{"id":346939,"date":"2024-10-20T00:23:37","date_gmt":"2024-10-20T00:23:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-24775-22014\/"},"modified":"2024-10-25T23:52:04","modified_gmt":"2024-10-25T23:52:04","slug":"bs-iso-iec-24775-22014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-24775-22014\/","title":{"rendered":"BS ISO\/IEC 24775-2:2014"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 2 Normative references <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 3 Terms, definitions, symbols, abbreviations, and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 3.3 Keywords <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 3.4 Conventions <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4 Typographical Conventions 4.1 Maturity Model 4.2 Experimental Maturity Level 4.3 Implemented Maturity Level Figures Figure 1 \u2013 Experimental Maturity Level Tag <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4.4 Stable Maturity Level 4.5 Finalized Maturity Level 4.6 Deprecated Material Figure 2 \u2013 Implemented Maturity Level Tag Figure 3 \u2013 Stable Maturity Level Tag <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Figure 4 \u2013 Deprecated Tag <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5 Transport and reference model 5.1 Introduction to transport and reference model 5.1.1 Overview 5.1.2 Language requirements 5.1.3 Communications requirements 5.1.4 XML Message Syntax and Semantics 5.2 Transport Stack <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Figure 5 \u2013 Transport Stack <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.3 Reference model 5.3.1 Overview 5.3.2 Roles for Interface Constituents Figure 6 \u2013 Reference Model <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.3.3 Cascaded Agents <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 6 Health and Fault Management 6.1 Objectives 6.2 Overview 6.3 General concepts <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 6.4 Description of Health and Fault Management 6.4.1 General 6.4.2 Operational Status and Health State (Polling) Figure 7 \u2013 Basic Fault Detection Tables Table 1 \u2013 OperationalStatus for Disk Drive <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 6.4.3 Standard Errors and Events 6.4.4 Error and Alert indications 6.4.5 Indications 6.4.6 Event Correlation and Fault Containment <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Figure 8 \u2013 Health lifecycle <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 6.4.7 Fault regions Figure 9 \u2013 Continuum <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Figure 10 \u2013 Application Fault Region <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 6.4.8 Examples Figure 11 \u2013 Array Instance <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | Figure 12 \u2013 Switch Example <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7 Object Model General Information 7.1 Model overview (Key resources) 7.1.1 Overview 7.1.2 Introduction to CIM UML notation Figure 13 \u2013 Lines that Connect Classes <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7.2 Techniques 7.2.1 CIM fundamentals <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.2.2 Modeling profiles 7.2.3 CIM Naming <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 8 Correlatable and durable names 8.1 Overview <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 8.2 Guidelines for SCSI Logical Unit Names 8.3 Guidelines for FC-SB-2 device names <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 8.4 Guidelines for port names 8.5 Guidelines for storage system names <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 8.6 Standard formats for correlatable names 8.6.1 General 8.6.2 Standard formats for Logical Unit names Table 2 \u2013 Standard formats for StorageVolume names <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 8.6.3 Standard formats for port names 8.6.4 Standard formats for fabric names 8.6.5 Standard formats for storage system names Table 3 \u2013 Standard formats for port names <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Table 4 \u2013 Standard formats for storage system names <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 8.6.6 Operating system device names <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Table 5 \u2013 Standard operating system names for tape devices Table 6 \u2013 LogicalDisk.Name for disk partitions Table 7 \u2013 GenericDiskParittion.Name for disk partitions <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 8.6.7 Case sensitivity 8.7 Testing equality of correlatable names 8.8 iSCSI names Table 8 \u2013 Standard operating system names for unpartitioned disks <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Figure 14 \u2013 iSCSI Qualified Names (iqn) examples Figure 15 \u2013 iSCSI EUI Name example Figure 16 \u2013 iSCSI 64-bit NAA Name example Figure 17 \u2013 iSCSI 128-bit NAA Name example <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 9 Standard Messages 9.1 Overview 9.2 Required characteristics of Standard Messages 9.2.1 Declaring and producing Standard Messages <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Table 9 \u2013 Example Standard Message Declaration <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 9.3 Message registry 9.3.1 Common Element Messages Table 10 \u2013 Example Standard Message Values Table 11 \u2013 Redundancy Message Arguments <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Table 12 \u2013 Redundancy Alert Information Table 13 \u2013 Environmental Message Arguments <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Table 14 \u2013 Environmental Alert Information Table 15 \u2013 FRU Operation Message Arguments Table 16 \u2013 FRU Operation Alert Information <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Table 17 \u2013 Password change Message Arguments Table 18 \u2013 Password change Alert Information Table 19 \u2013 User or Account Operation Message Arguments <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Table 20 \u2013 User or Account Operation Alert Information Table 21 \u2013 User Login Message Arguments Table 22 \u2013 User Login Alert Information <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Table 23 \u2013 Proxy Agent Device Communication Message Arguments Table 24 \u2013 Proxy Agent Device Communication Alert Information Table 25 \u2013 Port Status Changed Message Arguments <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Table 26 \u2013 Port Status Changed Alert Information Table 27 \u2013 Datacheck Error Message Arguments Table 28 \u2013 Datacheck Error Alert Information <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | Table 29 \u2013 User Login Failure Message Arguments Table 30 \u2013 User Login Failure Alert Information Table 31 \u2013 Drive not responding Message Arguments <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Table 32 \u2013 Drive not responding Alert Information Table 33 \u2013 Cooling Fan Failure