SG 247200
SG 247200
SG 247200
ibm.com/redbooks
International Technical Support Organization IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5 August 2007
SG24-7200-01
Note: Before using this information and the product it supports, read the information in Notices on page vii.
Second Edition (August 2007) This edition applies to Version 5, Release 4, Modification 0 of i5/OS.
Copyright International Business Machines Corporation 2005, 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix The team that wrote this IBM Redbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .x Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .x Chapter 1. Planning for upgrades to System i5 hardware. . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Planning fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.1 Presales planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Postsales planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2 Migration towers and SPD hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2.1 SPD features and their replacements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2.2 SPD features that can be converted to PCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.3 Disk migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.3.1 Redundant Array of Independent Disks arrangements . . . . . . . . . . . . . . . . . . . . . 13 1.4 Physical planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.5 Linux migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 1.5.1 Migrating a Linux logical partition from iSeries . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 1.6 Windows migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 1.6.1 Moving the Integrated xSeries Adapter or Integrated xSeries Server from iSeries 8xx to 5xx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 1.7 IBM AIX 5L migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 1.8 Migration and upgrade check list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Chapter 2. Migration examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 General upgrade considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Side-by-side upgrade and data migration using the side-by-side method . . . . . . 2.1.2 Data migration using the side-by-side method (source system in the previous release). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.3 Upgrade using unload/reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.4 Upgrade with converted or relocated disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.5 Upgrade with load source migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Migration examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.1 Model 810 to model 520 (or 525, 550) with no LPAR . . . . . . . . . . . . . . . . . . . . . . 2.2.2 Model 820 with tower to model 520 (525, 550) with no LPAR . . . . . . . . . . . . . . . 2.2.3 Model 640 to model 520 (or 525, 550) no LPAR. . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.4 Model 720 to model 520 (or 525, 550) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.5 Model 840 to model 570 (system upgrade with no LPAR or Hardware Management Console) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 3. System i5 disk at i5/OS V5R4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Introducing the System i5 disk technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Disk types (speeds and feeds) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Disk packaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.1 System i 515, 525, 520, and 550 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.2 System i 570 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.3 System i 595 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 34 35 36 37 38 39 40 40 42 43 44 45 51 52 52 52 52 52 52 iii
3.3.4 I/O expansion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4 Disk protection types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.1 RAID-5 vs RAID-6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.2 Considerations when planning disk protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.3 Migrating to RAID-6 from unprotected disk with iSeries Navigator . . . . . . . . . . . . 3.4.4 Migrating to RAID-6 from unprotected disk using dedicated service tools . . . . . . 3.4.5 Migrating to RAID-6 from unprotected disk using system service tools . . . . . . . . 3.4.6 Migrating to RAID-6 from mirrored . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.7 Migrating to RAID-6 from RAID-5 protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5 Load source migration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.1 Considerations for load source migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.2 Load source migration: No disk protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.3 Load source migration: Mirrored system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.4 Load source migration: RAID system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.5 RAID-5 arrangement on Peripheral Component Interconnect-X I/O adapters . . .
52 53 55 56 64 66 68 68 68 69 69 70 75 85 86
Chapter 4. System i5 consoles in i5/OS V5R4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 4.1 Introduction to the consoles on System i5 servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 4.1.1 Twinax console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 4.1.2 Operations console (direct-attached or LAN-attached). . . . . . . . . . . . . . . . . . . . . 90 4.1.3 The Hardware Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 4.2 Thin Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.2.1 Thin Console installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.2.2 Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.2.3 Thin Console 5250 emulation screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 4.2.4 Neoware Connection Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 4.2.5 Physical installation and cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 4.2.6 Customization settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 4.2.7 Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 4.2.8 Backup/recovery and availability considerations. . . . . . . . . . . . . . . . . . . . . . . . . 123 4.2.9 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 4.3 Console card locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 4.3.1 Designated slots for models 5xx (V5R3). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 4.3.2 i5/OS V5R3M5 and V5R4 (new Smart IOA plus+ models) . . . . . . . . . . . . . . . . . 127 4.4 Changing the console type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 4.4.1 Using the console service functions (65+21) . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Chapter 5. i5/OS V5R4 software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1 i5/OS V5R4 software requirements and information . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.1 i5/OS V5R4 informational authorized program analysis report and PSPs . . . . . 5.1.2 Required software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.3 AS/400 models not supported in i5/OS V5R4 . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.4 License agreements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 i5/OS V5R4 software upgrade paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Interoperability with the existing systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4 i5/OS V5R4 software upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 6. Tape data encryption in i5/OS V5R4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1 Using the Encryption Key Manager and TS1120 tape drive . . . . . . . . . . . . . . . . . . . . 6.1.1 Encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.2 Encryption components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.3 Planning for tape encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.4 Backup and recovery considerations with Encryption Key Manager . . . . . . . . . 6.1.5 Encryption Key Manager server on a PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
129 130 130 131 131 131 131 132 132 137 138 138 139 140 140 142
6.1.6 Creating a keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 Creating keys in your keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.1 Creating a self-signed key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.2 Creating a certificate request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.3 Importing keys from another keystore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3 Configuring Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.1 Editing the .properties file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.2 Starting the EKM Admin Console (command prompt) . . . . . . . . . . . . . . . . . . . . 6.3.3 Starting and stopping the EKM server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.4 Adding tape drives to the EKM drive table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4 Encryption Key Manager on i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.1 Software requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.2 Installing the unrestricted policy files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.3 Installing the Encryption Key Manager .jar and sample configuration file. . . . . . 6.4.4 Installing Digital Certificate Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5 Creating a keystore in DCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.1 Creating keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.2 Creating a private/public key pair in your keystore . . . . . . . . . . . . . . . . . . . . . . . 6.5.3 Importing a key into the keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.4 Creating a local Certificate Authority-signed key in your keystore . . . . . . . . . . . 6.6 Configuring Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.6.1 Editing the .properties file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.6.2 Starting the EKM Admin Console (command prompt) . . . . . . . . . . . . . . . . . . . . 6.6.3 Starting and stopping the EKM server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.6.4 Adding the tape drives to the EKM drive table . . . . . . . . . . . . . . . . . . . . . . . . . . 6.7 Configuring your TS1120 tape drive for encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . 6.7.1 Defining the keystores to be used by the TS3500 . . . . . . . . . . . . . . . . . . . . . . . 6.7.2 Enabling your tape drive for encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.7.3 Setting up a scratch encryption policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.7.4 Rekeying an encrypted cartridge for use by another company. . . . . . . . . . . . . . Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
148 151 151 153 156 159 159 162 163 163 164 164 164 165 165 167 170 173 175 176 180 180 181 183 183 184 184 188 190 193 195 195 195 195 196 196
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Contents
vi
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
vii
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:
AIX 5L AIX AS/400e AS/400 Domino eServer IBM iSeries i5/OS Lotus OS/400 PowerPC POWER POWER5 Redbooks Redbooks (logo) System i System i5 System p System x System Storage Tivoli TotalStorage WebSphere xSeries zSeries 1350
The following terms are trademarks of other companies: Java, JDK, JRE, JVM, J2SE, Sun Java, Ultra, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft., Windows Server., Windows., and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Itanium, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States, other countries, or both. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
viii
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Preface
Planning an upgrade from an existing IBM AS/400e or IBM eServer iSeries server to a new model IBM System i5 can range from a very simple disk migration to a complex task involving many components and OS upgrade steps. This IBM Redbook discusses the various topics that are involved in migrating to the new Peripheral Component Interconnect-X (PCI-X) and IBM POWER5 processor technology. Upgrade scenarios are included to assist your planning. IBM i5/OS V5R4 contains additional components, functions, and features, which this book discusses. The new features include the new Thin Console support for the IBM System i5 low-end system. This book also discusses the new hardware-based tape encryption that is available with i5/OS V5R4 and the IBM TotalStorage TS1120 tape drive. Whether you are an IBM Field Technical Support Specialist, business partner, or client, this book offers the guidance you require to plan your upgrade or migration to a new IBM System i5 system.
ix
Thanks to the following people for their contributions to this project: Sue Baker Pat Cawley Joe Gibbons Duane Grosz Mike Konkel Scott Maxson Mark Olson Brian Podrow Barb Smith Tracy Smith Allyn Walsh Geoff Warren Larry Youngren IBM Rochester John Morganti IBM Austin Carla Ruhl Thai Tran IBM Tucson Tom Benjamin John Peck IBM Endicott
Comments welcome
Your comments are important to us! We want our IBM Redbooks to be as helpful as possible. Send us your comments about this or other IBM Redbooks in one of the following ways: Use the online Contact us review IBM Redbook form found at: ibm.com/redbooks Send your comments in an e-mail to: redbook@us.ibm.com
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400
Preface
xi
xii
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Chapter 1.
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
The output of the SPT can be used either to create a report or as an input to the IBM Configurator for e-business (e-Config) for order processing. The report function of the SPT invokes the System Plan Viewer, which has a print option. You will also be able to use the .sysplan file to automatically create and deploy partitions on an HMC.
Solution proposal
By discussing the clients existing server configuration and their requirements, the IBM Sales Representative or IBM Business Partner formulates a complete proposal. During this phase of the project, the baseline information about the client environment must be gathered. During the solution proposal, use the Workload Estimator or one of the System i capacity planning tools to establish the size and the capacity of the System i server. For more information about the Workload Estimator, refer to the following Web site: http://www-304.ibm.com/jct01004c/systems/support/tools/estimator/index.html You must also review the information in the IBM Systems Hardware Information Center. Much of the hardware planning information for both IBM System i5 and IBM System p5 servers is now available in the Hardware Information Center at: http://publib.boulder.ibm.com/infocenter/eserver/v1r3s/index.jsp The IBM Prerequisite Web site provides you with compatibility information for hardware features. This tool helps you to plan a successful system upgrade by providing you with the prerequisite information for the features you currently have or plan to add to your system: http://www-912.ibm.com/e_dir/eServerPrereq.nsf If you are working with an existing System i server that has an HMC at V5R2, you can use the System Plan function to gather hardware and partition information that can be utilized for the creation of your SPT model. You will not be able to deploy the upgrade system plan unless the upgrade is to just add hardware for an additional partition. For more information about the System Planning Tool and the System Plan function of the HMC, refer to: http://www.ibm.com/servers/eserver/support/tools/systemplanningtool/ You can also refer to the LPAR Simplification Tools Handbook, SG24-7231.
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
The e-Config output also leads to a discussion of whether the server configuration is suitable in terms of commercial processing workload (CPW), main storage, auxiliary storage, LAN/WAN connectivity, availability requirements, console requirements, physical dimensions, and power and cooling requirements. During this consideration phase, both the system and application software must be considered. The new IBM System i5 models require IBM i5/OS V5R3 or later, depending on the model (that is, whether the server is partitioned). All of the logical partitions must also be at i5/OS V5R3 or later. Some functions require i5/OS V5R3M5 or i5/OS V5R4, such as initial program load (IPL) system across system area network (SAN) or input/output processor-less (IOP-less) adapter cards.
A readiness check is advised before proceeding. If there are complex or advanced components in the configuration, the IBM Sales Representative or IBM Business Partner can run a systems assurance review. This is a checkpoint to ensure that certain advanced options have been adequately considered.
Feature upgrade
Feature upgrade can be performed by the client, an IBM Service Representative, or an IBM Business Partner, depending on the features being replaced. Instructions are included with the hardware. A feature upgrade can be as small as adding an Ethernet adapter or using concurrent maintenance, or as large as adding multiple expansion towers with many disks and adapters. Certain features might also require an upgrade to i5/OS V5R3 before they can be installed.
Software upgrade
The i5/OS upgrade is a client responsibility, unless it is contracted to IBM or an IBM Business Partner. A test environment must be available to create a version of the system and its applications. Ideally, this would be on an i5 server to ensure that there are no hardware interactions that could hamper the actual upgrade. However, it is possible to test the i5/OS V5R3 software on any older iSeries server that supports V5R3. This could be a 7xx or 8xx model. i5/OS V5R4 can also be installed on 5xx or 8xx models if the system or LPAR has a 17 GB load source drive. This enables system and application function testing, but not volume testing. If the system that is to be migrated has critical applications, consider making a trip to the IBM Rochester Benchmark Center. Here, you can test both the function and the capacity on an i5 server, even before you place an order. The Benchmark Center is a fee-based offering. For more information, refer to the following Web site: http://www.ibm.com/servers/eserver/iseries/benchmark/cbc/index.html We appreciate the cost involved, but it is often well worth the investment. For example, if you are planning to spend $150,000 on a server, it would be a small investment to spend $15k $20k on a benchmark test. You will also benefit from access to the new software and hardware, plus getting the additional benefit of skills transfer to key client staff.
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Table 1-1 SPD features and towers that must be replaced SPD feature code 2686 Card description and properties Suggested replacement PCI feature HSL port Card description and properties
Optical link processor (266 Mbps). Used for attaching #5044. Each #2686 supports a maximum of one #5044. Optical link processor (1063 Mbps). Used for attaching #5065, #5072, #5073, #5082, and #5083 expansion towers. Each #2688 supports a maximum of two #50xx towers. Optical bus adapter. Allows for the addition of up to three #2686 or #2688 optical link processors in any combination. System unit expansion rack. This is a 12 SPD I/O card slot cage in a rack enclosure. Storage expansion unit. Provides space for up to 16 disk units. Storage expansion unit. Provides space for up to eight to 16 disk units. 1063 Mbps system unit expansion tower. Provides an additional bus. 1063 Mbps storage expansion tower. Provides a direct access storage device (DASD) tower for adding up to 16 disk units. LAN/WAN/Workstation IOP. This supports up to three LAN/WAN/ Workstation IOAs. Twinaxial workstation controller. One 8-port attachment is provided to support up to 40 twinaxial devices. ASCII workstation controller. This workstation controller supports up to six ASCII devices. Integrated Services Digital Network (ISDN) basic rate adapter Electronic Industries Association (EIA) 232/V.24 two-line adapter
2688
HSL port
2695
HSL port
5044
5094, 5294, 5095, 5075, 5074, or 50791 5094, 5294, 5095, 5075, 5074, or 50791 5094, 5294, 5095, 5075, 5074, or 50791 5094, 5294, 5095, 5075, 5074, or 50791 5075, 5074, or 50791
5052 and 5058 5055 and 5057 5072 and 5073 5082 and 5083
2629
PCI I/O processor that drives PCI IOA adapters The twinaxial workstation IOA provides support for up to 40 active twinaxial displays and printer addresses.
