512
Dell EMC DD OS Version 7.0 Administration Guide Revision 02 March 2020

March 2020 Revision 02 - Dell EMC...Preface 15 System Features and Integration 17 Revision history.....18

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

  • Dell EMC DD OSVersion 7.0

    Administration GuideRevision 02

    March 2020

  • Copyright © 2010-2020 Dell Inc. or its subsidiaries All rights reserved.

    Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

    THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND

    WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF

    MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED

    IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.

    Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property

    of their respective owners. Published in the USA.

    Dell EMCHopkinton, Massachusetts 01748-91031-508-435-1000 In North America 1-866-464-7381www.DellEMC.com

    2 Dell EMC DD OS Administration Guide

  • Preface 15

    System Features and Integration 17Revision history................................................................................................. 18System overview............................................................................................... 18System features................................................................................................ 19

    Data integrity........................................................................................19Data deduplication............................................................................... 20Restore operations...............................................................................20DD Replicator.......................................................................................20Multipath and load balancing................................................................20High Availability.................................................................................... 21Random I/O handling........................................................................... 22System administrator access............................................................... 23Licensed features.................................................................................23

    Storage environment integration...................................................................... 24

    Getting Started 27Dell EMC DD System Manager overview...........................................................28Logging in and out of DD System Manager....................................................... 28

    Log in with certificate using CAC/PIV card..........................................30Logging in using single sign-on (SSO).................................................. 31

    The DD System Manager interface....................................................................31Page elements..................................................................................... 32Banner................................................................................................. 32Navigation panel...................................................................................32Information panel................................................................................. 32Footer.................................................................................................. 33Help buttons........................................................................................ 33End User License Agreement............................................................... 33

    Configuring the system with the configuration wizard...................................... 34License page........................................................................................ 34Network...............................................................................................35File System.......................................................................................... 37System Settings................................................................................... 41DD Boost protocol................................................................................42CIFS protocol.......................................................................................43NFS protocol........................................................................................44DD VTL protocol.................................................................................. 45

    Configure NTP..................................................................................................46Managing time and date settings......................................................... 46

    Command line interface.................................................................................... 47Logging into the CLI..........................................................................................47CLI online help guidelines.................................................................................. 48

    Managing the Protection System 51System management overview......................................................................... 52

    HA system management overview....................................................... 52

    Chapter 1

    Chapter 2

    Chapter 3

    CONTENTS

    Dell EMC DD OS Administration Guide 3

  • HA system planned maintenance......................................................... 52Restarting a protection system.........................................................................53Powering a protection system on or off ........................................................... 53

    Power a protection system on............................................................. 54System upgrade management.......................................................................... 55

    Pre-upgrade checklists and overview...................................................55Viewing upgrade packages on the protection system...........................60Obtaining and verifying upgrade packages...........................................60Upgrading a protection system.............................................................61Removing an upgrade package.............................................................62

    Managing electronic licenses............................................................................ 62HA system license management...........................................................63

    Protection system storage management...........................................................63Viewing system storage information.................................................... 64Physically locating an enclosure...........................................................68Physically locating a disk......................................................................69Configuring storage............................................................................. 69DD3300 capacity expansion................................................................. 70Fail and unfail disks............................................................................... 71

    Network connection management..................................................................... 71HA system network connection management....................................... 71Network interface management........................................................... 72General network settings management................................................85Network route management................................................................ 89

    System passphrase management......................................................................92Setting the system passphrase............................................................ 92Changing the system passphrase.........................................................93

    Configuring mail server settings........................................................................93Managing system properties.............................................................................94SNMP management..........................................................................................94

    Viewing SNMP status and configuration..............................................95Enabling and disabling SNMP...............................................................96Downloading the SNMP MIB................................................................96Configuring SNMP properties.............................................................. 97SNMP V3 user management................................................................ 97SNMP V2C community management................................................... 99SNMP trap host management............................................................. 101

    Autosupport report management.....................................................................102Setup sending ASUP using the GUI.................................................... 103HA system autosupport and support bundle manageability.................104Enabling and disabling autosupport reporting to Dell EMC..................104Reviewing generated autosupport reports.......................................... 104Configuring the autosupport mailing list............................................. 104Verifying the system is able to send ASUP and alert emails to externalrecipients............................................................................................105

    Support bundle management...........................................................................106Generating a support bundle...............................................................106Generating a mini support bundle....................................................... 106Viewing the support bundles list......................................................... 107

    Coredump management...................................................................................107Splitting a coredump file..................................................................... 107

    Alert notification management........................................................................ 108HA system alert notification management.......................................... 109Viewing the notification group list...................................................... 109Creating a notification group................................................................111Managing the subscriber list for a group.............................................. 111

    Contents

    4 Dell EMC DD OS Administration Guide

  • Modifying a notification group.............................................................112Deleting a notification group............................................................... 113Resetting the notification group configuration.................................... 113Configuring the daily summary schedule and distribution list...............113Enabling and disabling alert notification to Dell EMC...........................115Testing the alerts email feature........................................................... 115

    Support delivery management..........................................................................116Selecting standard email delivery to Dell EMC.................................... 116Selecting and configuring Secure Remote Services delivery............... 116Testing ConnectEMC operation.......................................................... 117

    Log file management........................................................................................ 118Viewing log files in DD System Manager..............................................119Displaying a log file in the CLI.............................................................. 119Learning more about log messages..................................................... 120Saving a copy of log files.................................................................... 120Log message transmission to remote systems.....................................121

    Remote system power management with IPMI................................................122IPMI and SOL limitations.................................................................... 123Adding and deleting IPMI users with DD System Manager..................123Changing an IPMI user password........................................................ 124Configuring an IPMI port.................................................................... 124Preparing for remote power management and console monitoring withthe CLI................................................................................................125Managing power with DD System Manager........................................ 126Managing power with the CLI............................................................. 127

    System access management............................................................................127Role-based access control.................................................................. 128Access management for IP protocols................................................. 129Local user account management........................................................ 135Directory user and group management............................................... 142Diagnosing authentication issues........................................................ 157Change system authentication method...............................................158Reset the iDRAC password.................................................................159

    Monitoring Protection Systems 161Viewing individual system status and identity information............................... 162

    Dashboard Alerts area.........................................................................162Dashboard File System area................................................................163Dashboard Services area.................................................................... 163Dashboard HA Readiness area............................................................ 164Dashboard Hardware area.................................................................. 164Maintenance System area.................................................................. 164

