SL8500 Modular Library System

Total Page:16

File Type:pdf, Size:1020Kb

SL8500 Modular Library System StorageTek SL8500 Modular Library System Systems Assurance Guide Part Number: MT9229 May 2010 Revision: L Submit comments about this document by clicking the Feedback [+] link at: http://docs.sun.com StorageTek SL8500 Modular Library System - Systems Assurance Guide MT9229 Revision: L Copyright © 2004, 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications which may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure the safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark licensed through X/Open Company, Ltd. This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services. Summary of Changes Date Revision Description May 2004 First (A) Initial release June 2004 Second (B) Refer to this revision for the list of changes (artwork change) July 2004 Third (C) Refer to this revision for the list of changes (power updates) October 2004 Fourth (D) Refer to this revision for the list of changes (specifications) May 2005 Fifth (E) Refer to this revision for the list of changes (pass-thru port) September 2005 Sixth (F) Refer to this revision for the list of changes (handbots and drives) March 2006 Seventh (G) Refer to this revision for the list of changes (features) September 2006 Eighth (H) Refer to this revision for the list of changes (SPL, TCP/IP) March 2007 Ninth (J) Refer to this revision for the list of changes (SPL, Host connectivity) January 2008 Tenth (K) Refer to this revision for the list of changes. January 2010 Tenth (KA) Refer to this revision for the list of changes. May 2010 Eleventh (L) Changes to this revision include: • Updated with Oracle’s branding • Removed reference to Sun Microsystems, Inc. (other than Web site references) • Added LTO4 and LTO5 information • Added T10000 B information • Updated ISV information • Added information for Redundant Electronics • Added information for the PUE Ethernet card/switch • Added Rack Stop Installation Tools • Updated with engineering comments • Updated marketing order numbers Note: Change bars are included in this revision. MT9229 Revision: L iii Summary of Changes iv SL8500: Systems Assurance Guide • May 2010 Revision: L • MT9229 Contents Summary of Changes . iii Contents . v Figures . xiii Tables. xv Preface . xix Terminology and Usage . xix Related Publications . xix Documentation, Support, and Training . xx Oracle Welcomes Your Comments . xx 1: Introduction . 1 Library Overview . .1 Modules . .2 Library Walls, Arrays, and Slots . .4 Capacities . .7 Expansion Modules and Library Capacities . .7 RealTime Growth™ Capability . .8 Capacity on Demand . .8 Total Library Physical Capacities . .9 Partitioned Physical Capacities . .9 Reserved Slot Capacities . .9 Power . .10 N+1 Power Configuration . .10 2N Power Configuration . .11 AC Power Options . .12 Delta or Wye? . .12 Load Sharing DC Power Supplies . .13 Power Connections . .14 Electronics Control Module . .16 HBC Card . .16 HBT Card . .16 HBK Card . .16 Firmware . .17 Audits and Initialization . .18 Robotic Rail Assemblies . .19 Cartridge Access Ports . .20 Pass-thru Mechanisms . .21 MT9229 • Revision: L v Contents Elevators . .21 Pass-thru Ports . .22 Library Cameras . .24 Accessory Racks . .25 Operator Panels . .26 Keypad . .26 Remote Operator Panel . .27 Touch Screen Operator Control Panel . .27 Service Safety Door and Mode . .28 Emergency Robotic Stop . .28 Host Interface Connections . .29 Host Connectivity Checklist ..