N/A
27452 /47453
#4745 supports up to two multiple protocol communications ports2 #4745 supports up to two multiple protocol communications ports2
2609
27452 /47453
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
SPD feature code 2610, 2656, and 2659 2612, 2654, 2655, 2657, and 2658 2613, 6153, and 6173 2614
Card description and properties #4745 supports up to two multiple protocol communications ports2 #4745 supports up to two multiple protocol communication ports2 #4745 supports up to two multiple protocol communication ports2 #4745 supports up to two multiple protocol communication ports2 PCI cryptographic coprocessor3 PCI I/O processor that drives PCI IOA adapters See note 10
27452 /47453
27452 /47453
27452 /47453
4801 2843, 9943, or 28242 27612 /4761, 2772, 2773, or 2805 27452 /47453
2666
#4745 supports up to two multiple protocol communication ports2 #4745 supports up to two multiple protocol communication ports2 PCI 100/10 Mbps Ethernet IOA
2699 and 9699 2617 and 6181 2618 2619, 2626, and 6149 2665 2663 and 2668 2810 FSIOP4 6616, 6617, and 6618
27452 /47453
Ethernet/Institute of Electrical and Electronics Engineers (IEEE) 802.3 adapter Fibre distributed data interface adapter 16/4 Mbps token ring adapter Shielded twisted-pair distributed data interface adapter I/O attachment processor wireless LAN adapter LAN/WAN IOP Integrated PC server (IPCS) Integrated PC server
28382 /4838
N/A 4744 N/A N/A 2843, 9943, or 28242 2790, 2791, or 27994 2790/2890-----> 2791/2891-----> 2799/2899 ----> 2792/28924 ---> 700 MHz Integrated xSeries 850 MHz Integrated xSeries 1.0 GHz Integrated xSeries 1.6 GHz Integrated xSeries PCI I/O processor that drives PCI IOA adapters PCI 100/16/4 Mbps token-ring IOA
SPD feature code 8664 and 8665 1312, 1322, 1325, 1327, 1333, 1334, 1337, 1602, 6605, and 6652 1313, 1323, 1326, 1336, 1603, 6606, 6650, 6806, 6906, and 9606 1327, 1337, 6607, 6807, 6907, 9707, and 9907 1333, 6713, 6813, 8713, and 8813
Suggested replacement PCI feature N/A 43175 43185 43195 4326 4327 43175 43185 43195 43265 43275 43175 43185 43195 43265 43275 43175 43185 43195 43265 43275 43185 43195 43265 43275 4482 or 45826 4482 or 45826
Base-shielded twisted-pair distributed data interface adapter One-byte 1.03 GB disk unit Two-byte 1.03 GB disk unit
8.58 GB disk unit 10k revolutions per minute (rpm) 17.54 GB disk unit 10k rpm 35.16 GB disk unit 10k rpm 35.16 GB disk unit 15k rpm 70.56 GB disk unit 15k rpm 8.58 GB disk unit 10k rpm 17.54 GB disk unit 10k rpm 35.16 GB disk unit 10k rpm 35.16 GB disk unit 15k rpm 70.56 GB disk unit 15k rpm 8.58 GB disk unit 10k rpm 17.54 GB disk unit 10k rpm 35.16 GB disk unit 10k rpm 35.16 GB disk unit 15k rpm 70.56 GB disk unit 15k rpm 8.58 GB disk unit 10k rpm 17.54 GB disk unit 10k rpm 35.16 GB disk unit 10k rpm 35.16 GB disk unit 15k rpm 70.56 GB disk unit 15k rpm 17.54 GB disk unit 10k rpm 35.16 GB disk unit 10k rpm 35.16 GB disk unit 15k rpm 70.56 GB disk unit 15k rpm 4 GB -inch cartridge tape unit 4 GB -inch cartridge tape unit
1334, 6714, 6824, 8714, and 8824 1349, 1379, and 6368 1350, 1380, 6369, 6380, 6381, and 6481 1355, 6385, and 6485 1360, 6390, and 6490 6325 and 6425 2621 2624
1.2 GB -inch cartridge tape unit 2.5 GB -inch cartridge tape unit
16 GB -inch cartridge tape unit 8 mm cartridges are supported only through external 7208 devices8 CD-ROM device PCI Ultra magnetic media controller PCI Redundant Array of Independent Disks (RAID) disk unit controller
Optional CD-ROM feature Removable media device attachment Storage device controller
4425 or 4525 27292 or 2749 27482 , 4748, 97489 , 27782 , 4778, or 97789
10
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Card description and properties All the devices that are attached to the 2644 IOP are not supported on V5R2. All the devices that are attached to the 6112 IOP are not supported on V5R2. All the devices that are attached to the 6146 IOP are not supported on V5R2. All the devices that are attached to the 6500 IOP are not supported on V5R2. PCI magnetic media controller Fibre Channel (FC) tape and disk controllers PCI RAID disk unit controller and PCI-X RAID disk controllers
6112
N/A
6146
Diskette adapter
N/A
6500
DASD controller
N/A
6501
27292 or 2749 276511 or 276611 27482 , 4748, or 97489 27782 , 4778 or 97789, 27579 or 27829 27482 , 4748, or 97489 27782 , 4778, 97789, 27579 , or 27829 27292 , 2749, or 2768
6513
PCI RAID disk unit controller and PCI-X RAID disk unit controller
6534
1: In contrast to SPD towers that have either disk space or IOA/IOP slots and limited disk space, HSL towers feature IOP/IOA slots and disk slots in greater quantity than the existing SPD towers. Therefore, depending on the type of SPD towers you are replacing, you have multiple choices for HSL towers. 2: If you are planning on migrating SPD features and towers to 5065 or 5066 before doing an upgrade to an 8xx system, you must use the SPD/PCI features that can reside only in 5065 or 5066 towers. 3: #2745/4745 support up to two multiple protocol communications ports when one or two (in any combination) of the following cables are attached: #0348 V.24/EIA232 20 ft PCI cable #0349 V.24/EIA232 50 ft PCI cable #0353 V.35 20 ft PCI cable #0354 V.35 50 ft PCI cable #0355 V.35 80 ft PCI cable #0356 V.36 20 ft PCI cable #0358 V.36 150 ft PCI cable #0359 X.21 20 ft PCI cable #0360 X.21 50 ft PCI cable #0365 V.24/EIA232 80 ft PCI cable #0367 Operations Console Cable 4: The Integrated PC Server (IPCS) (earlier known as FSIOP) might be shown as feature #6517, #6518, #6519, #6526, #6527, #6528, or #6529. All FSIOP and 6616 IPCS are no longer supported on V5R1. If you are using an 6617 or 6618 IPCS and planning on moving from SPD
11
to PCI, the 2790/2890, 2791, 2891, 2799/2899, and 2792/2892 replacement Integrated xSeries Server can only reside in 5074, 5075, or 5079 towers, 270, or 8xx systems. (Some Integrated xSeries Servers are model-dependant.) The new Enterprise Edition Servers ship with an Integrated IBM eServer zSeries including 9792. There are also Windows considerations to be met when upgrading an Integrated PC Server. 5: All 1.03 GB, 1.96 GB, and 4.19 GB disks are not supported in any 270, 8xx servers, or 5065/5066, 5074/5079/5075, or 5094/5294/5095 towers. 6: 1.2 GB and 2.5 GB -inch cartridges can be read/write on 4482/4582 4 GB -inch cartridge tape units. 7: 13 GB -inch cartridge can be read/write on a 4483/4583 16 GB -inch cartridge tape unit. 8: Internal 8 mm cartridge tape units are no longer supported on 270 or 8xx systems. The alternative is to use an external 7208 tape device. 9: FC2748/4748/9748 are supported by V4R5/V5R1. FC2778/4778/9778 are supported by V5R1 and V5R2. FC2757 and 2782 are supported by V5R2 (February 2003 level). 10: There are numerous fax options for PCI alternatives to the SPD 2664 Integrated FAX Adapter. Refer to the system handbook for alternatives. 11: If the 6501 is being used to attach to an external tape/disk device, it is common for this adapter to be replaced with a 2765 Fibre Channel Tape Adapter or a 2766 Fibre Channel Disk Adapter.
17.54 GB disk unit 10k rpm Storage/PCI expansion unit 1.8 m Storage/PCI expansion unit
1: If you are adding a new disk to an installed 8xx system, it is recommended that you also take advantage of the situation to convert the installed 10k rpm disk to 5065 or 5066 towers.
All disks that do not meet the first two conditions must be removed before or during the upgrade. In the case of an upgrade to i5/OS V5R4, the load source drive must be removed before the upgrade. Special care must be taken to ensure the fourth criteria, where the RAID sets span more disks than can be physically placed on an IOP; for example, earlier expansion towers had disks in sets of 16 disks (usually two RAID sets). However, because a #5074 has disks in a set of 15 disks, one disk must be removed from the configuration and from its RAID set prior to moving the disks as a set to the #5074. The new System i5 has fewer internal disk slots in the CEC than most 8xx servers. Therefore, the disks might have to be rearranged to enable RAID sets to be retained, and to have disks to fit in the CEC.
iSeries Navigator
The iSeries Navigator provides an alternative graphical view of the disk drives. This helps you identify the exact location of a drive from a graphical representation. The graphics truly represent the actual position of a drive unit in a tower. To access the graphical view, perform the following tasks: 1. From the iSeries Navigator main window, expand Configuration and Service (Figure 1-2).
2. In the right-hand panel, expand Hardware. 3. Expand Disks Units. 4. You will be asked for a service tools ID and password when you select a resource.
Chapter 1. Planning for upgrades to System i5 hardware
13
Notes: Dedicated and System Service Tool IDs and passwords are not the same as the OS/400 user profiles and IDs. Starting with OS/400 V5R1, service tool passwords are case-sensitive. You may also define multiple IDs, which may also have varying authority levels. If you forget or disable your service tool IDs, they can be reset by using the command CHGDSTPWD from an OS/400 command line, using the Security Officer profile. 5. Figure 1-3 shows the four options that are available to you: All Disks: This provides a list of all the disks on the system. By Location: This provides a list of disks by tower. Right-click one of the towers to view its serial number and frame ID. This can be compared to the frame ID displayed on the tower itself. Disk Pools: This enables you to view a list of disks according to auxiliary storage pool (ASP). Nonconfigured Disks: This provides a list of disks found on the system, but have not yet been added to an ASP.
6. Right-click By Location and select Graphical view. The disk graphics are hot and show where the disk is situated on the system, so that it can be identified easily. Right-click one of the disks and select Properties to see more 14
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
information about the disks, such as serial number, location, percent full, percent busy, and, most important, the unit number required by STRASPBAL. Figure 1-4 shows the pop-ups. To review the details in each frame, right-click the frame and select Properties. This shows the serial number and frame ID for each frame. The frame ID information can be compared to the LED on each frame, so that you can identify each frame.
You now have sufficient information to identify the disks marked for removal.
15
2. In the System Service Tools main menu, select: a. Type 1 - Start a service tool b. Type 7 - Hardware Service Manager c. Select F6 - Print configuration 3. Some print format options are presented. If your printer allows it, use 132 characters-wide, and press Enter. 4. A spool file is submitted to the service printer. Usually, this is a QPRINT output queue. You now have a printout of the hardware on your system that can be used to help identify the disk units on your system and their location.
16
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Figure 1-6 shows the rear of the i520/550. You can see the connections for the HMC, the high-speed link (HSL), the system power control network (SPCN), local area network (LAN), and the service ports. There are also Universal Serial Bus (USB) ports. These are not usable by i5/OS. Both of the Ethernet ports are available for allocation to partitions, but cannot be used for Operation Console LAN connection. SPCN is a loop on i5 servers. Therefore, both of the ports will have a cable connected if an expansion tower is a part of the system.
The front view presents you with a standard SCSI bay for an internal tape drive. There are two integrated development environment (IDE) drive bays for a DVD device. The lower bay is IDE, but it has a SCSI converter to allow connections to the i5/OS. The second or upper bay can have a DVD device that is IDE-connected. In the control panel, there is a USB and an Ethernet port. Neither of these items is available for use by the partitions. The controls for accessing the display messages and entering the options are very similar to the current 8xx operation panel. There are eight disk drive bays, arranged in two groups of four. With the #5709 feature, the bays P3D1 - P3D4 can run with no protection or mirroring. The #5709 feature is located behind the drill panel beneath the disk bays. This adapter can have a #6574 feature added as a daughter card. This enables these four disks to run RAID protection. To include the other four disk bays, a #6594 feature must be added. This provides the disk bay back plane for bays P2D1 - P2D4. The protection for these disks can be RAID or mirroring. P3D1 is the first disk slot for an i5/OS load source device. The configurator forces you to put a disk in the load source position, but in a partitioned server, there is no requirement for a load source disk in the CEC.
17
If you want to run these disks under a separate partition, they must be driven by an IOP/IOA from one of the PCI-X slots in the CEC (Figure 1-7).
18
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
19
The rear of the i570 (Figure 1-9 on page 21) has the blindswap cassettes on the left and power supplies to the right. Between the I/O adapters and the power supply is the Service Processor. There are two types of blindswap cassettes, one for card slot 1 - 5, and a different type for slot 6. (The cassette for slot 6 is different because it can accommodate the second HSL-2 adapter.) On the lower right is the system interconnect port. This allows multiple i570s to be connected to form a large operating unit.
20
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
As with the i520, there are LAN, SPCN, HSL, and USB ports. (The USB ports are not available for use by the i5/OS. The LAN ports are available for partition use, but they are not available for Operations Console LAN.)
If you look at the front of the i570, you see two DVD device drive bays. However, there is no bay for an internal tape drive. If a tape is required, it must be internal, in an expansion tower, or an external drive. As with the i520, only one of the DVD drive bays is available for i5/OS use. In the control panel, there are USB and Ethernet ports. Neither of these is available for use by the partitions. The controls for accessing the display messages and entering the options is very similar to the current 8xx operation panel.
21
22
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
23
1.6.1 Moving the Integrated xSeries Adapter or Integrated xSeries Server from iSeries 8xx to 5xx
Perform the following tasks to move the IXS and the IXA from iSeries 8xx to 5xx: 1. Ensure that the iSeries server is at V5R3 or later. 2. Install the latest program temporary fixes (PTFs) on iSeries. 3. Upgrade the integration software on the xSeries: a. Select Start Programs IBM iSeries Integration for Windows Server. b. Select the server you want to upgrade. c. Right-click and select All tasks Update. 4. Back up your xSeries server. 5. During the upgrade to the iSeries hardware, move the IXA or IXS card to its new position in the new iSeries server. 6. Change the resource name in the nonprogrammable workstation (NWS) description. 7. Vary on and use as normal.
