O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize V8.1

Book Description

Abstract

This IBM® Redbooks publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller, which is powered by IBM Spectrum™ Virtualize V8.1.

IBM SAN Volume Controller is a virtualization appliance solution that maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running.

The IBM virtualization technology improves the management of information at the "block" level in a network, which enables applications and servers to share storage devices on a network.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Summary of changes
    1. February 2018, Seventh Edition
  5. Chapter 1. Introduction to storage virtualization
    1. 1.1 Storage virtualization terminology
    2. 1.2 Requirements driving storage virtualization
      1. 1.2.1 Benefits of using IBM Spectrum Virtualize
    3. 1.3 Latest changes and enhancements
      1. 1.3.1 IBM SAN Volume Controller Engine 2145-SV1
      2. 1.3.2 IBM Spectrum Virtualize Software changes and enhancements
    4. 1.4 Summary
  6. Chapter 2. System overview
    1. 2.1 Brief history of IBM SAN Volume Controller
      1. 2.1.1 IBM SAN Volume Controller architectural overview
      2. 2.1.2 IBM Spectrum Virtualize
      3. 2.1.3 IBM SAN Volume Controller topology
      4. 2.1.4 IBM SAN Volume Controller models
    2. 2.2 IBM SAN Volume Controller components
      1. 2.2.1 Nodes
      2. 2.2.2 I/O Groups
      3. 2.2.3 System
      4. 2.2.4 Dense expansion drawers
      5. 2.2.5 Flash drives
      6. 2.2.6 MDisks
      7. 2.2.7 Cache
      8. 2.2.8 Quorum disk
      9. 2.2.9 Disk tier
      10. 2.2.10 Storage pool
      11. 2.2.11 Volumes
      12. 2.2.12 IBM Easy Tier
      13. 2.2.13 Hosts
      14. 2.2.14 Host cluster
      15. 2.2.15 RAID
      16. 2.2.16 Encryption
      17. 2.2.17 iSCSI
      18. 2.2.18 IBM Real-time Compression
      19. 2.2.19 IP replication
      20. 2.2.20 IBM Spectrum Virtualize copy services
      21. 2.2.21 Synchronous or asynchronous remote copy
      22. 2.2.22 FlashCopy and Transparent Cloud Tiering
    3. 2.3 Business continuity
      1. 2.3.1 Business continuity With Stretched Cluster
      2. 2.3.2 Business continuity with Enhanced Stretched Cluster
      3. 2.3.3 Business Continuity with HyperSwap
      4. 2.3.4 Automatic Hot Spare nodes
    4. 2.4 Management and support tools
      1. 2.4.1 IBM Assist On-site and Remote Support Assistance
      2. 2.4.2 Event notifications
      3. 2.4.3 Simple Network Management Protocol traps
      4. 2.4.4 Syslog messages
      5. 2.4.5 Call Home email
    5. 2.5 Useful IBM SAN Volume Controller web links
  7. Chapter 3. Planning
    1. 3.1 General planning rules
      1. 3.1.1 Basic planning flow
    2. 3.2 Planning for availability
    3. 3.3 Connectivity planning
    4. 3.4 Physical planning
      1. 3.4.1 Planning for power outages
      2. 3.4.2 Cabling
    5. 3.5 Planning IP connectivity
      1. 3.5.1 Firewall planning
    6. 3.6 SAN configuration planning
      1. 3.6.1 Physical topology
      2. 3.6.2 Zoning
      3. 3.6.3 SVC cluster system zone
      4. 3.6.4 Back-end storage zones
      5. 3.6.5 Host zones
      6. 3.6.6 Zoning considerations for Metro Mirror and Global Mirror
      7. 3.6.7 Port designation recommendations
      8. 3.6.8 Port masking
    7. 3.7 iSCSI configuration planning
      1. 3.7.1 iSCSI protocol
      2. 3.7.2 Topology and IP addressing
      3. 3.7.3 General preferences
      4. 3.7.4 iSCSI back-end storage attachment
    8. 3.8 Back-end storage subsystem configuration
    9. 3.9 Storage pool configuration