Recommended publications
  • Encryption Suite
    comforte_Encryption_Suite.qxp_comforte_Encryption_Suite 29.10.17 13:33 Seite 1 comForte´scomforte’s encryptionencryptio nsuite suite ProtectProtect passwords passwords andand confidentialconfidential applicationapplication data data on on HP HP NonStopE Nonsto psystems systems SSecurCSecurCS Se SecurTNcurTN Se SecurFTPcurFTP Sec SecurLiburLib Secu SecurSHrSH Secu SecurPrintrPrint communication is our Forte comforte_Encryption_Suite.qxp_comforte_Encryption_Suite 29.10.17 13:33 Seite 2 Overview comForte offers a rich set of products The following diagram shows all products All our products take advantage of the most depending on the protocol you want to together. This diagram may look confusing widely used and accepted security protocols: encrypt. Even for a single protocol (such at first glance, but we do believe that our Depending on the product, connections are as Telnet) we offer different solutions rich set of products allows us to tailor our secured either via SSL (Secure Sockets Layer, depending on your requirements. solutions according to the customers’ now standardized by the IETF as Transport requirements rather than according to our Layer Security – TLS) or via SSH2 (Secure Shell product set. The purpose of this flyer is to protocol version 2). provide an overview of the different products and to help you find the right solution for All our solutions can restrict access to your your requirements. NonStop system to “encrypted only” and also provide some basic firewall capabilities. comforte_Encryption_Suite.qxp_comforte_Encryption_Suite 29.10.17 13:33 Seite 3 Telnet Encryption Many organizations are realizing that using Webbrowser access to NonStop 6530 single, integrated product. SecurTN replaces Telnet over a heterogenous TCP/IP network and 3270 applications and services, TELSERV, thereby eliminating the “256 session results in reduced security: all protective delivering them to users both inside only” limit of TELSERV.
    [Show full text]
  • Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks Phuong M
    CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks Phuong M. Cao, Yuming Wu, and Subho S. Banerjee, UIUC; Justin Azoff and Alex Withers, NCSA; Zbigniew T. Kalbarczyk and Ravishankar K. Iyer, UIUC https://www.usenix.org/conference/nsdi19/presentation/cao This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19). February 26–28, 2019 • Boston, MA, USA ISBN 978-1-931971-49-2 Open access to the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19) is sponsored by CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks Phuong M. Cao1, Yuming Wu1, Subho S. Banerjee1, Justin Azoff2;3, Alexander Withers3, Zbigniew T. Kalbarczyk1, Ravishankar K. Iyer1 1University of Illinois at Urbana-Champaign, 2Corelight, 3National Center for Supercomputing Applications Abstract While only a small fraction of such attempts succeed, they This paper describes CAUDIT1, an operational system have led to major misuses in 51% of 1,800 surveyed organi- deployed at the National Center for Supercomputing Applica- zations, with a financial impact of up to $500,000 per organi- tions (NCSA) at the University of Illinois. CAUDIT is a fully zation [7]. automated system that enables the identification and exclusion This paper describes the production deployment of of hosts that are vulnerable to SSH brute-force attacks. Its CAUDIT at the National Center for Supercomputing Ap- key features include: 1) a honeypot for attracting SSH-based plications (NCSA) at the University of Illinois over a period attacks over a /16 IP address range and extracting key meta- of 463 days.
    [Show full text]
  • Scripting the Openssh, SFTP, and SCP Utilities on I Scott Klement
    Scripting the OpenSSH, SFTP, and SCP Utilities on i Presented by Scott Klement http://www.scottklement.com © 2010-2015, Scott Klement Why do programmers get Halloween and Christmas mixed-up? 31 OCT = 25 DEC Objectives Of This Session • Setting up OpenSSH on i • The OpenSSH tools: SSH, SFTP and SCP • How do you use them? • How do you automate them so they can be run from native programs (CL programs) 2 What is SSH SSH is short for "Secure Shell." Created by: • Tatu Ylönen (SSH Communications Corp) • Björn Grönvall (OSSH – short lived) • OpenBSD team (led by Theo de Raadt) The term "SSH" can refer to a secured network protocol. It also can refer to the tools that run over that protocol. • Secure replacement for "telnet" • Secure replacement for "rcp" (copying files over a network) • Secure replacement for "ftp" • Secure replacement for "rexec" (RUNRMTCMD) 3 What is OpenSSH OpenSSH is an open source (free) implementation of SSH. • Developed by the OpenBSD team • but it's available for all major OSes • Included with many operating systems • BSD, Linux, AIX, HP-UX, MacOS X, Novell NetWare, Solaris, Irix… and yes, IBM i. • Integrated into appliances (routers, switches, etc) • HP, Nokia, Cisco, Digi, Dell, Juniper Networks "Puffy" – OpenBSD's Mascot The #1 SSH implementation in the world. • More than 85% of all SSH installations. • Measured by ScanSSH software. • You can be sure your business partners who use SSH will support OpenSSH 4 Included with IBM i These must be installed (all are free and shipped with IBM i **) • 57xx-SS1, option 33 = PASE • 5733-SC1, *BASE = Portable Utilities • 5733-SC1, option 1 = OpenSSH, OpenSSL, zlib • 57xx-SS1, option 30 = QShell (useful, not required) ** in v5r3, had 5733-SC1 had to be ordered separately (no charge.) In v5r4 or later, it's shipped automatically.