    Health Alerts panel.......................................................................................... 165Viewing and clearing current alerts..................................................................165

    Current Alerts tab...............................................................................166Viewing the alerts history................................................................................ 166

    Alerts History tab................................................................................167Viewing hardware component status............................................................... 167

    Fan status...........................................................................................168Temperature status............................................................................ 168Management panel status...................................................................169SSD status (DD6300 only)................................................................. 169Power supply status........................................................................... 170PCI slot status.................................................................................... 170NVRAM status.................................................................................... 170

    Chapter 4

    Contents

    Dell EMC DD OS Administration Guide 5

  • Viewing system statistics................................................................................. 171Performance statistics graphs.............................................................171

    Viewing active users........................................................................................ 172History report management............................................................................. 173

    Types of reports................................................................................. 173Viewing the Task Log....................................................................................... 177Viewing the system High Availability status..................................................... 178

    High Availability status........................................................................178

    File System 181File system overview....................................................................................... 182

    How the file system stores data..........................................................182How the file system reports space usage............................................182How the file system uses compression .............................................. 182How the file system implements data integrity................................... 184How the file system reclaims storage space with file system cleaning....184Supported interfaces ......................................................................... 185Supported backup software................................................................185Data streams sent to a protection system ......................................... 185File system limitations.........................................................................187

    Monitoring file system usage........................................................................... 188Accessing the file system view........................................................... 189

    Managing file system operations..................................................................... 195Performing basic operations............................................................... 195Performing cleaning............................................................................197Performing sanitization.......................................................................199Modifying basic settings..................................................................... 201

    Fast copy operations.......................................................................................203Performing a fast copy operation.......................................................203

    MTrees 205MTrees overview............................................................................................ 206

    MTree limits.......................................................................................206Quotas............................................................................................... 206About the MTree panel.......................................................................207About the summary view....................................................................207About the space usage view (MTrees)................................................212About the daily written view (MTrees)............................................... 212

    Monitoring MTree usage..................................................................................213Understanding physical capacity measurement.................................. 214

    Managing MTree operations............................................................................216Creating an MTree..............................................................................216Configure and enable/disable MTree quotas.......................................218Deleting an MTree.............................................................................. 218Undeleting an MTree.......................................................................... 219Renaming an MTree............................................................................219

    Snapshots 221Snapshots overview........................................................................................ 222Monitoring snapshots and their schedules...................................................... 222

    About the snapshots view.................................................................. 222Managing snapshots....................................................................................... 224

    Creating a snapshot........................................................................... 224

    Chapter 5

    Chapter 6

    Chapter 7

    Contents

    6 Dell EMC DD OS Administration Guide

  • Modifying a snapshot expiration date.................................................224Renaming a snapshot......................................................................... 225Expiring a snapshot............................................................................225

    Managing snapshot schedules........................................................................ 225Creating a snapshot schedule............................................................ 226Modifying a snapshot schedule.......................................................... 227Deleting a snapshot schedule............................................................. 227

    Recover data from a snapshot........................................................................ 227

    CIFS 229CIFS overview.................................................................................................230Performing CIFS setup................................................................................... 230

    HA systems and CIFS.........................................................................230Preparing clients for access to protection systems............................ 231Enabling CIFS services........................................................................231Naming the CIFS server......................................................................231Setting authentication parameters.....................................................232Disabling CIFS services...................................................................... 232

    Working with shares........................................................................................232Creating shares.................................................................................. 233Modifying a share...............................................................................235Creating a share from an existing share............................................. 235Disabling a share................................................................................ 236Enabling a share................................................................................. 236Deleting a share................................................................................. 236Performing MMC administration........................................................236Connecting to a protection system from a CIFS client....................... 236Displaying CIFS information .............................................................. 237

    Configuring SMB signing.................................................................................237Managing access control................................................................................ 238

    Accessing shares from a Windows client............................................238Providing domain users administrative access....................................238Allowing administrative access to a protection system for domain users.......................................................................................................... 239Restricting administrative access from Windows............................... 239File access......................................................................................... 239

    Monitoring CIFS operation..............................................................................242Displaying CIFS status....................................................................... 242Display CIFS configuration................................................................. 243Displaying CIFS statistics...................................................................245

    Performing CIFS troubleshooting....................................................................245Displaying clients current activity...................................................... 245Setting the maximum open files on a connection............................... 246System clock......................................................................................246Synchronize from an NTP server....................................................... 246

    NFS 247NFS overview................................................................................................. 248

    HA systems and NFS..........................................................................248Managing NFS client access to the protection system................................... 248

    Enabling NFS services........................................................................249Disabling NFS services.......................................................................249Creating an export............................................................................. 249Modifying an export...........................................................................250

    Chapter 8

    Chapter 9

    Contents

    Dell EMC DD OS Administration Guide 7

  • Creating an export from an existing export.........................................251Deleting an export..............................................................................252

    Displaying NFS information.............................................................................252Viewing NFS status............................................................................252Viewing NFS exports..........................................................................252Viewing active NFS clients.................................................................252

    Integrating a DDR into a Kerberos domain...................................................... 253Add and delete KDC servers after initial configuration.................................... 254

    NFSv4 257Introduction to NFSv4.................................................................................... 258

    NFSv4 compared to NFSv3............................................................... 258NFSv4 ports.......................................................................................259

    ID Mapping Overview......................................................................................259External formats............................................................................................. 259

    Standard identifier formats................................................................ 259ACE extended identifiers................................................................... 260Alternative formats............................................................................ 260

    Internal Identifier Formats.............................................................................. 260When ID mapping occurs................................................................................ 260

    Input mapping.....................................................................................261Output mapping..................................................................................261Credential mapping.............................................................................261

    NFSv4 and CIFS/SMB Interoperability........................................................... 262CIFS/SMB Active Directory Integration.............................................262Default DACL for NFSv4.................................................................... 262System Default SIDs.......................................................................... 262Common identifiers in NFSv4 ACLs and SIDs.....................................263

    NFS Referrals................................................................................................. 263Referral Locations..............................................................................263Referral location names......................................................................263Referrals and Scaleout Systems.........................................................264

    NFSv4 and High Availability............................................................................ 264NFSv4 Global Namespaces............................................................................. 264

