:
n Run the following command to start the FTP service:
# service vsftpd start
$ su - root
Password: Password of root
----End
A.1.3 How to Enable and Disable the FTP Authority of the root
User in the SUSE Linux OS
Question
How to enable and disable the FTP authority of the root user in the SUSE Linux OS?
Answer
l The method of enable the FTP authority of the root user is as follow:
a. Log in to the SUSE Linux OS as the root user.
b. Run the vi /etc/ftpusers command to open the ftpusers file in the /etc directory.
Add the comment tag (#) to the beginning of the following line in the ftpusers file
to comment out this line:
root
c. Run the command wq! to save and close the ftpusers file.
l The method of disable the FTP authority of the root user is as follow:
a. Log in to the SUSE Linux OS as the root user.
b. Run the vi /etc/ftpusers command to open the ftpusers file in the /etc directory and
delete the comment tag (#) to the beginning of the following line in the ftpusers
file:
root
c. Run the command wq! to save and close the ftpusers file.
----End
Question
How do I add the default route in the SUSE Linux OS?
Answer
Step 1 Log in to the system as user root.
Step 4 Write the default route configurations into the /etc/sysconfig/network/routes file.
l Format:
default gateway IP address - -
NOTE
gateway IP address: network management IP address for the network on which the U2000 server
is located.
l Example:
default 10.9.1.254 - -
Step 5 Press Esc and run the command :wq to save and close the file.
Step 6 Run the following command to make the route take effect:
# /etc/init.d/network restart
Step 7 Run the netstat -nr command to view the default route of the system.
----End
Question
How do I add a static route in the SUSE Linux OS?
NOTE
If a static route exists and a new static route needs to be added, use the MSuite to add a static route after
the U2000 is installed. Using yast2 to add a static route is prohibited to prevent several-second network
disconnection and service interruption.
Answer
Step 1 Log in to the system as user root.
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
Step 3 Run the following command to view the existing routes in the system:
# netstat -nr
Step 5 Write the static route configurations into the /etc/sysconfig/network/routes file.
l Format:
destination network segment address gateway IP address destination network
segment subnet mask
NOTE
– destination network segment address: The network segment of the IP address of the computer
connected to the U2000 server.
– gateway IP address: network management IP address for the network on which the U2000
server is located.
– destination network segment subnet mask: subnet mask of the network segment on which the
computer connected to the U2000 server is located.
l Example:
10.16.1.0 10.9.1.254 255.255.255.0
Press Esc and run the command :wq to save and close the file.
Step 6 Run the following command to make the route take effect:
# /etc/init.d/network restart
----End
Question
How to add a static route after the U2000 is installed?
NOTE
If a static route exists and a new static route needs to be added, use the MSuite to add a static route after
the U2000 is installed. Using yast2 to add a static route is prohibited to prevent several-second network
disconnection and service interruption.
Answer
Step 1 Ensure that the MSuite servers on the primary and secondary sites have been started.
Run the following command as the root user to check whether the MSuite servers are started:
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
# ps -ef | grep java
A message similar to the following will be displayed in the SUSE Linux system:
...
root 7593 7130 0 06:31 pts/7 00:00:00 grep java
ossuser 8937 12803 0 04:13 pts/8 00:00:42 /opt/oss/OSSJRE/jre_linux/bin/
java -Dprocname=AgentIntegrate -Dfile.encoding=UTF8 -Xmx1024m -
XX:MetaspaceSize=16m -XX:MaxMetaspaceSize=256m -XX:+UseCompressedClassPointers -
XX:+UseCompressedOops -XX:CompressedClassSpaceSize=128m -XX:
+HeapDumpOnOutOfMemoryError -DabsCfgPath=/opt/oss/server/etc/oss_cfg/frame -cp
nbi/agentintegrate/thirdparty/*:3rdlib/*:common/uflightdispatcher/lib/
jdom.jar:cbb/qasn/lib/*:common/uflight/frame_app/plugins/
com.huawei.uflight.platformadapter/*:common/uflight/web_app/plugins/pax-web-
runtime-2.1.2.jar:common/uflight/web_app/plugins/web_app/plugins/pax-web-
spi-2.1.2.jar:nbi/agentintegrate/lib/*:nbi/agentintegrate/bin/*
com.huawei.u2000.inventory.webserver.JettyStarter
...
NOTE
If the displayed information contains /opt/oss/OSSJRE/jre_linux/bin/java -server, the MSuite servers have
been started.
If the MSuite servers have not been started, switch to the ossuser and run the following
commands as the root user to start the MSuite servers:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./startserver.sh
Step 4 Right-click the target server and choose Configure Route from the shortcut menu. The
Configure Route dialog box is displayed.
Step 5 In the dialog box that is displayed, click Add or Delete according to actual route conditions to
configure the route.
NOTICE
Before adding a route, ensure that the server and the router are directly connected. Otherwise,
the route cannot be took effect immediately.
For example, the procedure for adding a route from a client (IP address: 10.70.73.77) to a
server (IP address: 10.71.224.12) is as follows, with the IP address of the intermediate router
being 10.71.224.1:
1. Ensure that the server and the router are directly connected.
2. Click Add. Set Destination to 10.70.73.0, Subnet Mask to 255.255.255.0, and
Gateway to 10.71.224.1.
----End
Answer
l Method one (recommended): Use commands.
a. Log in to the OS as the root user through remote login software.
b. Run the command df -h to check disk partitions.
l Method two: In the GUI.
a. Log in to the GUI of the OS as the root user.
b. Run the following command in the terminal window to open the YaST2 Control
Center window.
# yast2
----End
Question
How do I check the remaining space of a disk?
Answer
Run the df -hk command to check the remaining space of a disk.
For example, run the df -hk /opt command to check the remaining space of the /opt partition.
Question
How to monitor system processes and application ports after the SUSE Linux OS is installed?
Answer
l Choose Computer > More Applications > System > GNOME System Monitor to
manage processes.
l Opens the terminal, use ps -ef | grep process name command to view processes. You can
run the vmstat or top command to view the usage of the CPU, memory, and I/O bus.
Question
What should I do when I fail to log in to the SUSE Linux OS through the remote login tools?
Answer
Step 1 Log in to the SUSE Linux OS as user root through remote login software or the Windows OS
CLI.
Step 2 Run the following command in the terminal window:
# yast remote allow set=yes
# rcxdm restart
Step 3 Use the remote login tools to log in to the U2000 server again.
----End
Answer
Run the ps -ef | grep process name command to query the process status.
For example, run the ps -ef | grep sysmonitor command to query the status of the sysmonitor
process. The following message will be displayed:
ossuser 17156 17032 0 22:13:59 pts/3 0:00 grep sysmonitor
ossuser 11972 1 0 04:38:10 pts/2 13:00 imap_sysmonitor -cmd start
l imap_sysmonitor indicates information about the process, where 11972 is the process
ID.
NOTE
Answer
Run the kill -9 process ID command to forcibly end a process.
Answer
Run the following command to open the vi editor:
vi file name
l If a file with the same filename exists, run the vi command to open and edit the file.
l If a file with the same filename does not exist, run the vi command to create and edit a
file.
Command Function
ESC Press ESC to exit the text input mode and enter the
command mode.
l The commands for inserting text are as follows (must be run in command mode).
Command Function
o Adds text at the beginning of the next line where the cursor
locates (open).
l The commands for moving the cursor are as follows (must be run in command mode).
Command Function
l The commands for deleting texts are as follows (must be run in command mode).
Command Function
l The commands for quitting the vi editor are as follows and must be run in command
mode. You are recommended to press ESC before running any command listed in Table
A-1.
A.1.14 How to Change the Time and Time Zone of the SUSE
Linux OS
Question
How to change the time and time zone of a SUSE Linux OS where the U2000 is not installed
yet?
NOTE
For how to change the time and time zone of a SUSE Linux OS after the U2000 has been installed, see
MSuite > U2000 Deployment > Setting the System Time and Time Zone in the U2000 Administrator
Guide.
Answer
Step 1 Log in to the graphical desktop system of the SUSE Linux OS as the root user.
Step 2 Open the CLI and run the following command to start the YaST2 control center.
# yast2
Step 4 In the dialog box that is displayed, set the area and time zone.
Step 5 To change the time, click Change. In the dialog box that is displayed, set the date and time,
and then click Accept.
Step 6 Click OK.
Step 7 Run the following commands to restart the OS. It takes approximately 5 to 8 minutes to
restart the system.
# sync;sync;sync;sync
# shutdown -r now
Step 8 Optional: For Suse 11 OS, ensure that the time and time zone has been correctly modified
after restart the OS, or run the following commands.
1. Run the following commands to synchronize the hardware time.
# . /etc/sysconfig/clock
# /sbin/hwclock --systohc $HWCLOCK
3. Run the following commands to restart the OS. It takes approximately 5 to 8 minutes to
restart the system.
# sync;sync;sync;sync
# shutdown -r now
----End
Answer
The virtual network computing (VNC) is a component of SUSE Linux. It is a typical thin
client software. The graphics processor service runs on the server and multiple instances can
be created.
l Advantage: A remote computer can access the server using the Internet Explorer. If the
connection is torn down, the desktop can be held by logging in with the same user name
and port number. The remotely run applications will not be interrupted due to the
network disconnection.
l Disadvantage: The shortcut options in the VNC window conflicts with those on the
Windows and applications. As a result, some shortcut options are unavailable in the
VNC window. Table A-2 shows the usage of the commonly seen shortcut options in the
VNC window.
NOTE
l It is recommended that you log in to the OS in SSH (recommended) or Telnet mode, instead of the
Java desktop mode. Then run the commands to enable the VNC services.
l The VNC service is automatically disabled after the OS is restarted to ensure the security of the
U2000. To use the VNC to remotely log in to SUSE Linux, reconfigure the VNC service.
l After installing U2000, the scripts to enable and disable VNC is in the in the /opt/oss/engr/
tools/VNC directory. Before installing U2000, the scripts to enable and disable VNC is in the in
the /opt/install/OSSICMR/tools/VNC directory. The following example describes how to use the
VNC after installing U2000.
l Configure the VNC service as the root user.
a. Use the PuTTY tool to log in to the server as a root user.
b. Optional: Run the following command as user root to set the password for user
root to log in to the VNC. If the VNC login password for user root already exists or
is known, skip this step.
# vncpasswd
l Remember the password that will be used for VNC login as user root.
l If the password is forgotten, log in to the OS as user root, run the vncpasswd command,
and set a new password according to the message.
c. Run the following commands to enable the VNC services.
NOTICE
After uploading and decompressing the preconfigured component package and
before running the script to preconfigure the OS, the scripts to enable and disable
VNC is in the in the /opt/install/OSSICMR/tools/VNC directory.
After preconfiguring the OS, the scripts to enable and disable VNC is in the in
the /opt/oss/engr/tools/VNC directory.
# cd /opt/oss/engr/tools/VNC
# sh start_vnc_root.sh
If the command output contains successfully, the VNC service corresponding to the
root user is started. The port ID is 5802 for the root user.
NOTE
l During operations on the GUI, do not close the PuTTY dialog box. Otherwise, the
connection to the VNC client becomes abnormal. If the PuTTY dialog box is closed,
refer to this FAQ to reconfigure the VNC service.
l If a message is displayed asking you to set the password, run the vncpasswd command
as the root user to set the password.
l If information similar to the following is displayed:
The vnc for root is already running and port is 2.
Run the following commands to stop the VNC service and close the port:
# sh stop_vnc_root.sh
# su - ossuser
$ vncserver -kill :2
$ exit
Run command sh start_vnc_root.sh to start the VNC service for the root user.
l If information similar to the following is displayed:
start vncserver :2 failed
Run the following commands to enable the VNC services.
# vncserver :2
l If information similar to the following is displayed:
Warning: X3650-SEC1:2 is taken because of /tmp/.X11-unix/X2
Remove this file if there is no X server X3650-SEC1:2
A VNC server is already running as :2
X3650-SEC1 is the server name.
Run ps -ef |grep vnc to check whether the VNC service corresponding to the root user
has started.
l If no information is displayed, the VNC service corresponding to the root user has
not started.
Run cd /tmp. If the .X2-lock file exists, run rm .X2-lock to delete the .X2-lock
file.
Run cd /tmp/.X11-unix. If the X2 file exists, run rm X2 to delete the X2 file.
Repeat Step 3 to start the VNC service for the root user.
l If information is displayed, the VNC service corresponding to the root user has
started.
d. Perform the following operations to create an SSH tunnel so that the
communication between the server and VNC client is more secure. In the following
example, the PuTTY is saved in the D:\PuTTY path and the server IP address is
10.9.1.1.
i. On a PC or laptop, choose Start > Run. In the dialog box that is displayed,
enter cmd to open a CLI.
ii. Run the following command to navigate to the path where the PuTTY is
located:
C:\> cd /d D:\PuTTY\
iii. Run the following command to create an SSH tunnel for the root user:
D:\PuTTY> putty -L 5902:localhost:5902 -L 5802:localhost:5802
10.9.1.1
NOTE
l During operations on the GUI, do not close the PuTTY dialog box. Otherwise, the
connection to the VNC client becomes abnormal. If the PuTTY dialog box is
closed or SSH tunnel is disconnected due to an exception, refer to this FAQ to
reconfigure the VNC service.
l If the security hardening policy is enabled on the system, enter the user name and
password of the ossuser user in the PuTTY window to complete the creation of
the SSH tunnel.
e. Open the Internet Explorer of a PC or laptop. Enter http://localhost:5802 in the
address bar. Then press Enter.
NOTE
If a message is displayed indicating that the application is prohibited to run, choose Start >
Control Panel and click Java. In the Java Control Panel dialog box, click the Security tab,
Edit Site List, and Add, and enter http://localhost:5802. Click OK, Continue, and then
OK. Restart the Internet Explorer and enter http://localhost:5802 in the address bar.
f. Enter the password and click OK to access SUSE Linux.
NOTICE
l The VNC cannot be used to connect a PC or laptop to multiple SUSE Linux
servers. If the VNC needs to be used to connect to another server, you must shut
down the server connected to the PuTTY and then refer to the FAQ to
reconfigure the VNC connected to the server. The new VNC connected to the
SUSE Linux server overwrites the previous VNC connected to the SUSE Linux
server. To reuse the previous VNC, refer to this FAQ to reconfigure this VNC.
l After the GUI process is completed, run the following command to shut down
the VNC service in order to ensure security:
# cd /opt/oss/engr/tools/VNC
# sh stop_vnc_root.sh
l Remember the password that will be used for VNC login as user ossuser.
l If the password is forgotten, log in to the OS as user ossuser, run the vncpasswd
command, and set a new password according to the message.
c. Run the following commands to enable the VNC service for the ossuser user.
$ su - root
Password: root user password
# cd /opt/oss/engr/tools/VNC
# sh start_vnc_oss.sh
If the command output contains successfully, the VNC service corresponding to the
ossuser user is started. The port ID is 5803 for user ossuser.
NOTE
l If a message is displayed asking you to set the password, run the vncpasswd command
as the ossuser user to set the password.
l If information similar to the following is displayed:
The vnc for ossuser is already running and port is 3.
Run the following commands to stop the VNC service and close the port:
# sh stop_vnc_oss.sh
# vncserver -kill :3
Run command sh start_vnc_oss.sh to start the VNC service for the ossuser user.
l If information similar to the following is displayed:
start vncserver :3 failed
Run the following commands to enable the VNC service.
# vncserver :3
l If information similar to the following is displayed:
Warning: X3650-SEC1:3 is taken because of /tmp/.X11-unix/X3
Remove this file if there is no X server X3650-SEC1:3
A VNC server is already running as :3
X3650-SEC1 is the server name.
Run ps -ef |grep vnc to check whether the VNC service corresponding to the ossuser
user has started.
l If no information is displayed, the VNC service corresponding to the ossuser user
has not started.
Run cd /tmp. If the .X3-lock file exists, run rm .X3-lock to delete the .X3-lock
file.
Run cd /tmp/.X11-unix. If the X3 file exists, run rm X3 to delete the X3 file.
Repeat Step 3 to start the VNC service for the ossuser user.
l If information is displayed, the VNC service corresponding to the ossuser user has
started.
d. Perform the following operations to create an SSH tunnel for the ossuser user so
that the communication between the server and VNC client is more secure. In the
following example, the PuTTY is saved in the D:\PuTTY path and the server IP
address is 10.9.1.1.
i. On a PC or laptop, choose Start > Run. In the dialog box that is displayed,
enter cmd to open a CLI.
ii. Run the following command to navigate to the path where the PuTTY is
located:
C:\> cd /d D:\PuTTY\
iii. Run the following command to create an SSH tunnel for the ossuser user:
D:\PuTTY> putty -L 5903:localhost:5903 -L 5803:localhost:5803
10.9.1.1
NOTE
NOTE
During operations on the GUI, do not close the PuTTY dialog box. Otherwise, the
connection to the VNC client becomes abnormal. If the PuTTY dialog box is closed or
SSH tunnel is disconnected due to an exception, refer to this FAQ to reconfigure the
VNC service.
e. Open the Internet Explorer of a PC or laptop. Enter http://localhost:5803 in the
address bar. Then press Enter.
NOTE
If a message is displayed indicating that the application is prohibited to run, choose Start >
Control Panel and click Java. In the Java Control Panel dialog box, click the Security tab,
Edit Site List, and Add, and enter http://localhost:5803. Click OK, Continue, and OK,
restart the Internet Explorer, and enter http://localhost:5803 in the address bar.
f. Enter the password and click OK to access SUSE Linux.
NOTICE
l The VNC cannot be used to connect a PC or laptop to multiple SUSE Linux
servers. If the VNC needs to be used to connect to another server, you must shut
down the server connected to the PuTTY and then refer to the FAQ to
reconfigure the VNC connected to the server. The new VNC connected to the
SUSE Linux server overwrites the previous VNC connected to the SUSE Linux
server. To reuse the previous VNC, refer to this FAQ to reconfigure this VNC.
l After the GUI process is completed, run the following command to shut down
the VNC service in order to ensure security:
$ su - root
Password: root user password
# cd /opt/oss/engr/tools/VNC
# sh stop_vnc_oss.sh
If you still cannot use the VNC on a PC or laptop to log in to the server after the VNC is
configured, perform the following operations to locate the fault:
a. Check whether the VNC port is occupied.
For a root user, the VNC port is 5802. For an ossuser user, the VNC port is 5803.
For the U2000 V100R008SPC300 or later, port forwarding must be configured on
Windows. VNC ports may be occupied.
On a PC or laptop running on Windows, if a root user cannot use the VNC to log in
to the server, run the netstat -a |findstr 5802 command to check whether the VNC
port is occupied. If an ossuser user cannot use the VNC to log in to the server, run
the netstat -a |findstr 5803 command to check whether the VNC port is occupied.
The following information is displayed (a root user is used as an example)
TCP 127.0.0.1:5802 SZXY1X001776702:0 LISTENING
If the command output contains 5802 and LISTENING, port 5802 is occupied. For
an osssuer user, check whether the command output contains 5803 and
LISTENING.
If the VNC port is occupied, shut down all in-use VNCs on the current PC or
laptop. Verify that no user is using the VNC on the PC or laptop running on
Windows.
b. If the problem persists, close all IE web browsers and restart the IE.
c. If the problem still exists after the IE is restarted, restore the IE to default
configurations, if applicable. To restore the IE to default configurations, choose
Tools > Internet Options > Advanced > Restore Defaults. If the Internet Explorer
cannot be reconfigured, try another browser, PC, or laptop.
Table A-2 Usage of commonly seen shortcut options in the VNC window
Scenar Availabil Shortcut Description
io ity Option/
Operation
1 A user fails to run The VNC has been running for a long time
commands in the without being restarted, resulting in environment
CLI after logging variable failures. To resolve this problem, restore
in to the GUI the environment variables and run the related
through the VNC. commands.
Restore the environment variables:
1. Log in to the GUI as the root user.
2. Run the following commands to restore
environment variables:
# . /.profile-EIS
2 If the VNC service There is a low probability that this issues occurs
has been running if the VNC service has been running for a certain
for a long period period of time. If this issue occurs, restart the
of time, the GUI VNC service as the root or ossuser user.
desktop may stop
responding when a
user logs in to the
GUI desktop in
vnc mode.
----End
Answer
NOTICE
l Using the Yast2 to set IP addresses is not recommended because intermittent network
disconnection may occur and the NMS may fail to function properly.
l The IP address cannot be located in a network segment on which the IP addresses of some
used network interfaces are located. Otherwise, a network fault occurs.
NOTE
– If the command output contains information similar to ifcfg-bond0, bond has been configured
for the network interface. Perform Step 2.2 to view the IP address of the used network
interface.
– If the command output contains information similar to ifcfg-eth0, bond has not been
configured for the network interface. Perform Step 2.3 to view the IP address of the used
network interface.
2. Optional: If bond has been configured for the network interface, run the following
command to view the IP address of the used network interface:
# cat ifcfg-bond0
NOTE
The value 10.9.1.1/24 of the IPADDR parameter is the IP address of network interface bond0.
Record the value. If information similar to ifcfg-bond0 is displayed, repeatedly perform Step 2.2
and record the IP address.
3. Optional: If bond has not been configured for the network interface, run the following
command to view the IP address of the used network interface:
# cat ifcfg-eth0
ETHTOOL_OPTIONS=''
IPADDR='10.9.1.2/24'
MTU=''
NETWORK=''
REMOTE_IPADDR=''
NOTE
The value 10.9.1.2/24 of the IPADDR parameter is the IP address of network interface eth0.
Record the value. If information similar to ifcfg-eth0 is displayed, repeatedly perform Step 2.3
and record the IP address.
Step 3 Run the following operation to configure the IP address for the network interfaces that are not
used in the SUSE Linux OS.
NOTE
3. Enter an IP address, such as 10.78.225.28, for the network interface eth2. Then press
Enter.
A message similar to the following will be displayed:
Please input the subnet mask:
NOTE
The IP address cannot be located in the same network segment as a recorded IP address.
Otherwise, a network fault occurs.
4. Enter the subnet mask of the network segment on which the IP address resides, such as
255.255.255.0. Then press Enter.
A message similar to the following will be displayed:
Please input the hostname:
5. Enter a host name, such as hostname01, for the IP address. The host name must be
unique. Then press Enter.
A message similar to the following will be displayed:
Configured the NIC successfully.
NOTE
If the preceding information is displayed, the IP address of the eth2 network interface is
configured successfully. To configure IP addresses for other network interfaces, repeat Step 3.
Step 4 Run the following commands to restart the OS to make the configurations take effect.
# sync;sync;sync;sync
# shutdown -r now
----End
Question
How do I capture snapshot on SUSE Linux?
Answer
l Method 1: Use the keyboard.
a. Press Print Screen.
b. Rename the file and click Save.
----End
Question
How do I check whether bond is configured?
Answer
l Method 1:
a. Use the remote GUI software to log in to the server as the root user.
b. On the desktop, right-click and choose Open Terminal from the shortcut menu to
display a CLI.
c. Run the following command to log in to the YaST2 Control Center.
# yast2
d. In the YaST2 Control Center dialog box, choose Network Devices > Network
Card.
e. In the Network Setup Method dialog box, select Traditional Method with ifup
and click Next.
f. The Network Card Configuration Overview dialog box is displayed.
NOTE
If bond is configured, the Bond Network option is available. If bond is not configured, the Bond
Network is unavailable.
l Method 2:
a. On the CLI, run the following command:
# ifconfig -a
NOTE
If bond is configured, the command output contains bond0.
----End
Question
How do I configure the resolution on SUSE Linux?
Answer
Step 1 Log in to the GUI of the SUSE Linux OS as the root user.
Step 2 Open a CLI and run the following command to start the YaST2 control center:
# yast2
NOTE
If the Automatic Graphics System Setup dialog box is displayed, click Change Configuration.
Step 4 In the SaX2: X11 Configuration dialog box, click Change to modify the monitor properties.
Step 5 In the Monitor Settings dialog box, choose VESA. Select the resolution to be modified based
on the monitor size and individual habit. The commonly used resolution is 1024×768@60HZ.
NOTE
The IBM server does not support the resolution of 16:10, for example, 1440×900.
The newly configured resolution is displayed in Resolution. You can click it to modify the resolution too.
The resolution value should be less than or equal to the resolution set for Monitor.
Step 9 If no error is displayed during the test, click Save. The Message dialog box is displayed.
Step 11 Run the following commands to restart the OS to make the configurations take effect. The
restart process takes about 5 to 8 minutes.
# sync;sync;sync;sync
# shutdown -r now
----End
Question
How do I install the 7-zip software on the SUSE Linux OS?
Answer
Step 1 Download the 7-zip software package p7zip_9.20.1_src_all.tar.bz2 from http://
sourceforge.net/projects/p7zip/.
Step 2 Use SFTP to upload the 7-zip software package to the /opt directory on the server as the root
user. For details about how to use SFTP to upload the software package, see A.1.27 How to
Use the FileZilla to Transfer Files by SFTP.
Step 3 Use Telnet or SSH to log in to the server as the root user. The SSH mode is recommended
because it is more secure.
Step 4 Switch to the path where the software package is stored and assign permissions to the
software package.
# cd /opt
# chmod 750 /opt/p7zip_9.20.1_src_all.tar.bz2
2. Use up and down arrow keys to search for statements similar to the following:
PATH=/sbin:/usr/sbin:/usr/local/sbin:$PATH
3. Add /usr/local/bin/ to the environment variable PATH. For details about using the vi
editor, see A.1.13 How to Use the vi Editor.
After the operation is performed, information similar to the following is displayed:
PATH=/sbin:/usr/sbin:/usr/local/sbin:/usr/local/bin/:$PATH
4. Press Esc and run the :wq command to save the /etc/profile file and exit from the Vi
editor.
----End
Question
To ensure system security, the SUSE Linux OS supports the file change audit function that
can record relevant file change information. How do I enable the file change audit function on
SUSE Linux OS?
Answer
NOTICE
Enabling the file change audit function of the SUSE Linux OS may affect the system space
occupation and system performance. It is advised not to enable the function.
NOTE
NOTE
The preceding information indicates that no audit rules have been configured.
d. Run the following command to create audit rules for the relevant U2000 directory
or file to be audited. The following uses the /opt/oss/engr directory as an example:
# auditctl -w /opt/oss/engr -p wa
NOTE
NOTE
The preceding information indicates that the audit rules of the /opt/oss/engr directory have
been created. The OS will audit the permission changes of files in the /opt/oss/engr
directory.
f. Run the following command to enable the creation of the audit rules of the /opt/oss/
engr directory to take effect:
# auditctl -e 1
NOTE
To query the audit log and learn the detailed file change information, run the ausearch -
f /opt/oss or /var/log/audit/audit.log command. For details, see the SUSE Linux OS
documentation. For example, https://www.suse.com/documentation/sles11/.
g. Optional: To delete the audit rules of the /opt/oss/engr directory, perform the
following operations:
i. Run the following command to delete the audit rules of the /opt/oss/engr
directory:
# auditctl -W /opt/oss/engr -p wa
NOTE
/opt/oss/engr is the directory to be audited.
ii. Run the following command to query whether the audit rules of the /opt/oss/
engr directory are deleted:
# auditctl -l
NOTE
If no information like LIST_RULES: exit,always dir=/opt/oss/engr (0x8) perm=wa
is displayed, the audit rules of the /opt/oss/engr directory have been deleted.
iii. Run the following command to enable the deletion of the audit rules of
the /opt/oss/engr directory to take effect:
# auditctl -e 1
c. Run the following command to query whether the auditd service is running:
# service auditd status
NOTE
NOTE
Some audit rules are enabled by default after OS security hardening.
e. Perform the following operations to create audit rules for the relevant U2000
directory or file to be audited. The following uses the /opt/oss/engr directory as an
example:
i. Run the vi command to open the audit.rules file.
# vi /etc/audit/audit.rules
-w /var/log/sudo.log -p wa -k actions
-w /sbin/insmod -p x -k modules
-w /sbin/rmmod -p x -k modules
-w /sbin/modprobe -p x -k modules
-e 2
ii. Add the audit rules of the /opt/oss/engr directory to the audit.rules file, as
follows:
# This file contains the auditctl rules that are loaded
......
-w /var/log/sudo.log -p wa -k actions
-w /sbin/insmod -p x -k modules
-w /sbin/rmmod -p x -k modules
-w /sbin/modprobe -p x -k modules
-w /opt/oss/engr -p a
-e 2
NOTE
NOTE
l The preceding information indicates that the audit rules of the /opt/oss/engr directory
have been created. The OS will audit the permission changes of files in the /opt/oss/engr
directory.
l To query the audit log and learn the detailed file change information, run the ausearch -
f /opt/oss or /var/log/audit/audit.log command. For details, see the SUSE Linux OS
documentation. For example, https://www.suse.com/documentation/sles11/.
k. Optional: To delete the audit rules of the /opt/oss/engr directory, perform the
following operations:
i. Run the vi command to open the audit.rules file.
# vi /etc/audit/audit.rules
-w /var/log/sudo.log -p wa -k actions
-w /sbin/insmod -p x -k modules
-w /sbin/rmmod -p x -k modules
-w /sbin/modprobe -p x -k modules
-w /opt/oss/engr -p a
-e 2
NOTE
/opt/oss/engr is the directory to be audited.
ii. Delete the audit rules of the /opt/oss/engr directory from the audit.rules file,
as follows:
# This file contains the auditctl rules that are loaded
......
-w /var/log/sudo.log -p wa -k actions
-w /sbin/insmod -p x -k modules
-w /sbin/rmmod -p x -k modules
-w /sbin/modprobe -p x -k modules
-e 2
iii. Run the :wq command to save the modification and exit the vi editor.
iv. Powering off the U2000 and the database.
v. Run the following commands to restart the OS:
# sync;sync;sync;sync
# shutdown -r now
vi. Run the following command to query whether the audit rules of the /opt/oss/
engr directory are deleted:
# auditctl -l
NOTE
If no information like LIST_RULES: exit,always dir=/opt/oss/engr (0x8) perm=wa
is displayed, the audit rules of the /opt/oss/engr directory have been deleted.
----End
Answer
Step 1 Log in to the SUSE Linux OS as the ossuser user through SSH by using PuTTY.
Step 4 Perform the following operations to set an encryption algorithm for OpenSSH.
1. Run the following command:
# python modifysshdalg.py
All mac_algorithms:
1: hmac-md5-etm@openssh.com 2:hmac-sha1-etm@openssh.com
3: umac-64-etm@openssh.com 4:umac-128-etm@openssh.com
5: hmac-sha2-256-etm@openssh.com 6:hmac-sha2-512-
etm@openssh.com
7: hmac-ripemd160-etm@openssh.com 8:hmac-sha1-96-
etm@openssh.com
9: hmac-md5-96-etm@openssh.com 10:hmac-md5
11: hmac-sha1 12:umac-64@openssh.com
13: umac-128@openssh.com 14:hmac-sha2-256
15: hmac-sha2-512 16:hmac-ripemd160
17: hmac-ripemd160@openssh.com 18:hmac-sha1-96
19: hmac-md5-96
All cipher_algorithms:
1: aes128-cbc 2:3des-cbc
3: blowfish-cbc 4:cast128-cbc
5: arcfour128 6:arcfour256
7: arcfour 8:aes192-cbc
9: aes256-cbc 10:rijndael-cbc@lysator.liu.se
11: aes128-ctr 12:aes192-ctr
13: aes256-ctr
All Kex_algorithms:
1: ecdh-sha2-nistp256 2:ecdh-sha2-nistp384
3: ecdh-sha2-nistp521 4:diffie-hellman-group-
exchange-sha256
5: diffie-hellman-group-exchange-sha1 6:diffie-hellman-group14-sha1
7: diffie-hellman-group1-sha1
3. Select the secure MACs algorithm for OpenSSH based on actual situations and press
Enter. It is recommended that 11 be entered.
NOTE
– The new algorithm will replace the previous OpenSSH algorithm, you need to ensure that the
new algorithm contains all the algorithms that OpenSSH needs to use. Otherwise, some
connected systems cannot connect to the U2000 server through OpenSSH.
– Before selecting a secure algorithm, ensure that the system interconnected to the U2000
supports this algorithm; otherwise, this system cannot connect to the U2000 server over
OpenSSH.
– If need support multi secure algorithms, select the number before the secure algorithms and
separate them with commas (,).
The command output is as follows:
Input Y or y to modify cipher_algorithms,otherwise,exit the modification of
cipher_algorithms.
5. Select the secure Ciphers algorithm for OpenSSH based on actual situations and press
Enter. It is recommended that 11,12,13 be entered.
NOTE
– The new algorithm will replace the previous OpenSSH algorithm, you need to ensure that the
new algorithm contains all the algorithms that OpenSSH needs to use. Otherwise, some
connected systems cannot connect to the U2000 server through OpenSSH.