      1. 3.9.1 The storage pool and SAN Volume Controller cache relationship
    10. 3.10 Volume configuration
      1. 3.10.1 Planning for image mode volumes
      2. 3.10.2 Planning for thin-provisioned volumes
    11. 3.11 Host attachment planning
      1. 3.11.1 Queue depth
      2. 3.11.2 Offloaded data transfer
    12. 3.12 Host mapping and LUN masking
      1. 3.12.1 Planning for large deployments
    13. 3.13 NPIV planning
    14. 3.14 Advanced Copy Services
      1. 3.14.1 FlashCopy guidelines
      2. 3.14.2 Combining FlashCopy and Metro Mirror or Global Mirror
      3. 3.14.3 Planning for Metro Mirror and Global Mirror
    15. 3.15 SAN boot support
    16. 3.16 Data migration from a non-virtualized storage subsystem
    17. 3.17 SAN Volume Controller configuration backup procedure
    18. 3.18 Spectrum Virtualize Port Configurator
    19. 3.19 Performance considerations
      1. 3.19.1 SAN
      2. 3.19.2 Back-end storage subsystems
      3. 3.19.3 SAN Volume Controller
      4. 3.19.4 IBM Real-time Compression
      5. 3.19.5 Performance monitoring
  8. Chapter 4. Initial configuration
    1. 4.1 Prerequisites
    2. 4.2 System initialization
      1. 4.2.1 System initialization wizard
    3. 4.3 System setup
      1. 4.3.1 System setup wizard
      2. 4.3.2 Adding nodes
      3. 4.3.3 Adding spare nodes
      4. 4.3.4 Adding expansion enclosures
    4. 4.4 Configuring user authentication
      1. 4.4.1 Default superuser account
      2. 4.4.2 Local authentication
      3. 4.4.3 Remote authentication
      4. 4.4.4 User groups and roles
    5. 4.5 Configuring secure communications
      1. 4.5.1 Configuring a signed certificate
      2. 4.5.2 Generating a self-signed certificate
    6. 4.6 Configuring local Fibre Channel port masking
      1. 4.6.1 Planning for local port masking
      2. 4.6.2 Setting the local port mask
      3. 4.6.3 Viewing the local port mask
  9. Chapter 5. Graphical user interface
    1. 5.1 Normal operations using GUI
      1. 5.1.1 Access to GUI
    2. 5.2 Introduction to the GUI
      1. 5.2.1 Task menu
      2. 5.2.2 Suggested tasks
      3. 5.2.3 Notification icons and help
    3. 5.3 Overview window
      1. 5.3.1 Content-based organization
    4. 5.4 Monitoring menu
      1. 5.4.1 System overview
      2. 5.4.2 Events
      3. 5.4.3 Performance
      4. 5.4.4 Background tasks
    5. 5.5 Pools
    6. 5.6 Volumes
    7. 5.7 Hosts
    8. 5.8 Copy Services
    9. 5.9 Access
      1. 5.9.1 Users
      2. 5.9.2 Audit log
    10. 5.10 Settings
      1. 5.10.1 Notifications menu
      2. 5.10.2 Network
      3. 5.10.3 System menu
      4. 5.10.4 Support menu
      5. 5.10.5 GUI preferences
    11. 5.11 Additional frequent tasks in GUI
      1. 5.11.1 Renaming components
      2. 5.11.2 Changing system topology
  10. Chapter 6. Storage pools
    1. 6.1 Working with storage pools
      1. 6.1.1 Creating storage pools
      2. 6.1.2 Actions on storage pools
      3. 6.1.3 Child storage pools
      4. 6.1.4 Encrypted storage pools
    2. 6.2 Working with managed disks
      1. 6.2.1 Assigning managed disks to storage pools
      2. 6.2.2 Traditional and distributed RAID
      3. 6.2.3 Actions on arrays
      4. 6.2.4 Actions on external MDisks
    3. 6.3 Working with internal drives
      1. 6.3.1 Actions on internal drives
    4. 6.4 Working with external storage controllers
      1. 6.4.1 Fibre Channel external storage controllers
      2. 6.4.2 iSCSI external storage controllers
      3. 6.4.3 Actions on external storage controllers
  11. Chapter 7. Volumes
    1. 7.1 An Introduction to volumes
      1. 7.1.1 Image mode volumes