    NFSv4 global namespaces and NFSv3 submounts............................. 265NFSv4 Configuration...................................................................................... 265

    Enabling the NFSv4 Server................................................................ 266Setting the default server to include NFSv4...................................... 266Updating existing exports.................................................................. 266

    Kerberos and NFSv4....................................................................................... 266Configuring Kerberos with a Linux-Based KDC...................................267Configuring the protection System to Use Kerberos Authentication..268Configuring Clients............................................................................ 269

    Enabling Active Directory................................................................................269Configuring Active Directory..............................................................270Configuring clients on Active Directory.............................................. 270

    Storage Migration 271Storage migration overview............................................................................ 272Migration planning considerations...................................................................272

    DS60 shelf considerations..................................................................273Viewing migration status................................................................................. 274Evaluating migration readiness........................................................................274Migrating storage using DD System Manager................................................. 275

    Chapter 10

    Chapter 11

    Contents

    8 Dell EMC DD OS Administration Guide

  • Storage migration dialog descriptions............................................................. 276Select a Task dialog............................................................................276Select Existing Enclosures dialog....................................................... 276Select New Enclosures dialog............................................................ 276Review Migration Plan dialog............................................................. 276Verify Migration Preconditions dialog.................................................277Migration progress dialogs................................................................. 277

    Migrating storage using the CLI...................................................................... 278CLI storage migration example........................................................................279

    Metadata on Flash 285Overview of Metadata on Flash (MDoF) ........................................................ 286SSD cache licensing and capacity................................................................... 286SSD cache tier................................................................................................ 288SSD cache tier - system management ........................................................... 288

    Managing the SSD cache tier.............................................................288SSD alerts....................................................................................................... 291

    SCSI Target 293SCSI Target overview..................................................................................... 294Fibre Channel view..........................................................................................295

    Enabling NPIV.................................................................................... 295Disabling NPIV....................................................................................297Resources tab.................................................................................... 298Access Groups tab............................................................................. 304

    Port monitoring...............................................................................................304

    Working with DD Boost 305About DD Boost.............................................................................................. 306Managing DD Boost with DD System Manager............................................... 306

    Specifying DD Boost user names........................................................307Changing DD Boost user passwords...................................................307Removing a DD Boost user name....................................................... 308Enabling DD Boost............................................................................. 308Configuring Kerberos......................................................................... 308Disabling DD Boost.............................................................................309Viewing DD Boost storage units......................................................... 309Creating a storage unit....................................................................... 310Viewing storage unit information......................................................... 311Modifying a storage unit..................................................................... 313Renaming a storage unit..................................................................... 314Deleting a storage unit........................................................................315Undeleting a storage unit....................................................................315Selecting DD Boost options................................................................ 315Managing certificates for DD Boost.................................................... 317Managing DD Boost client access and encryption...............................318

    About interface groups................................................................................... 320Interfaces...........................................................................................320Clients................................................................................................ 321Creating interface groups.................................................................. 322Enabling and disabling interface groups............................................. 323Modifying an interface group's name and interfaces.......................... 323Deleting an interface group................................................................ 323Adding a client to an interface group..................................................324

    Chapter 12

    Chapter 13

    Chapter 14

    Contents

    Dell EMC DD OS Administration Guide 9

  • Modifying a client's name or interface group......................................324Deleting a client from the interface group..........................................325Using interface groups for Managed File Replication (MFR)..............325

    Destroying DD Boost.......................................................................................326Configuring DD Boost-over-Fibre Channel...................................................... 327

    Enabling DD Boost users.................................................................... 327Configuring DD Boost........................................................................ 328Verifying connectivity and creating access groups.............................329

    Using DD Boost on HA systems....................................................................... 331About the DD Boost tabs................................................................................. 331

    Settings.............................................................................................. 331Active Connections............................................................................ 332IP Network.........................................................................................333Fibre Channel..................................................................................... 333Storage Units..................................................................................... 333

    DD Virtual Tape Library 335DD Virtual Tape Library overview....................................................................336Planning a DD VTL.......................................................................................... 336

    DD VTL limits..................................................................................... 337Number of drives supported by a DD VTL.......................................... 340Tape barcodes................................................................................... 340LTO tape drive compatibility...............................................................341Setting up a DD VTL...........................................................................342HA systems and DD VTL.................................................................... 342DD VTL tape out to cloud................................................................... 342

    Managing a DD VTL........................................................................................ 342Enabling DD VTL................................................................................ 344Disabling DD VTL................................................................................344DD VTL option defaults...................................................................... 344Configuring DD VTL default options...................................................345

    Working with libraries..................................................................................... 346Creating libraries................................................................................ 347Deleting libraries................................................................................ 349Searching for tapes............................................................................349

    Working with a selected library.......................................................................350Creating tapes................................................................................... 350Deleting tapes.....................................................................................351Importing tapes..................................................................................352Exporting tapes..................................................................................354Moving tapes between devices within a library.................................. 355Adding slots....................................................................................... 356Deleting slots..................................................................................... 356Adding CAPs...................................................................................... 357Deleting CAPs.................................................................................... 357

    Viewing changer information...........................................................................357Working with drives........................................................................................ 358

    Creating drives...................................................................................359Deleting drives................................................................................... 359

    Working with a selected drive......................................................................... 360Working with tapes..........................................................................................361

    Changing a tape's write or retention lock state.................................. 362Working with the vault....................................................................................362Working with the cloud-based vault................................................................363

    Prepare the VTL pool for data movement.......................................... 363

    Chapter 15

    Contents

    10 Dell EMC DD OS Administration Guide

  • Remove tapes from the backup application inventory........................365Select tape volumes for data movement............................................ 365Restore data held in the cloud............................................................367Manually recall a tape volume from cloud storage.............................. 367

    Working with access groups........................................................................... 369Creating an access group...................................................................369Deleting an access group....................................................................373

    Working with a selected access group............................................................ 373Selecting endpoints for a device........................................................ 374Configuring the NDMP device TapeServer group...............................374

    Working with resources.................................................................................. 375Working with initiators....................................................................... 376Working with endpoints......................................................................377Working with a selected endpoint...................................................... 378

    Working with pools..........................................................................................379Creating pools....................................................................................380Deleting pools..................................................................................... 381

    Working with a selected pool.......................................................................... 382Converting a directory pool to an MTree pool ................................... 384Moving tapes between pools..............................................................384Copying tapes between pools............................................................ 385Renaming pools..................................................................................386