– Before selecting a secure algorithm, ensure that the system interconnected to the U2000
supports this algorithm; otherwise, this system cannot connect to the U2000 server over
OpenSSH.
– If need support multi secure algorithms, select the number before the secure algorithms and
separate them with commas (,).
The command output is as follows:
Input Y or y to modify kex_algorithms,otherwise,exit the modification of
kex_algorithms.
:
7. Select the secure Kex algorithm for OpenSSH based on actual situations and press
Enter. It is recommended that 4 be entered.
NOTE
– The new algorithm will replace the previous OpenSSH algorithm, you need to ensure that the
new algorithm contains all the algorithms that OpenSSH needs to use. Otherwise, some
connected systems cannot connect to the U2000 server through OpenSSH.
– Before selecting a secure algorithm, ensure that the system interconnected to the U2000
supports this algorithm; otherwise, this system cannot connect to the U2000 server over
OpenSSH.
– If need support multi secure algorithms, select the number before the secure algorithms and
separate them with commas (,).
The command output is as follows:
Operation succeeded. Please restart Openssh for the settings to take effect.
Please input Y or y to restart OpenSSH,inputing others will exit directly and
no restart OpenSSH!
input :
NOTE
If the message "Restarting OpenSSH is successful." is displayed, the OpenSSH encryption
algorithm is successfully set.
----End
Question
How do I check downloaded software packages using HashMyFiles software?
Answer
Step 1 Obtain the MD5 code or SHA information that is used to check the downloaded software
package integrity.
l Download the iManager U2000 version MD5 CODE(English) file from http://
support.huawei.com/carrier. The iManager U2000 version MD5 CODE(English) file
contains MD5 code information after all software and document packages are
decompressed. Please contact a Huawei engineer to download the file.
– For carrier, log in to http://support.huawei.com/carrier. Search for U2000 and
select iManager U2000 in the search box on the Software tab. Then select a
desired version. Download the file in the Version Documentation column.
– For enterprise, log in to http://support.huawei.com/enterprise. Search for U2000
and select iManager U2000 in the search box on the Support tab. Then click
Documentation tab. Select a desired version and download the file.
NOTE
Take the following method to obtain the iManager U2000 version MD5 CODE(English) file. Only
Huawei engineers can download the file. If the customer requires using the file, please contact Huawei
engineers for help.
l The files in the ServiceCD of the Huawei RH series rack server are archived in Support
website. Perform the following operations to obtain the ISO files:
a. Log in to http://enterprise.huawei.com.
b. Choose Support > Server.
c. Choose Server Management Software > FusionServer Tools > Downloads >
V100R002C00 > V100R002C00SPC300.
d. Download the FusionServer Tools-ServiceCD2.0-V109.zip software packages.
e. Use the PGPverify to verify correctness of the software packages. For details, see
A.1.24 How Do I Verify Downloaded Software Packages Using the PGPVerify
Software.
l For other third-party software, obtain the MD5 code or SHA information from the
corresponding official websites.
Step 4 Choose Files > Add Folder from the main menu to access the Select Folder dialog box.
NOTE
You can also drag each local downloaded software package to the running window of the HashMyFiles.
Step 5 Select the folder in which the compression packages are stored and click OK.
Step 6 After uploading is complete, the MD5 code information of the local downloaded packages is
automatically generated. Choose View > HTML Report All Items to export the MD5 code
information and compare it with that in the MD5 code file obtained from Step 1.
Option Description
If the exported MD5 code information is the same as that in packages are correctly
the MD5 code file obtained from Step 1, downloaded.
If the exported MD5 code information is the different from download software
that in the MD5 code file obtained from Step 1, packets again.
----End
Question
How do I verify downloaded software packages using the PGPVerify software?
Answer
l Software packages and signature files correspond to each other and are stored in the
same directory. A software package corresponds to a signature file. Signature files are
released with products and their software packages.
l The extension of signature files is .asc. Generally, the names of signature files are the
same as the names of software packages. That is, when the software package name is
V200R016C60.zip, the corresponding signature file name is V200R016C60.zip.asc.
NOTE
The asc files will need to click the PGP after software packages to
download.
l Obtain the PGPVerify tool that is used to verify the completeness of downloaded
software packages and its public key file KEYS.
a. Download and decompress the PGPVerify tool.
n For carrier: visit http://support.huawei.com/carrier/digitalSignatureAction
to download the OpenPGP Signature Verification Guide package and
decompress it. Continue to decompress the VerificationTools.zip package in
the current folder.
n For enterprise: visit http://support.huawei.com/enterprise/en/tool/software-
digital-signature-validation-tool--pgp-verify--TL1000000054 to download
and decompress the VerificationTools.zip package.
b. Go to the VerificationTools folder that is generated after decompression and obtain
different versions of PGPVerify software for different OSs.
n Windows: PGPVerify.exe (in the Windows directory)
n Solaris: PGPVerify-sparc.tar.bz2 (in the solaris\PGPVerify TOOL directory)
n Linux: PGPVerify-x86_64.tar.gz (in the linux\X86\bit64\PGPVerify TOOL
directory)
c. On Solaris/Linux OSs, use SFTP as the root user to upload the obtained PGPverify
software and public key file KEYS to the server. For details about the SFTP transfer
method, see A.1.27 How to Use the FileZilla to Transfer Files by SFTP.
d. Windows OS supports GUI-based verification and CLI-based verification. Solaris
and Linux OSs support CLI-based verification only.
e. KEYS is the public key file.
l PGPVerify is a digital signature verification tool released by Huawei. Users can select
third-party openPGP verification tools based on actual needs.
Tool OS Tool Description
l D:\oss\ indicates the directory that stores the signature file. Change it based on site
requirements. The signature file and software package must be stored in the same
directory.
l To verify a single file, click Single Verify and select the file to be verified.
n The green item indicates passed verification, that is, [PASS].
n The yellow item indicates unsupported verification, that is, [WARN]. For
example, the signature file or software version does not exist.
n The red item indicates failed verification, that is, [FAIL].
If no "WARN" or "FAIL" character is displayed, the signature file is valid. All items
are displayed in green.
NOTICE
If a version has multiple signature files to be verified, the version is secure only
when the verification results of all files are "PASS". If the verification results
contain "WARN" or "FAIL", the verification is not passed and security risks exist.
In that event, re-download the software package.
NOTE
l Assume that the signature file and software package are stored in the D:\oss\ directory, and
the PGPVerify tool and public key file are stored in the C:\ directory.
l To verify a single file, run the C:\PGPVerify.exe" -k "C:\KEYS" -f "D:\oss
\V200R016C60.zip.asc command.
NOTE
In the preceding characters in bold, the RSA key ID is consistent with the public key ID. For a
certain file, if no "WARN" or "FAIL" character is contained in other information, the signature
file is valid.
NOTICE
If a version has multiple signature files to be verified, the version is secure only
when the verification results of all files are "PASS". If the verification results
contain "WARN" or "FAIL", the verification is not passed and security risks exist.
In that event, re-download the software package.
Solaris:
# cd /opt
# bzip2 -d PGPVerify-sparc.tar.bz2
# tar xvf PGPVerify-sparc.tar
Linux:
# cd /opt
# tar xvfz PGPVerify-x86_64.tar.gz
NOTE
To verify a single file, run the following commands:
# cd /opt
# ./PGPVerify -k KEYS -f install/plugins-cloudtask-C01.zip.asc
NOTE
In the preceding characters in bold, the RSA key ID is consistent with the public key ID. For a
certain file, if no "WARN" or "FAIL" character is contained in other information, the signature
file is valid.
NOTICE
If a version has multiple signature files to be verified, the version is secure only
when the verification results of all files are "PASS". If the verification results
contain "WARN" or "FAIL", the verification is not passed and security risks exist.
In that event, re-download the software package.
----End
NOTE
l Using the PuTTY or the server terminal window is recommended because local terminals that do not
support the character set configuration. For example, the CLI window of a Windows OS does not support
handling of garbled characters in a command output.
l If the ls command output contains garbled characters, the directory that contains the garbled characters is
created using another type of character set. After the character set is modified, the directory that contains
the garbled characters is normally displayed. Directories that do not contain garbled characters may
include garbled characters after the character set is modified. This does not affect operations on the
U2000. You need to pay attention only to the directory displayed in the current character set.
l If the length of displayed Chinese characters exceeds the CLI window width, garbled characters may
occur.
Answer
l Scenario 1: If you use PuTTY to fix the garbled characters, perform the following
operations to set the PuTTY character set.
a. Right-click on the PuTTY toolbar in the CLI window, choose Change Settings.
The PuTTY Reconfiguration window is displayed.
b. Choose Window > Translation to view the set from the Received data assumed
to be in which character set drop-down list.
NOTE
For PuTTY, a root user should use the Use font encoding character set, and an ossuser
should use the UTF-8 character set. If the current user uses the mapping character set but the
garbled characters are displayed, perform the following operations to modify the character se
l If the current character set is Use font encoding, change it to UTF-8.
l If the current character set is UTF-8, change it to Use font encoding.
l Scenario 3: If you fix the garbled characters using the server terminal window, perform
the following operations to modify the character set in the server terminal window:
Choose Terminal > Set Character Encoding in the server terminal window to view the
character set.
NOTE
For the SUSE Linux OS, a root user should use the GB2312 character set, and an ossuser should
use the Unicode(UTF-8) character set.
If the current user uses the mapping character set but the garbled characters are displayed, perform
the following operations to modify the character set:
For the SUSE Linux OS:
l If the current character set is GB2312, change it to Unicode(UTF-8).
l If the current character set is Unicode(UTF-8), change it to GB2312.
If the used OS has no mapping character set, choose Terminal > Set Character Encoding to add
the mapping character set and select it.
----End
Context
l You can run the rcntp status command as user root to check the running status of the
NTP service.
– If the command output contains running, the NTP service has started.
Checking for network time protocol daemon (NTPD):
running
NOTE
l If the NTP service has been started, port 123 corresponding to the service will also be
enabled. Run the netstat -an |grep 10.185.166.48:123 command to check whether port
123 used by the NTP service has been enabled on the current U2000 server.
10.185.166.48 is the ip address of the current U2000 server.
Information similar to the following is displayed means the port 123 has been enabled.
udp 0 0 10.185.166.48:123
0.0.0.0:* 5695/ntpd
l If no information displayed, means the port 123 has not been enabled. Run the service
ntp restart command to restart the NTP service and port 123 corresponding to the
service will also be enabled.
– If unused is displayed, the NTP service is not started.
Checking for network time protocol daemon (NTPD):
unused
NOTE
If the NTP service is not started, run the service ntp start command to start the NTP service.
l You can run the date command as user root.
– Check whether the medium-level NTP server time and the upper-level NTP
server time are the same.
– Check whether the NTP client time and the upper-level NTP server time are the
same.
If they are the same, the NTP service is in the normal state.
l In the ntpq -p command output, the remote field specifies the address of the reference
clock source. in the return message of the ntpq -p command is the IP address of the
reference time source. It indicates the status of the reference time source.
l The ntptrace command traces the entire NTP synchronization link from the local
machine to the NTP server at the highest level.
Procedure
Step 1 Log in to OS as user root.
Step 2 In a command line interface (CLI), run the ntpq -p command to view the NTP clock source.
Step 3 Run the ntptrace command to view the NTP synchronization link.
----End
Result
l If the server has been configured as the NTP server with the highest stratum, information
similar to the following is displayed.
# ntpq -p
remote refid st t when poll reach delay offset jitter
==============================================================================
LOCAL(0) .LOCL. 10 l 1 64 1 0.000 0.000 0.001
NOTE
l The preceding information indicates that the current server is the NTP server with the highest
stratum and is tracing the local time.
l The check of the NTP service takes about 5 minutes after the NTP server and NTP clients have
been started. In the ntpq -p command output, the remote field is not marked with an asterisk
(*). In the ntptrace command output, Timeout or Not Synchronized is displayed. Wait
5 minutes and then run the ntpq -p command or ntptrace command.
l If the server running on SUSE Linux is configured as the medium-level NTP server,
information similar to the following is displayed.
# ntpq -p
remote refid st t when poll reach delay offset jitter
==============================================================================
*10.71.224.140 .LOCL. 16 u - 64 0 0.000 0.000
0.000
+LOCAL(0) 10 l 6 64 1 0.000 0.000
0.001
# ntptrace
localhost: stratum 2, offset 0.000049, synch distance 0.02863
10.71.224.140: stratum 1, offset -0.001166, synch distance 0.01024
NOTE
l In the ntpq -p command output, *10.71.224.140 specifies that the IP address of the NTP
server on which the host performs time synchronization is 10.71.224.140. The asterisk (*)
indicates that the status is normal. The value in the st column indicates that 10.71.224.140 is at
stratum 1.
l In the ntptrace command output, localhost: stratum 2 specifies that the host is at
stratum 2, and the IP address of the host at the upper level is 10.71.224.140 at stratum 1.
l The check of the NTP service takes about 5 minutes after the NTP server and NTP clients have
been started. In the ntpq -p command output, the remote field is not marked with an asterisk
(*). In the ntptrace command output, Timeout or Not Synchronized is displayed. Wait
5 minutes and then run the ntpq -p command or ntptrace command.
l If the server running on SUSE Linux is configured as an NTP client, information similar
to the following is displayed.
# ntpq -p
remote refid st t when poll reach delay offset jitter
==============================================================================
*10.71.224.140 LOCAL(0) 2 u - 64 0 0.000 0.000
0.000
# ntptrace
localhost:stratum 3, offset 0.000035, sycnh distance 0.08855
10.71.224.140: stratum 2, offset 0.000224, synch distance 0.07860
10.161.94.212: stratum 1, offset 0.060569, synch distance 0.01036,
refid 'LCL'
NOTE
l In the ntpq -p command output, *10.71.224.140 specifies that the IP address of the NTP
server on which the host performs time synchronization is 10.71.224.140. The asterisk (*)
indicates that the status is normal. The value in the st column indicates that 10.71.224.140 is at
stratum 2.
l In the ntptrace command output, localhost: stratum 3 specifies that the host is at
stratum 3, the IP address of the host at stratum 2 is 10.71.224.140, and the IP address of the
host at stratum 1 is 10.161.94.212.
l The check of the NTP service takes about 5 minutes after the NTP server and NTP clients have
been started. In the ntpq -p command output, the remote field is not marked with an asterisk
(*). In the ntptrace command output, Timeout or Not Synchronized is displayed. Wait
5 minutes and then run the ntpq -p command or ntptrace command.
NOTE
l Before the U2000 is installed, use SFTP as the root user to transfer files.
l If the U2000 has been installed without security hardening, use SFTP as the ftpuser, ossuser, root
or another OS user to transfer files. This topic uses the root user as an example.
l If the U2000 has been installed with security hardening, use SFTP as the ftpuser user to upload files
to the /opt/backup/ftpboot directory under the root directory of the ftpuser user and then copy the
files to the specified directory. The operations of downloading files are similar.
Answer
Step 1 On a PC or laptop, double-click the shortcut icon of FileZilla client to open the FileZilla.
NOTE
You can go to http://filezilla-project.org to download the latest version of FileZilla. For more
information about software operation, see the software Help or go to the official website of the software
https://wiki.filezilla-project.org/Documentation for technical support.
6. Enter a user password in the Password text box, and ensure Remember password for
this session selected. Click OK.
Step 4 After the file is successfully uploaded, a success message is displayed, as shown in Figure
A-5.
----End
Answer
Step 1 Log in to the real-time desktop of a blade.
1. Logging in to the GUI of the MM910 management module.
2. Click KVM via MM. The Security Warning dialog box is displayed.
NOTE
– This step needs to be performed in an environment with JRE 1.7 or later installed.
– A 32-bit browser uses the 32-bit JRE, and a 64-bit browser uses the 64-bit JRE; otherwise, the
KVM window fails to be accessed through a browser.
– If the next page cannot be displayed on the Internet Explorer, switch to another browser or
close the current browser and log in to the controller card.
3. Click Yes. The blade management window is displayed.
– Private Mode allows only one user to access and perform operations on the server.
– Shared Mode allows two users to access and perform operations on the server simultaneously.
One user can view the operations performed by the other user.
Step 3 Perform the following operations to log in to the SUSE Linx GUI Desktop:
1. When the start window is displayed, move the cursor to Failsafe - SUSE Linux
Enterprise Server 11 SP3 - 3.0.101-0.47.105-default .
2. Press Esc. The Exiting… dialog box is displayed.
3. Press Tab to select OK and press Enter to enter the GRUB window.
4. Press c to enter the CLI window.
5. Enter the following commands that the system is started in CLI mode.
grub> root (hd0,0)
grub> cat /grub/menu.lst
grub> kernel /vmlinuz-3.0.101-0.47.105-default root=/dev/vg_root/lv_root
vga=0x314 3
grub> initrd /initrd-3.0.101-0.47.105-default
grub> boot
6. When the following information is displayed, enter the root user name and password to
log in to the operating system.
Float166251 login: root
Password:
4. Exit the Software Repositories window. Choose Software > Software Management to
enter the Software Management window.
5. Enter login into the text box on the Search tab. The list of related software packages will
be displayed in the right pane. Click the login software package to reinstall the login
service.
6. Run the following command to check runlevel. Ensure that its value is 5.
# cat /etc/inittab
The default runlevel is defined here
Id:5:initdefault:
----End
Answer
Step 1 Open the Internet Explorer and enter the IP address of the iMana/iBMC module in the address
bar. The iMana/iBMC login window is displayed.
NOTE
l Choose Tools > Internet option before logging in to the Huawei RH series rack server. Click the
Connection tab to clear settings of the proxy server of the Internet Explorer.
l The default IP of iMana/iBMC is 192.168.2.100. The subnet mask is 255.255.255.0. See A.2.2 How
to View the IP Address of the iMana/iBMC on the Huawei RH series rack server if the default
IP of iMana/iBMC changes.
Step 2 Enter the user name and the password of iMana/iBMC and click Log In.
NOTE
l If log in to the Huawei RH5885H V3 server through iBMC, display the following page:
l If log in to the Huawei RH2288H V3 server through iBMC, display the following page:
Step 3 Choose Remote Control from the navigation tree to open the remote control window. The
remote control window displays the KVM property and the virtual media property.
l If log in to the Huawei RH5885H V3 or Huawei RH2288H V2 server through iMana,
display the following page:
l If log in to the Huawei RH5885H V3 server through iBMC, display the following page:
l If log in to the Huawei RH2288H V3 server through iBMC, display the following page:
Step 4 Click Remote Virtual Console (shared mode) or Remote Virtual Console (private mode)
as required to enter the virtual console window.
l Remote Virtual Console (shared mode): Two users can log in to the remote virtual
console concurrently. The server responds to commands of each user.
l Remote Virtual Console (private mode): Only one user can log in to the remote virtual
console.
NOTE
----End
Question
How do I view the IP address of the iMana/iBMC on the Huawei RH series rack server?
Answer
Step 1 Install the KVM on the server.
Step 2 Press the power button on the server and restart the server.
Step 3 During server restart, press Delete until the BIOS configuration window is displayed.
NOTE
If a dialog box is displayed asking you to enter a password, enter the desired password and then press
Enter.
l If log in to the Huawei RH2288H V2 server through iMana, perform the following
operations:
a. Choose Advanced > IPMI BMC Configuration, and press Enter. The IPMI
BMC Configuration page is displayed.
b. Select BMC Configuration, and press Enter to access the BMC Configuration
window to view the IP address.
l If log in to the Huawei RH5885H V3 server through iBMC, perform the following
operations:
a. Choose Server Mgmt tab.
b. Choose BMC network configuration, and press Enter to access the BMC
network configuration window to view the IP address.
l If log in to the Huawei RH2288H V3 server through iBMC, perform the following
operations:
a. Choose Advanced > IPMI iBMC Configuration, and press Enter. The IPMI
iBMC Configuration page is displayed.
b. Select iBMC Configuration, and press Enter to access the iBMC Configuration
window to view the IP address.
----End
Question
How to modify the password of iMana user root?
Answer
Step 1 Open Internet Explorer. Enter the IP address of the iMana/iBMC module in the address bar.
The window for logging in to iMana is displayed.
NOTE
The default IP address of iMana/iBMC is 192.168.2.100. The subnet mask is 255.255.255.0. See A.2.2
How to View the IP Address of the iMana/iBMC on the Huawei RH series rack server if the default
IP of iMana/iBMC changes.
Step 2 Enter the user name and the password of iMana/iBMC and click Log In.
NOTE
l If log in to the Huawei RH5885H V3 server through iBMC, choose Config > Local
User from the navigation tree. Click corresponding to the root user.
l If log in to the Huawei RH2288H V3 server through iBMC, choose Config > User
Settings from the navigation tree. Click corresponding to the root user.
NOTE
Requirements on the user password are different when the function of checking the password complexity is
enabled or disabled:
l If the function is disabled, you can leave the password blank or enter a string whose length is shorter than
20 characters.
l If this function is enabled, the password must meet the following requirements:
– The password contains a minimum of 8 characters and a maximum of 20 characters.
– At least one space or one special character: `~!@#$%^&*()-_=+\|[{}];:'",<.>/?
– At least two of the following combinations: lowercase letters a to z, uppercase letters A to Z, and
digits 0 to 9.
– The password cannot be the same as the user name or the reverse of the user name.
l If log in to the Huawei RH5885H V3 or Huawei RH2288H V2 server through iMana,
the Modify User Information page is displayed. Enter the modification information and
click OK.
l If log in to the Huawei RH5885H V3 server through iBMC, enter the current password
for the root user in the Current User Password text box. Select You can change the
password only after selecting the check box. Enter the new password for the root user
in the Password and Confirm text boxes. Click Save.
l If log in to the Huawei RH2288H V3 server through iBMC, enter the current password
for the root user in the Current User Password text box. Select You can change the
password only after selecting the check box. Enter the new password for the root user
in the Password and Confirm text boxes. Click Save.
----End
Answer
The following problems may exist on the iMana/iBMC and you must take measures to these
problems:
No. Problem Solution
7 After the iMana/iBMC login window is Enter the iMana/iBMC address in the
accessed and login is not yet performed, address bar of the Internet Explorer to
the system automatically enters the re-open it.
window indicating a connection failure.
NOTE
l The Ethernet interfaces on an Huawei RH series rack server consist of integrated network interfaces
and extended network interfaces. The integrated network interfaces are recommended.
l An Huawei RH series rack server running SUSE Linux supports only the Broadcom and Intel
NICs.
Example 1: In Figure A-6, the mappings between the physical and logical network interfaces
for the Huawei RH2288H V2 server are described as follows:
l The Huawei RH2288H V2 server is integrated with one NIC. The associated logical
network interfaces on the integrated NIC are named eth0, eth1, eth2, and eth3.
l eth4, eth5, eth6, and eth7 are network interfaces on the extended NICs. The associated
logical network interfaces are named eth4, eth5, eth6, and eth7.
Figure A-6 Mappings between physical and logical network interfaces on the Huawei
RH2288H V2 server
Example 2: In Figure A-7, the mappings between the physical and logical network interfaces
for the Huawei RH5885H V3 server are described as follows:
l eth0, eth1, eth2, and eth3 are network interfaces on the integrated NIC. The associated
logical network interfaces are named eth0, eth1, eth2, and eth3.
l eth4, eth5, eth6, and eth7 are network interfaces on the extended NICs. The associated
logical network interfaces are named eth4, eth5, eth6, and eth7.
NOTE
The Huawei RH5885H V3 server supports twelve extended NICs with four interfaces. For the six NICs
on the right, the mapping logical interfaces from top down are: eth8 to eth11, eth4 to eth7, eth12 to
eth15, eth16 to eth19, eth20 to eth23, and eth24 to eth27. For the six NICs in the middle, the mapping
logical interfaces from top down are: eth28 to eth31, eth32 to eth35, eth36 to eth39, eth40 to eth43,
eth44 to eth47, and eth48 to eth51.
Figure A-7 Mappings between physical and logical network interfaces on the Huawei
RH5885H V3 server
Example 1: In Figure A-8, the mappings between the physical and logical network interfaces
for the Huawei RH2288H V3 server are described as follows:
l The Huawei RH2288H V3 server is integrated with one NIC. The associated logical
network interfaces on the integrated NIC are named eth0, eth1, eth2, and eth3.
l eth4, eth5, eth6, and eth7 are network interfaces on the extended NICs. The associated
logical network interfaces are named eth4, eth5, eth6, and eth7.
Figure A-8 Mappings between physical and logical network interfaces on the Huawei
RH2288H V3 server
Prerequisites
l If the disks are to be formatted in local mode, you must ensure that the server is
connected to the KVM.
l If the disks are to be formatted in remote mode, you must ensure that the following
preparations are ready:
– A PC or laptop on which the Internet Explorer browser is installed is ready.
– Internet Explorer browsers do not support a proxy server.
– The IP address of the iMana is available. For details about how to set the IP address
of the iMana, see 4.6.1.1 Configuring the iMana IP Address Through iMana
Management Interface (HUAWEI RH5885H V3 and HUAWEI RH2288H V2).
Procedure
Step 1 Start the server.
l In local mode, press the power button to restart the PC server.
l In remote mode, perform the following operations:
a. Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log
In to a Remote Huawei RH series rack server.
b. Click on the toolbar which is right above Remote Virtual Console and select
Cold Reset.
c. In the dialog box that is displayed, click Yes to restart the server.
Step 2 On Huawei RH5885H V3 server, ignore the following operations; If log in to the Huawei
RH2288H V2 server through iMana, perform the following operations:
1. When the BIOS start page appears, press Delete until the BIOS Setup Utility program is
started.
NOTE
If the BIOS password has been modified, a dialog box asking you to enter a password will be
displayed during startup. Enter the required password to access the Setup Utility application.
2. Choose Exit > Load Optimal Defaults, and press Enter.
3. In the Load Optimal Defaults? dialog box, click Yes and press Enter.
4. Choose Exit > Exit Saving Changes, and press Enter.
5. In the Exit Saving Changes? dialog box, click Yes and press Enter.
Step 3 After the basic input/output system (BIOS) check is completed, the BIOS information about
the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the screen. If
Ctrl+H is not pressed, restart the system.
Step 6 Click Configuration Wizard to access the RAID configuration wizard window, as shown in
the following figure.
NOTICE
After you select Clear Configuration, all RAID configurations will be deleted; as a result,
hard disk data will be damaged or lost. Check whether hard disk data can be deleted before
selecting Clear Configuration.
Step 8 Click Yes to clear the configuration, and return to the WebBIOS window.
After the initialization is complete, the WebBIOS window is displayed. As shown in the
following figure, the eight hard disks are used as an example.
Step 10 Click Exit to exit the WebBIOS window. The Exit Application dialog box is displayed.
Step 11 Click Yes, A dialog box is displayed.
a. Click on the toolbar which is right above Remote Virtual Console and select
Cold Reset.
b. In the dialog box that is displayed, click Yes to restart the server.
----End
Prerequisites
l If the disks are to be formatted in local mode, you must ensure that the server is
connected to the KVM.
l If the disks are to be formatted in remote mode, you must ensure that the following
preparations are ready:
– A PC or laptop on which the Internet Explorer browser is installed is ready.
– Internet Explorer browsers do not support a proxy server.
– The IP address of the iBMC is available. For details about how to set the IP address
of the iBMC, see 4.6.1.2 Configuring the iBMC IP Address Through iBMC
Management Interface(HUAWEI RH2288H V3 and HUAWEI RH5885H V3).
Procedure
Step 1 Start the server.
l In local mode, press the power button to restart the PC server.
l In remote mode, perform the following operations:
a. Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log
In to a Remote Huawei RH series rack server.
b. Click on the toolbar which is right above Remote Virtual Console and select
Reset or Forced System Reset.
c. In the dialog box that is displayed, click Yes to restart the server.
Step 2 After the basic input/output system (BIOS) check is completed, the BIOS information about
the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+R the moment you see Ctrl+R on the screen. If
Ctrl+R is not pressed, restart the system.
Step 4 Place the cursor over SAS3108 (Bus 0x01, Dev 0x00) by using up and down arrow keys and
press F2. The configuration tab is displayed.
Step 5 Select the Clear Configuration tab by using up and down arrow keys and press Enter. A
page asking whether to clear configurations is displayed.
NOTICE
Clear Configuration will clear the previous RAID configurations, resulting in data damage
or loss in hard disks. Therefore, before performing this operation, determine whether the data
in hard disks can be cleared.
Step 6 Select YES and press Enter. The following page is displayed after RAID configurations are
cleared.
a. Click on the toolbar which is right above Remote Virtual Console and select
Reset or Forced System Reset.
b. In the dialog box that is displayed, click Yes to restart the server.
----End
Prerequisites
l If the hard disk information is to be viewed in local mode, you must ensure that the
server is connected to the KVM.
l If the hard disk information is to be viewed in remote mode, you must ensure that the
following preparations are ready:
– A PC or laptop on which the Internet Explorer browser is installed is ready.
– Internet Explorer browsers do not support a proxy server.
– The IP address of the iMana is available. For details about how to set the IP address
of the iMana, see 4.6.1.1 Configuring the iMana IP Address Through iMana
Management Interface (HUAWEI RH5885H V3 and HUAWEI RH2288H V2).
Procedure
Step 1 Start the server.
l In local mode, press the power button to restart the PC server.
l In remote mode, perform the following operations:
a. Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log
In to a Remote Huawei RH series rack server.
b. Click on the toolbar which is right above Remote Virtual Console and select
Cold Reset.
c. In the dialog box that is displayed, click Yes to restart the server.
Step 2 After the basic input/output system (BIOS) check is completed, the BIOS information about
the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the screen. If
Ctrl+H is not pressed, restart the system.
Step 5 Click Physical View to access the Physical View window, as shown in the following figure.
NOTE
l In the navigation tree, the Physical View node automatically changes to Logical View.
l In the following example, RAID has not been configured for hard disks. The displayed information
displayed in the scenario where RAID has been configured is different from that in the scenario
where RAID has not been configured. Pay attention to only slot information in Physical View and
check whether the slot information meets the following conditions:
– IDs of eight slots from Slot: 0 to Slot: 7 are displayed.
– The description for every slot ID has three available options: Unconfigured Good, Online,
and Global Hot Spare.
If any two of the preceding three conditions are met, the eight hard disks on the server are available.
Otherwise, an unavailable hard disk exists on the server.
Step 6 Click Exit to exit the WebBIOS window. The Exit Application dialog box is displayed.
a. Click on the toolbar which is right above Remote Virtual Console and select
Cold Reset.
b. In the dialog box that is displayed, click Yes to restart the server.
----End
Prerequisites
l If the disks are to be formatted in local mode, you must ensure that the server is
connected to the KVM.
l If the disks are to be formatted in remote mode, you must ensure that the following
preparations are ready:
– A PC or laptop on which the Internet Explorer browser is installed is ready.
– Internet Explorer browsers do not support a proxy server.
– The IP address of the iBMC is available. For details about how to set the IP address
of the iBMC, see 4.6.1.2 Configuring the iBMC IP Address Through iBMC
Management Interface(HUAWEI RH2288H V3 and HUAWEI RH5885H V3).
Procedure
Step 1 Start the server.
l In local mode, press the power button to restart the PC server.
l In remote mode, perform the following operations:
a. Log in to the server. For details, see A.2.1 How Do I Use iMana/iBMC IP to Log
In to a Remote Huawei RH series rack server.
b. Click on the toolbar which is right above Remote Virtual Console and select
Reset or Forced System Reset.
c. In the dialog box that is displayed, click Yes to restart the server.
Step 2 After the basic input/output system (BIOS) check is completed, the BIOS information about
the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+R the moment you see Ctrl+R on the screen. If
Ctrl+R is not pressed, restart the system.
a. Click on the toolbar which is right above Remote Virtual Console and select
Reset or Forced System Reset.
b. In the dialog box that is displayed, click Yes to restart the server.
----End
Answer
Step 1 Download the patch package.
NOTE
The following uses Huawei RH5885H V3 server as an example (The method of downloading the patch
package and upgrading the firmware version for Huawei RH5885H V3 server is the same as that for
Huawei RH2288H V2 server):
1. Log in to http://support.huawei.com/carrier. Enter RH5885H V3 in the search box on
the Product Support to access the Search Results page.
2. Choose Carrier IT > Server > Fusion Server > Rack Server > RH5885H V3 from
Filter by Product in the navigation tree. Click Software to access the Software page.
3. Select the firmware upgrade package RH5885H V3-iMana-V722.zip to download it and
the mapping PGP file.
4. Use the PGPverify to verify correctness of the firmware upgrade package. For details,
see A.1.24 How Do I Verify Downloaded Software Packages Using the PGPVerify
Software.