    [Show full text]
  • Centrify Putty Guide
    Centrify-enabled PuTTY User’s Guide September 2020 (release 2020) Centrify Corporation • • • • • • Legal Notice This document and the software described in this document are furnished under and are subject to the terms of a license agreement or a non-disclosure agreement. Except as expressly set forth in such license agreement or non-disclosure agreement, Centrify Corporation provides this document and the software described in this document “as is” without warranty of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. Some states do not allow disclaimers of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of Centrify Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of Centrify Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Centrify Corporation may make improvements in or changes to the software described in this document at any time.
    [Show full text]
  • Oracle Enterprise Session Border Controller – Acme Packet 4600 and Microsoft Skype for Business for Enterprise SIP Trunking with NTT Communications
    Oracle Enterprise Session Border Controller – Acme Packet 4600 and Microsoft Skype for Business for Enterprise SIP Trunking with NTT Communications Technical Application Note Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Table of Contents INTENDED AUDIENCE ......................................................................................................................................... ..4 DOCUMENT OVERVIEW ....................................................................................................................................... .4 INTRODUCTION ..................................................................................................................................................... .5 AUDIENCE ............................................................................................................................................................................................ .5 REQUIREMENTS .................................................................................................................................................................................. .5 ARCHITECTURE ..................................................................................................................................................................................
    [Show full text]
  • Kafl: Hardware-Assisted Feedback Fuzzing for OS Kernels
    kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo1, Cornelius Aschermann1, Robert Gawlik1, Sebastian Schinzel2, Thorsten Holz1 1Ruhr-Universität Bochum, 2Münster University of Applied Sciences Motivation IJG jpeg libjpeg-turbo libpng libtiff mozjpeg PHP Mozilla Firefox Internet Explorer PCRE sqlite OpenSSL LibreOffice poppler freetype GnuTLS GnuPG PuTTY ntpd nginx bash tcpdump JavaScriptCore pdfium ffmpeg libmatroska libarchive ImageMagick BIND QEMU lcms Adobe Flash Oracle BerkeleyDB Android libstagefright iOS ImageIO FLAC audio library libsndfile less lesspipe strings file dpkg rcs systemd-resolved libyaml Info-Zip unzip libtasn1OpenBSD pfctl NetBSD bpf man mandocIDA Pro clamav libxml2glibc clang llvmnasm ctags mutt procmail fontconfig pdksh Qt wavpack OpenSSH redis lua-cmsgpack taglib privoxy perl libxmp radare2 SleuthKit fwknop X.Org exifprobe jhead capnproto Xerces-C metacam djvulibre exiv Linux btrfs Knot DNS curl wpa_supplicant Apple Safari libde265 dnsmasq libbpg lame libwmf uudecode MuPDF imlib2 libraw libbson libsass yara W3C tidy- html5 VLC FreeBSD syscons John the Ripper screen tmux mosh UPX indent openjpeg MMIX OpenMPT rxvt dhcpcd Mozilla NSS Nettle mbed TLS Linux netlink Linux ext4 Linux xfs botan expat Adobe Reader libav libical OpenBSD kernel collectd libidn MatrixSSL jasperMaraDNS w3m Xen OpenH232 irssi cmark OpenCV Malheur gstreamer Tor gdk-pixbuf audiofilezstd lz4 stb cJSON libpcre MySQL gnulib openexr libmad ettercap lrzip freetds Asterisk ytnefraptor mpg123 exempi libgmime pev v8 sed awk make
    [Show full text]
  • Q-SYS™ Platform Cisco Catalyst 3650 and 3850 Series