      2. 7.1.2 Managed mode volumes
      3. 7.1.3 Cache mode for volumes
      4. 7.1.4 Mirrored volumes
      5. 7.1.5 Thin-provisioned volumes
      6. 7.1.6 Compressed volumes
      7. 7.1.7 Volumes for various topologies
    2. 7.2 Create Volumes menu
    3. 7.3 Creating volumes
      1. 7.3.1 Creating Basic volumes
      2. 7.3.2 Creating Mirrored volumes
    4. 7.4 Mapping a volume to the host
    5. 7.5 Creating Custom volumes
      1. 7.5.1 Creating a custom thin-provisioned volume
      2. 7.5.2 Creating Custom Compressed volumes
      3. 7.5.3 Custom Mirrored Volumes
    6. 7.6 Stretched Volumes
    7. 7.7 HyperSwap and the mkvolume command
      1. 7.7.1 Volume manipulation commands
    8. 7.8 Mapping volumes to host after creation of volume
      1. 7.8.1 Mapping newly created volumes to the host using the wizard
    9. 7.9 Migrating a volume to another storage pool
    10. 7.10 Migrating volumes using the volume copy feature
    11. 7.11 Volume operations using the CLI
      1. 7.11.1 Creating a volume
      2. 7.11.2 Volume information
      3. 7.11.3 Creating a thin-provisioned volume
      4. 7.11.4 Creating a volume in image mode
      5. 7.11.5 Adding a mirrored volume copy
      6. 7.11.6 Adding a compressed volume copy
      7. 7.11.7 Splitting a mirrored volume
      8. 7.11.8 Modifying a volume
      9. 7.11.9 Deleting a volume
      10. 7.11.10 Using volume protection
      11. 7.11.11 Expanding a volume
      12. 7.11.12 Assigning a volume to a host
      13. 7.11.13 Showing volumes to host mapping
      14. 7.11.14 Deleting a volume to host mapping
      15. 7.11.15 Migrating a volume
      16. 7.11.16 Migrating a fully managed volume to an image mode volume
      17. 7.11.17 Shrinking a volume
      18. 7.11.18 Showing a volume on an MDisk
      19. 7.11.19 Showing which volumes are using a storage pool
      20. 7.11.20 Showing which MDisks are used by a specific volume
      21. 7.11.21 Showing from which storage pool a volume has its extents
      22. 7.11.22 Showing the host to which the volume is mapped
      23. 7.11.23 Showing the volume to which the host is mapped
      24. 7.11.24 Tracing a volume from a host back to its physical disk
    12. 7.12 I/O throttling
      1. 7.12.1 Define a volume throttle
      2. 7.12.2 View existing volume throttles
      3. 7.12.3 Remove a volume throttle
  12. Chapter 8. Hosts
    1. 8.1 Host attachment overview
    2. 8.2 Host clusters
    3. 8.3 N-Port Virtualization ID support
      1. 8.3.1 NPIV Prerequisites
      2. 8.3.2 Enabling NPIV on a new system
      3. 8.3.3 Enabling NPIV on an existing system
    4. 8.4 Hosts operations using the GUI
      1. 8.4.1 Creating hosts
      2. 8.4.2 Host clusters
      3. 8.4.3 Advanced host administration
      4. 8.4.4 Adding and deleting host ports
      5. 8.4.5 Host mappings overview
    5. 8.5 Hosts operations using CLI
      1. 8.5.1 Create a host by using CLI
      2. 8.5.2 Performing advanced host administration by using CLI
      3. 8.5.3 Adding and deleting a host port by using the CLI
      4. 8.5.4 Host Cluster Operations
  13. Chapter 9. Storage migration
    1. 9.1 Storage migration overview
      1. 9.1.1 Interoperability and compatibility
      2. 9.1.2 Prerequisites
    2. 9.2 Storage migration wizard
  14. Chapter 10. Advanced features for storage efficiency
    1. 10.1 Introduction
    2. 10.2 EasyTier
      1. 10.2.1 EasyTier concepts
      2. 10.2.2 Flash drive arrays and flash MDisks
      3. 10.2.3 Disk tiers
      4. 10.2.4 Read Intensive Flash drives and EasyTier
      5. 10.2.5 EasyTier process
