O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.1

Book Description

Abstract

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution powered by IBM Spectrum™ Virtualize. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price.

The IBM Storwize V7000 solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion.

This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 and IBM Spectrum Virtualize™ V8.1 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture of the Storwize V7000, how to implement it, and how to take advantage of its industry-leading functions and features.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Summary of changes
    1. February 2018, Seventh Edition
  5. Chapter 1. Introduction to storage virtualization
    1. 1.1 Storage virtualization terminology
    2. 1.2 Requirements driving storage virtualization
      1. 1.2.1 Benefits of using IBM Spectrum Virtualize
    3. 1.3 Latest changes and enhancements
      1. 1.3.1 IBM Storwize V7000 Gen2+
      2. 1.3.2 IBM Spectrum Virtualize Software changes and enhancements
    4. 1.4 Summary
  6. Chapter 2. System overview
    1. 2.1 IBM Spectrum Virtualize
    2. 2.2 Storage virtualization
    3. 2.3 IBM Storwize V7000 overview
      1. 2.3.1 IBM Storwize V7000 models
      2. 2.3.2 IBM Storage Utility Offerings
      3. 2.3.3 IBM Storwize V7000 functions
      4. 2.3.4 IBM Storwize V7000 licensing
    4. 2.4 IBM Storwize V7000 hardware
    5. 2.5 IBM Storwize V7000 components
      1. 2.5.1 Hosts
      2. 2.5.2 Host cluster
      3. 2.5.3 Nodes or canisters
      4. 2.5.4 I/O groups
      5. 2.5.5 Cache
      6. 2.5.6 Clustered system
      7. 2.5.7 HyperSwap
      8. 2.5.8 Dense expansion drawers
      9. 2.5.9 Expansion Enclosures
      10. 2.5.10 RAID
      11. 2.5.11 Read Intensive Flash Drives
      12. 2.5.12 Managed disks
      13. 2.5.13 Quorum disks
      14. 2.5.14 IP Quorum
      15. 2.5.15 Storage pool
      16. 2.5.16 Volumes
      17. 2.5.17 Easy Tier
      18. 2.5.18 Encryption
      19. 2.5.19 iSCSI
      20. 2.5.20 Real-time Compression
      21. 2.5.21 IP replication
      22. 2.5.22 IBM Storwize V7000 copy services
      23. 2.5.23 Synchronous or asynchronous remote copy
      24. 2.5.24 FlashCopy and Transparent Cloud Tiering
    6. 2.6 Business continuity
      1. 2.6.1 Business Continuity with HyperSwap
    7. 2.7 Management and support tools
      1. 2.7.1 IBM Assist On-site and Remote Support Assistance
      2. 2.7.2 Event notifications
      3. 2.7.3 Simple Network Management Protocol traps
      4. 2.7.4 Syslog messages
      5. 2.7.5 Call Home email
    8. 2.8 Useful IBM Storwize V7000 websites
  7. Chapter 3. Planning
    1. 3.1 General planning rules
      1. 3.1.1 Basic planning flow
    2. 3.2 Planning for availability
    3. 3.3 Connectivity planning
    4. 3.4 Physical planning
      1. 3.4.1 Cabling
    5. 3.5 Planning IP connectivity
      1. 3.5.1 Firewall planning
    6. 3.6 SAN configuration planning
      1. 3.6.1 Physical topology
      2. 3.6.2 Zoning
      3. 3.6.3 Storwize V7000 cluster system zone
      4. 3.6.4 Back-end storage zones
      5. 3.6.5 Host zones
      6. 3.6.6 Zoning considerations for Metro Mirror and Global Mirror
      7. 3.6.7 Port designation recommendations
      8. 3.6.8 Port masking
    7. 3.7 iSCSI configuration planning
      1. 3.7.1 iSCSI protocol
      2. 3.7.2 Topology and IP addressing
      3. 3.7.3 General recommendation
      4. 3.7.4 iSCSI back-end storage attachment
    8. 3.8 Back-end storage subsystem configuration