24
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Note: Historically, model upgrades have not been offered in the AIX marketplace. Therefore, this scenario is not unusual for the AIX client base. For more information about AIX 5L implementation, refer to AIX 5L on IBM System i Platform Implementation Guide, SG24-6455. For information about upgrades to the system within the System i5 range, consult the AIX 5L upgrade pages at: http://www.ibm.com/servers/aix/upgrade/index.html
General planning task ____ Task If you have not already done so, make a copy of this checklist and put it in your project book. Organize your project book and project documents. Perform physical planning tasks to make sure that you have adequate space and power for your upgraded system. Be sure to consider the differences in cabling requirements. Verify your planned configuration. If you have not already done so, determine whether you have to order replacements for unsupported hardware devices. If your system exchanges information with other AS/400s or iSeries, plan any required changes to ensure the coexistence of different OS releases. If you have not already done so, determine whether you will use IBM services for any part of the upgrade process. ___/___/____ ____________ ___/___/____ ____________ ____ Task ___/___/____ ____________ Visit the physical site planning site, which is available on the Web at: http://publib.boulder. ibm.com/infocenter/ese rver/v1r3s/index.jsp
____ Task
____ Task
___/___/____ ____________
____ Task
____ Task
____ Task
___/___/____ ____________
25
Brief description Have the software and the publications been ordered on CD-ROM? Has the user-based pricing been specified with the correct number of users?
Where to find additional information Validate with your local IBM Software Order organization. Validate with your local IBM Software Order organization.
____ Task
Hardware configuration tasks ____ Task Was an IBM-supplied configurator tool used for hardware and software configuration? If LPARs are going to be used, was the LVT used? Will Linux or AIX partitions be installed? With Linux or AIX, will direct I/O or virtual I/O be used? What tape will be used for the Linux/ AIX partition backup? Does the configured system meet or exceed any capacity planning tool recommendations? Are the number of DASD arms and DASD IOAs sufficient for the clients planned DASD protection? Has the appropriate feature code for mirroring or RAID protection been ordered? Will the quantity and speed of the tape devices be able to meet the clients backup window requirements? Will all the products be delivered by the planned installation date? Is there an established timetable for software and hardware setup and installation? Has the appropriate amount of main storage memory been ordered? ___/___/____ ____________ ___/___/____ ____________ ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________
____ Task
____ Task
____ Task
____ Task
____ Task:
____ Task
____ Task
____ Task
26
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Brief description Does the hardware support the clients availability plan (DASD, Tape, LAN, and Communication lines)? If non-IBM hardware will be attached to the system (especially non-IBM DASD), has the client verified whether it is supported? Does the source system include migration or SPD towers? Will the currently installed tower be converted to HSL/PCI towers? If no migration tower is going to be used, have PCI replacement features been ordered to replace the installed SPD features? Is space required for a load source pump? If the load source is going to be protected with RAID, has the proper amount of additional disk been ordered (3/7/9) for the RAID set required? Has the appropriate console type been configured (twinaxial, operations navigator, or HMC)? Has an appropriate device been ordered or is it already available for the console type? If 10k rpm disks are to be migrated to HSL towers, is there room to accommodate them? Has the method to migrate data from nonconverted disk been identified?
____ Task
____ Task
___/___/____ ____________
____ Task
____ Task
____ Task
____ Task
___/___/____ ____________
____ Task
____ Task
____ Task
____ Task
Installation plan tasks ____ Task Has a site preparation review been planned? Has the removal of migrated/replaced equipment been planned? ___/___/____ ____________ ____ Task ___/___/____ ____________
27
Brief description Does the client understand which parts of this installation are the clients responsibility and which are the IBM Service Representatives responsibility? Have the appropriate installation manuals for both hardware and software been ordered for the client on CD-ROM? Does the client agree with the installation plan? Has the client committed personnel and resources to the project? Will the client location be able to move the system to the installation site from the delivery dock? Is the height, width, depth, and load capacity of any elevator to be used adequate for system? Have the names of the movers and the installation group been given to the clients security personnel? Will additional/special tools be required to move the equipment to the clients machine room?
____ Task
____ Task
____ Task
___/___/____ ____________ ___/___/____ ____________ See the physical planning site: http://publib.boulder. ibm.com/infocenter/ese rver/v1r3s/index.jsp
____ Task
____ Task
____ Task
Software checklist ____ Task Has the required level of OS/400 been ordered? If LPARs are going to exist, will they have valid OS/400 releases for the hardware and the primary partition? Will the installed system be upgraded to the required level of OS/400 before the upgrade, and if so, when? Are the current cumulative program temporary fix (CUM PTF) packages available? Has the Preventive Service Planning (PSP) package been reviewed and understood? ___/___/____ ____________ ____ Task ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________
____ Task
____ Task
____ Task
28
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Brief description Has the HIPER PTF list been reviewed and the PTF ordered? Are there any unsupported software/licensed program product (LPP)/programming request for price quotation (PRPQ) that have to be replaced or altered? Are alternatives known, and have they been ordered (for example, OV/400, client access, or fax)? Has the memo to user section titled Licensed products that are no longer supported been reviewed? Check the current installed client software for compatibility, that is, iSeries access. Plan to upgrade the client software to the latest release and service pack. If the upgrade is a side-by-side where all the client applications, libraries, and data will be restored to a new system, have alternative provisions been made to capture information contained in OUTQ, DTAQ, and MSGQ, if necessary?
____ Task
___/___/____ ____________
____ Task
____ Task
____ Task
____ Task
Site preparation tasks ____ Task Is the site preparation on schedule? Has proper power installation been ordered for all the systems, the new I/O towers, and the additional equipment required during the upgrade only or any external equipment? Are the power connectors correct for the new system unit and the I/O tower? ___/___/____ ____________ ____ Task ___/___/____ ____________
____ Task
___/___/____ ____________
Refer to the iSeries physical planning Web site at: http://publib.boulder. ibm.com/infocenter/ese rver/v1r3s/index.jsp
29
Brief description If using side-by-side, is power available to run both the systems at the same time? Have all the preparations for cooling and grounding been met? Has the client considered contracting an IBM Installation Planning Representative? Have all the physical planning check lists from the physical planning Web site been completed?
Due date / task owner ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________
____ Task
____ Task
____ Task
Refer to the iSeries physical planning Web site at: http://publib.boulder. ibm.com/infocenter/ese rver/v1r3s/index.jsp
____ Task
Does the client understand that it is their responsibility to order, install, and assemble all the twinaxial, coax, telephone twisted pair, Ethernet, and IBM cabling system cables? Have all the cables and connectors been ordered and confirmed?
___/___/____ ____________
____ Task
___/___/____ ____________
Refer to the iSeries physical planning Web site at: http://publib.boulder. ibm.com/infocenter/ese rver/v1r3s/index.jsp
____ Task
Has the floor plan layout been completed? Is there adequate storage space for manuals, tools, and cleaning kits? Is the client aware that a relatively short power outage can cause a significantly long system outage? Has a UPS been installed or ordered? Has the physical planning and capacity planning for the UPS been done?
___/___/____ ____________
____ Task
____ Task
System management tasks ____ Task Have the system components been labeled? Have adequate training and update sessions been scheduled? ___/___/____ ____________ ____ Task ___/___/____ ____________
30
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
____ Task
Will programmers be trained to take advantage of the new functions and the OS/400 unique features and functions? Has a standard for the applications documentation been established? Has a standard for the operations been documented in a particular HMC? Are plans in place for ongoing management of disk space usage? Are there defined change management procedures in place? Are non-IBM software impacts known and documented? Are schedules in place for preventive maintenance for both hardware and software? Does the client understand the use of electronic customer support (ECS), Web-based support, and other IBM-supplied problem determination tools? Is the save/restore strategy adequate for the new system? Are the quantity and speed of tape devices adequate for the client to complete daily backups within the required window? Have the networking options been reviewed? Has the communication network been checked to ensure compatibility across all the products in the network?
___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________ ___/___/____ ____________
____ Task
____ Task
____ Task
____ Task
____ Task
____ Task
____ Task
____ Task
___/___/____ ____________
____ Task
____ Task
____ Task
___/___/____ ____________
31
Brief description Has IBM Technology Services been offered to assist in the installation of all or part of the hardware, software, or configuration of the network/communication? If planning for a TCP/IP network, has a unique Internet domain name been registered? If the client is planning to connect to the Internet, are appropriate security measures planned or implemented?
____ Task
____ Task
Testing. tasks ____ Task Plan how to validate your applications. Plan how to check network communications and client software. ___/___/____ ____________ ____ Task ___/___/____ ____________
The following table is for user defined tasks: ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________ ____ Task ___/___/____ ____________
32
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Chapter 2.
Migration examples
This chapter provides some examples of a general upgrade and migration process and certain advanced situations. Before reading this chapter, you must have an understanding of the planning considerations and migration options described in Chapter 1, Planning for upgrades to System i5 hardware on page 1. Important: The steps and descriptions in this chapter are for guidance only. Steps, processes, and responsibilities might change. If you are planning an upgrade using a supported miscellaneous equipment specification (MES), the Customized Upgrade Installation Instructions (CUII) will always be the correct document to describe the upgrade. For an unsupported migration using an upgrade method, you should seek advice from your IBM Representative before attempting the upgrade.
33
34
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2.1.1 Side-by-side upgrade and data migration using the side-by-side method
The side-by-side upgrade path is a method where the target system is a complete (or near-complete) replacement for the source system. This is of two types: Side-by-side, retaining the existing serial number (that is, a side-by-side upgrade). Side-by-side with a new serial number, that is, a box swap and not an upgrade. This is used often when there is no supported upgrade path from the clients existing system, as a data migration to a new system. If the source system is a model that does not support the V5R3 or later level of OS/400, there are additional steps in the upgrade path. Both the methods involve the purchase of enough resources to duplicate most or all of the current environment.
Side-by-side upgrade
In the side-by-side upgrade method, with IBM approval, an IBM service contract, or both there may be limited use of the MES hardware for a short time to carry out extended user testing, thereby reducing the total upgrade risk and possibly reducing the downtime. The benefit of this method is that the production machine is unavailable only during the normal backup routines. The source system supports V5R3 or later. This method is used to test the upgrade process and gives the users the time to test the new environment. This is the sequence of events in the upgrade process: 1. The client reviews the information Request for Price Quotation (RPQ) and orders upgrade, services, and side-by-side time through a special bid process. 2. The required hardware is ordered to duplicate most or all of the environment. 3. The source system is upgraded to V5R3 or later in all the partitions. Note: If you are upgrading the source system to i5/OS V5R4, a 17 GB load source is required for any i5/OS V5R4 partition. 4. The MES is installed as a stand-alone system. 5. The LPAR configuration is created on the target server. 6. Existing full system backups are used to create the new test system using the recovery procedures described in Backup and Recovery V5R4, SC41-5304-08, which is available at: http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?SSN=07AHN00275429 11678&FNC=PBL&PBL=SC41-5304-08PBCEEBO200012125&TRL=TXTSRH 7. The client tests the current environment for up to 56 days. 8. Any production objects that are created or altered, and which will be required on a new system, are saved. 9. The target server is then synchronized with the source system. This can be done in a number of ways: Install only changed objects (saved with the save changed objects command). Install client data libraries only (assuming that the program libraries are unchanged). Scratch install from up-to-date source system saves.
35
Follow the disk migration upgrade path outlined in 2.1.4, Upgrade with converted or relocated disks on page 38. Important: Although scratch install is the safest way to ensure that all of the objects are synchronized, it might take an excessive amount of time. The method allows for an intermediate stage where the target system is refreshed with the changed data to test the final upgrade method. When using the save changed objects command, the client must be sure that the testing process does not change the data objects. Otherwise, data mismatches occur. Refer to Backup and Recovery V5R4, SC41-5304 for detailed procedures. 10.Move any required hardware from the source to the target system. 11.Perform full system backups. 12.Go live.
2.1.2 Data migration using the side-by-side method (source system in the previous release)
In the data migration side-by-side upgrade method, a new server is installed with a serial number that is different from the existing servers because no upgrade path exists to the new hardware. The benefit of this method is that the production machine is unavailable only during normal backup routines. You might chose to use this method: When the source system does not support the V5R3 or later release of OS/400. When the source system will not support a 17 GB load source drive. The tasks involved in the upgrade process are: 1. The client orders a new server and services through a special bid process. 2. The new system duplicates most or all of the current environment. 3. The source system is upgraded to the highest release it can support. 4. The new server is installed. 5. If the new server has licensed programs installed, scratch install the System Licensed Internal Code (SLIC) and the base OS/400. Note: A new system might be delivered with V5R3 and the licensed programs installed. In order to ensure a complete system migration, the target system must be scratch installed with only the V5R3 Licensed Internal Code and the base operating system. For more details, refer to Restoring Previous Release User Data to a New System in Backup and Recovery V5R4, SC41-5304-08. 6. Existing full system backups are used to create the new test system, using the recovery procedures described in Backup and Recovery V5R4, SC41-5304-08. 7. Upgrade the licensed programs to i5/OS V5R3 or later. 8. Install the latest PTFs.
36
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
9. The client tests the current environment. 10.Any production objects that are created or altered, which will be required on the new system, are saved. 11.The target server is then synchronized with the source system. This can be done in a number of ways: Install only the changed objects (saved with the save changed objects command). Install only the client data libraries. Scratch install from the up-to-date source system saves. Important: Although scratch install is the safest way to ensure that all the objects are synchronized, it might take an excessive amount of time. This method allows for an intermediate stage where the target system is refreshed with the changed data to test the final upgrade method. When using the save changed objects command, the client must be sure that the testing process does not change data objects. Otherwise, data mismatches can occur. Refer to Backup and Recovery V5R4, SC41-5304-08 for information about the detailed procedures. 12.Move the required hardware, if any, from the source to the target system. 13.Perform full system backups (you require system saves in i5/OS V5R4 for recovery). 14.Go live.
37
Important: Be absolutely certain that the saves are completed successfully because data that is not saved cannot be recovered by using this method. 6. Remove the hardware from the source system and perform an MES upgrade. 7. Scratch install a new system from the saves. 8. Perform resource mapping. 9. Perform a test and go live.
38
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
scenario is that the overspill disk might force an unwanted expansion unit and significantly increase the MES price. Bus cabling must be planned to ensure that buses retain their existing numbering wherever possible. SPCN is cabled as a loop in the new hardware.