5. Decompress the firmware upgrade package.
Step 2 Open the Internet Explorer of a PC. Enter the iMana IP address in the address bar to access
the iMana login page. Enter the user name and password to log in to the control card page.
Step 3 Choose Configuration > Firmware Upgrade to access the Firmware Upgrade page.
Step 4 On the Firmware Upgrade tab, click Browse of Upgrade File Name and select the local
directory where the firmware upgrade package is stored.
NOTE
The firmware upgrade package to be uploaded must be an *.hpm file.
Huawei RH2288H V3 server and Huawei RH5885H V3 server is so early that alarms fail to
be reported. A controller has to be closed during an upgrade.
Answer
Step 1 Download the patch package.
NOTE
The following uses Huawei RH2288H V3 server as an example (The method of downloading the patch
package and upgrading the firmware version for Huawei RH5885H V3 server is the same as that for
Huawei RH2288H V3 server server):
1. Log in to http://support.huawei.com/carrier. Enter RH2288H V3 in the search box on
the Product Support to access the Search Results page.
2. Choose Carrier IT > Server > Fusion Server > Rack Server > RH2288H V3 from
Filter by Product in the navigation tree. Click Software to access the Software page.
3. Select the firmware upgrade package RH2288H V3-iBMC-V206.zip to download it and
the mapping PGP file.
4. Use the PGPverify to verify correctness of the firmware upgrade package. For details,
see A.1.24 How Do I Verify Downloaded Software Packages Using the PGPVerify
Software.
5. Decompress the firmware upgrade package.
Step 2 Open the Internet Explorer of a PC. Enter the iMana IP address in the address bar to access
the iBMC login page. Enter the user name and password to log in to the control card page.
Step 3 Choose System > Firmware Upgrade to access the Firmware Upgrade page.
Step 4 On the Firmware Upgrade tab, click Browse of Upgrade File Name and select the local
directory where the firmware upgrade package is stored.
NOTE
The firmware upgrade package to be uploaded must be an *.hpm file.
Step 5 Set Select iBMC Boot Mode Used After the iBMC Firmware of the Target Version Is
Uploaded to Immediately restart automatically.
Step 6 Click Start Upgrade and click Yes. The system starts to upload the upgrade package to the
server and then starts to perform the upgrade.
After the upgrade is complete, the server automatically restarts.
----End
Answer
Step 1 On the Internet Explorer, choose Tools > Internet Options > Security > Trusted sites >
Sites, the Trusted sites dialog is displayed.
Step 2 Clear the selection of the Require server verification (https:) for all sites in this zone check
box.
Step 3 Add website address to the Add this website to the zone.
NOTE
If the Would you like to move it to the Trusted sites zone? dialog is displayed, click Yes.
The IE browser has different versions. Select the lowest level from the Reset to drop-down list.
----End
Answer
Step 1 Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar to
access the page for logging into the IMM.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 2 Enter an IMM user name and a password, and click Log In.
NOTE
Step 3 Click Remote Control, select Use the ActiveX Client > Start remote control in single-user
mode to access the remote control desktop.
NOTE
l When logging in to the IBM server for the first time, perform the following operations:
1. Click Start remote control in single-user mode and wait about 2 minutes. In the dialog box
asking you whether to install the IMM_KVMVM32.cab, click Install.
2. During the installation, click Run in the Warning-Security dialog box asking you whether to
trust this site.
l Do not close the ActiveX KVM Client dialog box. Otherwise, the Video Viewer dialog box cannot
be displayed.
l If the remote control desktop appears and then disappears immediately, see A.3.1 How to Solve the
Problem Where the Remote Control Desktop Appears and Then Disappears Immediately to
solve the problem.
l If Use the ActiveX Client is unavailable, just click Start remote control in single-user mode to
access the remote control desktop.
l Keep the default values of other parameters unchanged.
l For the IBM X3650 M4 server, if CAPS is displayed in the lower right corner of the Video Viewer
window, letters are entered in upper case; if CAPS is not displayed in the lower right corner of the
Video Viewer window, letters are entered in lower case. The Caps indicator on the keyboard cannot
indicate whether letters are entered in upper or lower case.
l For the IBM X3650 M4 server, if NUM is displayed in the lower right corner of the Video Viewer
window, digits can be entered; if NUM is not displayed in the lower right corner of the Video
Viewer window, digits cannot be entered. The Num indicator on the keyboard cannot indicate
whether the number keypad is available.
l If a message is displayed indicating that the application is prohibited to run, choose Start > Control
Panel and click Java. In the Java Control Panel dialog box, click the Security tab, Edit Site List,
and Add, enter an iMana/iBMC IP address, such as http://192.168.2.100, and click OK. Click OK,
restart the IE Explorer, and log in to iMana/iBMC again.
----End
Question
How do I use an IMM IP address to remotely log in to an IBM server?
Answer
Step 1 Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar to
access the page for logging into the IMM.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 2 Enter an IMM user name and a password, and click Login.
NOTE
Step 3 Click Continue to access the Integrated Management Module web page.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
Step 4 Enable remote control. Choose Tasks > Remote Control from the navigation tree. In the
right-hand pane, click Use the ActiveX Client with Microsoft Internet Explorer > Start
Remote Control in Single User Mode to access the remote control desktop.
The remote control desktop consists of two parts: virtual media window and desktop display
window.
NOTE
l When logging in to the IBM server for the first time, perform the following operations:
1. Click Start remote control in single-user mode and wait about 2 minutes. In the dialog box
asking you whether to install the IMM_KVMVM32.cab, click Install.
2. During the installation, click Run in the Warning-Security dialog box asking you whether to
trust this site.
l If the remote control desktop appears and then disappears immediately, see A.3.1 How to Solve the
Problem Where the Remote Control Desktop Appears and Then Disappears Immediately to
solve the problem.
l If Use the ActiveX Client with Microsoft Internet Explorer is unavailable, just click Start
Remote Control in Single User Mode to access the remote control desktop.
l Do not close the ActiveX KVM Client dialog box. Otherwise, the Video Viewer dialog box cannot
be displayed.
l If a message is displayed indicating that the application is prohibited to run, choose Start > Control
Panel and click Java. In the Java Control Panel dialog box, click the Security tab, Edit Site List,
and Add, enter an iMana/iBMC IP address, such as http://192.168.2.100, and click OK. Click OK,
restart the IE Explorer, and log in to iMana/iBMC again.
----End
Answer
Step 1 Install the KVM on the IBM server.
NOTE
A common monitor is enough.
Step 2 Press the power button of the IBM server to restart it.
Step 3 Wait about 1 minute after the IBM System X window is displayed. The <F1> Setup option is
displayed.
Step 5 Use arrow keys to select System Settings, and press Enter.
l For IBM X3650 M3 or IBM X3850 X5, show as follows:
Step 6 Use arrow keys to select Integrated Management Module, and press Enter.
l For IBM X3650 M3 or IBM X3850 X5, show as follows:
Step 7 Use arrow keys to select Network Configuration press Enter and access the page for
modifying the IMM IP address.
l For IBM X3850 X5, show as follows:
----End
Answer
Step 1 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 2 Enter an IMM user name and a password, and click Log In.
NOTE
Step 4 In the displayed User Accounts page, click Global Login Settings. Select Custom security
settings from Account security level, and set the Password expiration period (days)to 0
and other parameters to the maximum value. Then click OK.
Step 5 In the User Accounts page, click USERID.
Step 6 Enter a new password, such as Changeme_123, in Password. Enter the password again in
Confirm password. To ensure the security of the U2000, passwords must be complex
enough. For example, a password must contain eight or more characters of two types. The
allowed characters are digits, letters, and special characters. Remember to change passwords
regularly.
----End
Answer
Step 1 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
The default IP address of the IMM is 192.168.70.125 and the default subnet mask is 255.255.255.0. If
the default IP address of the IMM is changed, see A.3.4 How to View the IMM IP Address on the
IBM Server.
Step 2 Enter an IMM user name and a password, and click Login.
NOTE
Step 3 Click Continue to access the Integrated Management Module web page.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
Step 4 Choose Login Profiles from the navigation tree and click Global Login Settings. Select
Custom security settings from Account security level, and set the Maximum Password
Age to 0 and other parameters to the maximum value. Then click Save.
Step 5 Choose Login Profiles from the navigation tree and click USERID.
Step 6 Enter a new password, such as Changeme_123, in Password. To ensure the security of the
U2000, passwords must be complex enough. For example, a password must contain eight or
more characters of two types. The allowed characters are digits, letters, and special characters.
Remember to change passwords regularly.
Step 8 Click Save. A message indicating that the password will take effect is displayed. Click OK.
----End
Answer
The following problems may exist on the IMM and you must take measures to these
problems:
N Problem Solution
o
.
2 After the Video Viewer window is On the taskbar, right-click Video Viewer
minimized on the taskbar, the window and choose Close window from the
cannot be restored. shortcut menu to shut down the Video
Viewer window. Re-open the Video
Viewer window on the IMM page.
N Problem Solution
o
.
3 The Caps indicator on the keyboard is on, Two methods are available:
but the entered letter is a lower-case letter. l Press Caps Lock.
NOTE
l On the Video Viewer window, the
Caps indicator in the On state does not
mean that the letter entered is an
upper-case letter.
l For the IBM X3650 M4 server, if
CAPS is displayed in the lower right
corner of the Video Viewer window,
letters are entered in upper case; if
CAPS is not displayed in the lower
right corner of the Video Viewer
window, letters are entered in lower
case. The Caps indicator on the
keyboard cannot indicate whether
letters are entered in upper or lower
case.
l Shut down the Video Viewer window,
press Caps Lock, and open it again.
4 The Num indicator on the key board is on, Two methods are available:
but entering a number fails. l Press Num Lock.
NOTE
l On the Video Viewer window, the
Num indicator in the On state does not
mean that the number key works.
l For the IBM X3650 M4 server, if
NUM is displayed in the lower right
corner of the Video Viewer window,
digits can be entered; if NUM is not
displayed in the lower right corner of
the Video Viewer window, digits
cannot be entered. The Num indicator
on the keyboard cannot indicate
whether the number keypad is
available.
l Shut down the Video Viewer window,
press Num Lock. Open it again after
the Running ActiveX KVM Client
window is automatically closed.
5 Failure to open multiple Video Viewer Open one Video Viewer window on a PC
windows on a PC or laptop or the failure or laptop. Open the Video Viewer
that the Video Viewer window does not window on a PC or laptop for each server
respond. when you operate multiple servers.
l The Ethernet interfaces on an IBM server consist of integrated network interfaces and extended
network interfaces. The integrated network interfaces are recommended.
l An IBM server running SUSE Linux supports only the Broadcom and Intel NICs.
Example 1: In Figure A-9, the mappings between the physical and logical network interfaces
for the IBM X3650 M4 are described as follows:
l The IBM X3650 M4 is integrated with one NIC. The associated logical network
interfaces on the integrated NIC are named eth0, eth1, eth2, and eth3.
l eth4, eth5, eth6, and eth7 are network interfaces on the extended NICs. The associated
logical network interfaces are named eth4, eth5, eth6, and eth7.
Figure A-9 Mappings between physical and logical network interfaces on the IBM X3650
M4
Example 2: In Figure A-10, the mappings between the physical and logical network
interfaces for the IBM X3850 X5 are described as follows:
l eth0 and eth1 are network interfaces on the integrated NIC. The associated logical
network interfaces are named eth0 and eth1.
l eth2, eth3, eth4, eth5, eth6, and eth7 are network interfaces on the extended NICs. The
associated logical network interfaces are named eth2, eth3, eth4, eth5, eth6, and eth7.
Figure A-10 Mappings between physical and logical network interfaces on the IBM X3850
X5
Example 3: In Figure A-11, the mappings between the physical and logical network
interfaces for the IBM X3650 M3 are described as follows:
l The IBM X3650 M3 is integrated with two NICs. The NIC on the right is integrated NIC
1 and the NIC on the left is integrated NIC 2. The associated logical network interfaces
are named eth0, eth1, eth2, and eth3.
l eth4, eth5, eth6, and eth7 are network interfaces on the extended NICs. The associated
logical network interfaces are named eth4, eth5, eth6, and eth7.
Figure A-11 Mappings between physical and logical network interfaces on the IBM X3650
M3
Prerequisites
You must ensure that the server is connected to the KVM.
Context
NOTE
l The operation snapshots in this topic vary according to the IBM WebBIOS versions and do not
affect the RAID configuration. During the RAID configuration, use actual snapshots.
l If no window is displayed after you click a button during the configuration, move the mouse and try
again.
Procedure
Step 1 Start the IBM server. After the basic input/output system (BIOS) check is completed, the
BIOS information about the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the screen. If
Ctrl+H is not pressed, restart the system.
Step 4 Click Physical View to access the Physical View window, as shown in the following figure.
NOTE
l In the navigation tree, the Physical View node automatically changes to Logical View.
l In the following example, RAID has not been configured for hard disks. The displayed information
displayed in the scenario where RAID has been configured is different from that in the scenario
where RAID has not been configured. Pay attention to only slot information in Physical View and
check whether the slot information meets the following conditions:
– If configuring eight hard disks for the IBM server with standard delivery configurations, IDs
of eight slots from Slot: 0 to Slot: 7 are displayed. If configuring two hard disks for the IBM
server (X3850 X5) with standard delivery configurations, IDs of two slots from Slot: 0 to
Slot: 1 are displayed.
– The description for every slot ID has three available options: Unconfigured Good, Online,
and Global Hot Spare.
If any two of the preceding three conditions are met, all hard disks on the server are available.
Otherwise, an unavailable hard disk exists on the server. As shown in the following figure, the eight hard
disks are used as an example.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l The IMM IP address has been set.
Context
NOTE
l The operation snapshots in this topic vary according to the IBM WebBIOS versions and do not
affect the RAID configuration. During the RAID configuration, use actual snapshots.
l If no window is displayed after you click a button during the configuration, move the mouse and try
again.
Procedure
Step 1 Perform the following operations to access the RAID configuration window.
1. Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar
to access the page for logging into the IMM.
2. Enter an IMM user name and a password, and click Login.
NOTE
3. Click Remote Control and select Use the ActiveX Client > Start remote control in
single-user mode to access the remote control desktop.
NOTE
– When logging in to the IBM server for the first time, perform the following operations:
1. Click Start remote control in single-user mode and wait about 2 minutes. In the dialog
box asking you whether to install the IMM_KVMVM32.cab, click Install.
2. During the installation, click Run in the Warning-Security dialog box asking you
whether to trust this site.
– Do not close the ActiveX KVM Client dialog box. Otherwise, the Video Viewer dialog box
cannot be displayed.
– If the remote control desktop appears and then disappears immediately, see A.3.1 How to
Solve the Problem Where the Remote Control Desktop Appears and Then Disappears
Immediately to solve the problem.
– If Use the ActiveX Client is unavailable, just click Start remote control in single-user mode
to access the remote control desktop.
– Keep the default values of other parameters unchanged.
– For the IBM X3650 M4 server, if CAPS is displayed in the lower right corner of the Video
Viewer window, letters are entered in upper case; if CAPS is not displayed in the lower right
corner of the Video Viewer window, letters are entered in lower case. The Caps indicator on
the keyboard cannot indicate whether letters are entered in upper or lower case.
– For the IBM X3650 M4 server, if NUM is displayed in the lower right corner of the Video
Viewer window, digits can be entered; if NUM is not displayed in the lower right corner of the
Video Viewer window, digits cannot be entered. The Num indicator on the keyboard cannot
indicate whether the number keypad is available.
4. Choose Tools > Power > Reboot from the main menu to reboot the system.
NOTE
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the
screen. If Ctrl+H is not pressed, restart the system.
Two pointers will be displayed. You can choose Tools > Single Cursor from the main menu to
change to the single pointer mode. Select the pointer mode according to individual operation
habits.
To quit single pointer mode, press F12.
Step 2 Click Physical View to access the Physical View window, as shown in the following figure.
NOTE
l In the navigation tree, the Physical View node automatically changes to Logical View.
l In the following example, RAID has not been configured for hard disks. The displayed information
displayed in the scenario where RAID has been configured is different from that in the scenario
where RAID has not been configured. Pay attention to only slot information in Physical View and
check whether the slot information meets the following conditions:
– IDs of eight slots from Slot: 0 to Slot: 7 are displayed.
– The description for every slot ID has three available options: Unconfigured Good, Online,
and Global Hot Spare.
If any two of the preceding three conditions are met, the eight hard disks on the server are available.
Otherwise, an unavailable hard disk exists on the server.
Step 3 Click Exit to exit the WebBIOS window. The Exit Application dialog box is displayed,
asking you whether to exit.
Step 4 Click Yes and choose Tools > Power > Reboot to restart the server. It takes approximately 5
to 8 minutes to restart the system.
NOTE
If a message asking you whether to continue is displayed, click Yes.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l The IMM IP address has been set.
Context
NOTE
l The operation snapshots in this topic vary according to the IBM WebBIOS versions and do not
affect the RAID configuration. During the RAID configuration, use actual snapshots.
l If no window is displayed after you click a button during the configuration, move the mouse and try
again.
Procedure
Step 1 Perform the following operations to access the RAID configuration window.
1. Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar
to access the page for logging into the IMM.
2. Enter an IMM user name and a password, and click Login.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
4. Enable remote control. Choose Tasks > Remote Control from the navigation tree. In the
right-hand pane, click Use the ActiveX Client with Microsoft Internet Explorer >
Start Remote Control in Single User Mode to access the remote control desktop.
The remote control desktop consists of two parts: virtual media window and desktop
display window.
NOTE
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the
screen. If Ctrl+H is not pressed, restart the system.
Two pointers will be displayed. You can choose Tools > Single Cursor from the main menu to
change to the single pointer mode. Select the pointer mode according to individual operation
habits.
To quit single pointer mode, press F12.
Step 2 Click Physical View to access the Physical View window, as shown in the following figure.
NOTE
l In the navigation tree, the Physical View node automatically changes to Logical View.
l In the following example, RAID has not been configured for hard disks. The displayed information
displayed in the scenario where RAID has been configured is different from that in the scenario
where RAID has not been configured. Pay attention to only slot information in Physical View and
check whether the slot information meets the following conditions:
– If configuring eight hard disks for the IBM server with standard delivery configurations, IDs
of eight slots from Slot: 0 to Slot: 7 are displayed. If configuring two hard disks for the IBM
server (X3850 X5) with standard delivery configurations, IDs of two slots from Slot: 0 to
Slot: 1 are displayed.
– The description for every slot ID has three available options: Unconfigured Good, Online,
and Global Hot Spare.
If any two of the preceding three conditions are met, all hard disks on the server are available.
Otherwise, an unavailable hard disk exists on the server. As shown in the following figure, the eight hard
disks are used as an example.
Step 3 Click Exit to exit the WebBIOS window. The Exit Application dialog box is displayed,
asking you whether to exit.
Step 4 Click Yes and choose Tools > Power > Reboot to restart the server. It takes approximately 5
to 8 minutes to restart the system.
NOTE
If a message asking you whether to continue is displayed, click Yes.
----End
Prerequisites
You must ensure that the server is connected to the KVM.
Context
NOTE
l The operation snapshots in this topic vary according to the IBM WebBIOS versions and do not
affect the RAID configuration. During the RAID configuration, use actual snapshots.
l If no window is displayed after you click a button during the configuration, move the mouse and try
again.
Procedure
Step 1 After the server is restarted, press F1 to access the BIOS window as prompted.
Step 2 Select Load Default Settings to restore default settings. Press Enter. The following dialog
box is played.
Step 3 Select Boot Manager, press Enter, and then choose Add Boot Option.
Step 4 Optional: For IBM X3650 M3 or IBM X3850 X5, select Legacy Only. Press Enter.
Step 5 Optional: For IBM X3650 M4, select Generic Boot Option and then Legacy Only by arrow
keys. Press Enter.
Step 7 Select Change Boot Order. Press Enter. The following dialog box is played.
Step 8 Press Enter, and select Legacy Only using the arrow key ↓.
Step 9 Press Shift and + to set the startup precedence to Legacy Only.
Step 10 Press Enter. Select Commit Changes using the arrow keys and press Enter to save the
settings.
Step 11 Restart the server manually.
Step 12 After the basic input/output system (BIOS) check is completed, the BIOS information about
the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the screen. If
Ctrl+H is not pressed, restart the system.
Step 15 Click Configuration Wizard to access the RAID configuration wizard window, as shown in
the following figure.
NOTICE
After you select Clear Configuration, all RAID configurations will be deleted; as a result,
hard disk data will be damaged or lost. Check whether hard disk data can be deleted before
selecting Clear Configuration.
Step 17 Click Yes to clear the configuration, and return to the WebBIOS window.
After the initialization is complete, the WebBIOS window is displayed. As shown in the
following figure, the eight hard disks are used as an example.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l The IMM IP address has been set.
Context
NOTE
l The operation snapshots in this topic vary according to the IBM WebBIOS versions and do not
affect the RAID configuration. During the RAID configuration, use actual snapshots.
l If no window is displayed after you click a button during the configuration, move the mouse and try
again.
Procedure
Step 1 Perform the following operations to access the RAID configuration window.
1. Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar
to access the page for logging into the IMM.
2. Enter an IMM user name and a password, and click Login.
NOTE
3. Click Remote Control, select Use the ActiveX Client, and click Start remote control
in single-user mode to access the remote control desktop.
NOTE
– When logging in to the IBM server for the first time, perform the following operations:
1. Click Start remote control in single-user mode and wait about 2 minutes. In the dialog
box asking you whether to install the IMM_KVMVM32.cab, click Install.
2. During the installation, click Run in the Warning-Security dialog box asking you
whether to trust this site.
– Do not close the ActiveX KVM Client dialog box. Otherwise, the Video Viewer dialog box
cannot be displayed.
– If the remote control desktop appears and then disappears immediately, see A.3.1 How to
Solve the Problem Where the Remote Control Desktop Appears and Then Disappears
Immediately to solve the problem.
– If Use the ActiveX Client is unavailable, just click Start remote control in single-user mode
to access the remote control desktop.
– Keep the default values of other parameters unchanged.
– For the IBM X3650 M4 server, if CAPS is displayed in the lower right corner of the Video
Viewer window, letters are entered in upper case; if CAPS is not displayed in the lower right
corner of the Video Viewer window, letters are entered in lower case. The Caps indicator on
the keyboard cannot indicate whether letters are entered in upper or lower case.
– For the IBM X3650 M4 server, if NUM is displayed in the lower right corner of the Video
Viewer window, digits can be entered; if NUM is not displayed in the lower right corner of the
Video Viewer window, digits cannot be entered. The Num indicator on the keyboard cannot
indicate whether the number keypad is available.
4. Choose Tools > Power > Reboot from the main menu to reboot the system.
NOTE
8. Select Boot Manager and press Enter. Then select Add Boot Option and press Enter.
9. Select Generic Boot Option and then select Legacy Only by arrow key ↓. Press
Enter.
10. Press Esc to return to Boot Manager.
11. Press Esc twice to return to Boot Manager.
12. Select Change Boot Order. Press Enter. The following dialog box is played.
13. Press Enter, and select Legacy Only using the arrow key ↓.
14. Press Shift and + to set the startup precedence to Legacy Only.
15. Press Enter. Select Commit Changes using the arrow keys and press Enter to save the
settings.
16. Choose Tools > Power > Reboot from the main menu to reboot the system.
NOTE
– Wait about 5 minutes until BIOS information about the RAID is displayed. Do not perform
any operation when the IBM System X window is displayed.
– This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on
the screen. If Ctrl+H is not pressed, restart the system.
NOTE
Two pointers will be displayed. You can choose Tools > Single Cursor from the main menu to
change to the single pointer mode. Select the pointer mode according to individual operation
habits.
To quit single pointer mode, press F12.
Step 2 Click Configuration Wizard to access the RAID configuration wizard window, as shown in
the following figure.
NOTICE
After you select Clear Configuration, all RAID configurations will be deleted; as a result,
hard disk data will be damaged or lost. Check whether hard disk data can be deleted before
selecting Clear Configuration.
Step 4 Click Yes to clear the configuration, and return to the WebBIOS window.
NOTE
Use the default value, Redundancy when possible, for Redundancy.
5. Click Yes in the dialog box showing the message Are you sure you want to disable
data protection?.
6. Click Accept.
7. Click Yes to save RAID configurations.
8. Click Yes in the dialog box showing the message All data on the new Virtual Drivers
will be lost. Want to Initialize? to initialize RAID configurations.
9. Click Home to return to the WebBIOS window.
The following figure shows the WebBIOS window after the initialization is complete.
Step 6 Click Exit to exit the WebBIOS window. The Exit Application dialog box is displayed,
asking you whether to exit.
Step 7 Click Yes, and the following window is displayed.
Step 8 Choose Tools > Power > Reboot to restart the server. It takes approximately 5 to 8 minutes to
restart the system.
NOTE
If a message asking you whether to continue is displayed, click Yes.
----End
Prerequisites
l A PC or laptop on which the Internet Explorer browser is installed is ready.
l Internet Explorer browsers do not support a proxy server.
l The IMM IP address has been set.
Context
NOTE
l The operation snapshots in this topic vary according to the IBM WebBIOS versions and do not
affect the RAID configuration. During the RAID configuration, use actual snapshots.
l If no window is displayed after you click a button during the configuration, move the mouse and try
again.
Procedure
Step 1 Perform the following operations to access the RAID configuration window.
1. Open the Internet Explorer and enter the IMM IP address of the IMM in the address bar
to access the page for logging into the IMM.
2. Enter an IMM user name and a password, and click Login.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
4. Enable remote control. Choose Tasks > Remote Control from the navigation tree. In the
right-hand pane, select Use the ActiveX Client with Microsoft Internet Explorer and
click Start Remote Control in Single User Mode to access the remote control desktop.
The remote control desktop consists of two parts: virtual media window and desktop
display window.
NOTE
NOTE
9. Select Boot Manager and press Enter. Then select Add Boot Option and press Enter.
10. Select Legacy Only. Press Enter.
11. Press Esc to return to Boot Manager.
12. Select Change Boot Order. Press Enter. The following dialog box is played.
13. Press Enter, and select Legacy Only using the arrow key ↓.
14. Press Shift and + to set the startup precedence to Legacy Only.
15. Press Enter. Select Commit Changes using the arrow keys and press Enter to save the
settings.
16. Choose Tools > Power > Reboot from the main menu to reboot the system.
NOTE
17. After the basic input/output system (BIOS) check is completed, the BIOS information
about the RAID is displayed, as shown in the following figure.
NOTE
This screen stays for a short period of time. Press Ctrl+H the moment you see Ctrl+H on the
screen. If Ctrl+H is not pressed, restart the system.
Two pointers will be displayed. You can choose Tools > Single Cursor from the main menu to
change to the single pointer mode. Select the pointer mode according to individual operation
habits.
To quit single pointer mode, press F12.
Step 2 Click Configuration Wizard to access the RAID configuration wizard window, as shown in
the following figure.
NOTICE
After you select Clear Configuration, all RAID configurations will be deleted; as a result,
hard disk data will be damaged or lost. Check whether hard disk data can be deleted before
selecting Clear Configuration.
Step 4 Click Yes to clear the configuration, and return to the WebBIOS window.
Step 6 Click Exit to exit the WebBIOS window. The Exit Confirmation dialog box is displayed,
asking you whether to exit.
Step 7 Click Yes, and the following window is displayed.
Step 8 Choose Tools > Power > Reboot to restart the server. It takes approximately 5 to 8 minutes to
restart the system.
NOTE
If a message asking you whether to continue is displayed, click Yes.
----End
Question
The HTTPS is recommended for remotely accessing the server to ensure system security.
How do I configure the HTTPS on the IMM?
Answer
Step 1 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
The default IP address of the IMM is 192.168.70.125. If the default IP address of the IMM has been
changed, see A.3.4 How to View the IMM IP Address on the IBM Server.
Step 2 Enter an IMM user name and a password, and click Log In.
NOTE
Step 3 Click IMM Management > Security. Ensure that the value of HTTPS Server certificate
status is A signed certificate is installed. As shown in the following figure.
If the value of HTTPS Server certificate status is not A signed certificate is installed,
perform the following operations to install SSL authentication:
1. Click Generate a New Key and a Self-signed Certificate.
2. Set the related parameters in Generate New Key and Self-signed Certificate dialog
box.
NOTE
– Set parameters in the Required SSL Certificate Data area as prompted. The following figure
shows examples of the parameter settings.
– The Optional SSL Certificate Data parameter does not need to be set.
3. Click OK. After automatic authentication is complete, the value of HTTPS Server
certificate status changes to A signed certificate is installed.
Step 4 Ensure that Enabled HTTPS server is selected. As shown in the following figure.
NOTE
l During restart of the IMM, run the ping IMM IP address -t command on the CLI of the PC or
laptop. If the IMM IP address can be pinged through, the IMM is successfully restarted. Restarting
IMM takes about 3 minutes.
l If HTTPS needs to be disabled and HTTP needs to be used, clear the selection of the select Enabled
HTTPS server. Then execute Step 4.2 through Step 4.3.
Step 5 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
If a security certificate error is displayed when HTTPS is used for web page access, ignore it and
continue the operation.
----End
Question
The HTTPS is recommended for remotely accessing the server to ensure system security.
How do I configure the HTTPS on the IMM?
Answer
Step 1 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
The default IP address of the IMM is 192.168.70.125. If the default IP address of the IMM has been
changed, see A.3.4 How to View the IMM IP Address on the IBM Server.
Step 2 Enter an IMM user name and a password, and click Login.
NOTE
Step 3 Click Continue to access the Integrated Management Module web page.
NOTE
You do not need to set Inactive session timeout value. Keep the default value no timeout.
Step 4 Choose Security from the navigation tree. Ensure that the value of HTTPS Server
certificate status is A self-signed Certificate is installed.
If the value of HTTPS Server certificate status is not A self-signed Certificate is installed,
perform the following operations to install SSL authentication:
1. Click Generate a New Key and a Self-signed Certificate.
2. Set the related parameters.
NOTE
– Set parameters in the Certificate Data area as prompted. The following figure shows
examples of the parameter settings.
– The Optional Certificate Data parameter does not need to be set.
If the value of HTTPS Server is not Enabled, perform the following operations:
1. Select Enabled from the HTTPS Server drop-down list.
2. Click Save. A message asking you to restart the IMM is displayed.
3. Click OK.
4. Choose Restart IMM from the navigation tree.
5. On the Restart IMM page, click Restart. A message indicating that the IMM will be
restarted is displayed.
6. Click OK. A message asking you to shut down the Internet Explorer or tabs is displayed.
7. Click Yes.
NOTE
l During restart of the IMM, run the ping IMM IP address -t command on the CLI of the PC or
laptop. If the IMM IP address can be pinged through, the IMM is successfully restarted. Restarting
IMM takes about 3 minutes.
l If HTTPS needs to be disabled and HTTP needs to be used, select Disabled from the HTTPS
Server drop-down list. Then execute Step 5.2 through Step 5.7.
Step 6 Enter the default IMM IP address on the Internet Explorer of the PC to access the IMM Web
login window.
NOTE
If a security certificate error is displayed when HTTPS is used for web page access, ignore it and
continue the operation.
----End
Question
How do I disable the Sybase database service?
Answer
Step 1 Perform the following operations to disable the Sybase database service in the single-server
system:
1. Log in to the OS as user ossuser.
2. Run the following commands to disable the Sybase database service:
# su - dbuser
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
3. Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root 9629 14603 0 07:46:52 pts/3 0:00 grep sybase
----End
Question
How do I start the Sybase database service?
Answer
l Perform the following operations to start the Sybase database service in the single-server
system:
a. Log in to the OS as user ossuser.
b. Run the following commands to start the Sybase database service:
# su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
c. Run the following command to check whether the Sybase database service is
running:
$ ./showserver
NOTE
----End
Question
How do I verify that the Sybase database is running?
Answer
Step 1 Log in to the OS as user ossuser.
Step 2 Enter the CLI and run the following commands to check the Sybase process status:
# su - dbuser
$ cd /opt/sybase/ASE*/install
$ ./showserver
NOTE
----End
A.4.2.1 How to Verify That the Sybase Database Has Been Installed
Question
How do I verify that the Sybase database has been installed?
Answer
NOTE
l The Sybase database will be automatically installed when the U2000 is installed if the Sybase
database does not exist on the system.
l If the Sybase database exists on the system, a dialog box will be displayed asking you whether or not
you want to reuse the Sybase database. There is no need to reinstall the Sybase database if it is
reused (saves time, but not recommended).
l Consult with the computer administrator to see if the Sybase database has been installed.
l Verify that the installation directory and file of the Sybase database exist. A sample
directory is /opt/sybase.
l Verify that the version of the Sybase database is correct. For details, see A.4.2.2 How to
Check the Sybase Database Version.
l Verify that the Sybase database is running. For details, see A.4.1.3 How to Verify That
the Sybase Database Is Running. For details about how to start the Sybase database,
see A.4.1.2 How to Start the Sybase Database Service.