    9. 3.9 Internal storage configuration
    10. 3.10 Storage pool configuration
      1. 3.10.1 The storage pool and Storwize V7000 cache relationship
    11. 3.11 Volume configuration
      1. 3.11.1 Planning for image mode volumes
      2. 3.11.2 Planning for thin-provisioned volumes
    12. 3.12 Host attachment planning
      1. 3.12.1 Queue depth
      2. 3.12.2 Offloaded data transfer
    13. 3.13 Host mapping and LUN masking
      1. 3.13.1 Planning for large deployments
    14. 3.14 NPIV planning
    15. 3.15 Advanced Copy Services
      1. 3.15.1 FlashCopy guidelines
      2. 3.15.2 Combining FlashCopy and Metro Mirror or Global Mirror
      3. 3.15.3 Planning for Metro Mirror and Global Mirror
    16. 3.16 SAN boot support
    17. 3.17 Data migration from a non-virtualized storage subsystem
    18. 3.18 Storwize V7000 configuration backup procedure
    19. 3.19 Performance considerations
      1. 3.19.1 SAN
      2. 3.19.2 Back-end storage subsystems
      3. 3.19.3 Storwize V7000
      4. 3.19.4 IBM Real-time Compression
      5. 3.19.5 Performance monitoring
  8. Chapter 4. Initial configuration
    1. 4.1 Prerequisites
    2. 4.2 System initialization
      1. 4.2.1 System initialization wizard
    3. 4.3 System setup
      1. 4.3.1 System setup wizard
      2. 4.3.2 Adding a control enclosure
      3. 4.3.3 Adding an expansion enclosure
    4. 4.4 Configuring user authentication
      1. 4.4.1 Default superuser account
      2. 4.4.2 Local authentication
      3. 4.4.3 Remote authentication
      4. 4.4.4 User groups and roles
    5. 4.5 Configuring secure communications
      1. 4.5.1 Configuring a signed certificate
      2. 4.5.2 Generating a self-signed certificate
    6. 4.6 Configuring local Fibre Channel port masking
      1. 4.6.1 Planning for local port masking
      2. 4.6.2 Setting the local port mask
      3. 4.6.3 Viewing the local port mask
  9. Chapter 5. Graphical user interface
    1. 5.1 Normal operations using the GUI
      1. 5.1.1 Access to GUI
    2. 5.2 Introduction to the GUI
      1. 5.2.1 Task menu
      2. 5.2.2 Suggested tasks
      3. 5.2.3 Notification icons and help
    3. 5.3 Overview window
      1. 5.3.1 Content-based organization
    4. 5.4 Monitoring menu
      1. 5.4.1 System overview
      2. 5.4.2 Events
      3. 5.4.3 Performance
      4. 5.4.4 Background tasks
    5. 5.5 Pools
    6. 5.6 Volumes
    7. 5.7 Hosts
    8. 5.8 Copy Services
    9. 5.9 Access
      1. 5.9.1 Users
      2. 5.9.2 Audit log
    10. 5.10 Settings
      1. 5.10.1 Notifications menu
      2. 5.10.2 Network
      3. 5.10.3 System menu
      4. 5.10.4 Support menu
      5. 5.10.5 Setting GUI preferences
    11. 5.11 Additional frequent tasks in GUI
      1. 5.11.1 Renaming components
      2. 5.11.2 Working with enclosures
  10. Chapter 6. Storage pools
    1. 6.1 Working with storage pools
      1. 6.1.1 Creating storage pools
      2. 6.1.2 Actions on storage pools
      3. 6.1.3 Child storage pools
      4. 6.1.4 Encrypted storage pools
    2. 6.2 Working with managed disks
      1. 6.2.1 Assigning managed disks to storage pools
      2. 6.2.2 Traditional and distributed RAID
      3. 6.2.3 Actions on arrays
      4. 6.2.4 Actions on external MDisks
    3. 6.3 Working with internal drives
      1. 6.3.1 Actions on internal drives
    4. 6.4 Working with external storage controllers
      1. 6.4.1 Fibre Channel external storage controllers
      2. 6.4.2 iSCSI external storage controllers
      3. 6.4.3 Actions on external storage controllers
  11. Chapter 7. Volumes
    1. 7.1 Introduction to volumes