    DD Replicator 387DD Replicator overview...................................................................................388Prerequisites for replication configuration...................................................... 389Replication version compatibility..................................................................... 391Replication types............................................................................................ 393

    Managed file replication .................................................................... 394Directory replication...........................................................................394MTree replication...............................................................................395Collection replication .........................................................................397

    Using DD Encryption with DD Replicator........................................................ 398Replication topologies.....................................................................................399

    One-to-one replication.......................................................................400Bi-directional replication.....................................................................401One-to-many replication.....................................................................401Many-to-one replication.....................................................................402Cascaded replication..........................................................................402

    Managing replication.......................................................................................403Replication status.............................................................................. 404Summary view....................................................................................404DD Boost view.................................................................................... 414Performance view...............................................................................415Advanced Settings view..................................................................... 415

    Monitoring replication .....................................................................................418Viewing estimated completion time for backup jobs........................... 418Checking replication context performance......................................... 419Tracking status of a replication process..............................................419Replication lag.................................................................................... 419

    Replication with HA......................................................................................... 419Replicating a system with quotas to one without............................................ 420Replication Scaling Context ........................................................................... 420Directory-to-MTree replication migration....................................................... 420

    Performing migration from directory replication to MTree replication420

    Chapter 16

    Contents

    Dell EMC DD OS Administration Guide 11

  • Viewing directory-to-MTree migration progress................................. 421Checking the status of directory-to-MTree replication migration...... 422Aborting D2M replication .................................................................. 422Troubleshooting D2M.........................................................................423Additional D2M troubleshooting......................................................... 424

    Using collection replication for disaster recovery with SMT............................424

    DD Secure Multitenancy 427Secure Multi-Tenancy overview......................................................................428

    SMT architecture basics.................................................................... 428Terminology used in Secure Multi-Tenancy (SMT)............................ 428Control path and network isolation.....................................................429Understanding RBAC in SMT............................................................. 430

    Provisioning a Tenant Unit...............................................................................431Enabling Tenant Self-Service mode................................................................ 435Data access by protocol..................................................................................435

    Multi-User DD Boost and Storage Units in SMT.................................435Configuring access for CIFS...............................................................436Configuring NFS access.....................................................................436Configuring access for DD VTL.......................................................... 436Using DD VTL NDMP TapeServer ..................................................... 437

    Data management operations..........................................................................437Collecting performance statistics.......................................................437Modifying quotas................................................................................437SMT and replication........................................................................... 438SMT Tenant alerts............................................................................. 439Managing snapshots.......................................................................... 439Performing a file system Fast Copy................................................... 440

    Cloud Tier 441Cloud Tier overview........................................................................................ 442

    Supported platforms.......................................................................... 442Cloud Tier performance......................................................................444

    Configuring Cloud Tier.................................................................................... 445Configuring storage for Cloud Tier.....................................................445

    Configuring cloud units................................................................................... 446Firewall and proxy settings.................................................................447Importing CA certificates................................................................... 447Adding a cloud unit for Elastic Cloud Storage (ECS)..........................448Adding a cloud unit for Alibaba...........................................................449Adding a cloud unit for Amazon Web Services S3...............................451Adding a cloud unit for Azure............................................................. 452Adding a cloud unit for Google Cloud Provider................................... 453Adding an S3 Flexible provider cloud unit...........................................455Modifying a cloud unit or cloud profile............................................... 456Deleting a cloud unit...........................................................................457

    Data movement.............................................................................................. 458Adding data movement policies to MTrees.........................................458Moving data manually........................................................................ 458Moving data automatically................................................................. 459Recalling a file from the Cloud Tier.................................................... 459Using the CLI to recall a file from the cloud tier................................. 460Direct restore from the cloud tier....................................................... 461

    Using the CLI to configure Cloud Tier..............................................................461

    Chapter 17

    Chapter 18

    Contents

    12 Dell EMC DD OS Administration Guide

  • Configuring encryption for DD cloud units...................................................... 465Information needed in the event of system loss.............................................. 465Using DD Replicator with Cloud Tier............................................................... 466Using DD Virtual Tape Library (VTL) with Cloud Tier...................................... 466Displaying capacity consumption charts for Cloud Tier...................................466Cloud Tier logs................................................................................................ 467Using the CLI to remove Cloud Tier................................................................ 467

    DD Retention Lock 471DD Retention Lock overview........................................................................... 472

    DD Retention Lock protocol............................................................... 473DD Retention Lock flow......................................................................473Automatic retention lock.................................................................... 473

    Supported data access protocols.................................................................... 474Compliance mode on iDRAC............................................................................475

    Create an iDRAC user account...........................................................475Request PowerProtect access for iDRAC administrators...................475Extend PowerProtect access for iDRAC administrators.....................476Disable PowerProtect access for iDRAC administrators.....................476

    Enabling DD Retention Lock on an MTree....................................................... 476Enabling DD Retention Lock Governance on an MTree.......................477Enabling DD Retention Lock Compliance on an MTree....................... 478

    Client-Side Retention Lock file control........................................................... 480Setting Retention Locking on a file..................................................... 481Extending Retention Locking on a file................................................ 483Identifying a Retention-Locked file.................................................... 484Specifying a directory and touching only those files...........................484Reading a list of files and touching only those files.............................484Deleting or expiring a file....................................................................484Using ctime or mtime on Retention-Locked files................................485

    System behavior with DD Retention Lock.......................................................485DD Retention Lock governance..........................................................485DD Retention Lock compliance...........................................................487

    DD Encryption 497DD Encryption overview..................................................................................498Configuring encryption................................................................................... 498About key management.................................................................................. 499

    Rectifying lost or corrupted keys....................................................... 499Key manager support.........................................................................500Working with the Embedded Key Manager........................................ 500Working with KeySecure Key Manager...............................................501Using DD System Manager to set up and manage the KeySecure KeyManager............................................................................................. 501Using the DD CLI to manage the KeySecure Key Manager.................503How the cleaning operation works..................................................... 507

    Key manager setup......................................................................................... 507Setting up KMIP key manager............................................................507

    Changing key managers after setup................................................................509Deleting certificates...........................................................................509

    Checking DD Encryption settings................................................................... 509Enabling and disabling DD Encryption..............................................................510

    Enabling DD Encryption......................................................................510Disabling DD Encryption..................................................................... 510

    Chapter 19

    Chapter 20

    Contents

    Dell EMC DD OS Administration Guide 13

  • Locking and unlocking the file system.............................................................. 511Locking the file system........................................................................511Unlocking the file system....................................................................512Changing the encryption algorithm.....................................................512

    Contents

    14 Dell EMC DD OS Administration Guide

  • Preface

    As part of an effort to improve its product lines, Dell EMC periodically releases revisions of itssoftware and hardware. Therefore, some functions described in this document might not besupported by all versions of the software or hardware currently in use. The product release notesprovide the most up-to-date information on product features, software updates, softwarecompatibility guides, and information about this product, licensing, and service.