----End
Question
How do I perform the required check on the Sybase database version to see if it is correct
after the Sybase database is installed?
Answer
Step 1 Log in to the OS as user dbuser.
NOTE
NOTE
Step 3 Run the following commands to check the Sybase database version:
2> go
2> go
NOTE
There must be a space between select and @ in the select @@version command.
(1 row affected)
The preceding message indicates that Sybase database version is SYBASE 15.7.
NOTE
EBF 26397 indicates the latest Sybase patch. The earlier Sybase patches are not displayed.
----End
Question
How do I view the server name of the Sybase database?
Answer
Step 1 Log in to the OS as user dbuser.
NOTE
Step 2 Run the following command to view the server name of the Sybase database:
$ more /opt/sybase/interfaces
DBSVR_back
master tcp ether 10.71.225.89 4200
query tcp ether 10.71.225.89 4200
master tcp ether 10.71.225.89 4200
query tcp ether 10.71.225.89 4200
master tcp ether 127.0.0.1 4200
query tcp ether 127.0.0.1 4200
----End
A.4.2.4 How to Change the sa User Password for the Sybase Database If the
U2000 Is Not Installed
Question
How to change the sa user password for the Sybase database if the U2000 is not installed?
Answer
Step 1 Log in to the OS as user dbuser.
NOTE
NOTE
Step 3 Run the following commands to change the sa user password for the Sybase database:
2> go
NOTICE
l Be sure to remember the password of user sa. If this password is missed, database-related
operations may fail to be performed.
l The database sa user password must meet the following requirements, please set the new
password as required:
– The password contains a minimum of eight characters and a maximum of 30
characters.
– The password must contain at least four of the following combinations:
n At least one lower-case letter
n At least one upper-case letter
n At least one digit
n At least one special character ~@#^*-_+[{}]:./?
Other special characters are not supported. Do not include other special
characters, such as ()|<>&`!$\"%'=;,space in passwords.
– The password must be different from the user name or the user name in reverse order
and cannot contain the complete user name (case-insensitive).
l Leave a space between sp_password and old password.
l The "new password" and "old password" must be marked with double quotation marks
during password modification.
----End
A.4.2.5 How to Change the Database Administrator Password for the Sybase
Database If the U2000 Is Installed
Question
How to change the database administrator user password for the Sybase database if the U2000
is installed?
NOTICE
l After the U2000 is installed, using the MSuite to change the password of the database
administrator is recommended. Do not manually change the password. Otherwise, the
U2000 may fail to be started properly. If the password of the database administrator is
changed manually, you must use the MSuite to change the password again to ensure the
normal operation of the U2000.
Answer
Step 1 Shut down the NMS server and client.
Log in to the system as user ossuser and run the following commands to end the U2000
processes:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
Step 2 Ensure that the MSuite servers on the primary and secondary sites have been started.
Run the following command as the root user to check whether the MSuite servers are started:
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
# ps -ef | grep java
A message similar to the following will be displayed in the SUSE Linux system:
...
root 7593 7130 0 06:31 pts/7 00:00:00 grep java
ossuser 8937 12803 0 04:13 pts/8 00:00:42 /opt/oss/OSSJRE/jre_linux/bin/
java -Dprocname=AgentIntegrate -Dfile.encoding=UTF8 -Xmx1024m -
XX:MetaspaceSize=16m -XX:MaxMetaspaceSize=256m -XX:+UseCompressedClassPointers -
XX:+UseCompressedOops -XX:CompressedClassSpaceSize=128m -XX:
+HeapDumpOnOutOfMemoryError -DabsCfgPath=/opt/oss/server/etc/oss_cfg/frame -cp
nbi/agentintegrate/thirdparty/*:3rdlib/*:common/uflightdispatcher/lib/
jdom.jar:cbb/qasn/lib/*:common/uflight/frame_app/plugins/
com.huawei.uflight.platformadapter/*:common/uflight/web_app/plugins/pax-web-
runtime-2.1.2.jar:common/uflight/web_app/plugins/web_app/plugins/pax-web-
spi-2.1.2.jar:nbi/agentintegrate/lib/*:nbi/agentintegrate/bin/*
com.huawei.u2000.inventory.webserver.JettyStarter
...
NOTE
If the displayed information contains /opt/oss/OSSJRE/jre_linux/bin/java -server, the MSuite servers have
been started.
If the MSuite servers have not been started, switch to the ossuser and run the following
commands as the root user to start the MSuite servers:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./startserver.sh
Step 4 On the MSuite client, choose Deploy > Change Database Administrator Password. The
Change Password dialog box is displayed.
Step 5 Enter the old password, new password and confirm password.
NOTE
l The initial password is Changeme_123. To enhance system security, you need to regularly update
the password and keep it well.
– The password contains a minimum of eight characters and a maximum of 30 characters.
– The password must contain at least four of the following combinations:
n At least one lower-case letter
n At least one upper-case letter
n At least one digit
n At least one special character ~@#^*-_+[{}]:./?
Other special characters are not supported. Do not include other special characters, such
as ()|<>&`!$\"%'=;,space in passwords.
– The password must be different from the user name or the user name in reverse order and
cannot contain the complete user name (case-insensitive).
l If the Change Password dialog box is displayed, click OK.
----End
Question
How do I view the bit number of the Sybase database?
Answer
Step 1 Log in to the OS as user dbuser.
NOTE
NOTE
Step 3 Run the following commands to view the bit number of the Sybase database:
1> select @@version
2> go
NOTE
There must be a space between select and @ in the select @@version command.
(1 row affected)
----End
Question
How do I view the details about the Sybase database during routine maintenance?
Answer
Step 1 Log in to the OS as user dbuser.
NOTE
Step 2 Run the following commands to view the details of all databases:
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
1> sp_helpdb
2> go
The information about the Sybase database will be displayed, including the name, size, owner,
and status.
Step 3 Run the following commands to view the details of a specific database:
2> go
NOTE
In the sp_helpdb database_name command, database_name is the name of the Sybase database.
----End
Prerequisites
l The database administrator sa has exited from the connection.
l The MSuite is stopped. For details about how to end processes on the MSuite server, see
How to End Processes on the How to End Processes on the MSuite Server.
l The U2000 is stopped. For details about how to check whether the U2000 is stopped, see
E.1 Stopping the U2000 Server Processes.
l The database is started. For details about how to check whether the database is started,
see D.2 Starting the Database.
Context
l To reduce the probability of security threats, you can disable the database administrator,
create a new database user to replace the database administrator, and assign the new user
with the same permissions as the database administrator.
l You can only manually disable the sa user and create a replacement user for the sa user
only after the U2000 is installed or upgraded.
Procedure
Step 1 Log in to the server as the root user.
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root command
and enter the root user password to switch to the root user.
Step 2 Perform the following operations to disable the sa user and create a new user to replace the sa
user.
1. Run the following commands to disable the sa user and create a new administrator:
# cd /opt/oss/engr/engineering/tool/modifyDBAUser/
# ./modifyDBAUser.sh
NOTE
The /opt/oss directory is the U2000 installation directory.
Information similar to the following is displayed:
Please enter old database administrator account:
– The dbadmin user is used as an example of the new administrator of the database. The
administrator name can be customized as required. The customized user name must start with
a letter and can contain lower-case letters, digits, and special character _. The length of the
customized user name must be less than 17 characters.
– If the created user dbadmin already exists, this command assigns permissions to the new
database administrator. If the new password is different from the old password, the user
password is reset.
Information similar to the following is displayed:
Please enter password of new database administrator account:
Please confirm password of new database administrator account:
6. Input yes.
If the following information is displayed, the replacement user for the sa user is created
successfully.
The command is executed successfully.
Success to modify dba user.
NOTE
If the information Success to modify dba user. is displayed, the automatic database growth parameter
is set successfully.
----End
Result
Check whether the replacement user for the sa user is successful.
1. Log in to the server as the dbuser user.
2. In the CLI, run the following commands to check whether the sa user is disabled.
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
Password:
3. In the CLI, run the following commands to check whether the dbadmin user is created
successfully:
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Udbadmin
If information similar to the following is displayed, enter the password of the dbadmin
user.
Password:
If the database can be connected properly, the dbadmin user is created successfully.
Follow-up Procedure
If the database administrator sa needs to be restored, refer to the preceding operations to
disable the existing database administrator and use the sa user as the new database
administrator.
NOTICE
l Enter the existing database administrator name (such as dbadmin) and password and then
the database administrator name sa and the password to be restored.
l The password of the database administrator sa to be restored is the one that is not disabled.
The password cannot be set randomly.
Answer
It must meet the following requirements for starting the NMS maintenance suite client:
l The MSuite server must be started.
l Port 12212 on the MSuite server is enabled.
l The MSuite client and the server communicate with each other properly.
1. Ensure that the MSuite server has been started.
In SUSE Linux OS, run the following command as user root to verify that the MSuite
server is running:
2. On a computer where the MSuite client is installed, double-click the U2000 NMS
Maintenance Suite shortcut icon on the desktop and then wait about one minute. The
Login dialog box is displayed.
NOTE
l In Solaris or SUSE Linux OS, log in to the Java desktop system as user ossuser. Otherwise,
the U2000 NMS Maintenance Suite shortcut icon is not displayed on the desktop. To start the
MSuite Client by running commands, log in to the OS as user ossuser through VNC.
$ cd /opt/oss/client/engineering
$ ./startclient.sh
l If a dialog box showing The client and server versions are different. Upgrade the client
using the CAU. is displayed, the method of upgrading the U2000 client by using the CAU is
as follow:
1. Install the U2000 client software in network mode: Enter https://server's IP address/cau/
(recommended for higher security) or http://server's IP address/cau/ in the address box of
the Internet Explorer, and press Enter to access the Web installation page. For details, see
Installing a U2000 Client in CAU ModeInstalling a U2000 Client in CAU Mode in the
U2000 Client Software Installation Guide.
2. If you upgrade the U2000 client software using the CAU, the MSuite client is also
upgraded.
3. Set the login parameters.
– IP Address:
n To log in to the local MSuite server, use the default IP address 127.0.0.1.
n To log in to the remote MSuite server, enter the IP address of the computer
where the MSuite server is installed. If multiple IP addresses are configured
for the computer, use the NMS application IP address.
NOTE
The Login dialog box of the MSuite client has the function to keep the login list. Selecting
an IP address from the IP Address drop-down list is recommended. If the desired IP address
is not displayed in the drop-down list, enter an IP address.
– Port: The default port ID is 12212. There is no need to change the default value
during login but ensure that the port is not occupied.
– User Name: The default user name is admin.
– Password: The initial password of the admin user is Changeme_123. The
password must be changed during the first login to ensure system security. Keep the
password confidential and change it regularly.
4. Click Login.
NOTE
l When you log in to the MSuite client, a progress bar is displayed showing the progress of Refresh
Deployment Information. Wait until the operation is complete.
l The MSuite works in single-user mode. Specifically, only one MSuite client can log in to the
MSuite at one time.
Question
How do I end processes on the NMS maintenance suite server?
Answer
Run the following commands as the ossuser user:
$ cd /opt/oss/engr/engineering
$ ./stopserver.sh
Prerequisites
MSuite processes are running. If they are not running, start them by following the steps
provided in A.5.4 Starting the Process of the MSuite Server.
Procedure
Step 1 Log in to the MSuite client.
Step 2 On the MSuite client, choose System > Change Password from the main menu. The Change
Password dialog box is displayed.
----End
NOTE
Context
Generally, the process of the MSuite server is not started with the OS startup. If the process is
not started, perform the following operations to start it.
Procedure
l Run the following command as user ossuser to verify that the MSuite server is running:
$ ps -ef | grep java
----End
Answer
Step 1 Log in to the server as user ossuser.
Step 2 Check the U2000 processes.
Run the following command to check whether the U2000 is running:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
----End
Answer
Step 1 Log in to the server as user ossuser.
Step 2 Ensure that the U2000 is running.
Run the following command to check whether the U2000 is running:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
----End
Answer
Step 1 Log in to the server as user ossuser.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
If the U2000 is still running, run the following commands to stop it:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
----End
Answer
In the single-server system: The U2000 is installed based on the bill of material (BOM).
l If the U2000 license BOM is available, the U2000 needs to be installed according to the
license BOM. Technical support engineers should change the IP address, install the
license on the U2000, and then use the U2000.
l If the U2000 license BOM is unavailable, only the OS needs to be installed.
Answer
Prepare installation packages according to the U2000 installation scheme.
SUSE Linux OS You can install the SUSE Linux OS by using the quick installation
DVD.
Quick installation DVD:
U2000version_server_os_sles11_x64_dvd1
Quick RAID You can configure RAID by using the quick RAID configuration
configuration DVD DVD.
Quick RAID configuration DVD: Sles_server_raid_x64_dvd1
Answer
Step 1 Log in to the OS on the U2000 server as ossuser user and do as follows to query the
communication mode in use:
$ ssl_adm -cmd query
Step 3 Set the communication mode for the U2000 server and client.
$ ssl_adm -cmd setmode mode parameter
NOTE
The available options for mode parameter are common, ssl, and both.
l common: common mode. If mode parameter is set to common, the U2000 server and client can
communicate only in common mode, and http protocol must be used to download the U2000 client
in CAU mode.
l ssl: security mode. If mode parameter is set to ssl, the U2000 server and client can communicate
only in security mode, and https protocol must be used to download the U2000 client in CAU
mode. The security mode is recommended to ensure security for communication between the
U2000 server and client.
l both: indicates that the U2000 server and client can communicate with each other in either
common or SSL mode.
NOTE
You can ignore messages displayed before this message because they do not affect the operation result.
Step 4 If you need to install the client in CAU mode after the server communication mode is set, you
must perform the following operations as the ossuser user:
$ cd /opt/oss/cau/bin
$ bash cau.sh
----End
Answer
The encoding format of the U2000 license file must be UNIX, not DOS.
l If the SUSE Linux OS is used, perform the following operations to confirm the encoding
format of the U2000 license file:
a. Log in to the OS as the root user.
b. Run the cd License file save path command to access the path where the license file
is stored.
c. Run the vi License file name.dat command to open the U2000 license file.
For example, assume that the U2000 license file name is license.dat, run the vi
license.dat command.
n If dos is contained in the last line of the window for viewing license.dat, for
example,
"license.dat" [noeol][dos] 163L, 13496C
The file is in the DOS format. Run the :q command and press Enter to exit
from the vi command. Then run the following command to change the format
of the U2000 license file from DOS to UNIX.
# dos2unix license.dat license.dat
n If dos is not displayed in the last line of the license.dat file, for example,
"license.dat" [noeol] 163L, 13496C
The file is in the UNIX format.
----End
NOTE
Answer
Step 1 Run the following command to connect to the server by means of FTP:
ftp server IP address
Enter the user name and password of the server.
Step 2 Set the FTP transfer mode.
l To use the ASCII mode, run the ascii command.
l To use the binary mode, run the bin command.
Step 3 Go to the path to files to be transferred.
lcd path of files to be transferred
Step 4 Go to the path where the files are to be transferred.
cd path to which the files are to be transferred
Step 5 Optional: Run the hash command to view the file uploading progress.
hash
Step 6 Run the following put command to transfer files:
put names of files to be transferred
Step 7 After the files are transferred, run the quit command to break the FTP connection.
----End
Answer
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to query the database user ID and U2000 user ID in the system:
l Run the following command to check whether a database user ID exists in the system.
800 specifies a database user ID.
# grep x:800: /etc/passwd
l Run the following command to check whether a U2000 user ID exists in the system. 900
specifies a U2000 user ID.
# grep x:900: /etc/passwd
Step 3 If no command output is displayed, the current system does not use any U2000 user ID. If a
command output is displayed, the current system uses a U2000 user ID, and the installation of
the U2000 may fail. Perform the following operations to back up the user ID and then delete
it. The testuser user ID is used as an example.
Run the following command to query the ID of the testuser user:
# id testuser
NOTICE
If the user is a login user, the execution of the userdel command fails to delete the user. A
message will be displayed indicating that the user is being used.
Step 4 After the U2000 is installed, create the user and restore the backup user data.
In system, create a new user named testuser. The testuser user belongs to the testgroup user
group.
# useradd -g testgroup testuser
----End
Prerequisites
l The desired ISO file is obtained.
l The DVD recorder has been installed on a Windows PC.
l The burning software has been obtained and installed.
NOTE
The commonly used burning software is Nero, which is a paid software. Purchase Nero from its
official website and then use it. Nero 8 is used as an example in this topic. For more information
about the software, see the software Help or log in to the official website http://
www.nero.com/enu/support/ of the software for technical support.
Answer
Step 1 See A.1.24 How Do I Verify Downloaded Software Packages Using the PGPVerify
Software to verify correctness of the obtained ISO file.
Step 2 Execute the Nero software.
Step 7 Choose the desired recorder from the Current Recorder drop-down list and select the Verify
data on disc after burning check box.
NOTICE
This step aims at ensuring that the contents burnt to DVD are the same as those in the ISO
file.
----End
Answer
l In Solaris and Linux, run the following commands as the ossuser user:
$ cd /opt/oss/engr/install/etc/conf
$ cat MacroFileNW.properties
NOTE
Only the U2000 SPC version number can be viewed on this way. If the version has been installed
with a CP patch, perform View the CP version of the U2000 to view more version information
about the U2000 software.
l If the version has been installed with a CP patch, you can use the following method to
view the CP version of the U2000.
The version information is stored on the U2000 server as a configuration file named the
version number. Access the following directory to view all version information:
In Solaris and Linux: $IMAP_ROOT/patch, such as /opt/oss/server/patch.
NOTE
The CP version number can be obtained only by accessing the directory. One version can have
either 0 patch or multiple CP patches.
Answer
To ensure that the NE logs are properly displayed on the U2000 client, disable the remote log
receiving function for the syslog service in the SUSE Linux OS, and allow the U2000
SyslogCollectorDM service instead of the OS receives the remote logs. Perform the following
operations on the nodes where the SyslogCollectorDM service has been deployed to ensure
that UDP port 514 is not used by the OS.
1. Use the PuTTY to log in to the U2000 server as user ossuser in SSH mode.
2. Run the following command to set environment variables.
$ . /opt/oss/server/svc_profile.sh
5. Run the following command to view the usage of port UDP 514:
# lsof -i:514
If the following information is displayed, port UDP 514 has been occupied by the syslog
service of the OS:
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
syslog-ng 8786 root 5u IPv4 8511952 UDP *:syslog
6. Disable the remote log receiving function for the syslog service in the SUSE Linux OS.
a. Run the following command to stop the syslog service on the OS:
# service syslog stop
b. Run vi to modify the /etc/syslog-ng/syslog-ng.conf file.
Comment on the udp<ip<"0.0.0.0"> port<514>> line. Run :wq! to save
the file and exit.
unix-dgram("/dev/log");
#
# uncomment to process log messages from network:
#
# udp<ip<"0.0.0.0"> port<514>>;
11. Run the following command to view the usage of port UDP 514 again:
# lsof -i:514
If the following information is displayed, the U2000 SyslogCollectorDM service has
occupied this port.
Answer
The U2000 running depends on third-party software and hardware. To help you better
maintain third-party software and hardware, handle related faults, and acquire knowledge, you
can obtain corresponding materials from third-party websites. Table A-5 lists the URLs of
commonly seen third-party software and hardware.
NOTE
Websites of third-party materials may vary with different reasons. The correct URLs are subject to the
official release.
Windows 10 http://
windows.microsoft.com/en
-us/windows/windows-
help#windows=windows-1
0
X3850 X5 http://www-947.ibm.com/
support/entry/portal/
documentation_expanded_
list/hardware/systems/
system_x/system_x3850_x5
RH2288H V2 http://support.huawei.com/
enterprise/
productsupport?
lang=en&pid=9581539&id
AbsPath=7919749|
9856522|9856792|9581539
RH2288H V3 http://support.huawei.com/
enterprise/
productsupport?
lang=en&pid=9901881&id
AbsPath=7919749|
9856522|9856792|9901881
RH5885H V3 http://support.huawei.com/
enterprise/
productsupport?
lang=en&pid=9768163&id
AbsPath=7919749|
9856522|9856792|9768163
M5000 http://www.oracle.com/
technetwork/
documentation/sparc-
mseries-
servers-252709.html
T4-1 http://docs.oracle.com/cd/
E22985_01/index.html
T4-2 http://docs.oracle.com/cd/
E23075_01/index.html
Answer
Step 1 On the PC or laptop, use the remote GUI login software, such as VNC, to log in to the SUSE
Linux OS GUI as the ossuser user. see Configure the VNC service as the ossuser user.
NOTE
The default password of the ossuser user is Changeme_123. The default password is not changed
during preinstallation.
Step 2 Right-click the blank area of the desktop and choose Open in Terminal from the shortcut
menu to open the CLI.
Step 3 Ensure that the U2000 is not running.
To check the running status of U2000 processes, run the following command:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start.
The process is stopped if the displayed information is empty.
If the U2000 is still running, run the following commands to stop it:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
Step 5 Ensure that the MSuite servers on the primary and secondary sites have been started.
$ ps -ef | grep java
– When you log in to the MSuite client, a progress bar is displayed showing the progress of
Refresh Deployment Information. Wait until the operation is complete.
– The MSuite works in single-user mode. Specifically, only one MSuite client can log in to the
MSuite at one time.
Step 7 Perform the following operations to adjust the system networking solution.
1. Choose Tools > Commissioning Tool from the MSuite client main menu. The
Information dialog box is displayed.
2. Read the information displayed and click Start. The system commissioning window is
displayed.
3. Deselect all options and do not set any parameter. Click Next several times until the
Configure Network window is displayed.
4. Select a system networking solution as needed, and set parameters, such as the IP
address and subnet mask.
5. Click Next several times to exit the commissioning tool.
Step 8 Run the following commands to restart the OS so that the new configurations can take effect:
# sync;sync;sync;sync
# shutdown -r now
----End
Context
If the NTP service is stopped, the U2000 server fails to synchronize the time with that of the
NTP server. This may result in a time deviation.
Procedure
Step 1 Use the PuTTY to log in to the SUSE Linux OS as user ossuser in SSH mode.
Step 3 Run the following command to check the running status of the NTP service.
# rcntp status
NOTE
l If the command output contains running, the NTP service has started.
Checking for network time protocol daemon (NTPD):
running
If the NTP service has been started, port 123 corresponding to the service will also be enabled. Run
the netstat -an |grep 123 command to check whether port 123 used by the NTP service has been
enabled on the current server.
l If unused is displayed, the NTP service is not started.
Checking for network time protocol daemon (NTPD): unused
Step 4 Run the following command to start or stop the NTP service.
l Run the following command to start the NTP service.
# service ntp start
l Run the following command to stop the NTP service.
# service ntp stop
----End
Question
How do users query the software and hardware installation and equipment serial numbers
(ESNs) after they obtain the contract number?
Answer
Step 1 Log in to http://texpert.huawei.com/TExpert/Pages/PageContainer.htm.
NOTE
l The following assumes that an engineer queries and installs a server on which the SUSE Linux OS is
installed.
l Only Huawei engineers have permission to log in to the system. Customers can contact Huawei
engineers to obtain information as needed.
Step 2 In the HUMEP iTestCommander page that is displayed, set Domain to FT and FT Data
Browse to By SN.
Step 3 Enter the obtained bar code number next to the Serial Number text box and click Search.
NOTE
You can obtain the bar code number from the server shelf.
Step 4 On the tab that is displayed, select the row whose SubSequence is 5 and has the latest
TransactionTime. Click SerialNumber.
Step 5 The query result page is displayed. View information about the software and hardware
installation and ESNs on the Result Two tab.
----End
Answer
Step 1 Change the private key of the SNMPv3 user in disk array.
NOTICE
If multiple disk arrays are configured, you need to perform the operation on every disk array
and ensure that the private keys for the disk arrays are the same.
NOTE
The default password for the user admin is Admin@storage and password set after
preinstallation is Changeme_123.
3. Run the following command to change the password for the default user Kaimse of the
disk array SNMP service.
– OceanStor 5500 V3 disk array:
> change snmp usm user_name=Kaimse authenticate_protocol=SHA
private_protocol=AES
Enter the old and new passwords for user Kaimse according to the system prompt.
Please input your authenticate password: new authenticate password
Please input your authenticate password again: new authenticate password
Please input your private password: new private password
Please input your private password again: new private password
NOTE
The default password and password set after preinstallation for the user Kaimse is
ism@Storage.
The new authenticate password and the new private password must be different.
The private key can contain 6 to 32 characters, including digits 0 to 9, lowercase letters a to
z, uppercase letters A to Z, and special characters @%-=_.]{}. To improve private key
security, please use the following private key policies:
n Must contain special characters and at least two types of following characters:
uppercase letters, lowercase letters and digits when password complex is normal.
n Must contain special characters, uppercase letters, lowercase letters and digits when
password complex is high.
n Must contain any types of the following characters: special characters, uppercase
letters, lowercase letters and digits when password complex is low.
n Be different from the user name or reversed used name.
n Repeated character strings whose unit length is common fractor of 64 (1, 2, 4, 8, etc.)
are not allowed in the passwords, for example, abab and abcdabcd.
To enhance the system security, periodically update the key.
The system displays the following information:
CAUTION: You are advised to set the USM account using secure
authentication protocol SHA and data encryption protocol AES.
Do you wish to continue?(y/n)
Enter y and press Enter. When the system displays the following information, the
password of user Kaimse has been changed successfully:
Command executed successfully.
Enter the old and new passwords for user Kaimse according to the system prompt.
Old password: old key
New password: new key
Re-enter new password: new key
NOTE
The default password and password set after preinstallation for the user Kaimse is
Kaimse@storage.
The private key can contain 6 to 32 characters, including digits 0 to 9, lowercase letters a to
z, uppercase letters A to Z, and special characters @%-=_.]{}. To improve private key
security, please use the following private key policies:
n Must contain special characters and at least two types of following characters:
uppercase letters, lowercase letters and digits when password complex is normal.
n Must contain special characters, uppercase letters, lowercase letters and digits when
password complex is high.
n Must contain any types of the following characters: special characters, uppercase
letters, lowercase letters and digits when password complex is low.
n Be different from the user name or reversed used name.
n Repeated character strings whose unit length is common fractor of 64 (1, 2, 4, 8, etc.)
are not allowed in the passwords, for example, abab and abcdabcd.
To enhance the system security, periodically update the key.
When the system displays the following information, enter y and press Enter to
restart the SNMP service of the disk array.
This operation will lead to reboot the snmp service!
Do you want to continue? y or n: y
When the system displays the following information, the password of user Kaimse
has been changed successfully:
command operates successfully
If the system displays the following information, type y to log out of the disk array.
Are you sure to exit?(y/n): y
Step 2 Change the private key of the SNMPv3 user in U2000 server.
1. Use PuTTY to log in to U2000 server in SSH mode as user ossuser.
2. Run the following command to switch to user root.
$ su - root
Password:password of user root
3. Run the following commands to start the tool for changing the private key.
# cd /opt/oss/engr/engineering/tool/
# ./modifyUSMvalue.sh
NOTE
For OceanStor 5500 V3 disk array, the default password and password set after preinstallation is
ism@Storage.
For OceanStor S3900 disk array, the default password and password set after preinstallation is
Kaimse@storage.
The private key can contain 8 to 30 characters, including digits 0 to 9, lowercase letters a to z,
uppercase letters A to Z, and special characters @%-=_.]{}. To improve private key security,
please use the following private key policies:
– The private key contains at least one uppercase letter.
– The private key contains at least one lowercase letter.
– The private key contains at least one digit.
– The private key contains at least one special character.
– The key cannot be composed of duplicate character strings, for example, Te_1Te_1.
To enhance the system security, periodically update the key.
6. Change the key of the SNMPv3 to the new authenticate password you have set in Step
1.3 as prompted.
When the system displays the
Operation succeeded...,
message, the private key of the SNMPv3 user is changed successfully.
Operation succeeded...
=============================================================
Please select a operation type
1--authpasswd
2--privpasswd
R--Return
=============================================================
Please make a choice : r
7. If the 5500 V3 disk array is used, privpasswd needs to be modified. If the other disk
array is used, please ignore this step to perform Step 2.8.
Type 2 to choose privpasswd and press Enter.
The system displays the following information.
Old key: old key
New key: new key
Re-enter new Key: new key
Change the key of the SNMPv3 to the new private password you have set in Step 1.3 as
prompted.
8. Type r to choose Return and press Enter to back to the previous menu.
The system displays the following information.
=============================================================
Please select a operation type
1--S2600/S3900
2--5500v3
Q--Exit
=============================================================
Please make a choice : q
9. Type q to choose Exit and press Enter to exit the tool for changing the private key.
The system displays the following information.
Goodbye!
In the command output, the second row of the ResourceMonitor -cmd start line
displays the ID of ResourceMonitor.
# kill -9 13382
NOTE
In the preceding command, 13382 is the process ID of ResourceMonitor. Replace it with the
actual value.
# su - ossuser
$ . /opt/oss/server/svc_profile.sh
$ exit
# ResourceMonitor -cmd start
----End
Question
How can I change the password of the H2 database?
Answer
Step 1 Use PuTTY to log in to the OS as the ossuser user in SSH mode.
Step 3 Run the following commands to start the H2 user management tool.
$ cd /opt/oss/server/tools/h2UserManager
$ ./H2SqlExecTool.sh
Step 4 Enter the database user name and press Enter. The default user name is ossuser.
Step 5 Enter the database user password and press Enter. The default password is Changeme_123.
Step 6 Enter the database file password and press Enter. The default password is Changeme_123.
NOTE
This script can be used to modify the database user password but not the database file password.
Step 8 Enter the new planned database user password according to the prompted password rule and
press Enter.
Step 9 Enter the new planned database user password according to the prompted password rule again
and press Enter.
----End
Answer
Step 1 Use PuTTY to log in to the OS as the ossuser user in SSH mode.
Step 2 Run the following commands to stop isdb and is_server.
$ svc_adm -cmd stopsvc isdb
$ svc_adm -cmd stopsvc is_server
Step 4 Run the following commands to start the tool to change the H2 database file password.
$ cd /opt/oss/server/tools/h2UserManager
$ ./H2FilePWDChange.sh
NOTE
This script can be used to modify the database file password but not the database user password.
Step 5 Enter the database user name and press Enter. The default user name is ossuser.
Information similar to the following is displayed.
Please input your user password:
Step 6 Enter the database user password and press Enter. The default password is Changeme_123.
Information similar to the following is displayed.
Please input your old file password:
Step 7 Enter the old database file password and press Enter. The default password is
Changeme_123.
Information similar to the following is displayed.
The password of the database must meet the following requirements:
At least one lowercase letter
At least one uppercase letter
At least one digit
At least one special character: ~@#^*--+[{}]:./?
Other special characters, such as \()|<>&`!$"%'=;, and space, are not
supported
Please input your new file password:
Step 8 Enter the new planned database user password according to the prompted password rule and
press Enter.
Information similar to the following is displayed.
Please input your new file password again:
Step 9 Enter the new planned database user password according to the prompted password rule again
and press Enter.
----End
Answer
NOTE
Stop the Sysguard process on the U2000 before changing the password of the U2000 Guard's H2
database.
l Perform the following operations to change the password of an H2 database user on the
Solaris/SUSE Linux-based U2000:
a. Log in to the OS as the ossuser user over SSH using the PuTTY.
b. Run the following command to start the tool used to manage passwords of H2
database users:
$ cd /opt/oss/server/base_service/sysguard/H2Manager
$ ./H2Manager.sh
c. Enter the password of the database user dbuser and press Enter. The default
password is Changeme_123. The password must be changed during the first login
to ensure system security. Keep the password confidential and change it regularly.
Information similar to the following is displayed:
if you want to change the password,please input the old password:
--------------------------------password
requirements---------------------------------------
--1: Length between 8 to 30. --
--2: At least one lowercase letter. --
--3: At least one uppercase letter. --
--4: At least one digit. --
--5: At least one special character: ~@#^-_+[{}]:./? --
--6: Other special characters, such as ()|<>&\`!$"%'=;, and space, are
not supported. --
-------------------------------------------------------------------------
-------------------
e. Enter the planned database user password again and press Enter.
If the last line of the command output is as follows, the password has been
successfully changed:
Changing the dbuser's password succeeded.
l Perform the following operations to change the password of a H2 database user on the
Windows-based U2000:
a. Log in to the Windows OS as a user with the administrator rights.
b. Assess the D:\oss\server\base_service\sysguard\H2Manager directory where the
tool used to manage H2 database user passwords resides.