      1. 7.1.1 Image mode volumes
      2. 7.1.2 Managed mode volumes
      3. 7.1.3 Cache mode for volumes
      4. 7.1.4 Mirrored volumes
      5. 7.1.5 Thin-provisioned volumes
      6. 7.1.6 Compressed volumes
      7. 7.1.7 Volumes for various topologies
    2. 7.2 Create Volumes menu
    3. 7.3 Creating volumes
      1. 7.3.1 Creating Basic volumes
      2. 7.3.2 Creating Mirrored volumes
    4. 7.4 Mapping a volume to the host
    5. 7.5 Creating Custom volumes
      1. 7.5.1 Creating a custom thin-provisioned volume
      2. 7.5.2 Creating Custom Compressed volumes
      3. 7.5.3 Custom Mirrored Volumes
    6. 7.6 HyperSwap and the mkvolume command
      1. 7.6.1 Volume manipulation commands
    7. 7.7 Mapping Volumes to Host after volume creation
      1. 7.7.1 Mapping newly created volumes to the host using the wizard
    8. 7.8 Migrating a volume to another storage pool
    9. 7.9 Migrating volumes using the volume copy feature
    10. 7.10 Volume operations using the CLI
      1. 7.10.1 Creating a volume
      2. 7.10.2 Volume information
      3. 7.10.3 Creating a thin-provisioned volume
      4. 7.10.4 Creating a volume in image mode
      5. 7.10.5 Adding a mirrored volume copy
      6. 7.10.6 Adding a compressed volume copy
      7. 7.10.7 Splitting a mirrored volume
      8. 7.10.8 Modifying a volume
      9. 7.10.9 Deleting a volume
      10. 7.10.10 Using volume protection
      11. 7.10.11 Expanding a volume
      12. 7.10.12 Assigning a volume to a host
      13. 7.10.13 Showing volume to host mappings
      14. 7.10.14 Deleting a volume to host mapping
      15. 7.10.15 Migrating a volume
      16. 7.10.16 Migrating a fully managed volume to an image mode volume
      17. 7.10.17 Shrinking a volume
      18. 7.10.18 Showing a volume on an MDisk
      19. 7.10.19 Showing which volumes are using a storage pool
      20. 7.10.20 Showing which MDisks are used by a specific volume
      21. 7.10.21 Showing from which storage pool a volume has its extents
      22. 7.10.22 Showing the host to which the volume is mapped
      23. 7.10.23 Showing the volume to which the host is mapped
      24. 7.10.24 Tracing a volume from a host back to its physical disk
    11. 7.11 I/O throttling
      1. 7.11.1 Define a volume throttle
      2. 7.11.2 View existing volume throttles
      3. 7.11.3 Remove a volume throttle
  12. Chapter 8. Hosts
    1. 8.1 Host attachment overview
    2. 8.2 Host clusters
    3. 8.3 N-Port Virtualization ID support
      1. 8.3.1 NPIV prerequisites
      2. 8.3.2 Enabling NPIV on a new system
      3. 8.3.3 Enabling NPIV on an existing system
    4. 8.4 Hosts operations using the GUI
      1. 8.4.1 Creating hosts
      2. 8.4.2 Host clusters
      3. 8.4.3 Advanced host administration
      4. 8.4.4 Adding and deleting host ports
      5. 8.4.5 Host mappings overview
    5. 8.5 Hosts operations using CLI
      1. 8.5.1 Create a host by using CLI
      2. 8.5.2 Advanced host administration by using the CLI
      3. 8.5.3 Adding and deleting a host port by using the CLI
      4. 8.5.4 Host Cluster Operations
  13. Chapter 9. Storage migration
    1. 9.1 Storage migration overview
      1. 9.1.1 Interoperability and compatibility
      2. 9.1.2 Prerequisites
    2. 9.2 Storage migration wizard
  14. Chapter 10. Advanced features for storage efficiency
    1. 10.1 Introduction
    2. 10.2 EasyTier
      1. 10.2.1 EasyTier concepts
      2. 10.2.2 Flash drive arrays and flash MDisks
      3. 10.2.3 Disk tiers
      4. 10.2.4 Read Intensive Flash drives and EasyTier
