If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.
If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure.
If you used flash media to store sensitive data, it is important to destroy the media. If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion. If a legal action is brought against you as a result of your submission, there are organisations that may help you.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.
We specialise in strategic global publishing and large archives. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors.
You can only access this submissions system through Tor. See our Tor tab for more information. We also advise you to read our tips for sources before submitting. If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed. The Saturday Paper - Australia. Click to send permalink to address bar, or right-click to to copy permalink.
How to contact WikiLeaks? What is Tor? Tips for Sources After Submitting. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.
What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Do not talk about your submission to others If you have any issues talk to WikiLeaks. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you.
Submit documents to WikiLeaks. Shop Donate Submit. Leaks News About Partners. The NAS Code upgrade will do the installation to the proper location. The installation will be skipped if the tool is already installed and running on the Control Station.
This tool when installed, will automatically collect logs and handle Data Mover panic dumps. By default it is not configured to transmit this information to EMC, but will create log files on the Control Station. It can be configured to ftp these logs to EMC, consult the user documentation, for instructions on setting this up.
If you wish to uninstall the autolog collector after it has been installed do the following: This tool will monitor changes to the backend Fibre Channel configuration, and log changes discovered. This tool can be configured to monitor Fibre Switch Changes, but is not configured to do so by default. If you wish to uninstall the connection monitor after it has been installed do the following: Click Clear All to re-enable this selection box.
All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. Task List Acquire the latest version of the script and it User Guide Read and understand this Users Documentation Install the script to the Control Station Run the script before the upgrade Analyze the pre-upgrade log data Collect log for transfer with CCA request or transfer to Celerra Support for Assistance Run the script post upgrade Analyze the post upgrade log data File clean up Acquire the latest version of the script and it User Guide Always check that the latest version of the script is what you will be testing with.
The upgrd-ck Script and support document are bundled with the Celerra Procedure Generator. Download and install the latest Celerra Procedure Generator with default settings.
Installing the script on the Control Station. If you wish to uninstall the autolog collector after it has been installed do the following:. If you wish to uninstall the connection monitor after it has been installed do the following:. Starting removing files Run the script before the upgrade The script should be run just prior to the NAS code upgrade and then again the upgrade has completed. It can also be run as a quick health check of the Celerra. To run the script before the code upgrade:.
There are many other switch combinations which can be used, these are explained in Appendix 4 of this document. Please check emc for further instructions.
Enter the number which corresponds to the version of NAS code you are upgrading to. Then the test will continue. Installing 5. Repeat, as appropriate, with other DAEs. You must have Powerlink access to view the video. Locate one pair of cables for each DAE as shown in Figure The second DAE is connected to Port 0. Additional DAEs can be added to each loop. Each BE loop can support up to 10 DAEs or disks, subject to the maximum number of disks for the system.
Your system may differ. The steps to follow are the same, no matter what kinds of DAEs you have in your system. The cable ends to the LCC are marked with single circles on the cable connectors as shown in Figure 21 on page Ensure that the cables lock into place. The cables and ports are not colored. Bus 0 is identified with orange labels.
Bus 1 uses blue labels. See Figure 21 on page The DAE power cables are also conveniently color-coded. Once they are connected, the DAEs will begin to power up. Connect a management station You must connect a management station to your system directly or remotely over a subnetwork. This computer will be used to set up your system and must be on the same subnet as the storage system to complete the initialization. If there is, disable it Windows Services and rerun the Initialization tool.
The document is available under VNX Management. Initialize your storage system Download the latest version of the VNX installation utilities from the Support website. The sequence for the installation and information about the utilities used is described below. Note: If your host is behind a firewall, open UDP port outgoing and port incoming.
These ports are used by the initialization utility. If these ports are not opened, the initialization utility will not function properly. Double-click the downloaded executable and follow the steps in the wizard to install the utility. Click Done. The initialization utility opens. Follow the online instructions to discover and assign IP addresses to your storage system. Update the storage system software and register your system The storage system comes pre-installed with the latest version of VNX Operating Environment OE software available at the time of shipment.
The Unisphere Service Manager USM is a collection of tools that helps you update, install, register, and maintain your system hardware and software. Downloading USM documentation 1. Select appropriate settings for your configuration to generate a customized procedure. Downloading Unisphere Service Manager 1. Download Unisphere Service Manager.
Save the executable to your management station. Unisphere Service Manager opens. Click Login. Connect to your system by entering the host name or IP address and click Connect. Rebooting SPB after the installation is complete is expected to add a difference of greater than 40 minutes seconds , but less than several hours to the runtime of SPA and SPB.
You are performing a single Storage Processor reboot as part of the VNX installation where Storage processor run time is expected to be less than several hours. Figure 2 Storage Hardware Display 3. Figure 3 Storage Processor Dropdown Menu 6.
Figure 4 Reboot Warning 8. Note: A Storage processor reboot can take 20 minutes to complete. Figure 5 Dropdown Menu How to Determine Storage Processor Uptime Figure 7 Storage Processor Dropdown Menu Select Yes. Figure 9 Storage Processor Dropdown Menu This task is optional. If an updated version is available, then run the Install Software wizard to install the update. Registering your system for service with your service provider 1.
Follow the steps in the wizard to complete the registration process. Check system health You can run a quick and real-time check on the connectivity, management, and storage component status of your VNX system. The health check checks network connectivity, management service status, Storage Processor status, Hot Spare status, disk faults, disk status, whether VNX OE for Block has been committed, and hardware component faults. Select Health Check. Log out of USM and close it.
Check system events Log in to Unisphere to confirm the health of your system, checking the system alerts, event logs, and statistics. Use the sysadmin credentials to log in to Unisphere. You may be prompted by certificate-related warnings. Accept all certificates as "Always Trust". There are multiple implementations for ESRS. If you already have an IP Client, this system can be added to it.
Select the appropriate options for your configuration. Follow the instructions for the ESRS implementation you choose. Launch Unisphere and select your system. Select Storage. For more information on these tasks, follow the instructions in the Unisphere online help. SPS viii. Demonstrate modification of the internal network IP addresses 1.
FailSafe Networking ii. EtherChannel iii. LACP trunking. Interpret Design Workbook Correctly set the failover mode for the datamovers Create and export a filesystem i. Set the export permissions correctly for the following 1.
Read only to select hosts 3. Interpret Design Workbook b. Configure the network interfaces for iSCSI i. Discuss best practices for setting up the interfaces d. Attach the Windows server and correctly format the LUN per best practices f.
Demonstrate creating and accessing a snapshot. Interpret Design Workbook. Configure the network interfaces for iSCSId. Disk Volumes b. Slice Volumes c. MetaVolumes d. Stripe Volumes e. User defined pools 8 Know where to go if you have a problem a. Escalation procedure b.
0コメント