NOTE
The tool resides in the U2000 installation directory, which may be different from the
preceding directory. You can modify the U2000 installation directory based on actual
situations.
c. Double-click H2Manager.bat to start the tool.
Information similar to the following is displayed:
please input dbuser's password:
d. Enter the password of the database user dbuser and press Enter. The default
password is Changeme_123.
Information similar to the following is displayed:
if you want to change the password,please input the old password:
--------------------------------password
requirements---------------------------------------
--1: Length between 8 to 30. --
--2: At least one lowercase letter. --
--3: At least one uppercase letter. --
--4: At least one digit. --
--5: At least one special character: ~@#^-_+[{}]:./? --
--6: Other special characters, such as ()|<>&\`!$"%'=;, and space, are
not supported. --
-------------------------------------------------------------------------
-------------------
f. Enter the planned database user password again and press Enter.
If the following information is displayed, the password has been successfully
changed.
Changing the dbuser's password succeeded.
Question
How do I import a U2000 key store?
Answer
l For the Windows OS:
a. Log in to the OS as the ossuser user.
b. Run the following command to import the key store.
> cd /d D:\oss\engr\tools\crypto
> import.bat import_path
NOTE
l import_path is the directory that stores the backup key store, for example, the backup
file path is D:\oss\engr\tools\crypto\cryptoInfo.zip.
l By default, the U2000 is installed in the D:\oss directory. If the U2000 is not installed in
this directory, replace the directory in the preceding command with the actual installation
directory.
NOTE
l import_path is the directory that stores the backup key store, for example, the backup
file path is /opt/oss/engr/tools/crypto/cryptoInfo.zip.
l By default, the U2000 is installed in the /opt/oss directory. If the U2000 is not installed
in this directory, replace the directory in the preceding command with the actual
installation directory and navigate to the actual installation directory to execute the
mapping script.
----End
Prerequisites
l The U2000 application and southbound IP addresses have been obtained.
NOTE
l To query the U2000 server IP address, run the # ifconfig -a command for the SUSE Linux and
Solaris OSs and the > ipconfig command for a Windows OS.
l To query the U2000 southbound IP address.
l SUSE Linux or Solaris OS:
Log in the OS as the ossuser user.
$ cd /opt/oss/server/tools/configSouthIP
$ ./configsouthip.sh -get
By default, the U2000 is installed in the /opt/oss directory. If the U2000 is not installed
in this directory, replace the directory in the preceding command with the actual
installation directory and navigate to the actual installation directory to execute the
mapping script.
l Windows OS:
Log in the OS as the ossuser user.
> cd /d D:\oss\server\tools\configSouthIP
> configsouthip.bat -get
By default, the U2000 is installed in the D:\oss directory. If the U2000 is not installed in
this directory, replace the directory in the preceding command with the actual installation
directory.
l If the southbound IP address is configured:
– If the device is connected to the network through the server's application IP address,
the server's application IP address should add to the southbound IP address list, see
How Can I Configure an IP Address for the Communication Between the U2000
and Southbound NEs.
– The southbound IP addresses should communicate normally with their
interconnected devices. If the device is connected to the network through the
server's application IP address, the application IP addresses should communicate
normally with their interconnected devices.
– The server's application IP address should communicate normally with all client
networks.
– On the NBI Config Tools query the North IP address which the upper-layer OSS
connected to the network management server, the North IP address should
communicate normally with the upper-layer OSS.
l If the southbound IP address is not configured:
– The server's application IP address should communicate normally with all client
networks.
– The server's application IP address should communicate normally with managed
devices.
– On the NBI Config Tools query the North IP address which the upper-layer OSS
connected to the network management server, the North IP address should
communicate normally with the upper-layer OSS.
NOTE
Log in to the server OS as user root, run the command ping -S NMS_application_IP Destination_IP to
ensure that NMS application IP address can be normal communicated.
Context
l For a distributed system, the operations need to be performed only on the NM and EM
nodes.
l For a HA system, the operations need to be performed only on the primary site. Related
data will be automatically synchronized to the secondary site using the VCS.
NOTE
In a HA system, after data is synchronized to the secondary site, the NMS process at the secondary site
has to be restarted to enable all-zero IP address monitoring.
Procedure
l For the Windows OS:
a. Log in the OS as the ossuser user.
b. Stop the U2000 process.
c. Run the following command to disable all-zero IP address monitoring on the CML:
> cd /d D:\oss\server\platform\bin\special > sec_adm -cmd
disableListenAllIP
NOTE
By default, the U2000 is installed in the D:\oss directory. If the U2000 is not installed in this
directory, replace the directory in the preceding command with the actual installation
directory.
If information similar to the following is displayed, all-zero IP address monitoring
is successfully disabled:
Operation succeeded. Please restart all services for the settings to
take effect.
NOTE
By default, the U2000 is installed in the /opt/oss directory. If the U2000 is not installed in
this directory, replace the directory in the preceding command with the actual installation
directory and navigate to the actual installation directory to execute the mapping script.
If information similar to the following is displayed, all-zero IP address monitoring
is successfully disabled:
Operation succeeded. Please restart all services for the settings to
take effect.
Follow-up Procedure
When the U2000 server functions as an SNMP client and assesses devices, the specified IP
address and interface must be configured on the firewall to reduce attacks because the
interfaces on the SNMP client monitor only the all-zero IP address. The following describes
how to configure the firewall embedded in the Linux OS:
NOTE
For details about the interfaces in the following tables, see iManager U2000 Communication Port
Matrix.
Table A-6 IP addresses and interfaces configured on the firewall in a centralized system
Scenar Configur Interface Description
io ation Number
Item
Public U2000 14901 to Used by the U2000 to communicate with NEs over
SBI IP 15900 SNMP.
address
Table A-7 IP addresses and interfaces configured on the firewall in a distributed system
Object Configur Interface Description
ation Number
Item
The following describes how to configure the specified IP address and interface for the
centralized performance management system (the configuration methods in other scenarios
are similar):
1. Log in to the U2000 OS as the root user.
2. For the NM node in a distributed system or a centralized NMS, run the following
command to set service_ip1 and the interface
NOTE
l For the Solaris OS, the configuration command is ipf, for details, see http://
docs.oracle.com/cd/E19253-01/816-5166/ipf-1m/index.html.
l In the following command, service_ip1 indicates the U2000 SBI IP address, which should be
replaced with the mapping U2000 IP address in the preceding tables.
l The following describes how to open the access to the IP address specified for service_ip1.
l For transport NE search (IP auto discovery), the command used to open the access to
Ethernet ports is similar to the following:# iptables -A INPUT -i eth0 -p udp --dport 8001 -j
ACCEPT. eth0 corresponds to the Configuration Item column in 1 and 2.
i. Run the following command to open the access to interfaces 14001 to 14101:
# iptables -A INPUT -p udp -d service_ip1 --dport 14001:14101 -j
ACCEPT
ii. Run the following command to open the access to interfaces 14421:
# iptables -A INPUT -p udp -d service_ip1 --dport 14421 -j ACCEPT
ii. Run the following command to restrict the access to interfaces 14421:
# iptables -A INPUT -p udp --dport 14421 -j DROP
NOTE
For transport NE search (IP auto discovery), the command is # iptables -L -nv.
If information similar to the following is displayed, the configuration succeeds:
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT udp -- 0.0.0.0/0 10.67.172.24 udp dpts:
14001:14101
ACCEPT udp -- 0.0.0.0/0 10.67.172.24 udp dpts:
14421
DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:
14001:14101
DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:
14421
3. Optional: For the NM node in a distributed system or a centralized NMS, to open the
access to the IP address specified for service_ip2 (U2000 server's another IP address),
delete the DROP rules, add the IP address specified for service_ip2, and add DROP
rules again.
NOTE
l For the Solaris OS, the configuration command is ipf, for details, see http://
docs.oracle.com/cd/E19253-01/816-5166/ipf-1m/index.html.
l In the following command, service_ip2 indicates the U2000 SBI IP address, which should be
replaced with the mapping U2000 IP address in the preceding tables.
l The following describes how to open the access to the IP address specified for service_ip2:
l If an interface has multiple IP addresses, open the access to the interfaces mapping to the IP
addresses one by one. Then, restrict the access to them one by one. For example, open the
access to the interfaces mapping to service_ip1 and service_ip2 values and then restrict the
access to these interfaces one by one.
l For transport NE search (IP auto discovery), the command used to open the access to
Ethernet ports is similar to the following:# iptables -A INPUT -i eth1 -p udp --dport 8001 -j
ACCEPT. eth0 corresponds to the Configuration Item column in 1 and 2.
a. Run the following command to check the line numbers of DROP rules:
# iptables -L -n
NOTE
For transport NE search (IP auto discovery), the command is # iptables -L -nv.
b. According to the command output, the DROP rules exist in lines 3 and 4. Run the
following command to delete the DROP rules starting from line 4:
# iptables -D INPUT 4
# iptables -D INPUT 3
ii. Run the following command to open the access to interfaces 14421:
# iptables -A INPUT -p udp -d service_ip2 --dport 14421 -j ACCEPT
iii. Run the following command to restrict the access to interfaces 14001 to
14101:
# iptables -A INPUT -p udp --dport 14001:14101 -j DROP
iv. Run the following command to restrict the access to interfaces 14421:
# iptables -A INPUT -p udp --dport 14421 -j DROP
NOTE
For transport NE search (IP auto discovery), the command is # iptables -L -nv.
If information similar to the following is displayed, the configuration succeeds:
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT udp -- 0.0.0.0/0 10.67.172.24 udp dpts:
14001:14101
ACCEPT udp -- 0.0.0.0/0 10.67.172.24 udp dpts:
14421
ACCEPT udp -- 0.0.0.0/0 10.67.172.25 udp dpts:
14001:14101
ACCEPT udp -- 0.0.0.0/0 10.67.172.25 udp dpts:
14421
DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:
14001:14101
DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:
14421
Answer
Step 1 Log in to the OS as the ossuser user.
Step 2 Run the following commands to perform a rollback:
l SUSE Linux or Solaris OS:
$ rm -rf /opt/oss/server/etc/oss_cfg/frame/is_server/data/isdb.h2.db $
cp /opt/oss/server/etc/oss_cfg/frame/is_server/data/isdb.h2.db.bak /opt/oss/
server/etc/oss_cfg/frame/is_server/data/isdb.h2.db $ rm -rf /opt/oss/
server/etc/oss_cfg/frame/is_server/data/isdb.h2.db.bak
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
l Windows OS:
a. Go to the D:\oss\server\etc\oss_cfg\frame\is_server\data directory and delete the
isdb.h2.db file.
b. Rename the isdb.h2.db.bak file to isdb.h2.db.
NOTE
The preceding directory is true only if the U2000 is installed in D:\oss. If the U2000 is not
installed in partition D, change the partition in the directory accordingly.
----End
Answer
Step 1 Log in to the server as the ossuser user using the PuTTY.
Step 2 Run the following command to check whether deletion protection is configured for non-
dynamic files.
$ lsattr file name
NOTE
Configuration files, with the extension of conf, are stored in the /opt/oss/engr/install/etc/config
directory.
A file path can be either an absolute path or a relative path. The relative path is relative to the U2000
installation path. The format of a relative path is as follows:
/etc/a.log @{OSS_ROOT}/engr/b.log
NOTE
To cancel file deletion protection please run chattr_delete.sh.
----End
Question
How to change the password for the user ftpuser?
Answer
l For the SUSE Linux or Solaris OSs:
NOTE
l Run modify_ftp_setting.sh to change the password of the user ftpuser on U2000 server and
OS.
l The following command output is displayed on a Linux OS (used as an example).
l The rules for modifying a password are as follows:
l The password contains a minimum of 8 characters and a maximum of 30 characters.
l The password must contain four of the following combinations:
l At least one lower-case letter
l At least one upper-case letter
l At least one digit
l At least one special character ~!@#$%^&*()-_=+\|[{}];:"',<.>/?
l The password cannot be the same as the user name written in either the forward or
backward format.
l If security hardening is performed on the OS, set the password by referring to the
password policies in Security Hardening Guide.
a. Use the PuTTY tool to log in to the server as a root user.
b. Run the following commands to change the password for the user ftpuser as
prompted.
n SUSE Linux:
# cd /opt/sudobin/imap/ftp/files
# bash modify_ftp_setting.sh -i /opt/oss -u ftpuser -l false
n Solaris:
# cd /opt/oss/server/3rdTools/ftp/files
# bash modify_ftp_setting.sh -i /opt/oss -u ftpuser -l false
Changing the password of user ftpuser...
Changing password for ftpuser.
New password: new password for the ftpuser
Retype new password: new password for the ftpuser
Password changed.
Modifying FTP configurations of OSS...
The password of user ftpuser is required.
Please enter the changed password of user ftpuser: new password for the
ftpuser
If the following message displayed, the password for the user ftpuser modified
successfully.
FTP configurations modified successfully.
----End
Symptom
How do I solve the problem where a failure message is displayed during the installation or the
installation is abnormally interrupted?
NOTICE
This operation will uninstall the U2000. Specifically, this operation will cause NEs fail to be
managed and monitored and cause the U2000 database information to be deleted.
Procedure
Step 1 Log in to the OS of the server as user root.
Step 2 Run the following commands to use the environment clean-up tool to clear the installation
environment:
# cd /opt/oss/engr/engineering/tool/OSSEnvCleaner
# ./OSSEnvCleaner.sh
......
Are you sure you want to clean this environment using this tool?[yes/no]:
Step 4 Enter yes as prompted to confirm database deletion and press Enter.
Step 5 Enter the Sybase database path as prompted, or press Enter to automatically enter /opt/
sybase.
Step 6 Enter the user name and password of the database administrator and the server name. Then
press Enter.
Step 7 After the cleanup operation is performed as prompted, run the following commands to
reinstall the U2000, see 4.9.3 Starting the U2000 Installation Program.
NOTE
If Installation Process has been started. is displayed when installing the U2000, run the following
commands to stop the MSuite server process and then reinstall the U2000:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./stopserver.sh
----End
Question
How do I handle messages indicating that the port is occupied during use of the NMS
Maintenance Suite, installation, or uninstall?
NOTE
Answer
l Wait about one minute and try again after the port is released automatically.
l Run the following command to view process IDs:
# cd /opt/oss/engr/engineering/tool/
# ./FindProcessOnPort.sh
Searching for process running on port 12212 ......
-------------------------------------------------------------------------
Port: 12212 is being used by PID: 25542 /opt/oss/OSSJRE/jre_linux/bin/java -
server -Dequinox.conf=engineering/conf/installE
...
Locate all processes that contain port (12212,12213,12214,12215) and end these
processes by running the kill command. The following is a sample kill command:
# kill -9 25542
----End
Question
How to rectify the failure to connect to the Sybase database during U2000 installation?
Answer
Step 1 This fault occurs if the IP address recorded in the interfaces file in the Sybase database is
different from the IP address of the U2000 server. To rectify this fault, modify the IP address
recorded in the interfaces file.
# vi /opt/sybase/interfaces
DBSVR_back
master tcp ether 10.9.1.20 4200
query tcp ether 10.9.1.20 4200
master tcp ether 10.9.1.20 4200
query tcp ether 10.9.1.20 4200
master tcp ether 127.0.0.1 4200
query tcp ether 127.0.0.1 4200
Change the IP address (for example, 10.9.1.20) recorded in the interfaces file to the IP
address of the U2000 server.
----End
Possible Causes
The possible causes are as follows:
l The U2000 server does not work properly, the U2000 server fails to start properly, the
disk on the U2000 server is full, or the memory usage of the U2000 server is high
because many processes are started.
l An incorrect user name or password has been entered for logging in to the U2000 client.
l The network between the client and server does not function properly.
l The license file is a temporary one or is damaged.
l The number of clients allowed in the license is restricted.
l The port between the client and server is shielded by firewall or viruses. In common
mode, port 31037 is used by default. In SSL mode, port 31039 is used by default.
l The version of the client is inconsistent with that of the server.
l The communication protocol used by the client is inconsistent with that used by the
server.
l The user that logs in to the client is locked. This may be caused by too many times of
login failures.
l The IP address of the computer where the client is installed is not listed in the ACL.
l The OS time on the client is set incorrectly and the ILOG JTGO license is expired.
l The DCN is faulty.
l The dfwModule fails to be loaded.
l The maximum client login limit has been reached.
Procedure
Step 1 If an error message is displayed, locate and rectify the fault as prompted.
Step 2 Check whether the server has been started properly. Ensure that the server runs properly, the
disk space of the server is not used up, and not many processes are started on the server. If
many processes are started on the server, the memory usage is high.
1. Ensure that the disk space of the server is not used up.
– To troubleshoot the full disk space on the server on Windows, perform the
following operations:
Check that disk C is fully used, delete log files, and restart the U2000.
– To troubleshoot the full disk space on the server on Solaris or SUSE Linux, perform
the following operations:
i. Check that the space usage of the /opt directory reaches 100%.
ii. Run the following command to check the distribution of files larger than 100
MB.
Software runs abnormally because temporary files on the server are improperly
large. Delete temporary files from the /opt directory if they occupy large
space.
2. Ensure that not many processes are started on the server.
After the U2000 server is started, do not access the JDE desktop (switch to the CED
environment for the U2000 on the live network). Start the U2000 in CLI mode.
Step 3 Verify that the entered user name and password are correct.
Step 4 If a message indicating that the license file is invalid when you log in to the U2000 client,
rectify the license fault according to A.6.5 How to Resolve the Problem that the License
Does Not Take Effect and log in to the U2000 client.
Step 5 Choose Help > License Management > License Information from the main menu
(traditional style); alternatively, double-click System Management in Application Center
and choose License Management > Licenes Information from the main menu (application
style).
If the number of clients to log in exceeds the maximum number of clients allowed in the
license, apply for a new license and update the U2000 license file.
Step 6 Check whether the versions of the client and server are consistent. If the versions are
inconsistent, a message will be displayed asking you to upgrade the client. In this case, try to
upgrade or reinstall the client.
Step 7 Check whether the communication protocols used by the client and the server are consistent.
If the protocols are inconsistent, modify the protocols so that the protocols are consistent.
NOTE
Run the ssl_adm -cmd query command on the U2000 server to view the communication mode of the
U2000 server. For details, see A.5.10 How to Set the Communication Mode on the U2000 server for
the Single-Server System (SUSE Linux).
l To check the network between the client and server, run the following command on
SUSE Linux:
# ping -s IP_address_of_the_NMS
Step 9 Check whether the port between the client and server is shielded by firewall or viruses. Install
a virus scanner, scan the entire disk, and remove viruses. If the client installed on the
computer where the server belongs can log in to the server, but other clients cannot log in,
check whether the port has been added to the Windows firewall. If not, perform the following
operations to add the port to the Windows firewall:
NOTE
In common mode, port 31037 is used by default. In SSL mode, port 31039 is used by default.
Windows Server 2008 is used as an example to describe the procedures for adding a port to a firewall.
The procedures vary according to OSs. For specific procedures, see the Windows help.
1. Choose Start > Control Panel.
Step 10 Log in to the U2000 client as the admin user and choose Administration > NMS Security >
ACL.
On the U2000, you can set the client IP addresses that can be accessed. If the IP address of a
client is not in the permitted range, the client cannot access the server. For details, see "Setting
the Access Control List" in Chapter "Security Management" in the U2000 Administrator
Guide. If NAT is used for IP address translation for communication between the client and
server, ensure that the translated IP address is permitted in the ACL.
Step 11 If the number of failed login attempts by using the same user exceeds 3, the login authority of
the user is locked.
You can log in to the client again in 30 minutes (default) or unlock the user as another user
that has the authority, such as user admin.
Step 12 Check whether the system time is the current time. If not, modify the system time.
Step 13 Create a user and use it to log in. For details, see "Setting the Maximum Number of Sessions"
in U2000 Administrator Guide.
----End
A.6.5 How to Resolve the Problem that the License Does Not Take
Effect
Question
A message is displayed indicating that the license of the U2000 is invalid. As a result, the
U2000 cannot be started or certain functions cannot be used.
Answer
The possible causes are as follows:
l The license item is incorrect.
l The time setting of the OS is incorrect.
l Check and rectify the fault on Solaris or SUSE Linux based on the following items:
a. The date of the OS is the current date.
b. Check whether the ESN is correct.
You can obtain the ESN tool according to the U2000 License Usage Guide to check
the ESN.
If an error has occurred, transfer the license file again or download the license file
to the /opt/oss/server/etc/conf/license directory. Restart the U2000 and check
whether the license takes effect.
----End
Question
How do I rectify the failure to open the CAU download web page because the port is used?
Answer
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to view the PID of the process that uses the port:
# netstat -ntlp | grep -w 80
Step 4 Run the kill process PID command to stop the process after confirming that it can be stopped.
NOTICE
Stop the process only after you confirm that it can be stopped. Otherwise, the U2000 may fail
to run properly.
----End
Question
During NMS installation, a dialog box for selecting the database path is displayed on the
database service configuration page, indicating that the database installation file is not found.
How do I resolve the problem?
Answer
Step 1 Confirm that this problem occurs because the database installation package is not found.
Step 2 Select the directory where the database installation DVD-ROM is installed or the directory
where the database installation package is decompressed.
Step 3 Check whether the database installation package matches the OS.
----End
Context
l During the verification of the U2000 software installation, if a check item does not meet
the requirement, a failure message is displayed.
l During the uninstallation of the U2000 software, if the message indicating a successful
uninstallation is not displayed, the U2000 software fails to be uninstalled.
Procedure
Step 1 Log in to the SUSE Linux OS as the root user.
Run the following command to check whether the Sybase database is running:
# ps -ef | grep sybase
NOTE
NOTE
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error:
Net-Library operation terminated due to disconnect
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Enter the database administrator user password as prompted. The initial password of the database
administrator user is Changeme_123.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error:
Net-Library operation terminated due to disconnect
Step 3 Ensure that the Network Management System Maintenance Suite is not running.
Run the following command to check whether the network management system maintenance
suite process is started:
# ps -ef | grep java
root 19913 19907 0 04:04:09 pts/1 0:00 grep java
...
root 18382 18311 0 03:42:33 pts/2 12:20 /opt/oss/OSSJRE/jre_linux/bin/java
-server -Dlanguage=en -Xverify:none -Xmx128m -Xm
NOTE
Run the following commands to stop the Network Management System Maintenance Suite if
it is running:
# cd /opt/oss/engr/engineering
# ./stopserver.sh
Step 4 Run the following commands to delete the installation paths /opt/oss/engr, /opt/install/
OSSICMR, /opt/oss/OSSJRE, /opt/oss and /opt/sybase:
# rm -rf /opt/oss/engr
# rm -rf /opt/install/OSSICMR
# rm -rf /opt/oss/OSSJRE
# rm -rf /opt/oss
# rm -rf /opt/sybase
NOTE
If a message is displayed indicating that the /opt/sybase directory is unable to be removed, /opt/sybase
has been created as a system partition and cannot be deleted.
Run the following command to delete the next-level directories and files in /opt/sybase:
# cd /opt/sybase
# rm -rf *
If a message is displayed indicating that the data directory cannot be deleted, delete all directories
except the data directory in the /opt/sybase path.
Step 5 Run the following commands to delete user ossuser, dbuser and webuser:
# userdel ossuser
NOTE
The message no crontab for ossuser is displayed, indicating that the ossuser user is successfully
deleted.
# userdel dbuser
# userdel webuser
Step 6 Run the following command to delete user group ossgroup, dbgroup and webgroup:
# groupdel ossgroup
# groupdel dbgroup
# groupdel webgroup
Step 8 Reinstall the U2000 software. For details, see 4.9 Installing the U2000 Software.
During the U2000 reinstallation, a message indicating that a port is being used may be
displayed. If such a message is displayed, wait about 1 minute. After the port is automatically
released, continue the reinstallation. For the detailed solution, see A.6.2 How to Handle
Messages Indicating That the Port Is Occupied During Installation or Uninstall.
----End
This topic describes how to uninstall the U2000 software. Before reinstalling the U2000
software, you must uninstall U2000.
B.1 Uninstall Preparations
This topic describes the preparations for uninstalling the U2000 software.
B.2 Uninstalling a U2000
This topic describes how to uninstall a U2000. A U2000 can be uninstall on the GUI or CLI.
Uninstallation on the GUI is recommended. If the GUI method does not work, use the CLI
method.
B.3 Verifying the Uninstall Status of the Server Software
This topic describes how to verify that the U2000 server software is uninstalled.
Procedure
Step 1 Optional: If the SetSuse security hardening policy is enabled on the live network, choose
whether to disable the policy according to network conditions.
l If the SetSuse security hardening policy cannot be disabled on the live network, skip this
step.
NOTE
If the SetSuse security hardening policy is enabled, you cannot directly log in to the OS IP address
as the root user after uninstalling the U2000. Instead, you have to log in through the server
controller.
If the SetSuse security hardening policy is disabled on the live network, skip this step.
l If the SetSuse security hardening policy can be disabled on the live network, run the
following command to cancel the SetSuse security hardening policy.
1. Log in to the OS as the ossuser user.
NOTE
If log in to the server from a remote site, you can perform remote access by means of SSH(putty) as
user ossuser, or by means of VNC as user ossuser.
NOTE
Enter the database administrator user password as prompted. The initial password of the database
administrator user is Changeme_123.
In order to enhance the security of the database after the U2000 is installed, the sa user may be
manually disabled and replaced with a customized administrator name, such as dbadmin.
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
$ su - root
Password: root user password
# sync;sync;sync;sync
# shutdown -r now
NOTE
If the security hardening service need to be started, see Start the security hardening service.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start.
The process is stopped if the displayed information is empty.
If the U2000 is still running, run the following commands to stop it:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
Step 5 Ensure that the Network Management System Maintenance Suite is not running.
Run the following command to verify that the Network Management System Maintenance
Suite is not running:
$ ps -ef | grep java
Information similar to the following is displayed:
root 11758 1 1 Nov06 ? 03:24:40 /opt/oss/OSSJRE/jre_linux/bin/
java -server -Dlanguage=zh -Xverify:none -Xms512m ...
ossuser 13005 5087 0 11:37 pts/0 00:00:00 grep java
NOTE
If the Network Management System Maintenance Suite is still running, run the following
commands to stop it:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./stopserver.sh
$ exit
NOTE
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Enter the dbuser user password as prompted. The default password is Changeme_123. For system
security, modify the default password and remember the new password. For details, see A.1.1 How
to Change the OS User Password.
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
----End
Prerequisites
l Uninstallation preparations have been completed.
l The ossuser user has logged out.
a. Run the following command to check which processes are being used by the
ossuser user:
# ps -ef | grep ossuser
b. Run the following command to stop all the processes used by the ossuser user:
# kill -9 process ID of the ossuser user
NOTE
l In the preceding command, process ID of the ossuser user maps the second column in
the displayed information. For example, kill -9 17463.
l If there are multiple ossuser users, each process ID of the ossuser user separated by a
space. For example, kill -9 17463 17557 17625 17688.
l Information similar to the following is displayed, no process is being used by the
ossuser user, all the processes used by the ossuser are stopped:
root 18527 16473 0 12:46 pts/0 00:00:00 grep ossuser
l Forcibly stopping a process may cause disconnection between the command terminal
and the OS. If the connection is disconnected and you cannot log in to the OS from the
command terminal, restart the OS through the control card.
Context
l This operation uninstalls only the U2000. The Sybase database will not be uninstalled.
l Two modes are available to uninstall the U2000. One is the GUI mode and the other is
the CLI mode. The procedure for uninstalling the U2000 in GUI mode is described in the
following sections. Installation engineers are recommended to uninstall the U2000
through the CLI if they cannot log in to the GUI of the OS.
NOTE
If uninstallation fails, see A.6.8 How to Address the U2000 Installation or Uninstallation Failure to
completely uninstall the U2000.
NOTICE
Uninstalling a U2000 will cause NEs fail to be managed and monitored and cause the U2000
database information to be deleted.
Procedure
l Through the GUI
a. Log in to the OS as the root user through the GUI.
NOTE
If the SetSuse policy is enabled, log in to the OS as the root user through the control card.
Right-click in the blank area and choose Open in Terminal from the shortcut menu to
access the CLI.
b. Run the following command to go to the path where the uninstall.sh script is stored
and run the script:
# cd /opt/oss/engr
# ./uninstall.sh
l The duration of the uninstall depends on the quantity of installed components. Wait
patiently.
l If the SetSuse security hardening policy is enabled during uninstallation or the ossuser
user is being used, log in to the OS as the root user from IMM of the workstation and
then delete the ossuser user and the ossuser directory.
# userdel ossuser
# rm -rf /export/home/ossuser
NOTE
NOTE
Warning:The system will start the uninstallation. Are you sure you want
to continue?[y:Yes, n:No, n]:
l The duration of the uninstall depends on the quantity of installed components. Wait
patiently.
l If the SetSuse security hardening policy is enabled during uninstallation or the ossuser
user is being used, log in to the OS as the root user from IMM of the workstation and
then delete the ossuser user and the ossuser directory.
# userdel ossuser
# rm -rf /export/home/ossuser
e. After the uninstallation, the message similar to the following will be displayed:
===============< Uninstallation Complete >===============
Finish
The U2000 is uninstalled successfully.
f. Wait 1 minute. Run the following commands to ensure that engr, OSSICMR, and
OSSJRE directories do not exist and complete uninstallation.
# rm -rf /opt/oss/engr
# rm -rf /opt/install/OSSICMR
# rm -rf /opt/oss/OSSJRE
Follow-up Procedure
l /opt/backup/dbbackup and /opt/backup/ftpboot folders can be deleted based on actual
situations.
NOTE
If the /opt/backup/dbbackup and /opt/backup/ftpboot folders were not deleted during
uninstallation, they are renamed to /opt/backup/dbbackup_baktimestamp and /opt/backup/
ftpboot_baktimestamp while reinstall the U2000.
l If you do not cancel the SetSuse security hardening policies during U2000 uninstallation
but need to directly log in to the OS IP address as the root user, follow Security
Hardening Guide to roll back the SetSolaris security hardening policies.
Procedure
Step 1 Log in to the OS of the server as user root.
Step 2 Confirm that the installation path is correct during the uninstall.
l If the server is not mounted with disk arrays, the NMS installation path/opt/oss will be
deleted.
l If the server is mounted with disk arrays, the NMS installation path /opt/oss will be
empty.
The installation paths /opt/oss/engr and /opt/oss/OSSJRE, are deleted.
Step 3 Confirm the ossuser user that must be deleted during the uninstall.
Run the following command to switch to user ossuser:
# su - ossuser
----End
Some commissioning tasks need to be manually executed during U2000 system parameter
commissioning. This topic describes how to execute a manual commissioning task.
C.1 Replacing Storage Keys for a Single-Server System (Linux)
This topic describes how to replace the storage keys for a U2000 single-server system running
the Linux OS. Data stored on the U2000 is all encrypted. If the system key store is lost or
damaged, related data will fail to be encrypted. Therefore, it is recommended that storage
keys including the root key and working key on the U2000 server be periodically replaced. A
replacement period must be shorter than 1 year.
C.2 Configuring a Digital Certificate
The U2000 supports security encryption to ensure the communication security for the DCN
and the confidentiality and integrity for the transmitted data. A digital certificate is also used
to distribute public keys.
C.3 Setting Hardware Alarm Monitoring
This section describes the settings of monitoring the 5500 V3 disk array, S3900 disk array
hardware.
C.4 Configuring and Testing the FTP Service
During data synchronization, upgrade, backup, and patch installation of NEs, you need to
configure and test the FTP and SFTP service to ensure that the FTP services work properly
between NE software, the U2000, and NEs. This topic describes how to configure and test the
FTP and SFTP services on the U2000.
Prerequisites
l Ensure that the NMS process is stopped. To check whether it is stopped, see A.5.5 How
to Verify That the Processes of the U2000 Single-Server System Are Running on
SUSE Linux. If the NMS process is not stopped, see A.5.7 How to End the Processes
of the U2000 Single-Server System on (SUSE Linux).
l Ensure that the database is running properly. To check the database status, see A.4.1.3
How to Verify That the Sybase Database Is Running. If the database is stopped, see
A.4.1.2 How to Start the Sybase Database Service to start it.
l Ensure that the MSuite server process is stopped. For details, see How to End Processes
on the MSuite Server.
l Ensure that the key store is backed up.
Procedure
Step 1 Log in to the OS as the ossuser user over SSH using the PuTTY.
Step 2 Run the following command to back up the key store:
$ cd /opt/oss/engr/tools/crypto
$ ./export.sh export_path
NOTE
l The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not installed
in partition /opt, change the partition in the directory accordingly.
l In the preceding command, export_path indicates the key store's backup directory, for
example, /opt/oss/engr/tools/crypto.
NOTE
In the preceding displayed message, /opt/oss/engr/tools/crypto indicates the key store's backup
directory. The backup file cryptoInfo.zip contains both the working key and root key.