      5. 10.2.5 EasyTier process
      6. 10.2.6 EasyTier operating modes
      7. 10.2.7 Implementation considerations
      8. 10.2.8 Modifying the EasyTier setting
      9. 10.2.9 Monitoring tools
      10. 10.2.10 More information
    3. 10.3 Thin provisioning
      1. 10.3.1 Configuring a thin-provisioned volume
      2. 10.3.2 Performance considerations
      3. 10.3.3 Limitations of virtual capacity
    4. 10.4 Unmap
      1. 10.4.1 SCSI unmap command
    5. 10.5 Real-time Compression
      1. 10.5.1 Common use cases
      2. 10.5.2 Real-time Compression concepts
      3. 10.5.3 Random Access Compression Engine
      4. 10.5.4 Dual RACE instances
      5. 10.5.5 Random Access Compression Engine in IBM Spectrum Virtualize stack
      6. 10.5.6 Data write flow
      7. 10.5.7 Data read flow
      8. 10.5.8 Compression of existing data
      9. 10.5.9 Configuring compressed volumes
      10. 10.5.10 Comprestimator
  15. Chapter 11. Advanced Copy Services
    1. 11.1 IBM FlashCopy
      1. 11.1.1 Business requirements for FlashCopy
      2. 11.1.2 FlashCopy principles and terminology
      3. 11.1.3 FlashCopy Mapping
      4. 11.1.4 Consistency Groups
      5. 11.1.5 Crash consistent copy and hosts considerations
      6. 11.1.6 Grains and bitmap - I/O indirection
      7. 11.1.7 Interaction with the cache
      8. 11.1.8 Background Copy Rate
      9. 11.1.9 Incremental FlashCopy
      10. 11.1.10 Starting FlashCopy mappings and Consistency Groups
      11. 11.1.11 Multiple target FlashCopy
      12. 11.1.12 Reverse FlashCopy
      13. 11.1.13 FlashCopy and image mode Volumes
      14. 11.1.14 FlashCopy mapping events
      15. 11.1.15 Thin provisioned FlashCopy
      16. 11.1.16 Serialization of I/O by FlashCopy
      17. 11.1.17 Event handling
      18. 11.1.18 Asynchronous notifications
      19. 11.1.19 Interoperation with Metro Mirror and Global Mirror
      20. 11.1.20 FlashCopy attributes and limitations
    2. 11.2 Managing FlashCopy by using the GUI
      1. 11.2.1 FlashCopy presets
      2. 11.2.2 FlashCopy window
      3. 11.2.3 Creating a FlashCopy mapping
      4. 11.2.4 Single-click snapshot
      5. 11.2.5 Single-click clone
      6. 11.2.6 Single-click backup
      7. 11.2.7 Creating a FlashCopy Consistency Group
      8. 11.2.8 Creating FlashCopy mappings in a Consistency Group
      9. 11.2.9 Showing related Volumes
      10. 11.2.10 Moving FlashCopy mappings across Consistency Groups
      11. 11.2.11 Removing FlashCopy mappings from Consistency Groups
      12. 11.2.12 Modifying a FlashCopy mapping
      13. 11.2.13 Renaming FlashCopy mappings
      14. 11.2.14 Renaming a Consistency Group
      15. 11.2.15 Deleting FlashCopy mappings
      16. 11.2.16 Deleting a FlashCopy Consistency Group
      17. 11.2.17 Starting FlashCopy mappings
      18. 11.2.18 Stopping FlashCopy mappings
      19. 11.2.19 Memory allocation for FlashCopy
    3. 11.3 Transparent Cloud Tiering
      1. 11.3.1 Considerations for using Transparent Cloud Tiering
      2. 11.3.2 Transparent Cloud Tiering as backup solution and data migration
      3. 11.3.3 Restore using Transparent Cloud Tiering
      4. 11.3.4 Transparent Cloud Tiering restrictions
    4. 11.4 Implementing Transparent Cloud Tiering
      1. 11.4.1 DNS Configuration
      2. 11.4.2 Enabling Transparent Cloud Tiering
      3. 11.4.3 Creating cloud snapshots
      4. 11.4.4 Managing cloud snapshots
      5. 11.4.5 Restoring cloud snapshots
    5. 11.5 Volume mirroring and migration options
    6. 11.6 Remote Copy