39
2.2.1 Model 810 to model 520 (or 525, 550) with no LPAR
The source system is a model 810 with an integrated system expansion unit and no external towers. The target system is a model 520 with no external towers attached. This is the upgrade path using migrated or converted disks: 1. Upgrade model 810 to V5R3 with the latest PTFs. 2. Ensure that there is space in the new system for a disk to be removed and relocated from the existing system unit. Restriction: Model 810 has six disk slots in the base configuration, with up to 18 disks in the system unit, all running off one RAID controller IOP. A model 520 has four disk slots in the base configuration with a maximum of eight disks in the system unit. Depending on the capacity requirements, a client can choose to house all their disks in the system unit on the 520, which may have all the eight disks on one RAID controller or four on each of the two RAID controllers. This might result in disk reconfiguration services being need to be completed prior to the upgrade. 3. Make sure that there is space for the I/O adapters to be relocated to the new server. 4. Perform a full system backup. 5. Power down the existing server. 6. Set up the Hardware Management Console (HMC). 7. Remove the disks and the I/O adapters. Ensure that you know which disk is the Load Source. 8. Plug the disks into the new system unit. 9. Install the I/O adapters in the new system. 10.Power on. 11.Fix any bus ownership issues and hardware resource naming issues. 12.Go live. This upgrade is only complicated by disk migration issues, potentially going from 18 disks to eight, which must be performed before moving the disks across to the new system.
3. Switch off the RAID protection. 4. Remove one 8.58 GB drive from the configuration. Physically remove this drive from the system, move the load source drive to this drives position, and place a new 35.16 GB drive into the load source position. 5. Perform a D type IPL and install SLIC (System Licensed Internal Code) in the new load source drive. 6. Perform the load source migrate procedure to migrate from the old load source drive to the new 35.16 GB drive. The old load source drive now becomes nonconfigured. (At this point, you have one 35 GB drive and 16 8 GB drives configured, and one 8 GB drive nonconfigured). 7. IPL the system to a restricted state to ensure that storage management recovery is completed. 8. IPL to DST. 9. Remove six 8.58 GB drives from the configuration. Physically remove the seven nonconfigured drives from the system and replace with seven 35.16 GB drives. Tip: In this case, the ASP threshold limit will have to be increased to allow this action (defaults to 95%). 10.Initialize and format the new drives. 11.Add the new drives to the system ASP. 12.Start the RAID protection. 13.Remove the 10 remaining 8.58 GB drives from the configuration. 14.Physically remove the old drives, leaving only eight new drives. 15.Perform an IPL. When working out a strategy for this type of data migration, it is necessary to draw up a table similar to Table 2-2. This ensures that utilization does not exceed 100%. If utilization exceeds the ASP threshold by a small amount, it is possible to temporarily increase the threshold in the system service tools (SST) in order to allow migration to occur.
Table 2-2 Disk capacity and utilization through the migration process Stage At start Switch off RAID Remove one drive from ASP Migrate load source Remove six 8.58 GB drives Install seven 35.16 GB drives Remove ten 78.58 GB drives 8.58 GB equivalents 16 18 17 16 10 10 0 35.16 GB equivalents 0 0 0 1 1 8 8 Disk capacity 137.28 GB 155.44 GB 145.86 GB 172.44 GB 120.96 GB 367.08 GB 281.28 GB Utilization 85% 75% 80% 68% 96% 32% 41%
41
8.58 GB equivalents 0
35.16 GB equivalents 7
Utilization 47%
2.2.2 Model 820 with tower to model 520 (525, 550) with no LPAR
The source system is a model 820 with an integrated system expansion unit, and one #5074 external tower. The target system is a model 520 with the external tower migrated. Follow the upgrade with a migrated or converted disks path. 1. Upgrade model 820 to V5R3 or later with the latest PTFs. 2. Ensure that there is space in the new system for the disk to be removed and relocated from the existing system unit that is maintaining the existing RAID sets. Restriction: Model 820 has six disk slots in the base configuration with up to 12 disks in the system unit, all off one RAID controller IOP. A model 520 has four disk slots in the base configuration with a maximum of eight disks in the system unit. The RAID set that contains the load source disk must be housed in the system unit (with the load source disk in slot 6). This might result in disk reconfiguration services being required prior to the upgrade. 3. Ensure that there is space for the I/O adapters to be relocated to the new server. Because the migration tower is not supported on model 520, I/O features and disks housed in this unit must be replaced before or during the upgrade. 4. Perform a full system backup. 5. Install an additional disk in the #5074 tower. 6. Install a new I/O in the #5074 tower. 7. If the system unit on the 820 contains two RAID sets, move one complete RAID set to the #5074 tower. If not, a data migration similar to that described in the previous example (Example disk migration (Gig-Mig service) on page 40) must be performed to get the number of disks down to the number supported in the 520 (either four or eight, depending on the order). If the system has been in use since the time you performed this action, perform another full system backup. 8. Power down the existing server. 9. Remove the disks and the I/O adapters from the system unit. 10.Set up the HMC. 11.Move the disks from the old system unit and install them in the new system unit. 12.Install the I/O adapters in the new system unit or #5074, as required. 13.Upgrade #5074 to #5094. 14.Power on the unit. 15.Fix any bus ownership issues and hardware resource naming issues. 16.Go live.
42
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
43
44
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2.2.5 Model 840 to model 570 (system upgrade with no LPAR or Hardware Management Console)
The source system is a model 840 with a 9079 base I/O tower 9840/sb3. The target system is a model i570 with a 5294 expansion unit, using the Operations Console LAN. In this scenario, only the disks in the source system unit are moved. Note: This is a disk-only migration, which has two RAID sets hanging off one RAID controller. RAID set 1 is made up of six disks, and RAID set 2 is made up of eight disks. This means that the disks can be moved straight across to the new system without any reconfiguration of disks. Following is the upgrade process: 1. Develop an implementation plan to prepare for the upgrade, including asking the following questions: Is there a supported path for the new system? Is there any hardware that must be migrated or ordered? Are there enough DASD capacity and slots? Predefine the system console (this is important if you are planning LPARs). Note: For MES upgrades, the Customized Upgrade Installation Instructions (CUII) must be used in conjunction with the implementation plan and the steps described here. These instructions are available to the hardware service representatives. 2. Upgrade model 840 to i5/OS V5R4 with the latest PTFs. This function can be performed by your hardware representative. 3. The client tests the current environment. 4. The client performs a full system backup (perform two sets, and do not forget to clean the tape drive before and after each backup). 5. Verify that all the disks are reporting in by performing the following tasks: a. b. c. d. In the iSeries main menu, type STRSST and press Enter. Type 1 (Start a Service Tool) and press Enter. Type 3 (Work with disk units) and press Enter. Type 1 (Display disk configuration status) and press Enter.
In the disk unit details display you can see the bus number, the ASP number, the serial number, and the status of the unprotected disks. 6. Print the system rack configuration using SST (STRSST): a. b. c. d. In the iSeries main menu, type STRSST and press Enter. Type 1 (Start a Service Tool) and press Enter. Type 7 (Hardware Service Manager) and press Enter. Press PF6 to print the report.
7. From the rack config list, map the resource name to the card position, for example, DD009 - D31. Tip: Use the LPAR validation tool (LVT) to establish the current and the new component locations. 8. Use the rack config list, LVT report, and the diagram from the front cover panel of the source system 840 unit to locate the physical location of disk drives, and then access the
45
service tools (STRSST) to establish how many RAID sets were on the system. In our scenario, there were six disks in the first RAID set, and eight disks in the second RAID set. Therefore, they could be moved to the new server that maintains the RAID set. Note: If you have more than six disks, including your load source in a RAID set, some additional reconfiguration tasks must be performed during the preplanning stage. 9. Verify that the Ethernet/LAN Console is in the correct slot for the Operations Console. Details about card placement are available in the topic Operations console hardware requirements in the connecting to iSeries on selecting Connecting to iSeries Operations Console Manage Operations Console Change from one console type to another Twinaxial console to Operations Console. This is available in the IBM eServer iSeries Information Center on the Web at: http://www.iseries.ibm.com/infocenter 10.For the initial installation of the Operations Console on a LAN network, perform the following tasks: a. Ensure that the PC is connected to the LAN network. b. Connect the system to the LAN network using the console driver card in slot C04 or C06. c. Label both the cables. 11.Perform the following DST function to identify the Operations Console LAN PC as the system console for the DST: a. b. c. d. e. f. g. Select DST from the IPL or Install the system menu or by selecting panel function 21. Enter the QSECOFR user ID and password (case-sensitive) to access the DST. Select 5 (Work with DST Environment) and press Enter. Select 2 (System Devices) and press Enter. Select 6 (Console Mode) and press Enter. Select Console type 3 (Operations Console (LAN)). Select Save console type by pressing F7 and store before you exit. Note: This procedure is found in the section Selecting Operations Console as the console device in Operations Console Setup, SC41-5508-02. 12.When migrating to the Operations Console, it is important that you configure the new Operations Console PC before beginning the server model upgrade. At this point in the upgrade instructions, where console functions are required on the new iSeries server, you will be able to perform the required functions without your current console device. The Operations Console features matching the connectivity you plan to use must be specified as part of the order for your new iSeries server. 13.Power down the existing system and remove the cables. 14.Connect the new system with the HSL cables and the SPCN cables (as per the CUII document). 15.In the new i570 system, the CE will install the catch assembly to each central electronics complex (CEC) drawer. 16.Install the fabric flex (SMP) cable so that the left side is behind the rack frame and will not interfere with the covers or the rack trim (Figure 2-1 on page 47).
46
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Note: Fitting the flex cable is a client install, but an MES adding a CEC drawer is considered a CE install. 17.Start with the top CEC drawer, and then align the flex cable assembly to engage the install lever with the catch assembly. 18.After ensuring that the connector pin alignment is all right, move the lever in the fabric flex cable to the installed position and lock in place. (Refer to the fabric (SMP) cable install lever action in the CUII document.)
47
19.Install the flexible service processor cable on the right side of the rear of the CEC unit (Figure 2-2).
20.Remove the load source disk from the old server and insert it into the correct load source slot in the new system. 21.Remove the five remaining disks from the first RAID set in the old server and insert them into the empty slots in the same cage as the load source disk mentioned in the previous step (they can be placed in any order). 22.Remove the last eight disks from the second RAID set in the old server and insert them into the empty slots in the cage in the 5294 expansion unit. This maintains the existing RAID set. 23.For the first connection between the iSeries server and Operations Console PC, you must use the service tools user ID of 11111111 (eight 1s). This prevents the shipped expired user IDs from preventing a successful reauthentication of the client connection to the server. When you receive the OS/400 release upgrade, the shipped user IDs (except 11111111) are expired. To establish a successful reauthentication of the client connection to the server, use the service tools user ID of 11111111 (eight 1s). This is especially important for automatic installations. Attention: Failure to comply with these actions may prevent the console from working correctly during the upgrade or install. 24.Power on the new server. 25.Perform full system backups (you require system saves in i5/OS V5R4 for recovery). 26.Go live.
48
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Important: During a manual IPL of the system, if no console was specified earlier, you will receive two additional screens to confirm the setting of the console mode. The first confirmation requires F10 to accept your current console type and the second confirmation screen shows that a value did not exist previously (a zero is present against the old value) and the new value is shown. Press Enter to exit and set the console mode automatically. The IPL then continues to the IPL screen or the Install the System screen. Although this condition is most likely to occur during the installation of a new partition, it could happen on your first manual IPL of i5/OS V5R4.
49
50
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Chapter 3.
51
5094, 5294 and the 5095 expansion towers. The 5294 is merely a two-high 5094. Each 5094 can house 45 disk drives and the I/O cards that drive them. The 5095 expansion tower is a smaller unit that can be floor or rack mounted. It houses up to 12 disk units along with the I/O adapters that drive them. A new type of disk drive draw is now available. This disk draw is available only in a 4U rack mounted enclosure. It is SCSI connected rather than HSL. This offers a longer cable length (20m) that might be attractive to customers wishing to install many disks on one system where a short HSL cable length might cause physical arrangement limitations. The 24 drives in the EXP24 enclosure can be arranged in four six-disk packs or two 12-disk packs. These packs can be allocated to different logical partitions. The pack arrangements and protection depend on the I/O adapters controlling them. I/O adapters controlling the disk in an EXP24 can be in an I/O expansion located in the same rack as the EXP24 or the CEC.
Unprotected
Disks can be added to auxiliary storage pools (ASPs) without any form of data protection. This method is recommended only in situations where the maximum usable disk capacity is required and data does not have to be protected, such as a system that is used only for training purposes and is regularly scratch-installed to set up new courses.
RAID-5 protection
Disks are protected by a parity check bit being written for each sector on the drives. In the event of a single disk failure within a RAIDset, the system continues to operate in a degraded mode because the data in the failing unit can be calculated by using the saved parity value and the values of the bits in the same locations on the other disks. In the event of a second disk failure within the same RAIDset, the system fails and system recovery is from data backups. The cost of RAID-5 is a reduction in the overall disk capacity, equivalent to one disk per RAIDset. For example, a system with two RAID-5 RAIDsets of 10 disks each (20 drives in total) will have a total capacity equivalent to 18 disks.
53
A RAID-5 RAIDset can spread parity data over two, four, eight, or 16 drives. A RAID-5 RAIDset can contain a minimum of three disk drives (four for older disk input/output adapters) and a maximum of 18 disk drives.
RAID-6 protection
Disks are protected by writing two redundant data bits using the p&q parity data based on the Reed-Solomon algorithm. Conceptually, by writing two sets of parity data, a RAID-6 array can tolerate up to two disk failures within the array. A RAID-6 array with a single disk failure is still protected as much as a RAID-5 array with no failures. A RAID-6 RAIDset with two failing drives continues to function in degraded mode until a third disk in that RAIDset fails. The cost of a RAID-6 array is equivalent to two drives capacity per RAIDset. For example, a system with two RAID-6 RAIDsets of 10 disks each (20 drives) will have a total capacity equivalent to 16 disks. RAID-6 arrays spread parity data across all drives in the array when RAID-6 is started, so if seven drives are in the array, they will each have two parity stripes using up a total of two-sevenths of the capacity, leaving five-sevenths of the capacity for user data. Any disk drives that are subsequently added to the array will not have any RAIDstripes, and so the full capacity is available for user data. (For example, adding two more drives to the RAIDset gives seven drives at five-sevenths capacity and two drives at full capacity.) For performance reasons, it is desirable to stop and restart RAID on these drives to spread the parity stripes across all the nine drives, giving nine drives of seven-ninths capacity. A RAID-6 RAIDset can contain a minimum of four disk drives and a maximum of 18 disk drives. RAID-6 can be implemented only on #571B and #571E IOAs, which have auxiliary cache. IOA cache is mirrored to prevent data loss in the event of an IOA cache failure. An additional feature of RAID-6 is that when functioning with no drive failures, the RAID-6 IOA can interrogate the user data and the parity data to ensure consistency. Because of the two parity bits, any inconsistency can be isolated and corrected. For example, if a disk head is not tracking correctly, and therefore not reading data correctly, the parity bits will not conform to the data and a parity inconsistency is logged. On a RAID-5 implementation, all that is known is that there is a problem, and the failing disk cannot be isolated until other diagnostics show a hardware error. However, on a RAID-6 implementation, because of the two parity bits, the false data bits can be isolated and corrected. Thus the system can perform data cleaning. Note: The System i5 implementation of RAID-6 uses the P&Q parity data based on the Reed-Solomon algorithm method. This method utilizes a hardware finite field multiplier direct memory access (DMA) engine to perform the necessary calculations. Because other implementations utilize software calculations, they use CPU capacity or have to use additional disk capacity for parity data (or both), reducing available space for the user data.