NOTE
Replacing a working key may take a long period of time, usually less than 4 hours.
3. Run the following command to replace the H2 working key.
$ cd /opt/oss/server/tools/h2CryptoCfgTool
$ ./H2CryptoCfgTool.sh
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
If the following information is displayed, the replacement succeeds.
operation start.
...
operation success.
NOTE
If the preceding command fails to be executed, perform rollback. For details, see A.5.27 How Do I
Perform a Rollback After the H2 Key Replacement Fails.
4. Run the following command to delete the isdb.h2.db.bak file.
$ rm -rf /opt/oss/server/etc/oss_cfg/frame/is_server/data/isdb.h2.db.bak
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
Step 5 Optional: If the MSO Web system has been installed on the U2000, run the following
commands to re-encrypt data:
NOTE
Run the following command to check whether the MSO Web system is installed on the U2000:
$ ps -ef
The MSO Web system has been installed on the U2000 if the following information is displayed:
ossuser 127282 123782 99 14:33 pts/9 00:10:39 /opt/oss/OSSJRE/jre_linux/bin/
java -Dprocname=MSOService -Dfile.encoding=UTF-8 -DappName=MSOService -
Dfile.encoding=utf-8 -Xms4g -Xmx4g -Xmn3g -Xss256k -XX:ParallelGCThreads=20 -
XX:+UseC
$ cd /opt/oss/server/tools/msoCryptoCfgTool
$ sh MsoCryptoCfgTool.sh
Step 6 See A.5.6 How to Start the Processes of the U2000 Single-Server System on SUSE Linux
to start the NMS process.
Step 7 See How to Start the Process of the MSuite Server to start the Process of the MSuite Server.
----End
Follow-up Procedure
1. Delete the exported key store.
a. Log in to the OS as the ossuser user using the PuTTY.
b. Run the following command to delete the key store exported before key
replacement:
$ rm -rf opt/oss/engr/tools/crypto/cryptoInfo.zip
NOTE
The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is not
installed in partition /opt, change the partition in the directory accordingly.
2. Back up the new key store.
a. Log in to the OS as the ossuser user using the PuTTY.
b. Run the following command to back up the new key store:
$ cd /opt/oss/engr/tools/crypto
$ ./export.sh export_path
NOTE
l The preceding directory is true only if the U2000 is installed in /opt/oss. If the U2000 is
not installed in partition /opt, change the partition in the directory accordingly.
l In the preceding command, export_path indicates the key store's backup directory, for
example, /opt/oss/engr/tools/crypto.
If information similar to the following is displayed, the backup succeeds:
Operations are successful,Backup File is:opt/oss/engr/tools/crypto/
cryptoInfo.zip
NOTE
In the preceding displayed message, /opt/oss/engr/tools/crypto indicates the key store's
backup directory. The backup file cryptoInfo.zip contains both the working key and root
key.
c. Save the exported backup key store after encryption to a storage unit with a higher
level of confidentiality, and delete it locally.
Prerequisites
l You have obtained the trust certificate (rootCA.cer, subCA1.cer) and identity certificate
(server.p12) used by the server and the encryption password for the identity certificate.
l The SSL certificates have been backed up.
l Use the FTP to upload the new SSL certificate files (server.p12, rootCA.cer and
subCA1.cer) to the following directory on the U2000 server as the ossuser user before
you replace the SSL certificate of server.
– Solaris/SUSE Linux: /opt/oss/server/certs.
NOTE
l The directory is true only if the U2000 on Solaris or SUSE Linux OS is installed in /opt/
oss. If the U2000 is not installed in partition /opt, change the partition in the directory
accordingly.
l If security hardening is performed, ossuser FTP/SFTP rights will be disabled. In this
case, you need to upload files to the backup directory in the FTP root directory as the
ftpuser user (the FTP root directory of ftpuser is /opt/backup/ftpboot) and then copy
files to the target directory as the ossuser user.
– Windows: D:\oss\server\certs.
NOTE
The directory is true only if the U2000 on Windows OS is installed in D:\oss. If the U2000 is
not installed in partition D, change the partition in the directory accordingly.
NOTICE
Place only the certificate files server.p12, rootCA.cer and subCA1.cer in this directory.
Do not place other files in it. Otherwise, the certificate replacement script will fail to be
executed.
Context
l By default, the U2000 client authenticates the U2000 server, but the U2000 server does
not authenticate the U2000 client.
l The Huawei-predefined SSL certificates used to safeguard communication between the
U2000 server and client are located in the following directory:
– On Solaris or SUSE Linux OS: /opt/oss/server/etc/ssl.
– On Windows OS: D:\oss\server\etc\ssl.
l The MSuite and the U2000 use the same SSL certificates.
l The following script-based replacement procedure assumes that your OS is Solaris or
SUSE Linux OS. If your OS is Windows, replace the certificates for the U2000 server in
a similar way.
NOTICE
After SSL Certificates for the U2000 server have been replaced, you may fail to log in to
the MSuite.
Procedure
l Replace SSL certificates for the U2000 server through the GUI.
a. Ensure that the MSuite servers on the primary and secondary sites have been
started.
Run the following command as the root user to check whether the MSuite servers
are started:
NOTE
If security hardening is enabled, log in to the OS as the ossuser user. Then run the su - root
command and enter the root user password to switch to the root user.
# ps -ef | grep java
A message similar to the following will be displayed in the SUSE Linux system:
...
root 7593 7130 0 06:31 pts/7 00:00:00 grep java
ossuser 8937 12803 0 04:13 pts/8 00:00:42 /opt/oss/OSSJRE/
jre_linux/bin/java -Dprocname=AgentIntegrate -Dfile.encoding=UTF8 -
Xmx1024m -XX:MetaspaceSize=16m -XX:MaxMetaspaceSize=256m -XX:
+UseCompressedClassPointers -XX:+UseCompressedOops -
XX:CompressedClassSpaceSize=128m -XX:+HeapDumpOnOutOfMemoryError -
DabsCfgPath=/opt/oss/server/etc/oss_cfg/frame -cp nbi/agentintegrate/
thirdparty/*:3rdlib/*:common/uflightdispatcher/lib/jdom.jar:cbb/qasn/lib/
*:common/uflight/frame_app/plugins/com.huawei.uflight.platformadapter/
*:common/uflight/web_app/plugins/pax-web-runtime-2.1.2.jar:common/
uflight/web_app/plugins/web_app/plugins/pax-web-spi-2.1.2.jar:nbi/
agentintegrate/lib/*:nbi/agentintegrate/bin/*
com.huawei.u2000.inventory.webserver.JettyStarter
...
NOTE
If the displayed information contains /opt/oss/OSSJRE/jre_linux/bin/java -server, the MSuite
servers have been started.
If the MSuite servers have not been started, switch to the ossuser and run the
following commands as the root user to start the MSuite servers:
# su - ossuser
$ cd /opt/oss/engr/engineering
$ ./startserver.sh
The new encryption password for the identity certificate must meet the following
requirements:
l The password contains a minimum of 8 characters and a maximum of 20 characters.
l At least one space or one special character: `~!@#$%^&*()-_=+\|[{}];:'",<.>/?
l At least two of the following combinations: lowercase letters a to z, uppercase letters
A to Z, and digits 0 to 9.
l The password cannot be the same as the user name or the reverse of the user name.
f. Click OK.
g. Because the MSuite reuses the U2000 digital certificates, restart the MSuite server
for the certificates to take effect.
l Replace SSL certificates for the U2000 server using a script.
a. Use the PuTTY to log in to the U2000 server in SSH mode as the ossuser user.
b. Run the following command to end the U2000 processes:
Single-Server System:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
NOTE
The certificates can be backed up to an absolute or relative directory. The following steps
assume that the certificates are backed up to /opt/backup/dbbackup/ssl.
e. Run the following command to replace the certificates used by the U2000 server (as
the root user):
$ ssl_adm -cmd replace_certs -dir /opt/oss/server/certs
NOTE
f. Enter the new identity certificate old password, the new identity certificate new
password and reenter the new identity certificate new password, press Enter.
NOTE
g. Optional: If you need to use the iNBIXMLSoapAgent process, run the following
commands to change the certificate password for the process:
$ cd /opt/oss/server/nemgr/nemgr_access/scriptsinstall
$ ./postRepalceCert.sh
NOTE
If you do not perform this step, the iNBIXMLSoapAgent process will fail to start up after
certificates are replaced on the U2000 server.
h. After the certificates are successfully replaced, run the following commands to
import environment variables and update the CAU configuration data (as the
ossuser user).
$ cd /opt/oss/cau/bin/
$ ./cau.sh
i. Run the following commands to start U2000 processes for the replacement to take
effect:
----End
Follow-up Procedure
l After the SSL digital certificates on the server and clients are replaced, delete the
webrenderer cache directory C:\Users\%username%\thirdparty\webrender manually
on all clients and restart the client processes. Otherwise, functions depending on
webrenderer may fail.
NOTE
If the C:\Users\%username%\thirdparty\webrender directory does not exist, skip this step.
l After the trust and identity certificates used by the U2000 server are successfully
replaced, delete certificate files from /opt/oss/server/certs on the U2000 server.
l After the trust and identity certificates used by the U2000 server are successfully
replaced, replace the trust and identity certificates used by the U2000 client as well.
Prerequisites
l You have obtained the SSL certificates and encryption passwords from a trusted institute.
– The client.p12 contains the client certificate file and key file. The password for
encrypting the file needs to be obtained.
– The server.p12 contains the server certificate file and key file. The password for
encrypting the file needs to be obtained.
– The rootCA.cer and subCA1.cer contains the files issued by the client, server, and
upper-layer system.
l Use the FTP to upload the new SSL certificate to the following directory on the U2000
server as the ossuser user before you replace the SSL certificate.
– Solaris/SUSE Linux: /opt/oss/server/certs.
NOTE
l The directory is true only if the U2000 on Solaris/SUSE Linux OS is installed in /opt/
oss. If the U2000 is not installed in partition /opt, change the partition in the directory
accordingly.
l If security hardening is performed, ossuser FTP/SFTP rights will be disabled. In this
case, you need to upload files to the backup directory in the FTP root directory as the
ftpuser user (the FTP root directory of ftpuser is /opt/backup/ftpboot) and then copy
files to the target directory as the ossuser user.
– Windows: D:\oss\server\certs.
NOTE
The directory is true only if the U2000 on Windows OS is installed in D:\oss. If the U2000 is
not installed in partition D, change the partition in the directory accordingly.
l The SSL certificates have been backed up.
Context
l The predeployed SSL certificates for the communication between the U2000 and
uTraffic are stored in the following paths:
– Solaris or SUSE Linux: /opt/oss/server/etc/ssl/solution
– Windows: D:\oss\server\etc\ssl\solution
l The certificate replacement script is stored in the /opt/oss/server/common/pms/share/
tools/ssl path (Use Solaris/SUSE Linux as an example. The path on Windows is
similar.). Run the ./replace_certs.sh command as the ossuser user in this path.
Information similar to the following is displayed:
NOTE
l -type indicates the certificate type, -file indicates the certificate path, and -pfxpass indicates
the encrypted password for the identity certificate.
l certificate type:
l 1: client identity certificate
l 2: server identity certificate
l 3: trust certificate
l 4: revocation certificate list
l certificate file: path in which the certificate is stored.
l Example:
l ./replace_certs.sh -type 1 -file client.p12 -pfxpass
l ./replace_certs.sh -type 2 -file server.p12 -pfxpass
l ./replace_certs.sh -type 3 -file trust.cer
l ./replace_certs.sh -type 4 -file revoke.crl
l To ensure the security of the system, remember to change passwords regularly and passwords
must be complex enough.
l A password cannot be short and a password is recommended containing eight or more
characters.
l At least two types of the following characters: digits, letters, and special characters
Procedure
l Replace an SSL certificate for the U2000 and uTraffic using a script.
a. Log in to the OS as the ossuser user.
b. Start the identity certificate replacement script.
n Solaris or SUSE Linux :
$ cd /opt/oss/server/common/pms/share/tools/ssl
$ ./replace_certs.sh -type certificate type -file certificate file -pfxpass
NOTE
l The identify certificates on the server and client must be replaced separately. For
example:
l replace_certs.bat -type 1 -file client.p12 -pfxpass
l replace_certs.bat -type 2 -file server.p12 -pfxpass
l To ensure the security of the system, remember to change passwords regularly and
passwords must be complex enough.
l A password cannot be short and a password is recommended containing
eight or more characters.
l At least two types of the following characters: digits, letters, and special
characters
n Windows:
>cd /d d:
> cd \oss\server\common\pms\share\tools\ssl
> replace_certs.bat -type certificate type -file certificate file -pfxpass
NOTE
l The identify certificates on the server and client must be replaced separately. For
example:
l replace_certs.bat -type 1 -file client.p12 -pfxpass
l replace_certs.bat -type 2 -file server.p12 -pfxpass
l To ensure the security of the system, remember to change passwords regularly and
passwords must be complex enough.
l A password cannot be short and a password is recommended containing
eight or more characters.
l At least two types of the following characters: digits, letters, and special
characters
c. Start the trust certificate replacement script.
n Solaris or SUSE Linux (as the ossuser user):
$ cd /opt/oss/server/common/pms/share/tools/ssl
$ ./replace_certs.sh -type certificate type -file certificate file
NOTE
For information about variables, see the background information. For example, ./
replace_certs.sh -type 3 -file trust.cer.
n Windows:
>cd /d d:
> cd \oss\server\common\pms\share\tools\ssl
> replace_certs.bat -type certificate type -file certificate file
NOTE
For information about variables, see the background information. For example,
replace_certs.bat -type 3 -file trust.cer.
d. Optional: Start the CRL configuration script.
n Solaris or SUSE Linux (as the ossuser user):
$ cd /opt/oss/server/common/pms/share/tools/ssl
$ ./replace_certs.sh -type certificate type -file certificate file
NOTE
For information about variables, see the background information. For example, ./
replace_certs.sh -type 4 -file revoke.crl.
n Windows:
>cd /d d:
> cd \oss\server\common\pms\share\tools\ssl
> replace_certs.bat -type certificate type -file certificate file
NOTE
For information about variables, see the background information. For example,
replace_certs.bat -type 4 -file revoke.crl.
e. Restart the U2000 service.
----End
Result
l If U2000 processes are properly started, the U2000 can be connected to uTraffic by
means of Security SSL and SSL certificates have been successfully loaded. You can
manually delete the backup SSL digital certificates for U2000 and uTraffic.
l If the U2000 process fails to start, you must replace backup certificates and save the
target certificates to the default certificates path.
Follow-up Procedure
After SSL certificates used for the communication between the U2000 and uTraffic are
successfully replaced, delete certificate files from the following directory on the U2000
server:
l Solaris/SUSE Linux: /opt/oss/server/certs.
NOTE
l The directory is true only if the U2000 on Solaris/SUSE Linux OS is installed in /opt/oss. If
the U2000 is not installed in partition /opt, change the partition in the directory accordingly.
l If security hardening is performed, ossuser FTP/SFTP rights will be disabled. In this case, you
need to upload files to the backup directory in the FTP root directory as the ftpuser user (the
FTP root directory of ftpuser is /opt/backup/ftpboot) and then copy files to the target
directory as the ossuser user.
l Windows: D:\oss\server\certs.
NOTE
The directory is true only if the U2000 on Windows OS is installed in D:\oss. If the U2000 is not
installed in partition D, change the partition in the directory accordingly.
Context
The trust certificate preconfigured by Huawei consists of the root certificate
huaweiossCA.crt and intermediate certificate networkossCA.crt. All of the certificates need
to be deployed on the Internet Explorer.
Procedure
Step 1 Open the Internet Explorer of the U2000 client and choose Tool > Internet Options from the
main menu.
Step 2 In the Internet Options dialog box, select Content tab and click Certificates.
Step 3 In the Certificates dialog box, deploy the root certificate huaweiossCA.crt.
1. Select the Trusted Root Certification Authorities tab and click Import.
2. In the Certificate Import Wizard dialog box, click Next.
3. Click Browse..., select the trusted root certificate huaweiossCA.crt, and click Next.
NOTE
The trust root certificate preconfigured by Huawei, huaweiossCA.crt , is stored in the oss\client
\client\style\defaultstyle\conf\ssl\trust\PEM directory.
4. Click Next, and then click Finish.
5. In the Security Warning dialog box that is displayed, click Yes.
6. In the Certificate Import Wizard dialog box, click OK.
Step 4 Deploy the intermediate certificate networkossCA.crt.
1. Select the Intermediate Certification Authorities tab and click Import.
2. In the Certificate Import Wizard dialog box, click Next.
3. Click Browse..., select the trusted intermediate certificate networkossCA.crt, and click
Next.
NOTE
----End
Follow-up Procedure
l If the U2000 GUI is displayed abnormally, the SSL certificate fails to be uploaded. Refer
to the preceding operations to redeploy a digital certificate.
l If the dialog which prompted you need trusted certification is displayed in the U2000 NE
management, right-click Continue to this website (not recommended), and then click
Open in the New Window. In the dialog box that is displayed, click OK. If the Security
Alert dialog box for the installation certificate is displayed, click OK to display the
current function GUI. After finish the operation, the U2000 GUI will display normally.
Prerequisites
l The U2000 services are running properly.
l The U2000 server communicates properly with the optical fiber of the OceanStor 5500
V3 disk array.
l The IP network between the U2000 server and the OceanStor 5500 V3 disk array is
normal.
l Log in to the U2000 server as user ossuser.
Context
The monitoring software OceanStor Device Manager monitors the hardware status of an
OceanStor 5500 V3 disk array, including the hard disks, controllers, power supplies, fans,
optical ports, and batteries. If the hardware becomes faulty or fails to work, the U2000 reports
an alarm.
l While the U2000 is being upgraded, a patch is being installed on the U2000, or the
network between the server and the disk array becomes faulty, the alarms generated on
the disk array cannot be handled in time. After the system restores, the historical alarms
will not be reported to the U2000.
l Device Manager, an integrated storage management platform provided by Huawei, can
manage multiple sets of disk arrays. You do not need to download or install Device
Manager because it has been installed on the disk array before delivery.
NOTE
l Configure disk array monitoring on either controller A or B. The following example describes how
to configure disk array monitoring on controller A.
l To configure the monitoring function for the disk array, ensure the network communication
between the IP address of the disk array controller set in the following steps and the NMS
application IP address is normal. Otherwise, the disk array may fail to report alarms to the U2000.
Procedure
Step 1 Run the following command on the U2000 server to log in to controller A of the OceanStor
5500 V3 disk array in SSH mode:
$export LD_LIBRARY_PATH=/usr/sfw/lib
$ ssh admin@IP address of controller A
NOTICE
The default administrator name is admin and the initial password of the admin user is
Admin@storage. If the U2000 is preinstalled before being delivered, the password has been
changed to Changeme_123. To ensure system security, change the password after you log in
to the system for the first time and the password must be complex enough.
If the system displays Are you sure you want to continue connecting (yes/no)?, type yes
and press Enter.
Step 2 Optional: If monitoring is configured for the OceanStor 5500 V3 disk array for the first time,
change the Kaimse password of the SNMP user. For details, see A.5.21 How to Change the
Private Key of the SNMPv3 User Between U2000 and the Disk Array.
Step 3 Run the following command to check whether the disk array has been assigned Trap IP,
namely, the NMS application IP address.
admin:/> show notification trap
l If the system does not display any command output, the disk array has not been assigned
Trap IP. Perform Step 4.
l If the system displays any command output, the disk array has been assigned Trap IP. In
the command output, check whether IP Address is correct.
– If IP Address is correct, go to Step 5.
– If IP Address is incorrect, run the following command to change Trap IP. Then
perform Step 5.
admin:/> change notification trap server_id=service ID trap_version=SNMP
version server_ip=IP address server_port=service port number
NOTE
After the modification is complete, run the show notification trap command to
check whether Trap IP is successfully changed.
Step 4 Optional: If the trap IP address for disk array has not bee configured, run the following
command to set the trap IP address:
This section uses 192.168.9.241 as an example. In a single-server system, set the Trap IP of
the disk array to the U2000 application IP address. In an HA system, set the Trap IP of the
disk array to the primary U2000 application IP address.
admin:/> add notification trap trap_version=v3 server_ip=10.168.9.241
server_port=23001
Step 5 Run the following command to check whether the system time of the disk array is consistent
with that of the U2000 server to which the disk array connects.
admin:/> show system general
System Name : XXX.Storage
Health Status : Normal
Running Status : Normal
Total Capacity : 3.186TB
SN : 210235G6EHZ0CX0000XX
Location :
Product Model : XXXX
Product Version : VX00R00XCXX
High Water Level(%) : 80
Low Water Level(%) : 30
WWN : XXXX
Time : 2015-07-07/15:34:05 UTC+08:00
NOTE
This section assumes that you change the system time of the disk array to 2014-04-06/11:22:05, with the
precision comes to minutes.
The change system time command is used to change the system time. The system time ranges from
1970-01-01/00:00:00 to 2069-12-31/23:59:00.
If the IP addresses of controllers A and B have been configured in the Set Hardware Alarm dialog box
of the commissioning tool, set the device to the correct device style.
1. Log in to the U2000 server as user ossuser.
2. Run the following command to add the device style and the IP address of the disk
array controller to the SANtricty_config.xml file:
$ cd /opt/oss/server/platform/resourcemonitor/
$ cat SANtricty_config.xml
<config>
<src name = "trapsender" ip = "IP address of controller A" port = "23001"
iorstring = ""/>
<src name = "trapsender" ip = "IP address of controller B" port = "23001"
iorstring = ""/>
</config>
– If the device style recorded in this file is incorrect, run the following commands:
$ cd /opt/oss/engr/install/scripts/commission
n If the login controller is controller A, trapType is trapA, that is, the IP address of
controller A is configured.
n If the login controller is controller B, trapType is trapB, that is, the IP address of
controller B is configured.
n newTrapIP indicates the IP address of the new controller.
3. Run the following command to view the user.xml file:
$ cat user.xml
<snmp name = "trap">
......
<instance name = "san" run = "true" filepath = "SANtricty_config.xml"/>
<instance name = "vcs" run = "true" filepath = "vcs_config.xml"/>
<loginfo name = "debug" run = "false" filepath = "HDMonitor.debug"/>
</snmp>
– If the value of san in the user.xml file is true, perform step Step 7.4.
– If the value of san in the user.xml file is not true, run the following commands to
change the value of san to true:
$ cd /opt/oss/engr/install/scripts/commission
$ bash user.sh
4. Run the following commands to restart the ResourceMonitor process:
$ kill -9 21579
NOTE
----End
Prerequisites
l The U2000 services are running properly.
l The U2000 server communicates properly with the optical fiber of the S3900 disk array.
l The IP network between the U2000 server and the S3900 disk array is normal.
l Log in to the U2000 server as user ossuser.
Context
The monitoring software OceanStor Integrated Storage Management (ISM) monitors the
hardware status of an S3900 disk array, including the hard disks, controllers, power supplies,
fans, optical ports, and batteries. If the hardware becomes faulty or fails to work, the U2000
reports an alarm.
l While the U2000 is being upgraded, a patch is being installed on the U2000, or the
network between the server and the disk array becomes faulty, the alarms generated on
the disk array cannot be handled in time. After the system restores, the historical alarms
will not be reported to the U2000.
l OceanStor ISM, an integrated storage management platform provided by Huawei, can
manage multiple sets of disk arrays. You do not need to download or install OceanStor
ISM because it has been installed on the disk array before delivery.
NOTE
l Configure disk array monitoring on either controller A or B. The following example describes how
to configure disk array monitoring on controller A.
l To configure the monitoring function for the disk array, ensure the network communication
between the IP address of the disk array controller set in the following steps and the NMS
application IP address is normal. Otherwise, the disk array may fail to report alarms to the U2000.
Procedure
Step 1 Run the following command on the U2000 server to log in to controller A of the S3900 disk
array in SSH mode:
$export LD_LIBRARY_PATH=/usr/sfw/lib
NOTICE
The initial user name for the administrator user is admin, and the password is
Admin@storage. To ensure system security, change the password after you log in to the
system for the first time and the password must be complex enough.
If the system displays Are you sure you want to continue connecting (yes/no)?, type yes
and press Enter.
Step 2 Run the following command to check whether the disk array has been assigned Trap IP,
namely, the NMS application IP address.
admin:/> showtrapip
============================================================
Trap IP Information
------------------------------------------------------------
Server ID Server IP Server Port Trap Version
------------------------------------------------------------
0 10.168.9.251 23001 SNMPv3
============================================================
l If the system does not display any command output, the disk array has not been assigned
Trap IP. Perform Step 3.
l If the system displays any command output, the disk array has been assigned Trap IP. In
the command output, check whether IP Address is correct.
– If IP Address is correct, go to Step 4.
– If IP Address is incorrect, run the following command to change Trap IP. Then
perform Step 4.
admin:/> chgtrapip -server service ID -ip IP address -port service port
number-ver SNMP version
NOTE
After the modification is complete, run the showtrapip command to check whether
Trap IP is successfully changed.
Step 3 Optional: If the trap IP address for disk array has not bee configured, run the following
command to set the trap IP address:
This section uses 192.168.9.241 as an example. In a single-server system, set the Trap IP of
the disk array to the U2000 application IP address. In an HA system, set the Trap IP of the
disk array to the primary U2000 application IP address.
admin:/> addtrapip -ip 10.168.9.241 -port 23001 -ver 3
Step 4 Run the following command to check whether the system time of the disk array is consistent
with that of the U2000 server to which the disk array connects.
admin:/> showsys
The system time of the disk array must be the same as that of the U2000 server to which the
disk array is connected. If the system times are inconsistent, run the following commands:
NOTE
This section assumes that you change the system time of the disk array to 2012-11-21/11:05:00, with the
precision comes to minutes.
The chgsystime command is used to change the system time. The system time ranges from
1970-01-01/00:00:00 to 2069-12-31/23:59:00.
admin:/> exit
Step 6 Perform the following operations to update information in the disk array-related configuration
file on the U2000 server:
NOTE
If the IP addresses of controllers A and B have been configured in the Set Hardware Alarm dialog box
of the commissioning tool, skip the following steps.
1. Log in to the U2000 server as user ossuser.
2. Run the following command to add the device style and the IP address of the disk
array controller to the SANtricty_config.xml file:
$ cd /opt/oss/server/platform/resourcemonitor/
$ cat SANtricty_config.xml
<config>
<src name = "trapsender" ip = "IP address of controller A" port = "23001"
iorstring = ""/>
<src name = "trapsender" ip = "IP address of controller B" port = "23001"
iorstring = ""/>
</config>
– If the device style recorded in this file is incorrect, run the following commands:
$ cd /opt/oss/engr/install/scripts/commission
$ ./setDevice.sh oldDevice newDevice
NOTE
n If the login controller is controller A, trapType is trapA, that is, the IP address of
controller A is configured.
n If the login controller is controller B, trapType is trapB, that is, the IP address of
controller B is configured.
n newTrapIP indicates the IP address of the new controller.
3. Run the following command to view the user.xml file:
$ cat user.xml
<snmp name = "trap">
......
<instance name = "san" run = "true" filepath = "SANtricty_config.xml"/>
<instance name = "vcs" run = "true" filepath = "vcs_config.xml"/>
<loginfo name = "debug" run = "false" filepath = "HDMonitor.debug"/>
</snmp>
– If the value of san in the user.xml file is true, perform step Step 7.4.
– If the value of san in the user.xml file is not true, run the following commands to
change the value of san to true:
$ cd /opt/oss/engr/install/scripts/commission
$ bash user.sh
4. Run the following commands to restart the ResourceMonitor process:
$ ps -ef | grep "ResourceMonitor"
ossuser 21579 1 0 20:15:05 ? 4:43 ResourceMonitor -cmd start
ossuser 23892 13957 0 10:43:05 pts/2 0:00 grep ResourceMonitor
In the command output, the second row of the ResourceMonitor -cmd start line
displays the ID of ResourceMonitor. This section uses ID 21579 as an example.
$ kill -9 21579
NOTE
----End
Prerequisites
l The U2000 service is running properly.
l The alarm service is running properly.
NOTE
Log in to the server of the alarm service as the ossuser and run the following commands to view,
start or stop the alarm service.
l View the status of the alarm service: /opt/oss/manager/alarmmonitor/bin/rcuniep_alarm
status
l Start the alarm service: /opt/oss/manager/alarmmonitor/bin/rcuniep_alarm start
l Stop the alarm service: /opt/oss/manager/alarmmonitor/bin/rcuniep_alarm stop
l iMana Version
– RH 2288HH V2: (U1029)6.0 or above
– RH 5885HH V3: (U6)5.97 or above
NOTE
To upgrade the system controller firmware version, see A.2.10 How to Upgrade the System
Controller Firmware Version for Huawei RH5885H V3 and RH2288H V2 Servers?.
Context
The purpose of configuring server hardware alarms is to enable uploading of theses alarms to
the U2000 for monitoring. If another system is already available for monitoring these alarms
or they do not need to be monitored by the U2000, such configuration is not required.
Procedure
Step 1 Configure U2000 information.
1. Log in to the U2000 server as the ossuser user using the PuTTY.
2. Run the following command to configure U2000 information:
$ cd /opt/oss/manager/alarmmonitor/bin
$ ./alarm_receiver_mgr.sh add -emsip=192.168.128.158
NOTE
1--north
2--heart
=================================================================
NOTICE
Choose User Group to Administrator.
3. Choose Configuration > Log and Alarm to access the Trap window.
7. Click OK.
8. Choose Configuration > Service, click SNMP Configurations to access the SNMP
Configurations window.
Ensure that the SNMP Service is set to SNMP V3, SNMP V3 Authentication Protocol
is set to SHA and SNMP V3 Privacy Protocol is set to AES.
Step 3 Register the server to the alarm service.
1. Log in the OS with the alarm service as the ossuser user using the PuTTY.
2. Run the following command to configure use information:
$ cd /opt/oss/manager/alarmmonitor/bin
$ ./user_mgr.sh
NOTE
The entered password of the SNMP user name for communication and is the same as the password
of the user name set in Step 2.5.
6. Enter Y to confirm user adding.
If information similar to the following is displayed, the user account is successfully
added. In this case, press Enter.
----End
Prerequisites
l The U2000 service is running properly.
l The alarm service is running properly.
NOTE
Log in to the server of the alarm service as the ossuser and run the following commands to view,
start or stop the alarm service.
l View the status of the alarm service: /opt/oss/manager/alarmmonitor/bin/rcuniep_alarm
status
l Start the alarm service: /opt/oss/manager/alarmmonitor/bin/rcuniep_alarm start
l Stop the alarm service: /opt/oss/manager/alarmmonitor/bin/rcuniep_alarm stop
l iBMC Version:
– RH 2288HH V3: (U25)2.06 or above
– RH 5885HH V3: (U6)5.97 or above
NOTE
To upgrade the system controller firmware version, see A.2.11 How to Upgrade the System
Controller Firmware Version for Huawei RH2288H V3 server and Huawei RH5885H V3
server?.
Context
The purpose of configuring server hardware alarms is to enable uploading of theses alarms to
the U2000 for monitoring. If another system is already available for monitoring these alarms
or they do not need to be monitored by the U2000, such configuration is not required.
Procedure
Step 1 Configure U2000 information.
1. Log in to the U2000 server as the ossuser user using the PuTTY.
2. Run the following command to configure U2000 information:
$ cd /opt/oss/manager/alarmmonitor/bin
$ ./alarm_receiver_mgr.sh add -emsip=192.168.128.158
NOTE
NOTICE
Choose User Group to Administrator.
3. Choose Configuration > System Settings to access the System Settings window.
Ensure that the Set SNMP Version is set to V3, SNMP V3 AuthProtocol is set to
SHA1 and SNMP V3 PrivProtocol is set to AES.
4. Choose Alarm & SEL > Alarm Setting to access the Alarm Setting window.
5. In the Alarm Trap Notification Settings area, set Trap Function to ON.
6. In Set Trap Properties, set Trap Version to V3. Choose Trap V3 User to the user that
is configured to report alarms from the control card to the alarm server, and Trap Mode
to OID.
7. In Select Alarm Severities, select All and click Save.
8. In Configure Trap Server and Packet Format, click in a record to specify a trap
server and a packet format.
===============================================================
1--Add User
2--Delete User
3--Query User
E--Exit
===============================================================
Select an operation type :
NOTE
The entered password of the SNMP user name for communication and is the same with the
password of the user name set in Step 2.6.
6. Enter Y to confirm user adding.
If information similar to the following is displayed, the user account is successfully
added. In this case, press Enter.
INFO: Succeeded in adding the user .
===============================================================
NOTICE: Press Enter to return to the home page.