    Switch Configuration Examplefor Q-SYS™ Platform Cisco Catalyst 3650 and 3850 Series Important Note This switch configuration example is intended to serve as a network setup guideline for systems using Q-LAN audio and videostreaming within your Q-SYS system and should be used alongside the Q-SYS Q-LAN Networking Overview tech note for deeper setup insight. Keep in mind that QSC is unable to provide live network configuration support for third-party switch configuration. To learn more about network switch qualification services and the plug-and-play Q-SYS NS Series preconfigured network switches, visit http://www.qsc.com/switches. This document applies to these Cisco switches: Catalyst 3650-12X48UR | 3650-12X48UQ | 3650-12X48UZ | 3650-48FQM | 3650-8X24UQ | 3650-24PDM | 3650-48FQ | 3650-24PD | 3850-12X48U | 3850-24XU | 3850-48U | 3850-24U | 3850-48XS | 3850-24XS | 3850-NM-8-10G | 3850-NM-2-40G Introduction As of release 5.3.x, Q-SYS Designer software now supports AES67-standard interoperability. The AES67 standard does not prescribe a method of discovery for devices so manufacturers are free to implement one or more discovery services for their devices. In this configuration document, the process uses Bonjour as the discovery method for AES67 devices. Q-SYS Designer now also offers a selection of Differential Services Code Point (DSCP) setting presets to optimize Quality of Service (QoS) for different types of deployment. DSCP codes are a six-bit value placed in the IP header of data packet, and they instruct a network switch to handle various types of data with defined levels of priority that ensure proper QoS.
    [Show full text]
  • Oracle Enterprise Session Border Controller and Microsoft Skype for Business for Video Calls
    Oracle Enterprise Session Border Controller and Microsoft Skype for Business for Video calls Technical Application Note Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Table of Contents INTENDED AUDIENCE ...................................................................................................................................................... 4 DOCUMENT OVERVIEW .................................................................................................................................................. 4 INTRODUCTION ................................................................................................................................................................. 5 AUDIENCE ............................................................................................................................................................................................. 5 REQUIREMENTS ................................................................................................................................................................................... 5 VIS SERVER AND CODEC SUPPORT ..................................................................................................................................................
    [Show full text]
  • The Secure Encryption and Transfer Tool Release 2.7.0
    sett - the secure encryption and transfer tool Release 2.7.0 Gerhard Bräunlich, Robin Engler, Christian Ribeaud, Kevin Sayers, Jarosław Surkont, François Martin Apr 28, 2021 Contents: 1 What is sett? 1 2 sett quick start guide 3 2.1 Initial setup..............................................3 2.2 Getting a recipient’s key.......................................3 2.3 sett-gui quick start..........................................4 2.3.1 Encrypting data.......................................4 2.3.2 Transferring data......................................5 2.3.3 Decrypting data.......................................5 2.4 sett command line quick start....................................5 3 Installing sett on your local computer7 3.1 Installing dependencies.......................................7 3.1.1 Installing dependencies on Windows............................7 3.1.2 Installing dependencies on Linux..............................8 3.1.3 Installing dependencies on Mac OS............................9 3.2 Installing sett.............................................9 3.2.1 Installing sett on Windows.................................9 3.2.2 Installing sett on Linux and Mac OS............................ 10 3.2.3 Installing sett in a Conda virtual environment [cross-platform].............. 10 3.2.4 Installing a specific version of sett............................. 11 3.3 Updating sett............................................. 11 4 PGP key management with sett 13 4.1 Introduction to public-key cryptography, PGP and GnuPG..................... 13 4.1.1
    [Show full text]
  • Expedition 364 Methods1 1 Operations 7 Computed Tomography 10 Core Description S