Mirror protected
Disk mirroring requires each disk drive to have an identical mate. An exact copy of the data on the first drive is made to the second drive. In the event of a drive failure, the system continues to function using the other copy. The system fails only if both drives in a mirrored pair fail.
54
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Mirror protection can be heightened by carefully selecting and placing the hardware. The system will always select the best available protection when starting the mirroring process. Mirror protection can be at the following levels, with the greatest protection coming last: Disk protected A disk drive failure will not cause system outage. However, because both the disks of a mirrored pair are on the same Small Computer System Interface (SCSI) bus, a failure of the SCSI bus causes system outage. SCSI bus protected All of the disks have their mirrored pair on a different SCSI bus. However, a mirrored pair is on the same storage adapter card (IOA). In this case, an entire SCSI bus may fail, causing the system to lose contact with all drives on that SCSI bus, and there is no system outage. IOA protected Both of the disks of mirrored pairs are on separate storage adapter cards (IOA). Failure of an IOA does not cause system outage. Input/output processor protected Mirrored pairs are separated at the input/output processor (IOP) level. Failure of an IOP does not cause system outage, although some facilities might be unavailable depending on the hardware that is also present on that IOP. Bus protection Mirrored pairs are separated at the system bus level. Although failure of a system bus does not cause system outage, the other hardware attached to that bus is unavailable. Frame protection Mirrored pairs are in separate I/O towers. Although complete failure of an I/O tower does not cause system outage, the other hardware located on that tower is unavailable. High-speed link loop protection Mirrored pairs are on separate high-speed link (HSL) loops. Although HSL loop failure does not cause system outage, other hardware attached to that HSL loop is unavailable. When adding additional drives to an already mirrored system, it is necessary to stop and restart mirroring in order to gain the best level of mirroring for that hardware configuration.
55
RAID optimization
Unlike mirrored protection, all of the disk drives in a RAIDset must be on the same storage IOA card. This is because the IOA performs the calculations that are required for the parity stripes or data regeneration following disk failure. Within this limitation, there is scope for defining different optimization strategies, as outlined in the following list: Availability A parity set optimized for availability offers a greater level of protection because it allows a parity set to remain functional in the event of an SCSI bus failure. The availability
56
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
optimization value ensures that a parity set is formed from at least three disk units of equal capacity, each attached to a separate bus on the IOA. For example, if an IOA has 15 disk units and is optimized for availability, the result might be five parity sets with three disk units, each attached to separate SCSI buses on the adapter. (OS/400 V5R3 is required to optimize for availability.) Capacity A parity set that is optimized for capacity stores the maximum amount of data possible. The IOA may generate fewer parity sets with more disk units in each parity set. For example, if an I/O adapter has 15 disk units and is optimized for capacity, the result might be one parity set containing 15 disk units. Balanced A balanced parity set compromises between the ability to store large amounts of data and to provide fast access to data. For example, if an I/O adapter has 15 disk units and you choose the balanced parity optimization, the result might be two parity sets, one with nine disk units and one with six disk units. Performance A parity set optimized for performance provides the fastest data access. The I/O adapter might generate more parity sets with fewer numbers of disk units. For example, if an I/O adapter has 15 disk units, and is optimized for performance, the result might be three parity sets with five disk units each. The process of selecting the RAID optimization strategy can be performed using the iSeries Navigator or the dedicated service tools (DST).
57
58
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. In the page that is displayed (Figure 3-2), use the Optimization drop-down box to select the required optimization.
59
3. On the same page use the RAID Level drop-down box to select the required RAID type, as shown in Figure 3-3. Click Change Optimization.
60
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
61
5. In the Select Parity Optimization screen (Figure 3-5), select the required type of optimization and press Enter.
If the required optimization cannot be performed due to resource constraints (for example, not enough disks), a message is displayed when starting RAID, as shown in Figure 3-6.
Figure 3-6 Error message due to inadequate disks being available for the selected optimization
62
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
After RAID is started with the required optimization, the Display Device Parity Status screen (Figure 3-7) displays information about the optimization used.
63
64
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. On the page that is displayed (Figure 3-9), confirm that the RAID Level and Optimization settings are correct. Select the boxes for the RAIDsets you want to start, and click Start Parity.
65
3.4.4 Migrating to RAID-6 from unprotected disk using dedicated service tools
To migrate to RAID-6 from unprotected disk using the DST, follow these steps: 1. 2. 3. 4. From the DST main menu, select Work with Disk Units. Select Work with disk unit configuration. Select Work with Device Parity Protection. On the screen shown in Figure 3-11, enter 6 for Start device Parity Protection - RAID-6.
66
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
5. If there are insufficient drives for RAID-6, the system automatically selects RAID-6 where possible, and RAID-5 where alternately possible (Figure 3-13). If there are only two disks of a particular size on an ASP, they will remain unprotected. In the Start Device Parity Protection screen (Figure 3-12), select the RAIDsets you want to start and press Enter.
67
3.4.5 Migrating to RAID-6 from unprotected disk using system service tools
The system service tools (SST) menu (Figure 3-14) is similar to the DST menu. The actions to be performed in SST are similar to those actions described for DST in the earlier sections.
68
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
This sequence might have to be altered if hardware that not being supported in the release is in use. For example, the operating system might have to be upgraded and PTFs applied before load source migration because the new load source disk might not be supported in the current release. If moving from 8xx hardware, your new load source drive might be larger than is supported on your current system. In such a situation, you must either perform the upgrade as an unload reload or upgrade the load source to a 17 GB drive on your current system, then perform another load source upgrade on your target (upgraded) system to the larger drive.
69
Note: The process is basically the same for a system with an LPAR as for a system without an LPAR. All you have to do is follow the relevant scenario instructions.
70
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
6. In the Dedicated Service Tools screen, sign in to DST as QSECOFR (Figure 3-16). Note: The DST QSECOFR password is not the same as the QSECOFR user ID password, and is case-sensitive.
7. In the Use Dedicated Service Tools (DST) screen (Figure 3-17), enter 4 (Work with disk units).
71
8. In the Work with Disk Units screen (Figure 3-18), enter 2 (Work with disk unit recovery).
9. In the Work with Disk Unit Recovery screen (Figure 3-19), enter 6 (Disk unit problem recovery procedures).
72
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
10.In the Disk Unit Problem Recovery Procedures screen (Figure 3-20), enter 1 (Initialize and format disk unit).
11.In the screen that is displayed, select the new nonconfigured drive to initialize and confirm. 12.Return to the Work with Disk Unit Recovery screen (Figure 3-19 on page 72) and enter 9 (Copy disk unit data). 13.In the screen that is displayed (Figure 3-21), select the load source disk unit (disk unit 1) as the unit to copy.
73
14.In the Select Copy to Disk Unit Data screen (Figure 3-22), select the nonconfigured unit that you installed in step 3 on page 70 as the unit to copy to.
15.This displays the Copy Disk Unit Data Status screen (Figure 3-23).
16.Wait for copy to complete. 17.Power off the system. From the DST main screen (Figure 3-17 on page 71), enter 7 (Start a service tool), Or on the Service tools screen, enter 7 (Operator panel functions).
74
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
When you see the screen in Figure 3-24, press F10 to power off.
18.Find the old load source disk unit and slide the disk unit out of the system. 19.Move the new load source disk to the load source position. 20.If you removed a drive in step 3 on page 70, reinstall it. 21.Perform an IPL on the system.
75
6. Suspend the load source mate as follows: a. On the IPL or the Install the System screen (Figure 3-25), enter 3 (Use dedicated Service Tools).
76
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
c. On the DST main menu (Use Dedicated Service Tools screen shown in Figure 3-27), enter 4 (Work With Disk Units).
d. On the Work with Disk Units screen (Figure 3-28), enter 2 (Work with disk unit recovery).
77
e. On the Work with Disk Unit Recovery screen (Figure 3-29), enter 7 (Suspend mirrored protection).
f. At the Suspend Mirrored Protection screen (Figure 3-30), select unit 1 (the load source mate).
78
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
7. Copy the load source disk unit data to one of the new drives as follows: a. At the Work with Disk Unit Recovery screen (Figure 3-31), enter 6 (Copy Disk Unit Data).
b. At the Select Copy from Disk Unit screen (Figure 3-32), select unit 1.
79
c. Select one of the new drives on the Select Copy to Disk Unit screen (Figure 3-33) and note the serial number.
d. Press F10 to accept the warning Other disk unit will become missing. e. Press Enter to confirm the copy. The Copy Disk Unit Data Status screen (Figure 3-34) appears.
80
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
8. Return to the DST main screen (Figure 3-35) and power down the system (or partition) as follows: a. Enter 7 (Start a service tool).
81
c. On the Operator Panel Functions screen (Figure 3-37), press F10 to power off.
9. Remove the load source drive (the serial number and location you noted in step 2 on page 75) from the system. 10.Move the new load source drive (the serial number and location you noted in step 7 on page 79) to that slot. 11.Remove the old load source mate (the serial number you noted in step 2 on page 75). 12.Move the new load source mate to that slot (the serial number and location you noted in step 7 on page 79). 13.Power on the system (or partition) in manual mode.
82
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
14.Replace the configured unit as follows: a. Sign on to the DST. b. Select the option for Work with Disk Units. c. Select the option for Work with Disk Unit Recovery. d. At the screen shown in Figure 3-38, enter 3 (Replace configured unit).
e. Enter 1 next to the suspended Unit 1 disk unit at the screen shown in Figure 3-39.
83
f. At the Select Replacement Unit screen (Figure 3-40), enter 1 next to the newly installed disk unit, and press Enter to confirm.
The status is displayed in the Replace Disk Unit Data Status screen (Figure 3-41).
84
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
15.Check the configuration by performing the following tasks: a. From the DST main menu, select the option for Work with Disk Units. b. Select the option for Work with Disk Unit Configuration. c. Select the option for Display Disk Unit Status. d. In the Display Disk Configuration Status screen shown in Figure 3-42, check whether the load source (unit 1) is one of the new (larger) disks you require.
Load source migrate RAID system: No spare disk slots in the system
If no spare disk slots are available in the system, perform the following tasks: 1. 2. 3. 4. 5. 6. Perform a full system save. Perform an IPL to the DST. Switch off RAID. Follow the basic procedure for nonprotected systems. Restart RAID. Perform an IPL on the system.
85
Follow these steps: 1. Perform a full system save. 2. Power down the system. 3. Move the nonload source disk RAIDset to another IOA. (Ensure that you move all of the disks in the RAIDset and only the disks in that RAIDset). 4. Install the new disks in the vacated slots. 5. Start RAID on the new disks. 6. Perform disk copy from the load source disk to one of the new disks. 7. Add the remaining new disks into the system ASP. 8. Remove the rest of the old load source RAIDset from configuration by using the Remove disks from configuration option in the Work with ASP Configuration screen. 9. Power down the system. 10.Physically remove the old load source disk and its RAIDset from the system. 11.Move the new load source disk to the load source position. 12.Perform an IPL on the system.
86
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Figure 3-44 shows the new RAID-5 available with the new PCI-X RAID disk IOAs. In this configuration, the disk platter is subdivided into 16 subarrays. Each subarray has a user data area and a RAID data area. You can see that the Read/Write arm only has to move across a fraction of the disk platter at low levels of capacity. This vastly improves the seek time and consequently the response time.
This new RAID arrangement is implemented by the IOA as soon as any drive under it is started. The major implication of this setup becomes apparent during upgrades. Here are the two scenarios where the new RAID is implemented: When RAIDed disks are moved from under the control of an existing PCI RAID IOA to a system unit or expansion unit containing PCI-X RAID Disk IOAs When a new PCI-X RAID Disk IOA replaces an existing PCI RAID Disk IOA controlling RAIDed disks in an existing system unit or expansion tower There is no user control over the change to the RAID arrangement. Because the system runs an IPL for the first time after the new PCI-X IOAs are in place, the IOA detects the old RAID format. During the IPL, the old RAID format is removed and replaced with the new RAID format. During this period, the drives that are being reformatted are not protected. Therefore, ensure that full system backups have been taken.
87
88
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Chapter 4.
89
90
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
91
92
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Refer to the following sites to download server firmware fixes: iSeries Recommended Fixes - Server Firmware: Update Policy Set to Operating System http://www-912.ibm.com/s_dir/slkbase.nsf/c32447c09fb9a1f186256a6c00504227/60499 2740f846a4986256fd3006029b5?OpenDocument iSeries Recommended Fixes - Server Firmware: Update Policy Set to HMC http://www-912.ibm.com/s_dir/slkbase.nsf/ibmscdirect/E58D7BBF0EAC9A2786256EAD00 5F54D8
93
Select the release level, and download either the fixes for that release (corrective service download) or get a release update (recovery media download). Installation instructions are also available. Here is an example for HMC machine code 5.2.1: Corrective service download (Figure 4-2), which is available at: https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/download/v521.Updat e.html
Recovery media download (Figure 4-3 on page 95) https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/download/v521.Recov ery.html The HMC Recovery DVD, which is used to update your code to a new release, is a bootable image and contains the HMC Base Code. If you have to scratch install the HMC machine code, you require the recovery DVD for the release installed on the HMC. Before you start an upgrade, ensure that you have performed the following tasks: Back up the managed systems profile data.