      6. 10.2.6 EasyTier operating modes
      7. 10.2.7 Implementation considerations
      8. 10.2.8 Modifying the EasyTier setting
      9. 10.2.9 Monitoring tools
      10. 10.2.10 More information
    3. 10.3 Thin provisioning
      1. 10.3.1 Configuring a thin-provisioned volume
      2. 10.3.2 Performance considerations
      3. 10.3.3 Limitations of virtual capacity
    4. 10.4 Unmap
      1. 10.4.1 SCSI unmap command
    5. 10.5 Real-time Compression
      1. 10.5.1 Common use cases
      2. 10.5.2 Real-time Compression concepts
      3. 10.5.3 Random Access Compression Engine
      4. 10.5.4 Dual RACE instances
      5. 10.5.5 Random Access Compression Engine in IBM Spectrum Virtualize stack
      6. 10.5.6 Data write flow
      7. 10.5.7 Data read flow
      8. 10.5.8 Compression of existing data
      9. 10.5.9 Data reduction: Pattern removal, data deduplication, and compression
      10. 10.5.10 Creating compressed volumes
      11. 10.5.11 Comprestimator
  15. Chapter 11. Advanced Copy Services
    1. 11.1 IBM FlashCopy
      1. 11.1.1 Business requirements for FlashCopy
      2. 11.1.2 FlashCopy principles and terminology
      3. 11.1.3 FlashCopy Mapping
      4. 11.1.4 Consistency Groups
      5. 11.1.5 Crash consistent copy and hosts considerations
      6. 11.1.6 Grains and bitmap - I/O indirection
      7. 11.1.7 Interaction with the cache
      8. 11.1.8 Background Copy Rate
      9. 11.1.9 Incremental FlashCopy
      10. 11.1.10 Starting FlashCopy mappings and Consistency Groups
      11. 11.1.11 Multiple target FlashCopy
      12. 11.1.12 Reverse FlashCopy
      13. 11.1.13 FlashCopy and image mode Volumes
      14. 11.1.14 FlashCopy mapping events
      15. 11.1.15 Thin provisioned FlashCopy
      16. 11.1.16 Serialization of I/O by FlashCopy
      17. 11.1.17 Event handling
      18. 11.1.18 Asynchronous notifications
      19. 11.1.19 Interoperation with Metro Mirror and Global Mirror
      20. 11.1.20 FlashCopy attributes and limitations
    2. 11.2 Managing FlashCopy by using the GUI
      1. 11.2.1 FlashCopy presets
      2. 11.2.2 FlashCopy window
      3. 11.2.3 Creating a FlashCopy mapping
      4. 11.2.4 Single-click snapshot
      5. 11.2.5 Single-click clone
      6. 11.2.6 Single-click backup
      7. 11.2.7 Creating a FlashCopy Consistency Group
      8. 11.2.8 Creating FlashCopy mappings in a Consistency Group
      9. 11.2.9 Showing related Volumes
      10. 11.2.10 Moving FlashCopy mappings across Consistency Groups
      11. 11.2.11 Removing FlashCopy mappings from Consistency Groups
      12. 11.2.12 Modifying a FlashCopy mapping
      13. 11.2.13 Renaming FlashCopy mappings
      14. 11.2.14 Deleting FlashCopy mappings
      15. 11.2.15 Deleting a FlashCopy Consistency Group
      16. 11.2.16 Starting FlashCopy mappings
      17. 11.2.17 Stopping FlashCopy mappings
      18. 11.2.18 Memory allocation for FlashCopy
    3. 11.3 Transparent Cloud Tiering
      1. 11.3.1 Considerations for using Transparent Cloud Tiering
      2. 11.3.2 Transparent Cloud Tiering as backup solution and data migration
      3. 11.3.3 Restore using Transparent Cloud Tiering
      4. 11.3.4 Transparent Cloud Tiering restrictions
    4. 11.4 Implementing Transparent Cloud Tiering
      1. 11.4.1 DNS Configuration
      2. 11.4.2 Enabling Transparent Cloud Tiering
      3. 11.4.3 Creating cloud snapshots
      4. 11.4.4 Managing cloud snapshots
      5. 11.4.5 Restoring cloud snapshots
    5. 11.5 Volume mirroring and migration options
    6. 11.6 Remote Copy
      1. 11.6.1 IBM SAN Volume Controller and Storwize System Layers