    Morgan, J., Gulick, S., Mellett, C.L., Green, S.L., and the Expedition 364 Scientists Proceedings of the International Ocean Discovery Program Volume 364 publications.iodp.org https://doi.org/10.14379/iodp.proc.364.102.2017 Contents 1 Introduction Expedition 364 methods1 1 Operations 7 Computed tomography 10 Core description S. Gulick, J. Morgan, C.L. Mellett, S.L. Green, T. Bralower, E. Chenot, 16 Biostratigraphy G. Christeson, P. Claeys, C. Cockell, M. Coolen, L. Ferrière, C. Gebhardt, K. Goto, 18 Paleomagnetism H. Jones, D. Kring, J. Lofi, C. Lowery, R. Ocampo-Torres, L. Perez-Cruz, 19 Age model and mass accumulation A.E. Pickersgill, M. Poelchau, A. Rae, C. Rasmussen, M. Rebolledo-Vieyra, rates U. Riller, H. Sato, J. Smit, S. Tikoo, N. Tomioka, J. Urrutia-Fucugauchi, M. Whalen, 20 Geochemistry A. Wittmann, K. Yamaguchi, L. Xiao, W. Zylberman, and the Expedition 364 ESO Team2 21 Physical properties 26 Downhole logging Keywords: International Ocean Discovery Program, IODP, International Continental Scientific 41 Microbiology Drilling Program, ICDP, L/B Myrtle, Mission Specific Platform, Expedition 364, Site M0077, 44 References Hole M0077A, Gulf of México, Yucatán shelf, Chicxulub, impact crater, crater modification, multi-ring basin, peak ring, uplifted continental crust, impact melt rock, planar deformation features, Cretaceous/Paleogene boundary, PETM, K-Pg boundary, Cretaceous-Paleogene mass extinction, shock metamorphism, carbon isotope excursions, hydrothermal, geomagnetic reversal, shatter cone, ejecta, suevite, granitoid, pelagic limestone, tsunamite Introduction Recovered cores are numbered sequentially starting at 1, and each core is divided into sections numbered sequentially from the This chapter documents the operational, curatorial, and analyti- top, starting at 1 (Figure F1).
    [Show full text]
  • DTS1 Csfc / ECC Cryptographic Data Transport System
    DTS1 CSfC / ECC Cryptographic Data Transport System User Guide Part Number: DDOC0099-000-AH This Page Intentionally Left Blank User Guide DDOC0099-000-AH Front Matter Revisions Document Number Media Revision Date Description PCN DDOC0099-000 PDF A1 07/17/18 Multiple updates. 1227 DDOC0099-000 PDF A2 08/14/18 Multiple updates. 0818-0001 DDOC0099-000 PDF A3 10/01/18 Multiple updates. 1018-0001 DDOC0099-000 PDF A4 11/01/18 Multiple updates. 1118-0001 DDOC0099-000 PDF A5 01/22/19 Multiple updates. 0119-0001 DDOC0099-000 PDF A6 04/24/19 Conversion to new format. 0419-0001 DDOC0099-000 PDF A7 05/15/19 Corrected as noted by change bars. 0519-0005 DDOC0099-000 PDF A8 08/15/19 Corrected as noted by change bars. 0819-0005 DDOC0099-000 PDF A9 09/03/19 Removed references to RUGS-E system 0919-0001 DDOC0099-000 PDF AA 09/19/19 Revised encryption password / passphrase 0919-0005 requirements. DDOC0099-000 PDF AB 10/25/19 Revised to include video stream capture. Additional 1019-0014 revisions / corrections as noted by change bars. DDOC0099-000 PDF AC 3/27/20 Revised format and style of illustrations and tables. 0320-0012 Technical changes incorporated as noted by change bars. DDOC0099-000 PDF AD 4/9/20 Deleted VS-RMC-003 RMC, 1 TB and Secure Erase 0420-0004 from Appendix C DDOC0099-000 PDF AE 5/8/20 Corrected as noted by change bars. 0520-0003 DDOC0099-000 PDF AF 6/2/20 Corrected as noted by change bars. 0620-0003 DDOC0099-000 PDF AG 6/8/20 Update istarget information.
    [Show full text]
  • Putty Tutorial (Windows (WSL?/Mobaxterm?/Virtualbox))
    PuTTY Tutorial (Windows (WSL?/MobaXTerm?/VirtualBox)) Table of Contents PuTTY Client Basics and Simple Login..............................................................................................1 How to get PuTTY!.........................................................................................................................1 Simple Password-Based Login........................................................................................................1 Configuration Management.............................................................................................................3 X-Forwarding...................................................................................................................................4 SSH Hopping...................................................................................................................................5 Copying Data........................................................................................................................................5 pscp..................................................................................................................................................5 Filezilla............................................................................................................................................5 WinSCP............................................................................................................................................6 Public Key Authentication....................................................................................................................6
    [Show full text]