    Contact your technical support professional if a product does not function properly or does notfunction as described in this document.

    Note: This document was accurate at publication time. Go to Online Support (https://support.emc.com) to ensure that you are using the latest version of this document.

    Purpose

    This guide explains how to manage the PowerProtect DD Series Appliance systems with anemphasis on procedures using the dd System Manager, a browser-based graphical user interface(GUI). If an important administrative task is not supported in DD System Manager, the CommandLine Interface (CLI) commands are described.

    Note:

    l DD System Manager was formerly known as the Enterprise Manager.

    l In some cases, a CLI command may offer more options than those offered by thecorresponding DD System Manager feature. See the PowerProtect DD Series AppliancesOperating System Command Reference Guide for a complete description of a command andits options.

    Audience

    This guide is for system administrators who are familiar with standard backup software packagesand general backup administration.

    Related documentation

    Additional DD OS documentation is available from: https://www.dell.com/support/article/us/en/04/sln318579/powerprotect-and-data-domain-core-documents

    Special notice conventions used in this document

    This document uses the following conventions for special notices:

    NOTICE A notice identifies content that warns of a potential business or data loss.

    Note: A note identifies information that is incidental, but not essential, to the topic. Notes canprovide an explanation, a comment, reinforcement of a point in the text, or just a related point.

    Typographical conventions

    This document uses the following type style conventions in this document:

    Table 1 Typography

    Bold Indicates interface element names, such as names of windows, dialogboxes, buttons, fields, tab names, key names, and menu paths (whatthe user specifically selects or clicks)

    Dell EMC DD OS Administration Guide 15

    https://support.emc.com/https://support.emc.com/https://www.dell.com/support/article/us/en/04/sln318579/powerprotect-and-data-domain-core-documentshttps://www.dell.com/support/article/us/en/04/sln318579/powerprotect-and-data-domain-core-documents

  • Table 1 Typography (continued)

    Italic Highlights publication titles listed in text

    Monospace Indicates system information, such as:l System code

    l System output, such as an error message or script

    l Pathnames, filenames, prompts, and syntax

    l Commands and options

    Monospace italic Highlights a variable name that must be replaced with a variablevalue

    Monospace bold Indicates text for user input[ ] Square brackets enclose optional values

    | Vertical bar indicates alternate selections—the bar means “or”

    { } Braces enclose content that the user must specify, such as x or y orz

    ... Ellipses indicate nonessential information omitted from the example

    Where to get help

    You can get support, product, and licensing information as follows:

    Product information

    For documentation, release notes, software updates, or information about this product, go toOnline Support at https://support.emc.com.

    Technical support

    Go to Online Support and click Service Center. You will see several options for contactingTechnical Support. Note that to open a service request, you must have a valid supportagreement. Contact your sales representative for details about obtaining a valid supportagreement or with questions about your account.

    Your comments

    Your suggestions will help us continue to improve the accuracy, organization, and overall quality ofthe user publications. Send your opinions of this document to: [email protected].

    Preface

    16 Dell EMC DD OS Administration Guide

    https://support.emc.commailto:[email protected]

  • CHAPTER 1

    System Features and Integration

    This chapter includes:

    l Revision history......................................................................................................................18l System overview....................................................................................................................18l System features.....................................................................................................................19l Storage environment integration...........................................................................................24

    Dell EMC DD OS Administration Guide 17

  • Revision historyThe revision history lists the major changes to this document to support DD OS Release 7.0.

    Table 2 Document revision history

    Revision Date Description

    02 (7.0.0) March 2020 This revision includes the following corrections andclarifications:

    l Corrected DD6900 and DD9400 MTree limits.

    l CAC/PIV card login

    l Removed an unsupported US location for configuringa cloud unit for Google.

    l Add the CLI steps to register the system with anESRS gateway.

    l Added additional information about snapshotretention after breaking an MTree replicationcontext.

    l Added additional information about licensingrequirements for storage migration.

    01 (7.0.0) September 2019 This revision includes information about these newfeatures:

    l Retention Lock Compliance for DD6900, DD9400,and DD9900 systems.

    l GUI support for system coredump management.

    System overviewData Domain and PowerProtect systems are disk-based inline deduplication appliances thatprovide data protection and disaster recovery (DR) in the enterprise environment.

    Note: In this guide, "the protection system" or simply "the system" refers to both Data Domainand PowerProtect DD systems running DD OS 7.0 or later.

    All protection systems run the DD OS, which provides both a command-line interface (CLI) forperforming all system operations, and the DD System Manager graphical user interface (GUI) forconfiguration, management, and monitoring.

    Note: DD System Manager was formerly known as the Enterprise Manager.

    Protection systems consist of appliances that vary in storage capacity and data throughput.Systems are typically configured with expansion enclosures that add storage space.

    System Features and Integration

    18 Dell EMC DD OS Administration Guide

  • System featuresSystem features ensure data integrity, reliable restoration, efficient resource usage, and ease ofmanagement. Licensed features enable you to scale the system feature set to match your needsand budget.