94
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Back up the critical console information (this enables you to go back to the previous level of machine code in case something goes wrong when upgrading). Record HMC configuration information (schedule operations) and remote command status. Save the upgrade data. Upgrade data enables you to restore the HMC configuration after the upgrade. The upgrade data is stored in a designated disk partition on the HMC. Only one version of the upgrade data can be stored at a time, so perform this operation immediately before the upgrade. For details about the upgrade process, refer to: http://publib.boulder.ibm.com/infocenter/eserver/v1r3s/topic/ipha5/fixeshmc_ upgrades.htm
95
Check for updated information about the supported combinations server firmware and the HMC code levels at the POWER5 code matrix Web site: http://www14.software.ibm.com/webapp/set2/sas/f/power5cm/supportedcode.html For more information about getting and installing fixes and updates for HMC code and server firmware, refer to the IBM Systems Hardware Information Center or download the PDF at: http://publib.boulder.ibm.com/infocenter/eserver/v1r3s/topic/ipha5/ipha5.pdf Receive updates on the latest fix levels through the subscription service for System i5 at: http://www14.software.ibm.com/webapp/set2/subscriptions/iqvcmjd 96
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
4.2.2 Specifications
The Thin Console is a Neoware c50 thin client running a customized Linux image, which includes an IBM 5250 emulator.
97
The Linux software image does not include support for printing or for programmable or scriptable interfaces (application programming interfaces (APIs), commands, and scripts). The Neoware c50 thin client contains: 1 VIA Eden Processor @ 400 MHz 64 MB of flash storage 128 MB of DDR SDRAM memory 1 serial port (D-Sub 9-Pin Male) 1 parallel port (D-Sub 25-Pin Female) 1 VGA port, with support for up to 1200x1600 @ 60 Hz 1 PS/2 keyboard port 1 PS/2 mouse port 2 USB 2.0 ports (type A) The documentation for the Neoware c50 thin clients with their generic NeoLinux 3.0 load, NeoLinux Thin Clients User Manual, is available at: http://www.neoware.com/docs/manuals/um_neolinux_30_20040630.pdf The Thin Console has two interactive user interfaces: A 5250 screen When connecting to the server, it displays the connection status. After successful connection, it displays the servers 5250 console session. A GUI-type configuration screen for the keyboard and monitor called the ezConnect Neoware Connection Manager
98
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Under Server Information, the State field indicates the power and runtime states as they are detected by the Thin Console. The State field contains a numeric status code and a description. Table 4-1 lists the codes and their meanings.
Table 4-1 Server information state codes Numeric code 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07 0x08 0x09 0x0A 0x0F Code names CEC_NOT_RUNNING CEC_IPLING_PHYP_NOT_READY_FOR_HMC CEC_IPLING_PHYP_READY_FOR_HMC CEC_TERMINATION CEC_DUMPING CEC_POWER_ON_TRANSITION CEC_POWER_OFF_TRANSITION CEC_POWER_OFF_IN_PROCESS CEC_TRANSITION_TO_IPL CEC_TRANSITION_TO_DUMP CEC_TRANSITION_TO_TERMINATION CEC_PHYP_FUNCTIONAL Description "POWERED OFF" "STARTING" "STARTING" "TERMINATING" "FIRMWARE DUMP" "STARTING" "POWERING OFF" "POWERING OFF" "STARTING" "FIRMWARE DUMP" "TERMINATING" "FIRMWARE READY"
99
CEC_RUN_STATE_UNKNOWN n/a
"UNKNOWN" "UNKNOWN"
Under Connection Status, the server connection status code indicates the progress of the connection between the Thin Console and the server. It is a four-digit code XX.YY, where XX is the major connection status (00-99) and YY is the minor connection status (00-99). Table 4-2 lists the status codes and their description. During a successful connection, these codes must progress from 0 to 100.
Table 4-2 Server connection status codes Numeric code 00 10 20 30 40 50 60 70 80 90 93 97 99 100 Code names NO_CONNECTION CONNECTION_TO_HWS CMD_SOCKET_UP STREAM_SOCKET_UP PHYP_UP SERIAL_CONNECTION_UP LINK_LEVEL_ECHO_UP ICMP_ECHO_POLLING_UP HWS_IS_ECHOING GOT_INIT_COND_RESPONSE CONNECTED_TO_SLIC NEGOTIATING WAITING_FOR_SCREEN PASS_DATA_THROUGH Description "SEARCHING FOR SERVICE PROCESSOR" "SEARCHING FOR SERVICE PROCESSOR" "SERVICE PROCESSOR FOUND" "VALIDATING SYSTEM POWER STATE" "FIRMWARE READY" "COMMUNICATION INITIALIZED" "COMMUNICATION ACTIVE" "IP COMMUNICATION ACTIVE" "IP COMMUNICATION ACTIVE" "OPERATING SYSTEM CONSOLE INITIALIZED" "OPERATING SYSTEM CONSOLE ACTIVE" "NEGOTIATING" "WAITING FOR SCREEN DATA" The user should see the i5/OS 5250 data stream when at this state.
100
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
101
3. Plug in the monitor and power it on. 4. Plug in the Thin Console. It automatically powers on. It boots from the pre-installed Linux software image; you do not have to install any software. 5. Select the keyboard language and press Enter (Figure 4-9 on page 103).
102
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
6. Plug the other end of the Ethernet cable directly into either one of the HMC ports on the server. The ports are labeled HMC1 and HMC2. Although it is recommended that you attach the Thin Console before powering on the server, the console session must be able to connect regardless of the connection sequence. Note: Do not attach another console device to the remaining HMC port. When you use a Thin Console, only one HMC port on the FSP can be connected at a time. 7. The 5250 session comes up and displays the progress of the connection status. Figure 4-10 shows connection status 10.nn.
103
8. On the next screen (Figure 4-11), authenticate the device to the FSP by entering the HMC access password. The default password is abc123. This authentication ensures protection for the FSP network interfaces. After being entered, the access password is stored locally on the Thin Console, so that subsequent connections to the same FSP do not require you to re-enter it.
9. If you have not done so already, power on the System i5. The following figures (Figure 4-12, Figure 4-13 on page 105, and Figure 4-14 on page 105) show the Thin Console cycling through some of the different connection states. Figure 4-12 shows the Thin Console connection status 20.nn.
104
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
10.When the connection to the server is completed, the Thin Console 5250 session behaves like any other 5250 console (Figure 4-15).
105
11.When you power down the system (or IPL), the FSP port remains powered on. Because the Thin Console is directly connected to the FSP, it is able to detect that connection, even when the i5/OS system is not running. In such a situation, the system attention light is on. It will go off as soon as the server powers on. The following figures (Figure 4-16 to Figure Figure 4-26 on page 109) show the codes displayed by the Thin Console to signal this. Note the Server Information State, Server Information Reference Code, and Connection status fields. Figure 4-16 shows power off 10.00.
Figure 4-18 through Figure 4-21 on page 107 show four stages of power off 30.00.
106
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
107
108
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
109
Connection menu
Figure 4-28 shows the options that are available from the Connection menu. The Session option enables you to restart the 5250 console connection. If you change any of the connection settings, you have to restart the connection for the changes to take effect.
110
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
(within a red frame in Figure 4-29) are the general settings. Click Network if you want to modify the network settings.
111
The three other options in the red frame in the Appliance properties (Figure 4-31) are advanced settings. Factory Reset resets the customization to the factory default, and the Console option opens the Appliance Console.
In the Appliance Console screen (Figure 4-32), type menu and press Enter.
112
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
This opens an advanced configuration menu (Figure 4-33). The options in this menu exist to enable problem determination by IBM support personnel. Option 10 overrides the FSP address and stops the automatic network search code. Important: It is recommended that you do not make any changes here.
Figure 4-34 Neoware Connection Manager: Global IBM Terminal Settings Chapter 4. System i5 consoles in i5/OS V5R4
113
An example of customization is the color mapping for the 5250 session. Perform the following tasks to customize color mapping: 1. From the 5250 Settings tab, select Advanced against Custom Colors and select the check box against Option Menu, as shown in Figure 4-35.
114
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. Restart the 5250 console session for the changes to take effect. After the restart, the Option menu (Figure 4-36) is available in the 5250 session.
115
3. Click Advanced. Select a construct from the left column and change it to the color of your preference. Click Apply Current Color. When you are finished, click Save to save your changes to a new, user-defined color scheme (Figure 4-37).
116
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
4. Click Basic, select the new color scheme you just created and click Save, as shown in Figure 4-38.
5. Save the color scheme as the default for all your sessions, as shown in Figure 4-39.
117
6. When you exit the window, you will be asked whether to apply the changes you just made to the current session. Select Apply changes to this session before exiting and click Exit (Figure 4-40).
118
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
7. At this point, you still have the Option menu in the top left corner of the 5250 session. Switch back to the Neoware Connection Manager to take the Option menu out of the 5250 session (Figure 4-41).
4.2.7 Maintenance
Hardware warranty replacements are made by Neoware. Customers must register at the following Neoware Web site for warranty entitlement: http://www.neoware.com/support/warranty.php The software service is delivered by Neoware. Currently, no known fixes are required for the Thin Console. Neoware provides fixes to its registered customers. Load that code to a USB memory key. The minimum capacity requirement for the memory key is 100 MB. The flash code contains the complete NeoLinux image, and not just a fix or update. Refer to the following Web site for more details: http://www.neoware.com/ Perform these tasks to update (flash the code of) the Thin Console: 1. Receive the code from Neoware. 2. Expand the compressed file contents into the root directory of your USB key. If your USB key is shown as E: drive, E:\image.dd must be on the drive after the copy is complete. If you have already made a bootable USB key for Thin Console updates, you only require a new image.dd file. The file you receive might have a different format, such as image-142.dd. In such a situation, change the name to image.dd. 3. Find the batch file that corresponds to your mounted USB key drive letter. In this example, the USB key is located in E:. Double-click the corresponding batch file: If your drive is mounted on E:, double-click E:\syslinux32\syslinux-e-drive.bat. If your drive is mounted on F:, double click F:\syslinux32\syslinux-f-drive.bat.
119
If you have another drive letter, either create a corresponding bat file using Notepad or contact Development. 4. Your USB key must now be a bootable installer. 5. Power down the Thin Console by holding down the Power button for five seconds. 6. Insert the USB key into your Neoware Thin Console. 7. Power on the Thin Console and press the Delete key after you hear the Thin Console beep to enter the BIOS setup utility. 8. In the Phoenix - AwardBIOS CMOS Setup Utility screen (Figure 4-42), select Advanced BIOS Features.
120
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
9. This takes you to the Advanced BIOS Features window (Figure 4-43).
121
10.In the Advanced BIOS Features screen (Figure 4-44), ensure the following: The First Boot Device is set to USB-HDD The Second Boot Device is set to HDD-0 Press F10 to save your BIOS changes, and press Enter to confirm SAVE to CMOS and EXIT.
11.The Neoware Thin Console recognizes the memory key and boots from it. You will receive the following message: The image on the console is about to be overwritten. Do you wish to proceed with the update? [yes/no] 12.Reply yes to the message and press Enter. Follow the instructions when the following message is displayed on the screen: Please remove the USB key and press Enter...
122
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
123
4.2.9 Troubleshooting
This section discusses solutions for some common problems.
Hardware problems
Table 4-3 lists some common hardware problems that might occur when using the Thin Console. You can also refer to the documentation that comes with your console device or refer to the following Web site: http://www.neoware.com/
Table 4-3 Troubleshooting: hardware problems Symptom The display of the Thin Console is completely blank. Problem and recovery task There might be a hardware problem with the Thin Console or monitor, or there might be a setup problem. Follow these steps to resolve the problem: 1. Verify that the cabling is secure and accurate. 2. Verify that the Thin Console and monitor are powered on. 3. Reset the default monitor resolution setting. Refer to the console documentation or visit http://www.neoware.com/ This might be a hardware problem or it might be that the keyboard is set to a location that does not match the current keyboard setting. Refer to the console documentation or visit http://www.neoware.com/ Set the resolution of the Thin Console to 1024 x 768.
You cannot view wide displays such as spool files using the 5250 console.
124
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
The status screen displays status code 10.xx, and then prompts you for the HMC access password. After entering the password, the user ID and password cannot be authenticated.
The status screen does not get past status code 10.xx or 20.xx.
The status screen does not get past status code 30.xx.
The status screen does not get past status code 40.xx.
125
Symptom The status screen does not get past status code 50.xx.
Problem and recovery task Remaining in this state means that the Thin Console has completed the initialization of the firmware communication and has not successfully started communication with the LIC in i5/OS.
You can find this information in the IBM Systems Hardware Information Center at: http://publib.boulder.ibm.com/infocenter/eserver/v1r3s/index.jsp?topic=/iphc1/iphc 1troubleshooting.htm
570
595
a. Twinax adapters are typically placed in one of the Operations Console LAN slots but can replace the async card too.
126
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
4.3.2 i5/OS V5R3M5 and V5R4 (new Smart IOA plus+ models)
LAN console: Embedded LAN ports
In the new smart IOA (IOP-less) models, feature codes #5706 (PCI-X Gbps Ethernet-TX IOA) and #5707 (PCI-X 1 Gbps Ethernet-SX IOA) are the only console-supported smart IOAs. The embedded port is the manufacturing default for the LAN console. Card locations are supported only when the embedded port is disabled. Table 4-6 shows the location of the embedded LAN ports on models 520+, 550+, and 570+.
Table 4-6 5xx+ embedded LAN port location code System 520 550 570 Location code of embedded LAN port U787A.001.sssssss-P1-T5 U787B.001.sssssss-P1-T9 U7879.001.sssssss-P1-T6 In case of multiple CECs, the CEC with the load source
C3 C4 C5
C6
127
3. Enter function 65, followed by function 21 again to enter the edit mode. The operator panel displays SRC of A6nn500B to confirm the edit mode. You might have to enter function 11 to display the SRC. To cancel any changes and exit the edit mode, use function 66. 4. Repeat the functions 65+21(+11) until you reach the console type you require. (If you exceed 45 seconds between 65 and 21 when in the edit mode, SRC A6nn500D is presented, indicating a timeout condition. The system is no longer in edit mode.) 5. When you have reached the correct console type, enter only function 21(+11) to confirm your choice. SRC A6nn500C is displayed to indicate that the change is accepted. 6. Enter function 21 once more to force DST to the console. An example of a console change would be changing from twinax (console type 01) to LAN console (type 03): 65+21+11 A601500A You are in display mode and the console mode is 01. 65+21+11 A602500B You entered edit mode and incremented the counter. 65+21+11 A603500B You incremented the counter again. 21+11 A603500C You invoked the action (set the console mode to 03).
128
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Chapter 5.