      2. 11.6.2 Multiple IBM Spectrum Virtualize systems replication
      3. 11.6.3 Importance of write ordering
      4. 11.6.4 Remote copy intercluster communication
      5. 11.6.5 Metro Mirror overview
      6. 11.6.6 Synchronous remote copy
      7. 11.6.7 Metro Mirror features
      8. 11.6.8 Metro Mirror attributes
      9. 11.6.9 Practical use of Metro Mirror
      10. 11.6.10 Global Mirror overview
      11. 11.6.11 Asynchronous remote copy
      12. 11.6.12 Global Mirror features
      13. 11.6.13 Using Change Volumes with Global Mirror
      14. 11.6.14 Distribution of work among nodes
      15. 11.6.15 Background copy performance
      16. 11.6.16 Thin-provisioned background copy
      17. 11.6.17 Methods of synchronization
      18. 11.6.18 Practical use of Global Mirror
      19. 11.6.19 Spectrum Virtualize HyperSwap topology
      20. 11.6.20 Consistency Protection for GM/MM
      21. 11.6.21 Valid combinations of FlashCopy, Metro Mirror, and Global Mirror
      22. 11.6.22 Remote Copy configuration limits
      23. 11.6.23 Remote Copy states and events
    7. 11.7 Remote Copy commands
      1. 11.7.1 Remote Copy process
      2. 11.7.2 Listing available system partners
      3. 11.7.3 Changing the system parameters
      4. 11.7.4 System partnership
      5. 11.7.5 Creating a Metro Mirror/Global Mirror consistency group
      6. 11.7.6 Creating a Metro Mirror/Global Mirror relationship
      7. 11.7.7 Changing Metro Mirror/Global Mirror relationship
      8. 11.7.8 Changing Metro Mirror/Global Mirror consistency group
      9. 11.7.9 Starting Metro Mirror/Global Mirror relationship
      10. 11.7.10 Stopping Metro Mirror/Global Mirror relationship
      11. 11.7.11 Starting Metro Mirror/Global Mirror consistency group
      12. 11.7.12 Stopping Metro Mirror/Global Mirror consistency group
      13. 11.7.13 Deleting Metro Mirror/Global Mirror relationship
      14. 11.7.14 Deleting Metro Mirror/Global Mirror consistency group
      15. 11.7.15 Reversing Metro Mirror/Global Mirror relationship
      16. 11.7.16 Reversing Metro Mirror/Global Mirror consistency group
    8. 11.8 Native IP replication
      1. 11.8.1 Native IP replication technology
      2. 11.8.2 IP partnership limitations
      3. 11.8.3 IP Partnership and data compression
      4. 11.8.4 VLAN support
      5. 11.8.5 IP partnership and terminology
      6. 11.8.6 States of IP partnership
      7. 11.8.7 Remote copy groups
      8. 11.8.8 Supported configurations
    9. 11.9 Managing Remote Copy by using the GUI
      1. 11.9.1 Creating Fibre Channel partnership
      2. 11.9.2 Creating remote copy relationships
      3. 11.9.3 Creating Consistency Group
      4. 11.9.4 Renaming remote copy relationships
      5. 11.9.5 Renaming a remote copy consistency group
      6. 11.9.6 Moving stand-alone remote copy relationships to Consistency Group
      7. 11.9.7 Removing remote copy relationships from Consistency Group
      8. 11.9.8 Starting remote copy relationships
      9. 11.9.9 Starting a remote copy Consistency Group
      10. 11.9.10 Switching a relationship copy direction
      11. 11.9.11 Switching a Consistency Group direction
      12. 11.9.12 Stopping remote copy relationships
      13. 11.9.13 Stopping a Consistency Group
      14. 11.9.14 Deleting remote copy relationships
      15. 11.9.15 Deleting a Consistency Group
      16. 11.9.16 Remote Copy memory allocation
    10. 11.10 Troubleshooting remote copy
      1. 11.10.1 1920 error
      2. 11.10.2 1720 error
  16. Chapter 12. Encryption
    1. 12.1 Planning for encryption
    2. 12.2 Defining encryption of data at-rest