      1. 11.6.1 IBM SAN Volume Controller and Storwize System Layers
      2. 11.6.2 Multiple IBM Spectrum Virtualize systems replication
      3. 11.6.3 Importance of write ordering
      4. 11.6.4 Remote copy intercluster communication
      5. 11.6.5 Metro Mirror overview
      6. 11.6.6 Synchronous remote copy
      7. 11.6.7 Metro Mirror features
      8. 11.6.8 Metro Mirror attributes
      9. 11.6.9 Practical use of Metro Mirror
      10. 11.6.10 Global Mirror overview
      11. 11.6.11 Asynchronous remote copy
      12. 11.6.12 Global Mirror features
      13. 11.6.13 Using Change Volumes with Global Mirror
      14. 11.6.14 Distribution of work among nodes
      15. 11.6.15 Background copy performance
      16. 11.6.16 Thin-provisioned background copy
      17. 11.6.17 Methods of synchronization
      18. 11.6.18 Practical use of Global Mirror
      19. 11.6.19 Spectrum Virtualize HyperSwap topology
      20. 11.6.20 Consistency Protection for GM/MM
      21. 11.6.21 Valid combinations of FlashCopy, Metro Mirror, and Global Mirror
      22. 11.6.22 Remote Copy configuration limits
      23. 11.6.23 Remote Copy states and events
    7. 11.7 Remote Copy commands
      1. 11.7.1 Remote Copy process
      2. 11.7.2 Listing available system partners
      3. 11.7.3 Changing the system parameters
      4. 11.7.4 System partnership
      5. 11.7.5 Creating a Metro Mirror/Global Mirror consistency group
      6. 11.7.6 Creating a Metro Mirror/Global Mirror relationship
      7. 11.7.7 Changing Metro Mirror/Global Mirror relationship
      8. 11.7.8 Changing Metro Mirror/Global Mirror consistency group
      9. 11.7.9 Starting Metro Mirror/Global Mirror relationship
      10. 11.7.10 Stopping Metro Mirror/Global Mirror relationship
      11. 11.7.11 Starting Metro Mirror/Global Mirror consistency group
      12. 11.7.12 Stopping Metro Mirror/Global Mirror consistency group
      13. 11.7.13 Deleting Metro Mirror/Global Mirror relationship
      14. 11.7.14 Deleting Metro Mirror/Global Mirror consistency group
      15. 11.7.15 Reversing Metro Mirror/Global Mirror relationship
      16. 11.7.16 Reversing Metro Mirror/Global Mirror consistency group
    8. 11.8 Native IP replication
      1. 11.8.1 Native IP replication technology
      2. 11.8.2 IP partnership limitations
      3. 11.8.3 IP Partnership and Data compression
      4. 11.8.4 VLAN support
      5. 11.8.5 IP partnership and terminology
      6. 11.8.6 States of IP partnership
      7. 11.8.7 Remote copy groups
      8. 11.8.8 Supported configurations
    9. 11.9 Managing Remote Copy by using the GUI
      1. 11.9.1 Creating Fibre Channel partnership
      2. 11.9.2 Creating remote copy relationships
      3. 11.9.3 Creating Consistency Group
      4. 11.9.4 Renaming remote copy relationships
      5. 11.9.5 Renaming a remote copy consistency group
      6. 11.9.6 Moving stand-alone remote copy relationships to Consistency Group
      7. 11.9.7 Removing remote copy relationships from Consistency Group
      8. 11.9.8 Starting remote copy relationships
      9. 11.9.9 Starting a remote copy Consistency Group
      10. 11.9.10 Switching a relationship copy direction
      11. 11.9.11 Switching a Consistency Group direction
      12. 11.9.12 Stopping remote copy relationships
      13. 11.9.13 Stopping a Consistency Group
      14. 11.9.14 Deleting remote copy relationships
      15. 11.9.15 Deleting a Consistency Group
    10. 11.10 Remote Copy memory allocation
    11. 11.11 Troubleshooting remote copy
      1. 11.11.1 1920 error
      2. 11.11.2 1720 error