129
5.1.1 i5/OS V5R4 informational authorized program analysis report and PSPs
For additional information about new 5xx hardware and the required software, refer to the PSPs and the informational authorized program analysis reports (APARs): http://publib.boulder.ibm.com/infocenter/iseries/v5r4/topic/rzaq9/rzaq9.pdf For additional information about the new functions and the functions that have been removed in i5/OS V5R4, refer to iSeries Memorandum to Users Release R540, which is available on the Web at: http://www-912.ibm.com/s_dir/sline003.nsf/2d3aff1c6b4d6ce086256453000d971e/bdb2077 acff30ff28625710f005ca12f APAR and PSP information can be found by using the following identifiers: SF98010 refers to installation information for i5/OS V5R4. SF99540 refers to information about problems discovered since the latest PTF cumulative package. MF99540 refers to information about installing V5R3 hardware. SF99168 refers to information about server upgrades and data migrations.
130
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
131
Important: All V5 releases (V5R1, V5R2, and V5R3) require a minimum of 128 MB of main storage in each partition (V5R3 requires a minimum of 256 MB in the primary partition). Additional storage above these minimums might be required for reasonable system performance. When upgrading across more than one release, refer to iSeries Memorandum to Users Release R540 and the PSP information for each of the skipped releases to see how your installation might be affected.
Pre-upgrade planning
The following tasks are involved in pre-upgrade planning: 1. Check whether your server meets the requirements to support the new release. 2. Confirm the delivery of all the required software components and license keys. 3. Order the most recent Cumulative PTF package and Group PTF package that are relevant to your environment. 4. View the PSP for the current release and the target release. 5. Identify required software fixes (software acceptance PTFs and others identified by the PSP). 6. If you have nonconfigured disks, a PTF that enables you to set the disk configuration option exists. 7. Print a list of all the system values. 8. Gather performance data. 9. Ensure that the server has sufficient disk storage space. 10.Ensure that the load source disk is 17 GB or larger on each partition. 11.Ensure that IBM-supplied product libraries are not in a user ASP. 12.Ensure that there are no user-created subdirectories in the /QIBM/ProdData/CA400/Express path or the /QIBM/ProdData/ path. 132
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
133
Installing PTFs
To install PTFs, perform the following tasks: 1. Insert the first Cumulative Package CD. 2. Enter the command GO PTF and select option 8. 3. Insert the other CDs when prompted. 4. IPL PWRDWNSYS OPTION(*IMMED) RESTART(*YES) IPLSRC(B)I. 5. Wait for the INZSYS to complete. 6. Install the HIPER, DATABSE, and PTF groups that are relevant to your installation. 7. IPL PWRDWNSYS OPTION(*IMMED) RESTART(*YES) IPLSRC(B). 8. Verify the correct installation of the PTFs by running the GO LICPGM command and selecting option 50.
135
136
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Chapter 6.
137
6.1 Using the Encryption Key Manager and TS1120 tape drive
Many clients are aware of possible ways to protect the system and the data on it to: Avoid data loss, which can be caused by a disaster such as fire or hurricane, or simply by a person accidentally deleting the wrong library. Protect the confidentiality of data from malicious intrusion or even theft. Comply with governmental security regulations such as the Sarbanes-Oxley Act (SOX). The following means of physical security and logical security can help accomplish these needs: High Availability (HA) and disk mirroring solutions Journaling Daily backups Site security Network security (firewall) i5/OS built-in security functionalities When you encrypt your data, you take this a step further. Not only does encryption protect your data from accidental loss, such as somebody erasing active data from a tape, but also from deliberate compromise, including a theft of tapes during transport to or from a tape vaulting facility, or unauthorized personnel accessing confidential data stored on tape. However, even as you build this level of security, you want to be able to share parts of the confidential data with trusted parties such as clients and partners. Until now, tape encryption for the System i environment was possible only by implementing third-party solutions. The following Web site provides an overview: http://www.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/WP100790 Another solution is now available, based on a new encryption-capable tape drive, the TS1120. The encryption is managed by the TS3500 tape library. The section that follows looks at tape encryption methods.
138
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
The TS1120 encryption-capable tape drive (Figure 6-2) to perform the encryption. Only the model or type 3592-E05 can perform encryption. All the new orders are encryption capable. For existing models 3592-E05, a field upgrade for encryption can be ordered. For more information, refer to: http://www-03.ibm.com/servers/storage/tape/ts1120/index.html Order 3592-E05 FC 9592 (plant) or FC 5592 (field). Order 3584 Lxx FC 9900 to use the library-managed encryption. For the IBM Customer Engineer (CE) setup of encryption drives, order 3592-E05 FC 9596 or FC 5596.
139
140
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
In the light of the probable consequences, keep the following points in mind:
141
Software requirements
Table 6-1 shows the minimum Windows operating system versions and the minimum SDK version.
Table 6-1 Minimum software requirements for Windows Operating system Windows 2000, Windows 2003 Runtime environment bundled with IBM TotalStorage Productivity Center - Limited Edition (TPC-LE) - LPP 5608-VC6a IBM 64-bit runtime environment for Windows on AMD64/EM64T architecture, Java 2, Technology Edition, V5.0 IBM 32-bit runtime environment for Windows, Java 2, Technology Edition, V5.0 IBM 64-bit SDK for Windows on Intel Itanium architecture, Java 2, Technology Edition, V1.4.2
a. This product can only be installed from CD. It is not available for download. For more information, visit http://www.ibm.com/servers/storage/software/center/limited/index.html
After you have the required Windows operating system and the correct IBM Java Runtime Environment (JRE) for Windows installed (refer to Installing the IBM Java Runtime Environment for Windows on page 143): Install the IBM Java unrestricted policy files (refer to Installing the unrestricted policy files on page 146). Install the IBM EKM Application and the IBM EKM Sample Configuration file (refer to Installing the Encryption Key Manager .jar and sample configuration file on page 147). Install the proper tool to manage the keys in your type of keystore. In this example, we define a JCEKS keystore. Valid tools to manage this are the iKeyMan utility or the standard Java tool, keytool (refer to Installing the iKeyman utility on page 148).
142
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. Accept the license agreement. 3. The Choose Destination Location window (Figure 6-4) is displayed. You can change the destination folder if you want. Make a note of the folder path because you require it to start the EKM server at a later step. Click Next.
143
4. Click No when the installation wizard asks you whether you want to make this JRE the System JVM, as shown in Figure 6-5.
5. The Start Copying Files window (Figure 6-6) is displayed. Click Next.
144
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
6. The Browser Registration window (Figure 6-7) is displayed. Select a browser to be associated with EKM. Click Next.
7. The InstallShield Wizard Complete window (Figure 6-8) is displayed. Click Finish to complete the installation.
145
8. Verify the installation and version of the JRE by entering the following commands in a DOS prompt (Figure 6-9): cd C:\Program Files\IBM\Java50\jre\bin java -version
146
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. Download the .zip file for V1.4.2 (Figure 6-11). The same files are used for V1.4 and V5.
3. Uncompress the .zip file to get to the two .jar files. Replace the current US_export_policy.jar and local_policy.jar files in your C:\Program Files\IBM\Java50\jre\lib\security directory with the ones you just downloaded.
Installing the Encryption Key Manager .jar and sample configuration file
Perform the following tasks: 1. Download the IBM EKM Application (IBMKeyManagementServer.jar) and the IBM EKM Sample Configuration file (KeyManagerConfig.properties). Go to: http://www.ibm.com/support/docview.wss?rs=1139&context=STCXRGL&dc=D400&uid=ssg1 S4000504 Scroll down to find the files, as shown in Figure 6-12.
2. Place the KeyManagerConfig.properties file into a directory of your choice. 3. Place the IBMkeyManagementServer.jar file into the directory C:\Program Files\IBM\Java50\jre\lib\ext\.
147
For more details about the utility, download the IBM Global Security Kit: Secure Sockets Layer Introduction and iKeyman User's Guide at: http://download.boulder.ibm.com/ibmdl/pub/software/dw/jdk/security/50/GSK7c_SSL_IK M_Guide.pdf The standard Java tool, keytool, can also be used. Visit the Sun Java Web site for details about keytool usage.
148
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. The New key database window (Figure 6-15) is displayed. In this example, a JCEKS-type keystore is created. Select JCEKS against the Key database type field. Enter the relevant details in the File Name and Location fields. The file will be created with the name you specify here. Make sure the extension of the file is .jks. In this example, we create a keystore called keystore_x.jks in the C:\EKM folder. Click OK.
3. The Password Prompt window (Figure 6-16) is displayed. Specify a password to protect the keystore. (You will need this password later to access the keystore.) Click OK.
149
This completes the keystore creation. You must see the name of the keystore in the IBM Key Management window, as shown in Figure 6-17.
150
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
151
2. The Create New Self-Signed Certificate window (Figure 6-19) opens. Specify a Key Label of your choice, but make sure that it does not contain any blanks. Select X509 V3 from the Version menu, and 1024 from the Key Size menu. The Common Name field defaults to the computer name, but you can change it. Specify a value in the Organization field. Verify the Country or region and Validity Period fields. All other fields are optional. Click OK.
3. The key labels for the keys you create are displayed in the IBM Key Management window. In this example, we created two keys, as shown in Figure 6-20.
152
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
153
2. The Create New Key and Create Certificate Request opens (Figure 6-22). Specify a Key Label of your choice that does not contain any blanks. Select 1024 from the Key Size menu. The Common Name field defaults to the computer name, but you can change it. Specify a value in the Organization field. Verify the Country or region. You can change the path and file name where the certificate request is stored. All other fields are optional.
.
3. An Information window opens (Figure 6-23), which mentions that you must send the certificate request to a CA. Click OK. The CA then provides you with a signed certificate.
154
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
4. The IBM Key Management window shows the key labels for the certificate requests you create. In this example, we created two certificate requests, as shown in Figure 6-24.
155
2. In the Export/Import window (Figure 6-26), select Import Key and specify the key file (that is, the keystore type, JCEKS), the File Name, and the Location of the keystore from which you want to import the keys. Click OK.
156
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
3. Authenticate to the keystore from which you want to import the keys by entering the password (Figure 6-27). Click OK.
4. The Select from Key Label List window (Figure 6-28) opens, listing the key labels for all of the keys stored in the keystore. Select the key labels you want to import and click OK.
157
5. If any of the key labels for the keys that are being imported already exists in the keystore, a Duplicate Key Label warning will be displayed (Figure 6-29). Note that the iKeyman import function has added an asterisk (*) to the duplicate key label name in order to ensure that you do not overwrite the keys by accident. You can either accept the name change (by clicking OK), or edit the key label yourself (by clicking Clear).
6. Regardless of the duplicate key labels, you are always provided with the opportunity to change the key labels before you import the keys. Select the key label you want to change, enter the new name, and click Apply, as shown in Figure 6-30.
7. The change is reflected in the Select area, as shown in Figure 6-31. Click OK.
158
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
8. The imported keys are now displayed in your keystore in the IBM Key Manager window, as shown in Figure 6-32.
159
2. Use a text editor such as Notepad to edit the file (Figure 6-34). Click OK.
3. Figure 6-35 on page 161 shows the sample configuration file with the default values. Some of the values must be changed and some must be added. Strictly respect the syntax, and do not leave any trailing blanks. Do not use \ in path names; they are interpreted by Java as escape characters. Use / instead. Audit.handler.file.directory Specify where you want EKM to store the audit log. This directory must exist before you start the EKM Admin console. Admin.ssl.keystore.name Admin.ssl.truststore.name TransportListener.ssl.keystore.name TransportListener.ssl.truststore.name config.keystore.file Specify the path and the file name of the keystore. Admin.ssl.keystore.password Admin.ssl.truststore.password TransportListener.ssl.keystore.password TransportListener.ssl.truststore.password config.keystore.password Specify the keystore password. You do not have to specify the password, but if you do not, you will be asked to enter it when you start the EKM server. Config.drivetable.file.url Specify the path and the file name where you want EKM to store the information on the drives that are known to EKM. The path must exist before starting the EKM Admin console. You can select the file name yourself. It must have a .txt extension. It will be created by the EKM. The file path must be preceded by FILE://. debug.output.file Specify the path and the file name of the debug file you want to create. The file must have an extension of .log. 160
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
TransportListener.tcp.timeout Specify 120 (that is, the number in minutes). drive.acceptUnknownDrives Set this property to true if you want the EKM server to automatically add tape drives to the EKM drive table when they contact EKM. If you decide against allowing tape drives to be added automatically, in which case you must add the tape drives manually, set this value to false. (See 6.3.4, Adding tape drives to the EKM drive table on page 163.)
161
Figure 6-36 shows the KeyManagerConfig.properties file with the correct values for the configuration in this example.
162
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
C:\Program Files\IBM\Java50\jre\bin>java com.ibm.keymanager.KMSAdminCmd C:/EKM/keymanagerco nfig.properties # startekm Loaded drive key store successfully Starting the Encryption Key Manager 1.0 Processing Arguments Processing Server is started # stopekm Stopping the EKM admin service... #
163
V5R4
IBM Developer Kit for Java - Java 2 Platform, Standard Edition (J2SE) 5.0 32-bit
After you have the required operating system, SDK (JDK or J2SE), and the PTFs installed, as shown in Table 6-2: Install the IBM Java unrestricted policy files (refer to 6.4.2, Installing the unrestricted policy files on page 164) Install the IBM EKM Application and the IBM EKM Sample Configuration file (see 6.4.3, Installing the Encryption Key Manager .jar and sample configuration file on page 165) Install the proper tool to manage the keys in your type of keystore. In this example, we defined an IBMi5OSkeystore-type keystore. The interface to manage this type of keystore is the Digital Certificate Manager (DCM) GUI (refer to 6.4.4, Installing Digital Certificate Manager on page 165). The iKeyman utility enables you to create the JCEKS keystore type (refer to Installing the iKeyman utility in 6.1.5, Encryption Key Manager server on a PC on page 142).
164
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Installing the unrestricted policy files through a PTF. For i5/OS V5R3, install SI24671 for 5722JV1 For i5/OS V5R4, install SI24672 for 5722JV1, and then copy the unrestricted policy files from /qibm/proddata/java400/jdk15/lib/security/ to /QOpenSys/QIBM/ProdData/JavaVM/jdk50/32bit/jre/lib/security/
6.4.3 Installing the Encryption Key Manager .jar and sample configuration file
For i5/OS V5R3, install PTF SI25093 for 5722SS1. This PTF installs the EKM code, the default configuration properties file, and the script file. For i5/OS V5R4, perform the following tasks: 1. Install PTF SI25094 for 5722SS1. This PTF installs the default configuration properties file and the script file. 2. If J2SE V5.0 SR2 is installed (PTF SI24375), download the IBMKeyManagementServer.jar file from the IBM TotalStorage site (refer to the TS1120 topic). Go to: http://www.ibm.com/servers/storage/support/tape/ts1120/downloading.html Click Downloadable files. On the page that is displayed, select IBM Encryption Key Manager component for the Java Platform. Scroll down to find the file, as shown in Figure 6-37 and place it in the /QOpenSys/QIBM/ProdData/JavaVM/jdk50/32bit/jre/lib/ext/ directory.