      1. 12.2.1 Encryption methods
      2. 12.2.2 Encryption keys
      3. 12.2.3 Encryption licenses
    3. 12.3 Activating encryption
      1. 12.3.1 Obtaining an encryption license
      2. 12.3.2 Start activation process during initial system setup
      3. 12.3.3 Start activation process on a running system
      4. 12.3.4 Activate the license automatically
      5. 12.3.5 Activate the license manually
    4. 12.4 Enabling encryption
      1. 12.4.1 Starting the Enable Encryption wizard
      2. 12.4.2 Enabling encryption using USB flash drives
      3. 12.4.3 Enabling encryption using key servers
      4. 12.4.4 Enabling encryption using both providers
    5. 12.5 Configuring additional providers
      1. 12.5.1 Adding SKLM as a second provider
      2. 12.5.2 Adding USB flash drives as a second provider
    6. 12.6 Migrating between providers
      1. 12.6.1 Changing from USB flash drive provider to encryption key server
      2. 12.6.2 Changing from encryption key server to USB flash drive provider
    7. 12.7 Recovering from a provider loss
    8. 12.8 Using encryption
      1. 12.8.1 Encrypted pools
      2. 12.8.2 Encrypted child pools
      3. 12.8.3 Encrypted arrays
      4. 12.8.4 Encrypted MDisks
      5. 12.8.5 Encrypted volumes
      6. 12.8.6 Restrictions
    9. 12.9 Rekeying an encryption-enabled system
      1. 12.9.1 Rekeying using a key server
      2. 12.9.2 Rekeying using USB flash drives
    10. 12.10 Migrating between key providers
    11. 12.11 Disabling encryption
  17. Chapter 13. RAS, monitoring, and troubleshooting
    1. 13.1 Reliability, availability, and serviceability
      1. 13.1.1 IBM SAN Volume Controller Node
      2. 13.1.2 Dense Drawer Enclosures LED
      3. 13.1.3 Adding a node to an SVC system
      4. 13.1.4 Removing a node from an SVC clustered system
      5. 13.1.5 Power
    2. 13.2 Shutting down IBM SAN Volume Controller
    3. 13.3 Configuration backup
      1. 13.3.1 Backup using the CLI
      2. 13.3.2 Saving the backup using the GUI
    4. 13.4 Software update
      1. 13.4.1 Precautions before the update
      2. 13.4.2 IBM Spectrum Virtualize update test utility
      3. 13.4.3 Update procedure to IBM Spectrum Virtualize V8.1
      4. 13.4.4 Updating Spectrum Virtualize with a Hot Spare Node
      5. 13.4.5 Updating IBM SAN Volume Controller internal drives code
      6. 13.4.6 Updating the IBM SAN Volume Controller system manually
    5. 13.5 Health Checker feature
    6. 13.6 Troubleshooting and fix procedures
      1. 13.6.1 Managing event log
      2. 13.6.2 Running a fix procedure
      3. 13.6.3 Resolve alerts in a timely manner
      4. 13.6.4 Event log details
    7. 13.7 Monitoring
      1. 13.7.1 Email notifications and the Call Home function
      2. 13.7.2 Disabling and enabling notifications
      3. 13.7.3 Remote Support Assistance
      4. 13.7.4 SNMP Configuration
      5. 13.7.5 Syslog notifications
    8. 13.8 Audit log
    9. 13.9 Collecting support information using the GUI and the CLI
      1. 13.9.1 Collecting information using the GUI
      2. 13.9.2 Collecting logs using the CLI
      3. 13.9.3 Uploading files to the Support Center
    10. 13.10 Service Assistant Tool
  18. Appendix A. Performance data and statistics gathering
    1. SAN Volume Controller performance overview
    2. Performance monitoring
  19. Appendix B. CLI setup
    1. CLI setup
  20. Appendix C. Terminology
    1. Commonly encountered terms
  21. Related publications
    1. IBM Redbooks
    2. Other resources
    3. Referenced websites
    4. Help from IBM
  22. Back cover