    Data integrityThe DD OS Data Invulnerability Architecture™ protects against data loss from hardware andsoftware failures.

    l When writing to disk, the DD OS creates and stores checksums and self-describing metadatafor all data received. After writing the data to disk, the DD OS then recomputes and verifiesthe checksums and metadata.

    l An append-only write policy guards against overwriting valid data.

    l After a backup completes, a validation process examines what was written to disk and verifiesthat all file segments are logically correct within the file system and that the data is identicalbefore and after writing to disk.

    l In the background, the online verify operation continuously checks that data on the disks iscorrect and unchanged since the earlier validation process.

    l Storage in most systems is set up in a double parity RAID 6 configuration (two parity drives).Additionally, most configurations include a hot spare in each enclosure. Each parity stripe usesblock checksums to ensure that data is correct. Checksums are constantly used during theonline verify operation and while data is read from the system. With double parity, the systemcan fix simultaneous errors on as many as two disks.

    l To keep data synchronized during a hardware or power failure, the system uses non-volatileRAM (NVRAM) to track outstanding I/O operations. The following system models write thecontesnts of the NVRAM to flash memory upon power failure or reboot to preserve that dataindefinitely:

    n DD6300

    n DD6800

    n DD6900

    n DD9300

    n DD9400

    n DD9500

    n DD9800

    n DD9900

    l When reading data back on a restore operation, the DD OS uses multiple layers of consistencychecks to verify that restored data is correct.

    l When writing to SSD cache, the DD OS:

    n Creates an SL checksum for every record stored in the cache to detect corruption to cachedata. This checksum is validated for every cache read.

    n Treats corruption to cache data as a cache miss to avoid data loss by forcing clients toretrieve the most recent copy of the data from a different backup mechanism such asNVRAM or HDD instead of retrieving the corrupted data from the cache.

    System Features and Integration

    Dell EMC DD OS Administration Guide 19

  • n Removes the need for inline verification of cache writes because end-to-end verification isperformed on the copy of the data that resides on the system HDDs. This also saves I/Obandwidth by eliminating the need to perform additional I/O operations on the SSDs.

    n Removes the need for continuous fault detection on the SSDs because the SSDs have abuilt-in scan capability.

    Data deduplicationThe file system deduplicates data by identifying redundant data during each backup and storingunique data just once.

    The storage of unique data is invisible to backup software and independent of data format. Datacan be structured, such as databases, or unstructured, such as text files. Data can derive from filesystems or from raw volumes.

    Typical deduplication ratios are 20-to-1, on average, over many weeks. This ratio assumes thereare weekly full backups and daily incremental backups. A backup that includes many duplicate orsimilar files (files copied several times with minor changes) benefits the most from deduplication.

    Depending on backup volume, size, retention period, and rate of change, the amount ofdeduplication can vary. The best deduplication happens with backup volume sizes of at least10 MiB (MiB is the base 2 equivalent of MB).

    To take full advantage of multiple systems, a site with more than one system must consistentlybackup the same client system or set of data to the same target system. For example, if a full backup of all sales data goes to target system A, maximum deduplication is achieved when theincremental backups and future full backups for sales data also go to target system A.

    Restore operationsFile restore operations create little or no contention with backup or other restore operations.

    Incremental backups to the system are superior to tape backups, because they are always reliableand can be easily accessed.

    You can perform full backups more frequently without the penalty of storing redundant data.Multiple processes can access the system simultaneously. The system enables your site to offersafe, user-driven, single-file restore operations.

    DD ReplicatorDD Replicator sets up and manages the replication of backup data between two protectionsystems.

    A DD Replicator pair consists of a source and a destination system and replicates a complete dataset or directory from the source system to the destination system. An individual system can be apart of multiple replication pairs and can serve as a source for one or more pairs and a destinationfor one or more pairs. After replication is started, the source system automatically sends any newbackup data to the destination system.

    Multipath and load balancingIn a Fibre Channel multipath configuration, multiple paths are established between a protectionsystem and a backup server or backup destination array. When multiple paths are present, thesystem automatically balances the backup load between the available paths.

    At least two HBA ports are required to create a multipath configuration. When connected to abackup server, each of the HBA ports on the multipath is connected to a separate port on thebackup server.

    System Features and Integration

    20 Dell EMC DD OS Administration Guide

  • High AvailabilityThe High Availability (HA) feature lets you configure two protection systems as an Active-Standbypair, providing redundancy in the event of a system failure. HA keeps the active and standbysystems in sync, so that if the active node were to fail due to hardware or software issues, thestandby node can take over services and continue where the failing node left off.

    The HA feature:

    l Supports failover of backup, restore, replication and management services in a two-nodesystem. Automatic failover requires no user intervention.

    l Provides a fully redundant design with no single point of failure within the system whenconfigured as recommended.

    l Provides an Active-Standby system with no loss of performance on failover.

    l Provides failover within 10 minutes for most operations. CIFS, DD VTL, and NDMP must berestarted manually.

    Note: Recovery of DD Boost applications may take longer than 10 minutes, because Boostapplication recovery cannot begin until the DD server failover is complete. In addition,Boost application recovery cannot start until the application invokes the Boost library.Similarly, NFS may require additional time to recover.

    l Supports ease of management and configuration through DD OS CLI commands.

    l Provides alerts for malfunctioning hardware.

    l Preserves single-node performance and scalability within an HA configuration.Note: The active node continues retains full functionality, performance, and scalabilityeven if the HA configuration is in degraded mode, which means the standby node isunavailable for failover.

    l Supports the same feature set as stand-alone DD systems, with the exception of vDisk.

    l Supports systems with all SAS drives. This includes legacy systems upgraded to systems withall SAS drives.

    Note: The Hardware Overview and Installation Guides for the systems that support HAdescribes how to install a new HA system. The Single Node to HA Upgrade describes how toupgrade an existing system to an HA pair.

    l Does not impact the ability to scale the product.

    l Supports nondisruptive software updates.

    HA is supported on the following systems:

    l Data Domain DD6800

    l Power Protect DD6900

    l Data Domain DD9300

    l Power Protect DD9400

    l Data Domain DD9500

    l Data Domain DD9800

    l Power Protect DD9900

    System Features and Integration

    Dell EMC DD OS Administration Guide 21

  • HA architectureHA functionality is available for both IP and FC connections. Both nodes must have access to thesame IP networks, FC SANs, and hosts in order to achieve high availability for the environment.

    Over IP networks, HA uses a floating IP address to provide data access to the active node of theHA pair, regardless of which physical node is the active node.

    Over FC SANs, HA uses NPIV to move the FC WWNs between nodes, allowing the FC initiators tore-establish connections after a failover.

    Figure 1 on page 22 shows the HA architecture.

    Figure 1 HA architecture

    Random I/O handlingThe random I/O optimizations included in DD OS provide improved performance for applicationsand use cases that generate larger amounts of random read and write operations than sequentialread and write operations.