  16. Chapter 12. Encryption
    1. 12.1 Planning for encryption
    2. 12.2 Defining encryption of data at-rest
      1. 12.2.1 Encryption methods
      2. 12.2.2 Encryption keys
      3. 12.2.3 Encryption licenses
    3. 12.3 Activating encryption
      1. 12.3.1 Obtaining an encryption license
      2. 12.3.2 Start activation process during initial system setup
      3. 12.3.3 Start activation process on a running system
      4. 12.3.4 Activate the license automatically
      5. 12.3.5 Activate the license manually
    4. 12.4 Enabling encryption
      1. 12.4.1 Starting the Enable Encryption wizard
      2. 12.4.2 Enabling encryption using USB flash drives
      3. 12.4.3 Enabling encryption using key servers
      4. 12.4.4 Enabling encryption using both providers
    5. 12.5 Configuring additional providers
      1. 12.5.1 Adding SKLM as a second provider
      2. 12.5.2 Adding USB flash drives as a second provider
    6. 12.6 Migrating between providers
      1. 12.6.1 Changing from USB flash drive provider to encryption key server
      2. 12.6.2 Changing from encryption key server to USB flash drive provider
    7. 12.7 Recovering from a provider loss
    8. 12.8 Using encryption
      1. 12.8.1 Encrypted pools
      2. 12.8.2 Encrypted child pools
      3. 12.8.3 Encrypted arrays
      4. 12.8.4 Encrypted MDisks
      5. 12.8.5 Encrypted volumes
      6. 12.8.6 Restrictions
    9. 12.9 Rekeying an encryption-enabled system
      1. 12.9.1 Rekeying using a key server
      2. 12.9.2 Rekeying using USB flash drives
    10. 12.10 Migrating between key providers
    11. 12.11 Disabling encryption
  17. Chapter 13. RAS, monitoring, and troubleshooting
    1. 13.1 Reliability, availability, and serviceability
      1. 13.1.1 Node canisters
      2. 13.1.2 Expansion canisters
      3. 13.1.3 Dense Drawer Enclosures LED
      4. 13.1.4 Enclosure SAS cabling
      5. 13.1.5 Power
    2. 13.2 Shutting down IBM Storwize V7000
      1. 13.2.1 Shutting down a node canister
      2. 13.2.2 Shutting down a system
      3. 13.2.3 Shutting down and powering on a complete infrastructure
    3. 13.3 Configuration backup
      1. 13.3.1 Backup using CLI
      2. 13.3.2 Saving the backup using the GUI
    4. 13.4 Software update
      1. 13.4.1 Precautions before the update
      2. 13.4.2 IBM Storwize V7000 update test utility
      3. 13.4.3 Updating your Storwize V7000 to V8.1
      4. 13.4.4 Updating IBM Storwize V7000 drive code
      5. 13.4.5 Manually updating the Storwize V7000
    5. 13.5 Health Checker feature
    6. 13.6 Troubleshooting and fix procedures
      1. 13.6.1 Managing event log
      2. 13.6.2 Running a fix procedure
      3. 13.6.3 Event log details
    7. 13.7 Monitoring
      1. 13.7.1 Email notifications and the Call Home function
      2. 13.7.2 Remote Support Assistance
      3. 13.7.3 SNMP configuration
      4. 13.7.4 Syslog notifications
    8. 13.8 Audit log
    9. 13.9 Collecting support information using the GUI and the CLI
      1. 13.9.1 Collecting information using the GUI
      2. 13.9.2 Collecting logs using the CLI
      3. 13.9.3 Uploading files to the Support Center
    10. 13.10 Service Assistant Tool
  18. Appendix A. Performance data and statistics gathering
    1. Storwize V7000 performance overview
    2. Performance monitoring
  19. Appendix B. CLI setup
    1. CLI setup
  20. Appendix C. Terminology
    1. Commonly encountered terms
  21. Related publications
    1. IBM Redbooks
    2. Other resources
    3. Referenced websites
    4. Help from IBM
  22. Back cover