----End
NOTE
According to security requirements, the FTP service at the secondary site in an HA system is disabled by
default so that the site cannot be connected through FTP. You can use SFTP instead.
l Local FTP service mode: The U2000 server functions as the FTP server. During the
U2000 installation, an FTP/SFTP user is created by default to implement file transfer
among the client, NEs, and U2000 server.
l Third-party FTP service mode: A computer is configured as the FTP server. In this case,
the FTP/SFTP service must be installed on the computer and an FTP/SFTP user must be
created to implement file transfer among the client, NEs, and U2000 server.
After the U2000 is installed, one default local FTP account and three default third-party FTP
accounts are available. Each FTP account is a combination of the FTP service mode, FTP user
account, and main directory. FTP applications can directly use the FTP accounts without
requiring the input of FTP user names or other information. The default local FTP account has
a default local FTP user named ftpuser. Information about the default local FTP account has
been configured and therefore can be directly used. However, the default third-party FTP
accounts can be properly used only after their information is configured on the third-party
FTP server. The following table lists information about the default FTP accounts.
l This
accou
nt is
used
for file
transfe
r
betwe
en the
U2000
and
NEs.
It is
autom
aticall
y
create
d
during
U2000
install
ation
and
can be
directl
y
used.
After the U2000 is installed, eleven default FTP applications are available. The following
table lists information about the default FTP applications.
Access System Default local FTP account The FTP service is used to verify
the dump command, NE
synchronization, exported
hardware reports, support for
board decoupling, and distributed
NE migration.
ONT LOAD Default local FTP account The FTP service is configured and
tested to ensure the normal
operation of the ONT automatic
upgrade tasks or value-added
services.
PMS BulkCollector FTP Default local FTP account The FTP service is used to collect
Account NE performance data in batches
for analysis and statistics
collection on the U2000.
MSO System Default local FTP account The FTP service is configured to
ensure that the PNM, real-time
spectrum scanning, and historical
spectrum scanning functions of
the MSO system can be properly
used to collect device data for the
MSO system to analyze and
display.
This application applies only to
the access domain U2000 where
the MSO component is installed.
NE Software Default local FTP account The FTP service is configured and
Management(Client) tested to ensure normal
transmission of xFTP files
between the U2000 server and
client. This allows NE data
backup, NE data recovery, and
software library import from the
client.
NE Software Default local FTP account The FTP service is configured and
Management(NE) tested to ensure normal
transmission of xFTP files
between the U2000 server and
client. This helps implement
functions such as NE data backup,
recovery and software library
importing from the server.
NE License Management Default local FTP account The FTP service is configured and
tested to ensure normal license
file transmission between the
U2000 and NEs and implement
NE license upload and
management.
Information Collection Default local FTP account The FTP service is used to collect
of Device Fault NE fault diagnosis data for
Diagnosis analysis and statistics collection
on the U2000.
Figure C-3 Procedure for configuring and testing the FTP service on the U2000
Prerequisites
FTP servers are functioning properly, and the FTP/SFTP service has been installed.
Context
The U2000 supports both local and third-party FTP servers. If over 5,000 NEs are managed,
you are advised to use third-party FTP servers to transfer files between the U2000 and NEs.
This topic focuses on how to check the startup status of a local FTP server.
If a local FTP server is used (SFTP is recommended because it provides better security.), the
FTP/SFTP service is automatically installed.
l The ftpuser user is automatically created during U2000 installation. The ftpuser user is
a default user of the FTP service that is enabled by default.
l the OpenSSH software is automatically installed during U2000 installation. In addition,
the SFTP service is automatically installed, and the ftpuser and sshd users are
automatically created.
– sshd: user of the SSH service that is disabled by default. This user is automatically
created during OpenSSH installation.
– ftpuser: default user of the SFTP service that is enabled by default. This user is
created by the U2000.
NOTE
According to security requirements, the FTP service at the secondary site in an HA system is disabled by
default so that the site cannot be connected through FTP. You can use SFTP instead.
Procedure
Step 1 Log in to the operating system as a user with ossuser rights.
Step 2 Use the FTP software (for example, FileZilla) to connect to the U2000 server. If the
connection is successful, the FTP service has started. If the connection fails, the FTP service
has not started.
----End
Follow-up Procedure
How Do I Manually Enable and Disable the FTP Service on a Server, see A.1.2 How to
Start/Stop the FTP/SFTP/Telnet Service in the SUSE Linux OS.
Context
l After the U2000 is installed, each FTP service application has a default FTP account that
is bound to a default FTP user. An FTP user must be created only when an application
requires an independent account.
l A newly created user can be an FTP or SFTP user.
l This topic only describes how to create an FTP user on the local FTP server. If a third-
party FTP user is required for an application, the user must have been created and the
user account is valid.
l The procedure below instructs you how to create the FTP user neftpuser, assuming that
the main FTP directory is /opt/backup/neftpboot/ and the user's files need to be saved
to /opt/backup/neftpboot/ftproot/.
Procedure
Step 1 Log in to the local FTP server as the root user root using SSH.
Step 2 Run the following command to create the FTP user named neftpuser:
# useradd -d /opt/backup/neftpboot -g ossgroup -G ossgroup -m -k /etc/skel -
s /bin/bash neftpuser
NOTE
Step 3 Set a password for the newly created FTP user as follows:
1. Run the following command to set a password for the FTP user.
# passwd FTP user name
Step 4 Run the following command to assign rights to the main path of the newly created FTP user:
# chmod 755 /opt/backup/neftpboot
# chown root:ossgroup /opt/backup/neftpboot
Step 5 Run the following commands to create the directory to which the new FTP user's files will be
saved to and assign rights to the directory:
# mkdir -p /opt/backup/neftpboot/ftproot
# chmod 771 /opt/backup/neftpboot/ftproot
# chown ossuser:ossgroup /opt/backup/neftpboot/ftproot
NOTE
l /opt/backup/neftpboot is the main path for the newly created FTP user.
l FTP root directory/ftproot/ is the directory where files are saved.
Step 6 Perform the following operations so that the newly created FTP user can access only the
directory for the FTP user neftpuser and files:
NOTE
After this step is performed, the newly created FTP user neftpuser can access only the directory for the
FTP user neftpuser (/ftproot) and files.
l Perform the following operations so that the newly created FTP user can access only the
main directory, sub-directories, and files:
a. Log in to the local FTP server as the root user root using SSH.
b. Run the vi command to open the vsftpd.chroot_list file.
# vi /etc/vsftpd.chroot_list
c. Add the newly created FTP user neftpuser to the vsftpd.chroot_list file as follows:
ftpuser
neftpuser
d. Run the :wq command to save the configuration and exit the vi editor.
l Perform the following operations so that the newly created FTP user can access only the
main directory, sub-directories, and files:
a. Log in to the local FTP server as the root user root using SSH.
b. Run the vi command to open the sshd_config file.
n On Solaris:
# vi /usr/local/etc/sshd_config
n On Linux:
# vi /etc/ssh/sshd_config
c. Add the newly created FTP user neftpuser to the Match User ftpuser line.
Information similar to the following is displayed:
............
Match User ftpuser,neftpuser
ChrootDirectory %h
ForceCommand internal-sftp
............
d. Run the :wq command to save the configuration and exit the vi editor.
Step 7 Optional: Perform the following operations so that SFTP logs of a newly created FTP user
are recorded:
NOTICE
l If the main directory of an FTP user changes, re-perform the following operations so that
the FTP user's SFTP logs are recorded:
l A newly created FTP user neftpuser and the user's main directory (/opt/backup/
neftpboot) are used as an example.
l On Linux:
a. Log in to the local FTP server as the root user root using SSH.
b. Run the vi command to open the sbin.syslog-ng file.
# vi /etc/apparmor.d/sbin.syslog-ng
Information similar to the following is displayed:
/sbin/syslog-ng {
............
/sbin/syslog-ng mr,
# chrooted applications
/var/lib/*/dev/log w,
/var/log/** w,
............}
c. Add /opt/backup/neftpboot/dev/logw to the sbin.syslog-ng file as follows:
/sbin/syslog-ng {
............
/sbin/syslog-ng mr,
# chrooted applications
/var/lib/*/dev/log w,
/var/log/** w,
/opt/backup/neftpboot/dev/log w,
}
d. Run the :wq command to save the configuration and exit the vi editor.
e. Run the vi command to open the syslog-ng.conf file.
# vi /etc/syslog-ng/syslog-ng.conf
Information similar to the following is displayed:
............
source src {
............
unix-dgram("/dev/log");
#
# uncomment to process log messages from network:
#
#udp(ip("0.0.0.0") port(514));
};
f. Add unix-dgram("/opt/backup/neftpboot/dev/log") to the syslog-ng.conf file as
follows:
............
source src {
............
unix-dgram("/dev/log");
unix-dgram("/opt/backup/neftpboot/dev/log");
#
# uncomment to process log messages from network:
#
#udp(ip("0.0.0.0") port(514));
};
g. Run the :wq command to save the configuration and exit the vi editor.
h. Run the following commands to create a directory for the FTP user's logs and
assign rights to the directory:
# mkdir /opt/backup/neftpboot/dev
# chmod 700 /opt/backup/neftpboot/dev
# chown neftpuser:ossgroup /opt/backup/neftpboot/dev
l On Solaris:
a. Log in to the local FTP server as the root user root using SSH.
b. Run the following commands to create a directory for the FTP user's logs and
assign rights to the directory:
# mkdir /opt/backup/neftpboot/dev
# chmod 755 /opt/backup/neftpboot/dev
# chown root:sys /opt/backup/neftpboot/dev
c. Run the following command to check file attributes of the log and conslog:
# ls -lL /dev/ |grep log
NOTE
In the preceding information, 21 and 0 are file attributes of the conslog, and 21 and 5 are file
attributes of the log.
d. Run the following commands to create the /opt/backup/neftpboot/dev/log
and /opt/backup/neftpboot/dev/conslog devices:
# mknod /opt/backup/neftpboot/dev/conslog c 21 0
# mknod /opt/backup/neftpboot/dev/log c 21 5
NOTE
In the preceding two commands, 21 0 and 21 5 are file attributes of the conslog and log.
e. Run the following command to restart the syslog:
# svcadm restart svc:/system/system-log:default
----End
Prerequisites
l You are an NMS user with Operator Group authority or higher.
l On the FTP server, create an FTP user for the associated FTP application.
Context
l By default, the local FTP account and associated FTP application have been configured
after a U2000 client is installed. Do not modify the default settings.
l Multiple FTP applications can share one FTP account.
l The procedure for creating new account NE Management FTP Account to be used for
the NE Software Management(NE) application and binding the neftpuser user is used
as an example.
Procedure
Step 1 Choose Administration > Settings > FTP Account Information Management from the
main menu (traditional style); alternatively, double-click System Management in
Application Center and choose Settings > FTP Account Information Management from
the main menu (application style).
Step 2 In the FTP Account Information Management dialog box, click the Configure FTP
Account tab.
Step 3 On the Configure FTP Account tab, add account NE Management FTP Account for the
NE Software Management(NE) application.
1. Right-click in a blank area and choose Add from the shortcut menu.
2. In the Add FTP User dialog box, set parameters such as FTP Account, Server Name,
and Server IP Address.
– FTP Account: name of the new account, for example, NE Management FTP
Account
– Server Type: running mode of the FTP service, for details, see Table C-3
User Name Indicates the user name for logging in to the FTP
server.
FTP Port Indicates the port used for FTP transmission between
an FTP client and the FTP server.
SFTP Port Indicates the port used for SFTP transmission between
an FTP client and the FTP server.
User Name Indicates the user name for logging in to the FTP
server.
SFTP Port Indicates the port used for SFTP transmission between
an FTP client and the FTP server.
Check Public Check whether the public key entered by users is the
Key same as that of the third-party FTP server public key.
NOTE
The Check Public Key can be selected only when Server
Type is Third Party and Protocol is SFTP.
Private key Indicates the local path to the private key file.
file path
NOTE
– The account is created only for registration. The FTP user used for the account must be created
on the FTP server before account creation; otherwise, the FTP account cannot be properly used
after being created.
– FTP user information configured in this step must be the same as that on the FTP server.
– As SFTP is securer than FTP, SFTP is recommended when Server Type is set to Third Party.
3. Click OK.
4. In the Result dialog box, click Close.
Step 4 In the FTP Account Information Management dialog box, click the Configure FTP
Application tab.
NOTE
l The FTP applications Information Collection of Device Fault Diagnosis and Access System applies
only to the access domain.
l The FTP application IP Common Management(NE) applies only to the IP domain. Binding a third-
party FTP account to the FTP application is not supported.
Step 5 On the Configure FTP Application tab, add NE Management FTP Account to the NE
Software Management(NE) application.
1. Right-click the NE Software Management(NE) application and choose Modify from
the shortcut menu.
2. In the Modify FTP Application dialog box, select NE Management FTP Account.
3. Click OK.
4. In the Result dialog box, click Close.
NOTE
l One FTP application can use only one local FTP account, and one FTP account can be bound to only
one FTP user.
l After NE Management FTP Account is added to the NE Software Management(NE) application,
the default local FTP account is no longer used when NE Management FTP Account is used to
transfer files.
----End
Follow-up Procedure
l If FTP account information on the FTP server changes, perform the following operations
to modify FTP accounts on a U2000 client to keep consistency with those on the FTP
server. Consistent FTP information ensures normal FTP services. Only the FTP accounts
on a client are modified and the modifications do not affect FTP accounts on the FTP
server.
a. Right-click a desired FTP account and choose Modify from the shortcut menu.
b. In the Modify FTP User dialog box, modify parameters except FTP Account
based on site requirements.
c. Click OK.
d. In the Result dialog box, click Close.
l Perform the following operations to delete unused FTP accounts from a client, which
does not affect FTP accounts on the FTP server:
a. Right-click a desired FTP account and choose Delete from the shortcut menu.
b. Click OK when the Warning dialog box is displayed indicating that the selected
account will be deleted.
c. In the Result dialog box, click Close.
Prerequisites
l The FTP service on an FTP server has been enabled.
l The FTP user used for an FTP application has been created, and user information has
been configured on the FTP server.
Procedure
Step 1 Choose Administration > Settings > FTP Account Information Management from the
main menu (traditional style); alternatively, double-click System Management in
Application Center and choose Settings > FTP Account Information Management from
the main menu (application style).
Step 2 In the FTP Account Information Management dialog box, click the Configure FTP
Account tab.
Step 3 On the Configure FTP Account tab, right-click a desired FTP account and choose Test from
the shortcut menu to test whether the FTP function is available.
Step 4 In the dialog box that is displayed, click Test FTP or Test SFTP to test the FTP or SFTP
function of the FTP server.
l When adding or modifying an FTP account, you can click Test to test the new or modified FTP
account.
l If the test succeeds, the FTP user information on the client is the same as that on the server, and the
client can properly communicate with the server.
----End
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
D.1 Powering On the Server Safely
D.2 Starting the Database
This topic describes how to start the database. The U2000 can start properly only after the
database is started.
D.3 Starting the U2000 Server Processes
You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.
Server
1. Power on a Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3/IBM
X3650 M4/IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l Huawei RH2288H V2/Huawei RH2288H V3/Huawei RH5885H V3 server supports
100 to 240 VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC
and 200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
2. Press the power buttons on the peripherals and monitor connected to a server.
3. Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks
every 1s, press the power button on the shelf of the server.
NOTE
If the power button is steady on, the server has been successfully powered on. For details about
IBM server indicators, see the manual for IBM servers or log in to the official IBM website. For
details about Huawei server indicators, see the manual for Huawei servers or log in to the official
Huawei website. For official websites of software and hardware documents, see A.5.17 How Do I
Obtain Third-Party Software and Hardware Materials.
The red boxes in the following figures show the positions of power buttons on Huawei
RH2288H V2, Huawei RH2288H V3, Huawei RH5885H V3, IBM X3650 M4, IBM
X3650 M3 and, IBM X3850 X5.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network
cables, or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning
it on.
NOTE
Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10
minutes until the power indicator is steady green, no longer flashing, indicating the success of the
power-on.
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see A.1.1 How to Change the OS User Password.
Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase
NOTE
Step 3 Run the following commands to start the Sybase database if it is not running.
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
NOTE
Prerequisites
The OS on the PC server on which the U2000 server processes are installed is running
properly, and the database has been started.
Context
Generally, the U2000 server processes start along with the OS.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
E.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system
time of the computer where the server is installed or upgrading the version.
E.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the
database on the SUSE Linux single-server system.
E.3 Powering Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database.
This topic describes how to power off the U2000 single-server system (SUSE Linux) .
Prerequisites
All running U2000 clients have been stopped.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
$ daem_ps
NOTE
The U2000 is running if the displayed information contains imapmrb, imapwatchdog -cmd start,
imapsysd -cmd start, imapeventmgr, imap_sysmonitor -cmd start, ResourceMonitor -cmd start. If
no introduction is displayed, the U2000 processes have been stopped.
----End
Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see A.1.1 How to Change the OS User Password.
Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase
NOTE
Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
Enter the database administrator user password as prompted. The initial password of the database
administrator user is Changeme_123.
In order to enhance the security of the database after the U2000 is installed, the sa user may be manually
disabled and replaced with a customized administrator name, such as dbadmin.
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error:
Net-Library operation terminated due to disconnect
----End
Result
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the OS as the ossuser user. Run the following command to switch to the root user.
$ su - root
Password: password for the root user
NOTE
If you do not want to power off the server, you can run the following commands to restart the OS:
# sync;sync;sync;sync
# shutdown -r now
----End
F Getting Started
This topic describes certain common operations that can be performed on the SUSE Linux
workstation. After learning this topic, you can improve the efficiency of the operations on the
SUSE Linux OS.
NOTICE
The number pad keyboard is not recommended. This is because Num Lock may fail to work
normally when the OS is installed on certain machines.
On the desktop of the GUI OS, right-click in the blank area and choose Open in Terminal
from the shortcut menu to access the CLI.
The SUSE Linux commands are case-sensitive. That is, the OS considers an uppercase letter
and its corresponding lowercase letter two different letters. For example, when you want to
use the command for displaying the files in the certain directory, the OS can correctly run the
ls command, but it cannot run the Ls command because the Ls command is considered as an
invalid system command. The options in the SUSE Linux commands are used to change the
command execution method. Generally, the options start with the en-dash (-).
For example, run the following command to display the files and the related details in the /opt
directory:
ls -al /opt
Switching Users
The SUSE Linux OS has strict user management rules. Different OS users can access only
associated applications.
l To switch OS users, run the following command:
su - OS user name
Leave a space between - and OS user name.
For example, to switch to the ossuser user, run the following command:
su - ossuser
NOTE
To switch back to the root user, run the exit command several times until the prompt changes to #.
NOTE
The PuTTY is a free software used to log in to the UNIX OS by commands. You can access http://
www.chiark.greenend.org.uk/~sgtatham/putty/download.html to download the PuTTY. For more
information about software operation, see the software Help or go to the official website of the software
http://www.chiark.greenend.org.uk/~sgtatham/putty/docs.html for technical support.
1. Double-click the shortcut icon of the PuTTY software on the desktop. The following
dialog box is displayed.
Parameter Description
2. Set the parameters for logging in to the server. Then, click Open. The login dialog box is
displayed.
3. Enter the login user name, and then press Enter.
4. Enter the login password, and then press Enter.
NOTE
l When the remote desktop system is used, choosing Computer > Shutdown or Computer >
Logout > Switch User does not take effect. To shut down the system or switch to another user, run
associated CLI commands.
l If you enter the SUSE Linux login window by the IMM IP address, press Alt+Tab to switch to the
SUSE Linux login window, and characters cannot be entered, press Alt and try again.
5. Enter the login password of the user. Press Enter to log in to the OS.
When you restart the OS, the remote login user exits. It takes approximately 5 to 8 minutes to
restart the system. After the OS is restarted, re-log in to the server by referring to the
preceding login method.
Difference Between Command Operations on the Solaris and SUSE Linux OSs
Table F-1 Difference between command operations on the Solaris and SUSE Linux OSs
Command operation On Solaris On SUSE Linux
Shut down the OS. Run the following Run the following
commands to shut down the commands to shut down the
OS: OS:
# sync;sync;sync;sync # sync;sync;sync;sync
# shutdown -y -g0 -i5 # shutdown -h now
Disable system hardening. Run the following command Run the following command
to disable system hardening to disable system hardening
for the SetSolaris system: for the SetSuse system:
# cd /opt/SEK
# ./rollbackSEK.sh l If the OS version is Suse
11, run the following
command:
# cd /opt/SEK
# ./rollbackSEK.sh
This part can be skipped if the OS is installed with the quick installation DVD because the
installation software automatically partitions disks according to the disk size.
NOTE
l If the size and the number of hard disks to be configured for the server are not standard, contact
Huawei engineers to obtain the hard disk partitioning solution.
l You can run the df -h command to check disk partitions.
/var/log 10 -
/var/log/ 4 -
audit
Third and fourth hard disk /opt/sybase/ 100 It is used to store database data.
NOTE data
Partitioning is performed
only on the third and fourth /opt/backup 400 It is used to store backup data.
hard disks and the fifth and
sixth hard disks are used as
the mirroring disks.
The seventh hard disk /opt/ 300 It is used to system back up.
ssrbackup_l
ocal
The eighth hard disk /opt/backup/ 300 It is used to back up the database.
forDBSVRB
CK
l Configure the two hard disks on the server as RAID 1. Install the OS software and
U2000 project-related software and configure OS data.
l Configure the first 10 hard disks of the OceanStor S3900 disk array as RAID 10. The
first 10 hard disks are used to store database software, database data, U2000 software,
and backup data. The remaining two hard disks are used for global hot backup for the
first 10 hard disks.
NOTE
l If the size and the number of hard disks to be configured for the server are not standard, contact
Huawei engineers to obtain the hard disk partitioning solution.
l You can run the df -h command to check disk partitions.
/var/log 10 -
/var/log/audit 4 -
This topic describes how to configure the OceanStor 5500 V3, OceanStor S3900 disk arrays.
H.1 Configuring the OceanStor 5500 V3 Disk Array Using the OceanStor DeviceManager
This topic describes how to configure the OceanStor 5500 V3 disk array using the OceanStor
DeviceManager
H.2 Configuring the OceanStor S3900 Disk Array by Using the ISM
This topic describes how to configure the OceanStor S3900 disk array using the ISM.
Prerequisites
l The IP addresses for both controllers of OceanStor 5500 V3 the disk array are
configured. For details about how to set and view the IP addresses for controllers of the
OceanStor 5500 V3, see 4.6.3.1 Setting the SC IP Address for the OceanStor 5500 V3
Disk Array.
l The primary and secondary power supplies of the disk array have been powered on. For
more information, see 4.5 Powering On a Server.
l The Window management terminal must communicate properly with the disk array
controller.
l Users are logged in to the ISM from the Windows management terminal by using
Internet Explorer 9.0, Internet Explorer 10, or Internet Explorer 11.
Context
The OceanStor DeviceManager will lock up if an operation is not performed within 10
minutes after login. Enter the password again to log in if a lockup occurs.
NOTICE
If the selected disk arrays are not the OceanStor 5500 V3 disk arrays (12x600 GB), contact
Huawei engineers for details about how to configure the disk arrays.
Procedure
Step 1 Log in to the OceanStor DeviceManager.
1. Open the Internet Explorer on the Windows management terminal.
2. Enter https://XXX.XXX.XXX.XXX:8088 in the address bar of the Internet Explorer
(where XXX.XXX.XXX.XXX indicates the IP address of the management network port
of the storage array controller). Such as https://10.9.1.10:8088.
NOTE
– XXX.XXX.XXX.XXX indicates the IP address of the management network port of the storage
array controller.
– Port 8088 needs to be enabled when the system provides the web service externally in an
environment with the firewall deployed.
– A message may be displayed indicating that the security certificate of the website brings risks.
In this case, ignore the message and continue to visit the disk array as long as the IP address is
correct.
Parameter Description
3. Click OK.
A message is displayed indicating an operation success.
4. Click OK.
Parameter Description
3. Click OK.
The Execution Result dialog box is displayed.
4. When State is Succeeded, click Close. Storage pool creation completes.
b. Click LUN.
The LUN page is displayed.
c. Click Create.
The Create LUN dialog box is displayed.
2. Set LUN parameters.
Parameter Description
Capacity 1500
Quantity 1
3. Click OK.
The Execution Result dialog box is displayed.
4. When State is Succeeded, click Close. LUN creation completes.
c. Select LUN001 created in Step 4 in the Available LUNs area and click to
move it to the Selected LUNs area.
3. Click OK.
The Execution Result dialog box is displayed.
4. When State is Succeeded, click Close. LUN group creation completes.
Parameter Description
OS Linux
selected. Then click to move the selected initiators to the Selected Initiators
area.
4. Confirm the creation.
a. Click Next.
The Summary dialog box is displayed.
b. Click Finish to confirm created host's information.
The Warning dialog box is displayed.
c. Read the displayed message carefully and select I have read and understood the
consequences associated with performing this operation..
d. Click OK.
The Execution Result dialog box is displayed, indicating an operation success.
e. Click Close. Host creation completes.
Step 7 Create host group.
1. Log in to the Create Host Group dialog box.
c. Click Create.
The Create Host Group dialog box is displayed.
2. Set host group parameters.
The following table shows the parameter description.
Parameter Description
a. Click .
The Select Host Group dialog box is displayed.
b. Select the host group created in Step 7 from the list.
c. Click OK.
4. Add a LUN group to the mapping view.
a. Click .
The Select LUN Group dialog box is displayed.
b. Select the LUN group created in Step 5 from the list.
c. Click OK.
5. Confirm the creation.
a. Click OK.
The Warning dialog box is displayed.
b. Read the displayed message carefully and select I have read and understood the
consequences associated with performing this operation..
c. Click OK.
The Execution Result dialog box is displayed.
d. When State is Succeeded, the mapping view is successfully created. In this case,
click Close.
Step 9 Restart device.
NOTE
In the preceding command, port ID indicates the ports through which the disk array connects to
the server.
You can run the lsscsi command to query port IDs. The first column in the returned message
displays the port IDs of the fiber card. For example, run the following command:
# lsscsi
[0:2:0:0] disk LSI LSI 3.19 /dev/sda
[6:0:0:0] cd/dvd TSSTcorp CDDVDW SN-208DB CH00 /dev/sr0
[7:0:0:0] disk HUAWEI XSG1 4302 -
[7:0:0:1] disk HUAWEI XSG1 4302 /dev/sdb
[8:0:0:0] disk HUAWEI XSG1 4302 -
[8:0:0:1] disk HUAWEI XSG1 4302 /dev/sdc
Find the last two lines containing 4302 in the fourth column. Information in the first columns
([7:0:0:0] and [8:0:0:0]) indicates that the OceanStor 5500 V3 disk array connects to the server
through port 7 and port 8.
The following message will be displayed:
running
NOTE
If the fiber card is not in the running state, check and ensure the following aspect:
– The fiber is properly connected to the optical module.
– There is not any damage to the fiber.
– The optical module is properly connected to the fiber card.
– The indicator of the fiber card is functioning properly.
3. Run the following commands to restart the OS of the server and refresh the disk status:
# sync;sync;sync;sync
# shutdown -r now
----End
Prerequisites
l The IP addresses for both controllers of OceanStor S3900 the disk array are configured.
For details about how to set and view the IP addresses for controllers of the OceanStor
S3900, see 4.6.3.2 Setting the SC IP Address for the OceanStor S3900 Disk Array.
l The primary and secondary power supplies of the disk array have been powered on. For
more information, see 4.5 Powering On a Server.
l The Window management terminal must communicate properly with the disk array
controller.
l Users are logged in to the ISM from the Windows management terminal by using
Internet Explorer 7.0, Internet Explorer 8.0, or Internet Explorer 9.0.
Context
The ISM software will lock up if an operation is not performed within 10 minutes after login.
Enter the password again to log in if lock up occurs.
The following table shows the configuration requirements on the OceanStor S3900 disk array.
NOTICE
If the selected disk arrays are not the OceanStor S3900 disk arrays (12x600 GB), contact
Huawei engineers for details about how to configure the disk arrays.
Configure Settings
Item
Configure Settings
Item
Procedure
Step 1 Log in to the ISM.
1. Open the Internet Explorer on the Windows management terminal.
2. Enter https://XXX.XXX.XXX.XXX (more secure, recommended) or http://
XXX.XXX.XXX.XXX in the address bar of the Internet Explorer (where
XXX.XXX.XXX.XXX indicates the IP address of the management network port of the
storage array controller). Such as https://10.9.1.10.
NOTE
If "The page cannot be displayed" is displayed on the Internet Explorer, the Windows management
terminal and the disk array controller fail to communicate with each other. Check the network
connection.
The system will navigate to the default login window of the ISM, as shown in the
following figure.
3. Click Click Here to Launch OceanStor ISM. The system will check whether the ISM
is installed on the Windows management terminal.
NOTICE
Before installing the ISM, install the Java runtime environment (JRE). The JRE version
must be 1.6.0 or later (excluding version 1.6.0.20). In the CLI, run the java -version
command to view the JRE version. If the JRE is not installed, click Please Setup JRE.
If the ISM is not installed on the Windows management terminal, the system will
automatically download and install the ISM by means of the Java web start (JWS). If the
ISM is installed on the Windows management terminal, the system will automatically
check the software version. If the version of the ISM is not the latest version, the system
will automatically upgrade the software to the latest version.
4. In the Warning - Security dialog box, select Always trust content from this publisher
and click Run.
2. Select a mode for discovering disk arrays according to the conditions at your site. Table
H-1 describes the parameters for discovering disk arrays.
Parameter Description
Authenticati The associated disk arrays can be found only when the entered user
on name and password are the same as those of the disk arrays.
Username The default user name for logging in to the ISM is admin.
Authenticati Select a desired authentication mode. Choose Local Device from the
on Mode drop-down list.
Device Select a desired device type. Choose Storage Unit from the drop-down
Type list.
Parameter Description
Discovery Indicates that the discovery range is the IP address subnet segments on
Modes which the ISM client resides. The mode is by default selected.
Specify IP Indicates that disk arrays are discovered according to the IP address of
address the management network port on the specified disk array.
When you specify the IP address, the first field on the left ranges from
1 to 223 (except 127), the last field ranges from 1 to 254, and the other
fields range from 0 to 255.
Specify IP Indicates that disk arrays are discovered according to the IP address
Segment segment of the management network port on the specified disk array.
Start IP Address and End IP Address indicate the start and end IP
addresses of disk arrays to be discovered. When setting this parameter,
pay attention to the following points:
– The discovery range is the IP subnet segment of the ISM client.
– The first field on the left ranges from 1 to 223 (except 127), the last
field ranges from 1 to 254, and the other fields range from 0 to 255.
– The start IP address must be smaller than or equal to the end IP
address.
Local sub- Indicates that the discovery range is the IP subnet segment of the ISM
network client. This mode is the default discovery mode of the system.
3. Click OK. After the system successfully discovers storage arrays, the message Discover
device succeed. is displayed on Task Manager.
1. In the left -hand navigation tree, click the Assistant tab for the current device to perform
initialize configurations.
Display the initialization page.
Device Specifies the name of the OceanStor S3900 disk array to be configured.
Name When setting this parameter, note that:
– This parameter contains only the characters and numerals in DBC
case, underscores (_), en-dash symbols (-), and simplified Chinese
characters.
– This parameter consists of 1 to 32 characters. A Chinese character
counts for two DBC characters.
Location Specifies the location of the OceanStor S3900 disk array to be configured.
When setting this parameter, note that:
– This parameter contains only the characters and numerals in DBC
case, underscores (_), en-dash symbols (-), and simplified Chinese
characters.
– This parameter consists of 1 to 32 characters. A Chinese character
counts for two DBC characters.
Paramet
er Description
Confirm Confirms the new password. When setting this parameter, pay attention to
Password the following points:
– This parameter ranges from 6 to 16 characters.
– This parameter value must be the same as the value of New
Password.
4. Click Next. The Device Time Management dialog box is displayed. Table H-3 shows
the parameter description.
Synchronize Specifies that the time or time zone of the current client has been
Client Time synchronized to the device side. Ensure that time settings are correct
before performing synchronization.
NTP Specifies that the time settings on the NTP server are automatically
Automatic synchronized to the device side. Note that Server IP address and
synchronizi Synch Schedule(number of hours) must be set.
ng
Manual Specifies a manual modification of the time and time zone of the
Modificatio device. Click Modify. In the Modify Time dialog box, set the time and
n time zone of the device.
Not Modify Specifies that the current device or time zone is not modified.
Device
Time
5. Select the desired time and date and click Next to access the FC Host Port dialog box.
NOTE
This operation can modify the port rate. By default, Configuration Rate is set to Auto-Adapt.