    DD OS is optimized to handle workloads that consist of random read and write operations, such asvirtual machine instant access and instant restore, and incremental forever backups generated byapplications such as Avamar. These optimizations:

    l Improve random read and random write latencies.

    l Improve user IOPS with smaller read sizes.

    l Support concurrent I/O operations within a single stream.

    l Provide peak read and write throughput with smaller streams.Note: The maximum random I/O stream count is limited to the maximum restore streamcount of a protection system.

    System Features and Integration

    22 Dell EMC DD OS Administration Guide

  • The random I/O enhancements allow the protection system to support instant access/instantrestore functionality for backup applications such as Avamar and Networker.

    System administrator accessSystem administrators can access the system for configuration and management using a commandline interface (CLI) or a graphical user interface (GUI).

    l DD OS CLI - A command-line interface that is available through a serial console or throughEthernet connections using SSH or Telnet. CLI commands enable initial system configuration,changes to individual system settings, and display of system operation status.

    l DD System Manager - A browser-based graphical user interface that is available throughEthernet connections. Use DD System Manager to perform initial system configuration, modifythe system configuration, display system and component status, and generate reports andcharts.

    Note: Some DD hardware models support access using a keyboard and monitor attacheddirectly to the system.

    Licensed featuresFeature licenses allow you to purchase only those features you intend to use. Some examples offeatures that require licenses are DD Boost, and capacity on demand (storage capacity increases).

    Consult with your sales representative for information on purchasing licensed features.

    Table 3 Features requiring licenses

    Feature Name License Name inSoftware

    Description

    DD ArchiveStore ARCHIVESTORE Licenses systems for archive use, such as file andemail archiving, file tiering, and content anddatabase archiving.

    DD Boost DDBOOST Enables the use of a system with qualified backupsoftware. The online compatibility guide availableat https://compatibilityguide.emc.com:8080/CompGuideApp/ provides the list of qualifiedapplications. The managed file replication (MFR)feature of DD Boost also requires the DDReplicator license.

    DD Capacity onDemand

    CONTROLLER-COD

    Enables an on-demand capacity increase for a DDsystem that is not at its maximum supportedcapacity.

    Cloud Tier CLOUDTIER-CAPACITY

    Enables a system to move data from the activetier to low-cost, high-capacity object storage inthe public, private, or hybrid cloud for long-termretention.

    DD Encryption ENCRYPTION Allows data on system drives or external storageto be encrypted while being saved and lockedwhen moving the system to another location.

    DD Expansion Storage EXPANDED-STORAGE

    Allows system storage to be expanded beyondthe level provided in the base system.

    System Features and Integration

    Dell EMC DD OS Administration Guide 23

    https://compatibilityguide.emc.com:8080/CompGuideApp/https://compatibilityguide.emc.com:8080/CompGuideApp/

  • Table 3 Features requiring licenses (continued)

    Feature Name License Name inSoftware

    Description

    DD I/OS (for IBM ioperatingenvironments)

    I/OS An I/OS license is required when DD VTL is usedto backup systems in the IBM i operatingenvironment. Apply this license before addingvirtual tape drives to libraries.

    DD Replicator REPLICATION Adds DD Replicator for replication of data fromone protection system to another. A license isrequired on each system.

    DD Retention LockCompliance Edition

    RETENTION-LOCK-COMPLIANCE

    Meets the strictest data retention requirementsfrom regulatory standards such as SEC17a-4.

    DD Retention LockGovernance Edition

    RETENTION-LOCK-GOVERNANCE

    Protects selected files from modification anddeletion before a specified retention periodexpires.

    DD Shelf Capacity-Active Tier

    CAPACITY-ACTIVE

    Enables a system to expand the active tierstorage capacity to an additional enclosure or adisk pack within an enclosure.

    DD Storage Migration STORAGE-MIGRATION-FOR-DATADOMAIN-SYSTEMS

    Enables migration of data from one enclosure toanother to support replacement of older, lower-capacity enclosures.

    DD Virtual TapeLibrary (DD VTL)

    VTL Enables the use of a protection system as avirtual tape library over a Fibre Channel network.This license also enables the NDMP Tape Serverfeature, which previously required a separatelicense.

    High Availability HA-ACTIVE-PASSIVE

    Enables the High Availability feature in an Active-Standby configuration. You only need to purchaseone HA license; the license runs on the activenode and is mirrored to the standby node.

    SSD Cache SSD-CAPACITY Enables the SSD cache feature on DD6300,DD6800, DD9300, DD9500, and DD9800systems. This license is not required to use theSSD cache feature on DD6900, DD9400, andDD9900 systems.

    Storage environment integrationProtection systems integrate easily into existing data centers.

    l All protection systems can be configured as storage destinations for leading backup andarchiving applications using NFS, CIFS, DD Boost, or DD VTL protocols.

    l Search for compatibility documents at https://support.emc.com for information on theapplications that work with the different configurations.

    l Multiple backup servers can share a single protection system.

    System Features and Integration

    24 Dell EMC DD OS Administration Guide

    https://support.emc.com/

  • l A single protection system can handle multiple simultaneous backup and restore operations.

    l Multiple protection systems can be connected to one or more backup servers.

    For use as a backup destination, a protection system can be configured either as a disk storageunit with a file system that is accessed through an Ethernet connection or as a virtual tape librarythat is accessed through a Fibre Channel connection. The DD VTL feature enables protectionsystems to be integrated into environments where backup software is already configured for tapebackups to minimize disruption.

    Configuration is performed both in the DD OS, as described in the relevant sections of this guide,and in the backup application, as described in the backup application’s administrator guides and inapplication-related guides and tech notes.

    All backup applications can access the protection system as either an NFS or a CIFS file system onthe disk device.

    The following figure shows a protection system integrated into an existing basic backupconfiguration.

    Figure 2 Protection system integrated into a storage environment

    1. Primary storage2. Ethernet3. Backup server4. SCSI/Fibre Channel5. Ethernet or Fibre Channel connection6. Tape system

    System Features and Integration

    Dell EMC DD OS Administration Guide 25

  • Figure 2 Protection system integrated into a storage environment (continued)

    7. Protection system8. DD OS management layer9. NFS export/CIFS share/DD VTL pool/DD Boost storage unit10. DD OS data verification11. DD OS file system12. DD OS global deduplication and compression13. DD OS RAID protection

    As shown in Figure 2 on page 25, data flows to the protection system through an Ethernet or FibreChannel connection. Immediately, the data verification processes begin and are continued whilethe data resides on the system. In the file system, the DD OS Global Compression algorithmsdeduplicate and compress the data for storage. Data is then sent to the disk RAID subsystem.When a restore operation is required, data is retrieved from storage, decompressed, verified forconsistency, and transferred via Ethernet to the backup servers using Ethernet (for NFS, CIFS,DD Boost), or using Fiber Channel (for DD VTL and DD Boost).

