HP 3PAR Policy Manager Software UserGuideAbstractThis guide is intended to be used as a reference when installing, configuring, and maintaining HP 3PA
4. After clicking Next at the Introduction, provide the following information when prompted:• Installation directory for all of the installed software
4 Configuring UsersOverviewAfter installing the server, you need to configure the users and groups with privileges for the HP3PAR Policy Manager, and
1. Start the server on your local machine.a. Start your Web browser.b. Enter the local host IP address/listening port in the browser’s address bar, an
3. Under User Definition, click Users.The Users List pane appears.4. From the User Actions list, select Create New User.NOTE: User names and passwords
5 Starting the HP 3PAR Policy ManagerStarting HP 3PAR Policy ManagerBy default, once HP 3PAR Policy Manager has been installed, Policy Manager is star
Figure 6 Policy Manager User InterfaceWARNING! You need to modify the list of users and their passwords in Tomcat5; when doingso, you should remove th
6 Understanding the User InterfaceOverview of the User InterfaceThe HP 3PAR Policy Manager user interface allows you to set and control all permission
Home TabThe Home tab is the first viewable tab upon logging into HP 3PAR Policy Manager (Figure 8(page 17)).Figure 8 The Home TabThe Home tab provides
Policy TabThe Policy tab allows you to view and modify policy settings for each HP 3PAR Policy Manageraction (Figure 9 (page 18)). For instructions on
Table 2 Policy Tab Column Descriptions (continued)DescriptionColumn Nameright of Ask for Approval is not available for the followingactions:• Set Time
© Copyright 2011, 2011 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
Sorting Policy ColumnsThe contents of the Action, Permission, Access Right, Inheritance, and Lock columns can be sortedto facilitate locating specific
Figure 13 Pending Requests TabThe list of requests is generated in a table, which is described as follows:DescriptionColumn NameThe name of the device
Figure 14 Audit Log TabAudit messages consist of any activity Policy Manager audits during operation, and can includethe following:• All requests and
preexisting group, a new group is created for that device. For information on how this tab is usedin Policy Manager tasks, see “Using HP 3PAR Policy M
7 Using HP 3PAR Policy ManagerPolicy Inheritance and HierarchyHP 3PAR Policy Manager manages device policies and notification settings through a hiera
For example:• The Restart Agent action controls whether or not the device will perform a requested hardrestart; there are no specific parameters for t
Table 3 Actions with Base Installation (continued)DescriptionActionDetermines whether or not the Custodian accepts a new ping rate (frequency, in seco
2. Click a group to view that group’s policy settings.The View or change the policy settings for <Group Name> page appears displaying theselecte
1. On the View or change the policy settings for <Group Name> page in the Policy tab, click thepermission you wish to modify.The Edit the select
3. Enter the new parameter (for example, a script name or a file name) and click Finish.NOTE: You can use partial values in conjunction with wildcards
Contents1 Introduction...5Related Documentation...
Assigning Access RightsAfter setting an action and its permission, you assign it an access right. An access right specifieshow you want the individual
access right, and a Package action has an Always Allow access right, and a script is created ina package, the package permission supersedes that scrip
Setting Access Rights for All Policy PermissionsIf you want to change the access rights for all permissions in a policy to a single right, perform the
2. In the Create new group configurations page, type or select the properties to define this group(see Figure 26 (page 33)).NOTE: The next time an age
1. On the Select a group to view its group configuration settings page in the Configure tab, selectthe group you wish to edit.The View and edit the se
2. In the Notification Information section of the page, define the following:• To - The recipient(s) (identified by Email address) of the Email notifi
2. Click Delete Group and then OK when prompted for confirmation to delete the selected group(Figure 28 (page 36)).Figure 28 Deleting a GroupFinding a
1. On Configure tab, click Search→Missing Devices.Figure 29 Searching for Missing DevicesThe View and remove missing devices page appears. Any devices
Pending requests are shown in the Pending Requests tab. You can view all requests pending forthe following:• All groups• A selected group• A selected
The View all actions in selected pending requests page appears displaying all actions packagedin the pending action container. From this page you can
Editing Existing Group Configurations...33Configuring Group Notificati
Viewing Audit LogsAs stated earlier, you can view all audit log entries, entries for a selected group, or a selecteddevice. By default, audit log entr
• A Policy Manager user modifies a policy.• A Policy Manager user creates, modifies, or deletes an action permission from a policy.Custodian entries a
8 Troubleshooting and MaintenanceWhen Tomcat5 is operating in standalone mode, you may need to troubleshoot for the followingfunctionality:Troubleshoo
1 IntroductionRelated DocumentationThe following document provides information related to HP 3PAR Secure Service Architecture:Read the…For information
2 OverviewWhat is the HP 3PAR Policy Manager?The HP 3PAR Policy Manager (Policy Manager) is a server-based software application that enablescustomers
Figure 1 HP 3PAR Policy Manager Configured to Mange Custodian PoliciesHow It All WorksThe Secure Service Collector Server communicates with the Secure
recipients are informed of the requested action. They need to then accept or deny the action withina defined timeout period.• If the action is accepte
3 Installing the HP 3PAR Policy ManagerThe HP 3PAR Policy Manager installation includes all necessary components needed to managepolices on Custodians
Komentarze do niniejszej Instrukcji