When SR3 becomes available, it contains the EKM code. Therefore, you do not have to download the IBMKeyManagementServer.jar file.
165
3. Select Network Servers TCP/IP and check in the right pane to see whether the HTTP Administration server is started. If not, right-click HTTP Administration to start it (Figure 6-38).
166
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
5. The i5/OS Tasks window is shown. Select Digital Certificate Manager (Figure 6-39).
This takes you to the DCM start page (Figure 6-40 on page 168). The installation is complete.
167
To create a keystore, perform the following tasks: 1. From the DCM start page (Figure 6-40), select Create New Certificate Store.
2. In the Create New Certificate Store window, select Other System Certificate Store and click Continue, as shown in Figure 6-41.
168
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
3. Select No - Do not create a certificate in the certificate store. Click Continue (Figure 6-42).
4. In the Certificate Store Name and Password window (Figure 6-43), specify the Certificate store path and file name. If the path does not exist in your System i5 environment, create it first by using the CRTDIR command. The file name can be anything but must have a .kdb extension. This file is created automatically. You must specify the same path and file name in your EKM configuration file. Specify a password for the certificate (key) store and click Create. Important: The keystore is now in a user directory of the i5/OS IFS. Be careful not to back up the keystore to the encrypted tapes, because you will not be able to recover the keys, and without the keys you cannot access any of the data on your encrypted tapes. There is no recovery from lost keys.
The Certificate Store Created window opens (Figure 6-44 on page 170). Your keystore is created successfully.
Chapter 6. Tape data encryption in i5/OS V5R4
169
2. Select Other System Certificate Store and click Continue (Figure 6-45).
170
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
3. In the Certificate Store and Password panel, enter the keystore file name you created earlier (enter the complete path name) and the password as shown in Figure 6-46, and click Continue.
4. The Current Certificate Store window opens (Figure 6-47). You are now inside the keystore you selected and can start managing it.
171
There are two ways in which to work with the keystore you selected: In the left column, select Fast Path Work with server and client certificates (Figure 6-48).
172
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. Select VeriSign or other Internet Certificate Authority (CA) and click Continue (Figure 6-51).
173
3. In the Create Certificate window, select 1024 for the Key size and enter the certificate (key) label. You can choose the name yourself, but make sure that you specify the same label as the alias1 key label in the EKM configuration file. Complete the other fields and click Continue (Figure 6-52).
4. In the next window, the certificate request is displayed (Figure 6-53). Copy the request data, including the BEGIN and the END REQUEST lines and paste them into the certificate request form the CA has provided. Click OK to complete the creation.
The CA returns a signed certificate to you. Store the file on System i5, in the IFS.
174
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. Enter the complete IFS path name of the file in which you pasted the signed certificate data and click Continue, as shown in Figure 6-55.
175
3. Enter the password for the keystore from which you want to import the keys, and specify the key label. Click Continue (Figure 6-56).
176
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. Click Install Local CA Certificate on Your PC. In the right panel, click Install certificate, as shown in Figure 6-57.
3. Select the Work with Server and Client Certificates option and click Create, as shown in Figure 6-58.
177
4. In the Select a Certificate Authority window, select Local Certificate Authority (CA) and click Continue (Figure 6-59).
5. The Create Certificate window is displayed. Select a key size of 1024 and a certificate label, and complete the required fields, as shown in Figure 6-60. Click Continue.
178
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
The Certificate Created Successfully window is displayed (Figure 6-61). Click OK.
179
2. Figure 6-63 on page 181 shows the sample configuration file with the default values. Change some of the values and add some. Strictly respect the syntax and do not leave any trailing blanks. Do not use \ in path names. They are interpreted by Java as escape characters. Use / instead. Audit.handler.file.directory Specify where you want EKM to store the audit log. This directory must exist before you start the EKM Admin console. Admin.ssl.keystore.name Admin.ssl.truststore.name TransportListener.ssl.keystore.name TransportListener.ssl.truststore.name config.keystore.file Specify the path and the file name of the keystore. Admin.ssl.keystore.password Admin.ssl.truststore.password TransportListener.ssl.keystore.password TransportListener.ssl.truststore.password config.keystore.password
180
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Specify the keystore password. You do not have to specify the password, but if you do not do it, you will be asked to enter it when you start the EKM server. Config.drivetable.file.url Specify the path and the file name where you want EKM to store the information on the drives that are known to EKM. The path must exist before starting the EKM Admin console. You can choose the file name yourself but it must have a .txt extension. It will be created by the EKM. The file path must be preceded by FILE://. debug.output.file Specify the path and the file name of the debug file you want to create. The file must have a .log extension. drive.acceptUnknownDrives Set this property to true if you want the EKM server to automatically add the tape drives to the EKM drive table when they contact EKM. If you decide against allowing the tape drives to be added automatically, which means that you will have to add the tape drives manually, set this value to false. (Refer to 6.6.4, Adding the tape drives to the EKM drive table on page 183.)
181
1. To start the EKM Admin console, enter the STRQSH command on an i5/OS command line. 2. Start the EKM Admin console from the QSH command line by entering: strEKM -propfile fully_qualified_properties_file_name 3. The screen shown in Figure 6-64 opens. To show Help on the strEKM script, type: strEKM -h
4. When the EKM Admin server is started, the # prompt is available, as shown in Figure 6-65.
182
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
183
Figure 6-67 IBM System Storage Tape Library Specialist Web interface
184
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. In the left panel of the tape library Web interface, select Manage Access Key Manager Addresses, as shown in Figure 6-68.
3. To add a key manager address, select Create in the Select Action menu, and click Go (Figure 6-69).
185
4. The Create Key Manager Address window opens. Enter the IP address (Port field must be prefilled) and click Apply, as shown in Figure 6-70.
5. A confirmation window is displayed to confirm that the key manager IP address is added successfully (Figure 6-71).
186
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
6. To test the connection between the TS3500 tape library system and the keystore, select the key manager address and choose Ping Address in the Select Action menu, and click Go (Figure 6-72).
187
2. Select a tape that is capable of encryption, and select Modify Encryption Method from the Select Action menu. Click Go (Figure 6-75).
188
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
3. The Encryption method window is displayed (Figure 6-76). Note that the default value is None, and that the four remaining parameters are for IBM Support use only. Attention: Changing these values is not recommended.
4. To change the encryption method, select Library Managed in the Encryption Method menu, as shown in Figure 6-77.
189
5. As soon as you change the encryption method to Library-Managed, a new field appears on the page, the key manager address selection (Figure 6-78). This is normal when you enable a tape drive for encryption; the tape drive has to know where to get its keys. By using this field, you can point the tape drive to the keystore addresses you selected earlier as described in 6.7.1, Defining the keystores to be used by the TS3500 on page 184. After specifying the IP addresses of your choice, click Apply to confirm.
190
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
2. The Scratch Encryption Policy window is displayed. You can select the Set All/Other Volsers check box, or define a range of cartridges to be used for encryption. Each scratch encryption policy requires that you specify two key labels (and key modes). A key label is only a pointer, a common name that enables the tape library and the keystore to identify which keys are to be used for this policy. The same key labels must exist in your keystore. The key mode defines how the keystore identifies the public/private keys used to encrypt a data key. Possible values for key mode are: Default Label Clear Label Hash Label The label is configured at the encryption key manager The externally encrypted data key (EEDK) that is referenced by the specified key label The EEDK that is referenced by a computer value that corresponds to the public key that is referenced by the specified key label
Click Apply to encrypt all subsequent scratch tapes in the range ZYX100 - ZYX110 (Figure 6-80).
Figure 6-80 Scratch encryption policy definition Chapter 6. Tape data encryption in i5/OS V5R4
191
3. To check whether your cartridges are being encrypted, select Manage Cartridges Data Cartridges. Narrow your search by selecting a frame or a logical library. In this example, we selected only the encryption-enabled logical library (Figure 6-81). Click Search to display your selection of cartridges.
4. The last column in the list shows whether a cartridge is encrypted (Figure 6-82).
If you set the Show Density parameter to yes on the library side, you can also tell whether a tape is encrypted by looking at the density type. A nonencrypted tape written on a 3592-E05 drive will show a density of *FMT3592A1. For an encrypted tape, the density is FMT3592A1E.
192
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Note: Remember that the TS3500 library manages the encryption, not BRMS or the native i5/OS functions. Although the INZTAP DENSITY(FMT3592A1E) might look like it is working you receive a message stating that the density has changed in reality, the density does not change.
3. The Rekey Encryption window opens. Enter the key modes and labels you want to use to rekey the cartridge, and click Apply (Figure 6-84 on page 194).
193
194
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Related publications
The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this IBM Redbook.
IBM Redbooks
For information about ordering these publications, see How to get IBM Redbooks on page 196. Note that some of the documents referenced here may be available in softcopy only. IBM System i5, eServer i5, and iSeries Systems Builder IBM i5/OS Version 5 Release 4 January 2006, SG24-2155 Logical Partitions on System i5: A Guide to Planning and Configuring LPAR with HMC on System i, SG24-8000 High-speed Link Loop Architecture for the IBM eServer iSeries Server: OS/400 Version 5 Release 2, REDP-3652
Other publications
These publications are also relevant as further information sources: System i i5/OS and related software: Installing, upgrading, or deleting i5/OS and related software, Version 5 Release 4, SC41-5120 http://publib.boulder.ibm.com/infocenter/iseries/v5r4/topic/rzahc/rzahc.pdf Operations Console Setup, SC41-5508-02 http://www-1.ibm.com/support/docview.wss?uid=pub1sc41550802 OS/400 Backup and Recovery V5R4, SC41-5304 http://publib.boulder.ibm.com/infocenter/iseries/v5r4/topic/books/sc415304.pdf IBM Encryption Key Manager component for the Java platform, EKM Introduction, Planning, and User's Guide http://www-1.ibm.com/support/docview.wss?uid=ssg1S7001618
Online resources
These Web sites and URLs are also relevant as further information sources: Dynamic Logical Partitioning http://www.ibm.com/servers/eserver/iseries/lpar/ Expansion unit conversions in a partitioned environment for 8xx and 270 iSeries server models http://www-1.ibm.com/servers/eserver/iseries/migration/pdf/LPARexpansionupgrade FINAL.pdf
195
HSL Rules (High Availability and Clusters) http://www-1.ibm.com/servers/eserver/iseries/ha/systemdesign.html IBM CUII Home page http://w3.rchland.ibm.com/projects/WCII/cgi-bin/wciireq.pl IBM System i5 Benchmark Center http://www.ibm.com/servers/eserver/iseries/benchmark/cbc/index.html IBM Systems Workload Estimator http://www-304.ibm.com/jct01004c/systems/support/tools/estimator/index.html IBM eServer iSeries Information Center http://www.iseries.ibm.com/infocenter iSeries Memorandum to Users Release -- R530 (Preventive Service Planning) http://www-912.ibm.com/s_dir/sline003.nsf/2d3aff1c6b4d6ce086256453000d971e/e832 6ca1d7b29aa486256eac005dc19f?OpenDocument
196
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Index
Symbols
-inch 2.5GB 12 -inch, 13GB 12
I
IBM 5250 emulator 97 IBM Encryption Key Manager 139 IBM Java 140 IBM Software Development Kit 140 IBM TotalStorage TS1120 137 IBM Workload Estimator 3 IBMKeyManagementServer 140 Integrated xSeries Server 12 IPCS 11
Numerics
5250 console 91
A
acceptUnknownDrives 140 ASMI 90
J
Java Runtime Environment 140 JCEKS type keystore 149
B
backup and recovery considerations 140
C
Capacity on Demand 91 CEC 91
K
key management 150 KeyManagerConfig 140 keystore 140
D
data are encrypted by the host 138 define keystore 140
L
LPAR Validation Tool 2 LVT 2
E
EKM 137 configure 140 server 140 encryption components 139 encryption methods 138 encryption-capable tape drive 138
N
Neoware Connection Manager 101 Neoware Thin Client 97
O
operations console 90 overview of the System Planning Tool 2
F
FC 5592 139 FC 5596 139 FC 9592 139 FC 9596 139 Fibre Channel Disk Adapter Fibre Channel Disk adapter Fibre Channel Tape Adapter Fibre Channel Tape adapter FSIOP 9, 11
P
planning for tape encryption 140 PTF 92 12 12 12 12
R
Redbooks Web site 196 Contact us x RPQ 847102 12
G
graphical user interface 2
S
sample configuration File 140 Sarbanes-Oxley 138 SDK 140 server firmware 92 update policy 93 service partition 92 service processor 91
H
Hardware Management Console 3, 90 machine code 93
197
SPD feature code 1360 10 1379 10 1380 10 2609 8 2612 9 2617 9 2618 9 2619 9 2620 9 2621 10 2623 9 2624 10 2626 9 2629 8 2644 11 2654 9 2664 12 2665 9 2666 9 2686 8 2688 8 2695 8 2699 9 2745 11 2748 12 2757 12 2765 12 2766 12 2778 12 2782 12 2790 12 2791 12 2792 12 2799 12 2810 9 2820 9 2892 12 2899 12 3584-D22 139 3584-D23 139 3584-L22 139 3584-L23 139 3592-E05 139 4317 12 4318 12 4482 12 4483 12 4582 12 4583 12 4745 11 4748 12 4778 12 5044 8 5052 8 5055 8 5057 8 5058 8 5065 12 5066 12
5072 5073 5074 5079 5082 5083 6050 6112 6141 6146 6149 6153 6180 6181 6325 6368 6380 6385 6390 6425 6485 6490 6501 6502 6512 6513 6517 6518 6519 6532 6533 6534 6605 6606 6607 6616 6617 6618 6650 6652 6713 6714 6717 6718 6806 6807 6813 6817 6818 6824 6906 6907 8617 8664 8713 8714 8817 9748 9778 SSH 90
8 8 12 12 8 8 8 11 8 11 9 9 8 9 10 10 10 10 10 10 10 10 12 11 11 11 11 11 11 11 11 11 10 10 10 9 9 9 10 10 10 10 12 12 10 10 10 12 12 10 10 10 12 10 10 10 12 12 12
198
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
T
tape encryption 137 Thin Console 97 5250 emulation screen 98 customization settings 110 Tivoli Storage Manager 138 TS1120 137, 139 TS3500 tape library 138 system 139 twinax console 90
U
using EKM and TS1120 tape drive 138
W
WebSM 90 Workload Estimator 3
Index
199
200
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
IBM eServer iSeries Migration: A Guide to Upgrades and Migrations to IBM System i5
Back cover