6. Click Next to access the Event Notification dialog box. By default, no settings are
performed. To perform settings, select the Enable check box. Table H-4 shows the
description about all the associated parameters. Click Apply.
Parameter Description
Email The following parameters must be set if the notification is sent through
Notificatio emails.
n – Level settings: Select the level at which users can receive fault
information.
– Outbox settings: Set Sender Email, SMTP Server, and SMTP
Port.
– Receive box: Specifies the inbox in which fault information is
received. You can add multiple boxes and use a semicolon to
separate them.
SMS The following parameters must be set if notifications are sent through
Notificatio SMS:
n – Level settings: Select the level at which users can receive fault
information.
– SMS center service number: Enter a desired SMS center service
number as prompted.
– Receive number: Specifies the number for receiving fault
information. You can add multiple numbers and use a semicolon to
separate them.
Parameter Description
Syslog The following parameters must be set if notifications are sent through
Notificatio syslogs:
n – Level settings: Select the level at which users can receive fault
information.
– Receive IP address: Specifies the IP address for receiving fault
information. You can add multiple IP addresses and use the
semicolon to separate them.
7. Click Next to access the License Management dialog box. No license needs to be
selected. Click Finish to complete system initialization.
Step 4 Assign storage space.
1. Click the All Devices tab in the navigation tree. Select OceanStor S3900 to be
configured.
2. Click the Assistant tab in the navigation tree. Click Allocate Storage Space. The
Allocate Storage Space Wizard dialog box.
3. Select a value from the Block Storage Pool Type drop-down list in Select Block
Storage Pool.
4. Click Create. The Create RAID Group dialog box is displayed. Table H-5 shows the
description about all the associated parameters. After the parameter settings are
complete, click OK. In the dialog box that is displayed, click OK.
Parame
ter Description
Sub- Specifies the number of sub-hard disks to be configured. The default value
Group is 2.
Disks
a. After all configurations are performed based on Table H-5, click OK.
b. In the Information dialog box, click OK.
c. In the dialog box indicating successful creation, click Finish as prompted.
5. Click Next to access the Create LUN dialog box. Table H-6 shows the description
about all the associated parameters.
Parameter Description
Name Specifies the name of the LUN to be configured. The default value is
LUN001.
Parameter Description
Stripe Depth The default value is 64 KB. Set this parameter to 32 KB.
(KB)
6. Click Next to access the Mapping dialog box. Select the mapping host.
a. Click Create Host Group. The default host group name is HostGroup001. Click
OK.
b. Click Create Host. Select HostGroup001 as the host group. Keep the default host
name Host001 and set the OS type to Linux.
c. Click Next. Select already connected on the FC initiator.
d. Click Next. No configuration is required.
e. Click Next. Confirm the parameter settings. Click Finish.
f. After the configuration succeeds, click Close.
7. Select Host001. Click Next. In the Summary dialog box, confirm configurations.
NOTE
In the preceding command, port ID indicates the ports through which the disk array connects to
the server.
You can run the lsscsi command to query port IDs. The first column in the returned message
displays the port IDs of the fiber card. For example, run the following command:
# lsscsi
NOTE
If the fiber card is not in the Link Up state, check and ensure the following aspect:
– The fiber is properly connected to the optical module.
– There is not any damage to the fiber.
– The optical module is properly connected to the fiber card.
– The indicator of the fiber card is functioning properly.
3. Run the following commands to restart the OS of the server and refresh the disk status:
# sync;sync;sync;sync
# shutdown -r now
----End
A
access control list A list of entities, together with their access rights, which are authorized to have access
to a resource.
access control right The level of right granted to a user for his access to certain items.
ACL See access control list
advanced telecom A platform that is used by the hardware of the N2510. To expand the system capacity
application smoothly, you only need to add certain boards to the shelf and need not replace the
environment server. This helps reduce the investments of the customer.
AIS See Alarm Indication Signal
Alarm A message reported when a fault is detected by a device or by the network
management system during the process of polling devices. Each alarm corresponds to
a recovery alarm. After a recovery alarm is received, the status of the corresponding
alarm changes to cleared.
alarm An operation performed on an alarm. Through this operation, the status of an alarm is
acknowledgement changed from unacknowledged to acknowledged, which indicates that the user starts
handling the alarm. The process during which when an alarm is generated, the
operator needs to acknowledge the alarm and take the right step to clear the alarm.
alarm correlation rule A process of analyzing the alarms that meet alarm correlation rules. If alarm 2 is
analyzing generated within 5 seconds after alarm 1 is generated and meets the alarm correlation
analysis rules, the EMS masks alarm 2 or improves its severity level according to the
alarm correlation rules.
alarm delay time The alarm delay time consists of the start delay time and the end delay time. When an
NE detects an alarm for a period, the period is the start delay time. When an NE
detects that the alarm disappears for a period, the period is the end delay time.
Unnecessary alarms that are caused by error reports or jitters can be avoided by setting
the delay time.
alarm indication On the cabinet of an NE, there are four indicators in different colors indicating the
current status of the NE. When the green indicator is on, it indicates that the NE is
powered on. When the red indicator is on, it indicates that a critical alarm is generated.
When the orange indicator is on, it indicates that a major alarm is generated. When the
yellow indicator is on, it indicates that a minor alarm is generated. The ALM alarm
indicator on the front panel of a board indicates the current status of the board. (Metro)
Alarm Indication A code sent downstream in a digital network as an indication that an upstream failure
Signal has been detected and alarmed. It is associated with multiple transport layers. Note:
See ITU-T Rec. G.707/Y.1322 for specific AIS signals.
alarm mask On the host, an alarm management method through which users can set conditions for
the system to discard (not to save, display, or query for) the alarm information meeting
the conditions.
alarm reporting to the On a device, an alarm is reported to the EMS at once after the alarm is generated. On
EMS immediately the EMS client, the corresponding alarm information is displayed on the alarm panel.
alarm severity The significance of a change in system performance or events. According to ITU-T
recommendations, an alarm can have one of the following severities:Critical, Major,
Minor, Warning.
alarm status The devices in the network report traps to the NMS, which displays the alarm statuses
in the topological view. The status of an alarm can be critical, major, minor and
prompt.
alarm synchronization When alarm synchronization is implemented, the EMS checks the alarm information
in its database and on the NEs. If the alarm information on the two locations is
inconsistent, the alarm information on the NEs is synchronized to the EMS database to
replace the original records.
ALC link A piece of end-to-end configuration information, which exists in the equipment
(single station) as an ALC link node. Through the ALC function of each node, it
fulfils optical power control on the line that contains the link.
ARP Proxy When a host sends an ARP request to another host, the request is processed by the
DSLAM connected to the two hosts. The process is called ARP proxy. This protocol
helps save the bandwidth in the networking of a low-rate WAN or helps implement the
layer 3 communication between access devices in the networking of layer 2 isolation.
Asynchronous A data transfer technology based on cell, in which packets allocation relies on channel
Transfer Mode demand. It supports fast packet switching to achieve efficient utilization of network
resources. The size of a cell is 53 bytes, which consist of 48-byte payload and 5-byte
header.
ATAE See advanced telecom application environment
ATM See Asynchronous Transfer Mode
Authority and Domain The function of the NMS for authority management. With this function, you can:
Based Management
1. Partition and control the management authority
2. Manage device nodes and service data by region
3. Allocate users with different management and operation rights for different
regions
auto-negotiation An optional function of the IEEE 802.3u Fast Ethernet standard that enables devices
to automatically exchange information over a link about speed and duplex abilities.
bandwidth A range of transmission frequencies that a transmission line or channel can carry in a
network. In fact, it is the difference between the highest and lowest frequencies the
transmission line or channel. The greater the bandwidth, the faster the data transfer
rate.
BASE A kind of bus or plane used to load software, transmit alarms and maintain
information exchange.
basic input/output A firmware stored in the computer mainboard. It contains basic input/output control
system programs, power-on self test (POST) programs, bootstraps, and system setting
information. The BIOS provides hardware setting and control functions for the
computer.
BFD See Bidirectional Forwarding Detection
Bidirectional A simple Hello protocol, similar to the adjacent detection in the route protocol. Two
Forwarding Detection systems periodically send BFD detection messages on the channel between the two
systems. If one system does not receive the detection message from the other system
for a long time, you can infer that the channel is faulty. Under some conditions, the
TX and RX rates between systems need to be negotiated to reduce traffic load.
BIOS See basic input/output system
board Board refers to an electronic part that can be plugged in to provide new capability. It
comprises chips and electronic components and these components are always on a flat
and hard base and connected through conductive paths. A board provides ports for
upstream connections or service provisioning.
Bond Bond: On the SUSE Linux OS, the bond technology is used to form a virtual layer
between the physical layer and the data link layer. This technology allows two server
NICs connecting to a switch to be bound to one IP address. The MAC addresses of the
two NICs are also automatically bound as one MAC address. In this manner, a virtual
NIC is formed. The bond technology supports two modes: double-live and primary/
secondary. In double-live mode, after receiving request data from a remote server, the
virtual NIC on the server determines data transmission based on an algorithm,
improving network throughput and usability of the server. In primary/secondary mode,
if an NIC does not function properly, services will be automatically switched to the
other NIC, ensuring service protection. The SUSE Linux OS supports the binding of
NICs in primary/secondary mode.
Client/Server The model of interaction in a distributed system in which a program at one site sends a
request to a program at another site and awaits a response. The requesting program is
called a client. The program satisfying the request is called the server. It is usually
easier to build client software than build the server software.
client/server software A message-based and modular software architecture that comprises servers and
architecture clients. Compared with the centralized, mainframe, and time sharing computing, the
client/server software architecture improves the usability, flexibility, interoperability,
and scalability. In this architecture, a client is defined as the party that requires
services and a server is defined as the party that provides services. The client/server
architecture reduces network traffic by providing a query response rather than
transferring all files.
cluster A mechanism adopted to improve the system performance. Several devices of the
same type form a cluster. The exterior of a cluster is some like a kind of equipment. In
the interior of a cluster, the nodes share the load.
committed access rate A traffic control method that uses a set of rate limits to be applied to a router interface.
CAR is a configurable method by which incoming and outgoing packets can be
classified into QoS (Quality of Service) groups, and by which the input or output
transmission rate can be defined.
Committed The rate at which a frame relay network agrees to transfer information in normal
Information Rate conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
Common Desktop The Common Desktop Environment (CDE) is an integrated graphical user interface
Environment for open systems desktop computing. It delivers a single, standard graphical interface
for the management of data and files (the graphical desktop) and applications. CDE's
primary benefits -- deriving from ease-of-use, consistency, configurability, portability,
distributed design, and protection of investment in today's applications -- make open
systems desktop computers as easy to use as PCs, but with the added power of local
and network resources available at the click of a mouse.
Common Object A specification developed by the Object Management Group in 1992 in which pieces
Request Broker of programs (objects) communicate with other objects in other programs, even if the
Architecture two programs are written in different programming languages and are running on
different platforms. A program makes its request for objects through an object request
broker, or ORB, and thus does not need to know the structure of the program from
which the object comes. CORBA is designed to work in object-oriented environments.
See also IIOP, object (definition 2), Object Management Group, object-oriented.
Common Object A specification developed by the Object Management Group in 1992 in which pieces
Request Broker of programs (objects) communicate with other objects in other programs, even if the
Architecture two programs are written in different programming languages and are running on
different platforms. A program makes its request for objects through an object request
broker, or ORB, and thus does not need to know the structure of the program from
which the object comes. CORBA is designed to work in object-oriented environments.
See also IIOP, object (definition 2), Object Management Group, object-oriented.
CORBA See Common Object Request Broker Architecture
CORBA See Common Object Request Broker Architecture
D
Data Communication Data Communications Channel. The data channel that uses the D1-D12 bytes in the
Channel overhead of an STM-N signal to transmit information on operation, management,
maintenance and provision (OAM&P) between NEs. The DCC channels that are
composed of bytes D1-D3 is referred to as the 192 kbit/s DCC-R channel. The other
DCC channel that are composed of bytes D4-D12 is referred to as the 576 kbit/s DCC-
M channel.
data communication A communication network used in a TMN or between TMNs to support the data
network communication function.
data replication link A link used for data replication between the production machine and redundancy
machine. It is separated from the network of the primary links.
DCC See Data Communication Channel
DCN See data communication network
DDN See digital data network
Delay An average time taken by the service data to transmit across the network.
DG disk group
DHCP See Dynamic Host Configuration Protocol
digital data network A high-quality data transport tunnel that combines the digital channel (such as fiber
channel, digital microwave channel, or satellite channel) and the cross multiplex
technology.
disk mirroring A technique in which all or part of a hard disk is duplicated onto one or more other
hard disks, each of which ideally is attached to its own controller. With disk mirroring,
any change made to the original disk is simultaneously made to the other disks so that
if the original disk becomes damaged or corrupted, the mirror disks will contain a
current, undamaged collection of the data from the original disk.
Dynamic Host A client-server networking protocol. A DHCP server provides configuration
Configuration Protocol parameters specific to the DHCP client host requesting, generally, information
required by the host to participate on the Internet network. DHCP also provides a
mechanism for allocation of IP addresses to hosts.
E
E1 A European standard for high-speed data transmission at 2.048 Mbit/s. It provides 32
x 64 kbit/s channels.
ECC See embedded control channel
embedded control A logical channel that uses a data communications channel (DCC) as its physical
channel layer, to enable transmission of operation, administration, and maintenance (OAM)
information between NEs.
Equipment Serial A 32-bit number assigned by the mobile station manufacturer, uniquely identifying the
Number mobile station equipment.
ESN See Equipment Serial Number
F
Fabric A kind of bus/plane used to exchange system service data.
File Transfer Protocol A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be
an FTP client and the other an FTP server.
FTP See File Transfer Protocol
G
gateway A device to connect two network segments which use different protocols. It is used to
translate the data in the two network segments.
gateway network A network element that is used for communication between the NE application layer
element and the NM application layer
GE The IEEE standard dubbed 802.3z, which includes support for transmission rates of1
Gbps (gigabit per second)--1,000 Mbps (megabits per second)--over an Ethernet
network.
GMT See Greenwich Mean Time
GNE See gateway network element
graphical user A visual computer environment that represents programs, files, and options with
interface graphical images, such as icons, menus, and dialog boxes, on the screen.
Greenwich Mean Time The mean solar time at the Royal Greenwich Observatory in Greenwich near London
in England, which by convention is at 0 degrees geographic longitude.
GUI See graphical user interface
H
HA See High Availability
HA system See high availability system
half-duplex A transmitting mode in which a half-duplex system provides for communication in
both directions, but only one direction at a time (not simultaneously). Typically, once a
party begins receiving a signal, it must wait for the transmitter to stop transmitting,
before replying.
High Availability The ability of a system to continuously perform its functions during a long period,
which may exceeds the suggested working time of the independent components. You
can obtain the high availability (HA) by using the error tolerance method. Based on
learning cases one by one, you must also clearly understand the limitations of the
system that requires an HA ability and the degree to which the ability can reach.
high availability The high availability system (HA) system indicates that two servers are adopted by a
system same computer. When the primary server is faulty, the secondary server provides the
environment on which the software runs through the related technology.
History alarm The confirmed alarms that have been saved in the memory and other external
memories.
host The computer system that is connected with disks, disk subsystems, or file servers and
on which data is stored and I/Os are accessed. A host can be a large computer, server,
workstation, PC, multiprocessor computer, and computer cluster system.
I
IANA See Internet assigned numbers authority
ICA See independent computing architecture
ICMP See Internet Control Message Protocol
IE See Internet Explorer
IEEE See Institute of Electrical and Electronics Engineers
iMAP See integrated management application platform
independent An architecture that logically separates application execution from user interfaces to
computing transmit only keyboard actions, mouse responses, and screen updates on the network.
architecture
Institute of Electrical A society of engineering and electronics professionals based in the United States but
and Electronics boasting membership from numerous other countries. The IEEE focuses on electrical,
Engineers electronics, computer engineering, and science-related matters.
integrated N/A
management
application platform
International Standard One of two international standards bodies responsible for developing international
Organization data communications standards. International Organization for Standardization (ISO)
works closely with the International Electro- technical Commission (IEC) to define
standards of computing. They jointly published the ISO/IEC SQL-92 standard for
SQL.
International An organization that establishes recommendations and coordinates the development of
Telecommunication telecommunication standards for the entire world.
Union
Telecommunication
Standardization
Internet assigned The organization operated under the IAB. IANA delegates authority for IP address-
numbers authority space allocation and domain-name assignment to the NIC and other organizations.
IANA also maintains a database of assigned protocol identifiers used in the TCP/IP
suite, including autonomous system numbers.
Internet Control A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and
Message Protocol other information relevant to IP packet processing. For example, it can let the IP
software on one machine inform another machine about an unreachable destination.
See also communications protocol, IP, ISO/OSI reference model, packet (definition 1).
Internet Explorer Microsoft's Web browsing software. Introduced in October 1995, the latest versions of
Internet Explorer include many features that allow you to customize your experience
on the Web. Internet Explorer is also available for the Macintosh and UNIX platforms.
Internet Protocol The TCP/IP standard protocol that defines the IP packet as the unit of information sent
across an Internet and provides the basis for connectionless, best-effort packet delivery
service. IP includes the ICMP control and error message protocol as an integral part.
The entire protocol suite is often referred to as TCP/IP because TCP and IP are the
two fundamental protocols. IP is standardized in RFC 791.
Internet Protocol A update version of IPv4. It is also called IP Next Generation (IPng). The
Version 6 specifications and standardizations provided by it are consistent with the Internet
Engineering Task Force (IETF).Internet Protocol Version 6 (IPv6) is also called. It is a
new version of the Internet Protocol, designed as the successor to IPv4. The
specifications and standardizations provided by it are consistent with the Internet
Engineering Task Force (IETF).The difference between IPv6 and IPv4 is that an IPv4
address has 32 bits while an IPv6 address has 128 bits.
inventory A physical inventory in the U2000, that is, a physical resource such as a
telecommunications room, rack, NE, subrack, board, subboard, port, optical module,
fiber/cable, fiber and cable pipe, link resource, interface resource, access service,
ONU, or NE e-label that can be managed on the U2000, and the relationship between
resources.
IP See Internet Protocol
IPv4 The abbreviation of Internet Protocol version 4. IPv4 utilizes a 32bit address which is
assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is
written as 4 octets separated by periods and may range from 0.0.0.0 through to
255.255.255.255. Each address consists of a network number, an optional subnetwork
number, and a host number. The network and subnetwork numbers together are used
for routing, and the host number is used to address an individual host within the
network or subnetwork. IPv4 addresses may also be represented using CIDR
(Classless Inter Domain Routing).
IPv6 See Internet Protocol Version 6
ISO See International Standard Organization
ITU-T See International Telecommunication Union Telecommunication Standardization
J
Java Virtual Machine The environment in which Java programs run. The Java Virtual Machine gives Java
programs a software-based computer they can interact with. Because the Java Virtual
Machine is not a real computer but exists in software, a Java program can run on any
physical computing platform.
JRE Java runtime environment
JVM See Java Virtual Machine
K
keyboard, video, and A hardware device installed in the integrated configuration cabinet. KVM serves as
mouse the input and output device for the components inside the cabinet. It consists of a
screen, a keyboard, and a mouse.
KVM See keyboard, video, and mouse
L
LAN See Local Area Network
LCT See Local Craft Terminal
LDAP See Lightweight Directory Access Protocol
License A permission that the vendor provides for the user with a specific function, capacity,
and durability of a product. A license can be a file or a serial number. Usually the
license consists of encrypted codes, and the operation authority varies with different
level of license.
Lightweight Directory An TCP/IP based network protocol that enables access to a DSA. It involves some
Access Protocol reduced functionality from X.500 DAP specification.
Link Layer Discovery The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE
Protocol 802.1ab. Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology
and changes in topology when the network scales expand.
LLDP See Link Layer Discovery Protocol
load balancing The distribution of activity across two or more servers or components in order to
avoid overloading any one with too many requests or too much traffic.
Local Area Network A network formed by the computers and workstations within the coverage of a few
square kilometers or within a single building. It features high speed and low error rate.
Ethernet, FDDI, and Token Ring are three technologies used to implement a LAN.
Current LANs are generally based on switched Ethernet or Wi-Fi technology and
running at 1,000 Mbit/s (that is, 1 Gbit/s).
Local Craft Terminal Local Craft Terminal. The terminal software that is used for local maintenance and the
management of NEs in the singer-user mode, to realize integrated management of
multi-service transmission network. See also U2000.
M
MAN See Metropolitan Area Network
MD5 See Message-Digest Algorithm 5
MDP See message dispatch process
message dispatch N/A
process
Message-Digest A one-way hashing algorithm that produces a 128-bit hash. Both MD5 and Secure
Algorithm 5 Hash Algorithm (SHA) are variations on MD4 and are designed to strengthen the
security of the MD5 hashing algorithm.
Metropolitan Area A metropolitan area network (MAN) is a network that interconnects users with
Network computer resources in a geographic area or region larger than that covered by even a
large local area network (LAN) but smaller than the area covered by a wide area
network (WAN). The term is applied to the interconnection of networks in a city into a
single larger network (which may then also offer efficient connection to a wide area
network). It is also used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes referred to as a
campus network.
modem A device or program that enables a computer to transmit data over, for example,
telephone or cable lines. Computer information is stored digitally, whereas
information transmitted over telephone lines is transmitted in the form of analog
waves. A modem converts between these two forms.
MS Manual Switch
MSTP See multi-service transmission platform
MSuite NMS maintenance suite
multi-service A platform based on the SDH platform, capable of accessing, processing and
transmission platform transmitting TDM services, ATM services, and Ethernet services, and providing
unified management of these services.
N
NBI See northbound interface
NE See network element
network element A network element (NE) contains both the hardware and the software running on it.
One NE is at least equipped with one system control board which manages and
monitors the entire network element. The NE software runs on the system control
board.
network layer The network layer is layer 3 of the seven-layer OSI model of computer networking.
The network layer provides routing and addressing so that two terminal systems are
interconnected. In addition, the network layer provides congestion control and traffic
control. In the TCP/IP protocol suite, the functions of the network layer are specified
and implemented by IP protocols. Therefore, the network layer is also called IP layer.
Network Management A system in charge of the operation, administration, and maintenance of a network.
System
Network Time The Network Time Protocol (NTP) defines the time synchronization mechanism. It
Protocol synchronizes the time between the distributed time server and the client.
new technology file An advanced file system designed for use specifically with the Windows NT operating
system system. It supports long filenames, full security access control, file system recovery,
extremely large storage media, and various features for the Windows NT POSIX
subsystem. It also supports object-oriented applications by treating all files as objects
with user-defined and system-defined attributes.
NMS See Network Management System
northbound interface The interface that connects to the upper-layer device to realize service provisioning,
report alarms and performance statistics.
NTFS See new technology file system
NTP See Network Time Protocol
O
OAM See operation, administration and maintenance
Object Set A collection of managed objects. Object sets are established to facilitate the user right
management. If a user (or user group) is authorized with the operation rights of an
object set, the user (or user group) can perform all the authorized operations on all the
objects within the object set. This saves you the trouble of setting the management
rights for each NE one by one. Object sets can be created by geographical area,
network layer, equipment type and so on.
OMC See Operation and Maintenance Center
ONU See Optical Network Unit
Operation and An Operations and Maintenance Centre is an element within a network management
Maintenance Center system responsible for the operations and maintenance of a specific element or group
of elements. For example an OMC-Radio may be responsible for the management of a
radio subsystem where as an OMC-Switch may be responsible for the management of
a switch or exchange. However, these will in turn be under the control of a NMC
(Network Management Centre) which controls the entire network.
Operation Rights Operation Rights specify the concrete operation that the user can perform. The
operation right aims at the security objects. If one user has no right to manage one
device, he or she cannot operate the device.
Operation Set A collection of operations. Classifying operations into operation sets helps to manage
user operation rights. Operations performed by different users have different impacts
on system security. Operations with similar impacts are classified into an operation
set. Users or user groups entitled to an operation set can perform all the operations in
the operation set. The NMS provides some default operation sets. If the default
operation sets cannot meet the requirements for right allocation, users can create
operation sets as required.
Operation System Operation System is abbreviated to OS. OS is the interface between users and
computers. It manages all the system resources of the computer, and also provides an
abstract computer for users. With the help of OS, users can use the computers without
any direct operation on hardware. For the computer system, OS is a set of programs
used to manage all system resources; for users, OS provides a simple and abstract
method to use the system resources.
operation, A group of network support functions that monitor and sustain segment operation,
administration and activities that are concerned with, but not limited to, failure detection, notification,
maintenance location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
Operations Support A system whose main function is to run applications that manage network elements,
System networks and services.
Optical Network Unit A form of Access Node that converts optical signals transmitted via fiber to electrical
signals that can be transmitted via coaxial cable or twisted pair copper wiring to
individual subscribers.
OS See Operation System
OSS See Operations Support System
P
packet loss ratio The ratio of total lost packet outcomes to total transmitted packets in a population of
interest.
Power and The power and environment monitoring unit is installed at the top of the cabinet of the
environment SDH equipment and is used to monitor the environment variables, such as the power
monitoring unit supply and temperature. With external signal input through the relay, fire alarm,
smoke alarm, burglary alarm, etc. can be monitored as well. With the display on NMS
system, the change of environment can be monitored timely and accurately. For the
equipment installed with a power & environment monitoring board, the following
parameters can be set: relay switch output control, temperature alarm threshold, relay
usage and alarm setting, query of DIP switch status, etc.
PPPoE See Point-to-Point Protocol over Ethernet
private network A network which provides services to a specific set of users only (see
Recommendation I.570).
PSTN See public switched telephone network
PTN See packet transport network
public switched Public Switched Telephone Network. A telecommunications network established to
telephone network perform telephone services for the public subscribers.Sometimes called POTS.
R
RADIUS See remote authentication dial-in user service
RADIUS See Remote Authentication Dial in User Service
RAID See Redundant Arrays of Independent Disks
Redundant Arrays of A data storage scheme that allows data to be stored and replicated in a hardware disk
Independent Disks group (logical hard disk) consisting of multiple hard disks (physical hard disks). When
multiple physical disks are set up to use the RAID technique, they are said to be in a
RAID array. The hard disks in a RAID array provides higher data reliability and input/
output performance. There are various defined levels of RAID, each offering differing
trade-offs among access speed, reliability, and cost. At present, there are seven basic
RAID levels from RAID 0 to RAID 6. These basic RAID levels can be further
combined to form new RAID levels, such as RAID 10 (a combination of RAID 0 and
RAID 1).
Remote Authentication RADIUS was originally used to manage the scattered users who use the serial
Dial in User Service interface and modem, and it has been widely used in NAS. NAS delivers the
information of users on authentication, authorization and accounting to the RADIUS
server. RADIUS stipulates how the user and accounting information is transferred
between NAS and RADIUS. The RADIUS server is responsible for receiving the
connection request from users to complete authentication, and returning the
configurations of the users to NAS.
remote authentication A security service that authenticates and authorizes dial-up users and is a centralized
dial-in user service access control mechanism. RADIUS uses the User Datagram Protocol (UDP) as its
transmission protocol to ensure real-time quality. RADIUS also supports the
retransmission and multi-server mechanisms to ensure good reliability.
replicated volume N/A
group
replication link A link used for data replication between the production machine and redundancy
machine. It is physically separated from the network of the primary links.
Rlink See data replication link
RTN Radio Transmission Node
RVG See replicated volume group
S
Script file It is the text file describing the physical information and configuration information of
the entire network, including the NE configuration file, port naming file, end-to-end
configuration file, NE physical view script file, NMS information file and service
implementation data script file.
SDH See Synchronous Digital Hierarchy
Secure File Transfer A network protocol designed to provide secure file transfer over SSH.
Protocol (SFTP)
Secure Shell (SSH) A set of standards and an associated network protocol that allows establishing a secure
channel between a local and a remote computer. A feature to protect information and
provide powerful authentication function for a network when a user logs in to the
network through an insecure network. It prevents IP addresses from being deceived
and plain text passwords from being captured.
Secure Sockets Layer A protocol for ensuring security and privacy in Internet communications. SSL
supports authentication of client, server, or both, as well as encryption during a
communications session.
Security Log Security logs record the security operations on the NMS, such as logging in to the
server, modifying the password, and exiting from the NMS server.
Serial Line Interface Serial Line Interface Protocol, defines the framing mode over the serial line to
Protocol implement transmission of messages over the serial line and provide the remote host
interconnection function with a known IP address.
server 1. On a local area network, a computer running administrative software that
controls access to the network and its resources, such as printers and disk drives,
and provides resources to computers functioning as workstations on the network.
2. On the Internet or other network, a computer or program that responds to
commands from a client. For example, a file server may contain an archive of
data or program files; when a client submits a request for a file, the server
transfers a copy of the file to the client.
3. A network device that provides services to network users by managing shared
resources, often used in the context of a client-server architecture for a LAN.
T
TCP See Transmission Control Protocol
TCP/IP See Transmission Control Protocol/Internet Protocol
Telecommunication The Telecommunications Management Network is a protocol model defined by ITU-T
Management Network for managing open systems in a communications network.An architecture for
management, including planning, provisioning, installation, maintenance, operation
and administration of telecommunications equipment, networks and services.
Telnet Standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is used for
remote terminal connection, enabling users to log in to remote systems and use
resources as if they were connected to a local system. Telnet is defined in RFC 854.
TFTP See Trivial File Transfer Protocol
Time zone A division of the earth's surface, usually extending across 15 degrees of longitude
devised such that the standard time is the time at a meridian at the centre of the zone.
timing task The system can create a timing task (such as backing up, loading and recovering a
management task), run a timing task automatically, and suspend or resume a timing task.
TMN See Telecommunication Management Network
Transmission Control One of the core protocols of the Internet protocol suite. Using TCP, applications on
Protocol networked hosts can create connections to one another, over which they can exchange
streams of data. TCP guarantees reliable and in-order delivery of data from the sender
to the receiver. TCP also distinguishes data for multiple connections by concurrent
applications running on the same host.
Transmission Control Common name for the suite of protocols developed to support the construction of
Protocol/Internet worldwide internetworks.
Protocol
Trivial File Transfer A small and simple alternative to FTP for transferring files. TFTP is intended for
Protocol applications that do not need complex interactions between the client and server.
TFTP restricts operations to simple file transfers and does not provide authentication.
TFTP is small enough to be contained in ROM to be used for bootstrapping diskless
machines.
U
UDP See User Datagram Protocol
UPS Uninterruptible Power Supply
User Datagram A TCP/IP standard protocol that allows an application program on one device to send
Protocol a datagram to an application program on another. User Datagram Protocol (UDP) uses
IP to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that
is, the destination device does not actively confirm whether the correct data packet is
received.
V
VCS See Veritas Cluster Server
Veritas Cluster Server A High-availability cluster software, for Unix, Linux and Microsoft Windows
computer systems, created by Veritas Software. It provides application cluster
capabilities to systems running Databases, file sharing on a network, electronic
commerce websites or other applications.
Veritas Volume A software product from veritas Inc.. The Veritas Volume Manager is used to manage
Manager disk storage.
Veritas Volume A wide area network data replication solution offered by VERITAS for multiple
Replicator operating systems. These include. AIX, HPUX and Solaris .
Virtual Local Area A logical grouping of two or more nodes which are not necessarily on the same
Network physical network segment but which share the same IP network number. This is often
associated with switched Ethernet.
Virtual Router A protocol used for multicast or multicast LANs such as an Ethernet. A group of
Redundancy Protocol routers (including an active router and several backup routers) in a LAN is regarded as
a virtual router, which is called a backup group. The virtual router has its own IP
address. The host in the network communicates with other networks through this
virtual router. If the active router in the backup group fails, one of the backup routers
become the active one and provides routing service for the host in the network.
VLAN See Virtual Local Area Network
volume A logical unit for disk virtualization management, and basic object for host
applications.
VRRP See Virtual Router Redundancy Protocol
VVM See Veritas Volume Manager
W
WAN See Wide Area Network
wavelength division A technology that utilizes the characteristics of broad bandwidth and low attenuation
multiplexing of single mode optical fiber, uses multiple wavelengths as carriers, and allows
multiple channels to transmit simultaneously in a single fiber.
WDM See wavelength division multiplexing
Wide Area Network A network composed of computers which are far away from each other which are
physically connected through specific protocols. WAN covers a broad area, such as a
province, a state or even a country.
Wireless Local Area A generic term covering a multitude of technologies providing local area networking
Network via a radio link. Examples of WLAN technologies include WiFi (Wireless Fidelity),
802.11b and 802.11a, HiperLAN, Bluetooth, etc.
WLAN See Wireless Local Area Network
work station A terminal or microcomputer, usually one that is connected to a mainframe or to a
network, at which a user can perform applications.
WS See work station