    The DD OS accommodates relatively large streams of sequential data from backup software and isoptimized for high throughput, continuous data verification, and high compression. It alsoaccommodates the large numbers of smaller files in nearline storage (DD ArchiveStore).

    Protection system performance is best when storing data from applications that are notspecifically backup software under the following circumstances.

    l Data is sent to the protection system as sequential writes (no overwrites).

    l Data is neither compressed nor encrypted before being sent to the protection system.

    System Features and Integration

    26 Dell EMC DD OS Administration Guide

  • CHAPTER 2

    Getting Started

    This chapter includes:

    l Dell EMC DD System Manager overview............................................................................... 28l Logging in and out of DD System Manager............................................................................28l The DD System Manager interface........................................................................................ 31l Configuring the system with the configuration wizard...........................................................34l Configure NTP...................................................................................................................... 46l Command line interface.........................................................................................................47l Logging into the CLI.............................................................................................................. 47l CLI online help guidelines...................................................................................................... 48

    Dell EMC DD OS Administration Guide 27

  • Dell EMC DD System Manager overviewDD System Manager is a browser-based GUI for managing a single system from any location. DDSystem Manager provides a single, consolidated management interface that enables you toconfigure and monitor many of the system features and settings.

    Note: PowerProtect DD Management Center (DDMC) enables you to manage multiplesystems from a single browser window.

    DD System Manager provides real-time graphs and tables that enable you to monitor the status ofsystem hardware components and configured features.

    Additionally, a command set that performs all system functions is available to users through theCLI. Commands configure system settings and display system hardware status, featureconfiguration, and operation.

    The command-line interface is available through a serial console or through an Ethernetconnection using SSH, Telnet, or serial over LAN (SOL).

    Note: Some systems support access using a keyboard and monitor attached directly to thesystem.

    DD OS Software Versions

    DD OS software releases have two public statuses, indicating the number of installed systemsrunning the version.

    l General Availability releases have completed internal QA Testing and are available forinstallation in production environments.

    l Directed Availability - Controlled (Directed Availability) releases are carefully controlledaccess releases, directed to a small number of installations. Customers may request to bequalified for access to these releases.

    l Target Code -Dell EMC recommends that all systems upgrade to the DD OS target codewithin a release family as soon as practical.

    Note: There is only one Target Code release in a given family. Target Code releases havemet the installation and run-time hours and quality metrics to indicate that they are stableand have no problems that would affect most customers. For some release families, theremay be no target code identified, due to limited customer uptake, quality issues, or otherconsiderations.

    Upgrading between families may have product compatibility considerations, and a careful review ofproduct compatibility should precede any upgrade to a new release family.

    Logging in and out of DD System ManagerDD System Manager provides a single, consolidated management interface that enables you toconfigure and monitor many of the system features and settings Use a browser to log in to DDSystem Manager.

    About this task

    When connecting to DD System Manager from a web browser, all HTTP connections automaticallyredirect to HTTPS.

    Note: For information about managing user permissions, see the KB article Managing UserPermissions on the Data Domain system, available from the Online Support website, at https://support.emc.com/kb/181533.

    Getting Started

    28 Dell EMC DD OS Administration Guide

    https://support.emc.com/kb/181533https://support.emc.com/kb/181533

  • Procedure

    1. Open a web browser and enter the IP address or hostname to connect to DD SystemManager. It must be one of the following:

    l A fully qualified domain name (for example, http://dd01.example.com)l A hostname (http://dd01)l An IP address (http://10.5.50.5)

    Note: DD System Manager uses HTTP port 80 and HTTPS port 443. If your system isbehind a firewall, you may need to enable port 80 if using HTTP, or port 443 if usingHTTPS to reach the system. The port numbers can be easily changed if securityrequirements dictate.

    Note: If DD System Manager is unable to launch from any web browser, the displayederror message is "The GUI Service is temporarily unavailable. Please refresh yourbrowser. If the problem persists, contact support for assistance." SSH can be used tologin to the system and can run all commands.If you have not upgraded the DD OS but still encounter this GUI error, use the followingprocedure:

    a. Close the web browser session on the system with the reported error.

    b. Run these commands in sequence:

    l adminaccess disable httpl adminaccess disable httpsl adminaccess enable httpl adminaccess enable https

    c. Wait 5 minutes to allow the http and https services to start completely.

    d. Open a web browser, and connect to DD System Manager.

    If you see this GUI issue after a DD OS upgrade, use the following procedure:

    a. Close the web browser session on the system with the reported error.

    b. Run these commands in sequence:

    l adminaccess disable httpl adminaccess disable httpsl adminaccess certificate generate self-signed-certl adminaccess enable httpl adminaccess enable https

    a. Wait 5 minutes to allow the http and https services to start completely.

    b. Open a web browser, and connect to DD System Manager.

    2. For HTTPS secure login, click Secure Login.

    Secure login with HTTPS requires a digital certificate to validate the identity of the DD OSsystem and to support bi-directional encryption between DD System Manager and abrowser. DD OS includes a self-signed certificate, and DD OS allows you to import your owncertificate.

    3. Enter your assigned username and password.

    Getting Started

    Dell EMC DD OS Administration Guide 29

  • l For physical systems the default password is the system serial number.

    l For PowerProtect DD Virtual Edition (DD VE) instances the default password ischangeme.

    4. Click Log In.

    If this is the first time you have logged in, the Home view is displayed in the Informationpanel.

    Note: If you enter an incorrect password 4 consecutive times, the system locks out thespecified username for 120 seconds. The login count and lockout period are configurableand might be different on your system.

    Note: If this is the first time you are logging in, you might be required to change yourpassword. If the system administrator has configured your username to require apassword change, you must change the password before gaining access to DD SystemManager.

    If you forget the sysadmin password after changing it, contact Dell EMC Support.

    5. To log out, click the log out button in the DD System Manager banner.

    When you log out, the system displays the log in page with a message that your log out iscomplete.

    Log in with certificate using CAC/PIV cardLog in to DD System Manage