Alert Information Table 34 \u2013 Power Supply Failure Alert Information <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Table 35 \u2013 Drive Power Consumption Alert Information Table 36 \u2013 Drive Voltage Alert Information Table 37 \u2013 Predictive Failure Alert Information <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 9.3.2 Common Protocol Messages Table 38 \u2013 Diagnostics Required Alert Information Table 39 \u2013 Authorization Failure Message Arguments Table 40 \u2013 Error Properties for Authorization Failure <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Table 41 \u2013 Operation Not Supported Message Arguments Table 42 \u2013 Property Not Found Message Arguments <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | Table 43 \u2013 Invalid Query Message Arguments Table 44 \u2013 Parameter Error Message Arguments Table 45 \u2013 Error Properties for Parameter Error <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Table 46 \u2013 Query Syntax Error Message Arguments Table 47 \u2013 Error Properties for Query Syntax Error Table 48 \u2013 Query Too Expensive Message Arguments Table 49 \u2013 Error Properties for Query Too Expensive <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Table 50 \u2013 Class or Property Invalid in Query Message Arguments Table 51 \u2013 Error Properties for Class or Property Invalid in Query Table 52 \u2013 Invalid Join in Query Message Arguments <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Table 53 \u2013 Error Properties for Invalid Join in Query Table 54 \u2013 Unexpected Hardware Fault Message Arguments Table 55 \u2013 Error Properties for Unexpected Hardware Fault Table 56 \u2013 Too busy to respond Message Arguments <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Table 57 \u2013 Shutdown Started Message Arguments Table 58 \u2013 Shutdown Started Alert Information Table 59 \u2013 Component overheat Message Arguments Table 60 \u2013 Error Properties for Component overheat <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Table 61 \u2013 Component overheat Alert Information Table 62 \u2013 Device Failover Message Arguments Table 63 \u2013 Functionality is not licensed Message Arguments Table 64 \u2013 Error Properties for Functionality is not licensed <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Table 65 \u2013 Invalid Property Combination during instance creation or modification Message Arguments Table 66 \u2013 Error Properties for Invalid Property Combination during instance creation or modification <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | Table 67 \u2013 Property Not Found Message Arguments Table 68 \u2013 Error Properties for Property Not Found Table 69 \u2013 Proxy Can Not Connect Message Arguments Table 70 \u2013 Error Properties for Proxy Can Not Connect <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 9.3.3 Storage Messages Table 71 \u2013 Not Enough Memory Message Arguments Table 72 \u2013 Error Properties for Not Enough Memory Table 73 \u2013 Error Properties for Object Already Exists <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Table 74 \u2013 Device Not ready Message Arguments Table 75 \u2013 Error Properties for Device Not ready Table 76 \u2013 Error Properties for Internal Bus Error <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Table 77 \u2013 Error Properties for DMA Overflow Table 78 \u2013 Error Properties for Firmware Logic Error Table 79 \u2013 Front End Port Error Message Arguments Table 80 \u2013 Front End Port Error Alert Information <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | Table 81 \u2013 Back End Port Error Message Arguments Table 82 \u2013 Back End Port Error Alert Information Table 83 \u2013 Remote Mirror Error Message Arguments Table 84 \u2013 Error Properties for Remote Mirror Error <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Table 85 \u2013 Remote Mirror Error Alert Information Table 86 \u2013 Error Properties for Cache Memory Error Table 87 \u2013 Error Properties for Unable to Access Remote Device <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Table 88 \u2013 Error Reading Data Alert Information Table 89 \u2013 Error Writing Data Alert Information Table 90 \u2013 Error Validating Write (CRC) Alert Information <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | Table 91 \u2013 Error Properties for Copy Operation Failed Table 92 \u2013 Error Properties for RAID Operation Failed Table 93 \u2013 Error Properties for Invalid RAID Type <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | Table 94 \u2013 Error Properties for Invalid Storage Element Type Table 95 \u2013 Error Properties for Configuration Change Failed Table 96 \u2013 Error Properties for Buffer Overrun <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Table 97 \u2013 Stolen Capacity Message Arguments Table 98 \u2013 Error Properties for Stolen Capacity Table 99 \u2013 Invalid Extent passed Message Arguments Table 100 \u2013 Error Properties for Invalid Extent passed <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | Table 101 \u2013 Error Properties for Invalid Deletion Attempted Table 102 \u2013 Error Properties for Job Failed to Start Table 103 \u2013 Job was Halted Message Arguments <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Table 104 \u2013 Invalid State Transition Message Arguments Table 105 \u2013 Error Properties for Invalid State Transition Table 106 \u2013 Invalid SAP for Method Message Arguments Table 107 \u2013 Error Properties for Invalid SAP for Method <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | Table 108 \u2013 Resource Not Available Message Arguments Table 109 \u2013 Error Properties for Resource Not Available Table 110 \u2013 Resource Limit Exceeded Message Arguments <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Table 111 \u2013 Error Properties for Resource Limit Exceeded Table 112 \u2013 Thin Provision Capacity Warning Message Arguments Table 113 \u2013 Thin Provision Capacity Warning Alert Information <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Table 114 \u2013 Thin Provision Capacity Critical Message Arguments Table 115 \u2013 Thin Provision Capacity Critical Alert Information Table 116 \u2013 Thin Provision Capacity Okay Message Arguments Table 117 \u2013 Thin Provision Capacity Okay Alert Information <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 9.3.4 Fabric Messages Table 118 \u2013 Masking Group Membership Changed Message Arguments Table 119 \u2013 Masking Group Membership Changed Alert Information Table 120 \u2013 Zone Database Changed Message Arguments <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | Table 121 \u2013 Zone Database Changed Alert Information Table 122 \u2013 ZoneSet Activated Message Arguments Table 123 \u2013 ZoneSet Activated Alert Information Table 124 \u2013 Error Properties for Session Locked <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Table 125 \u2013 Error Properties for Session Aborted Table 126 \u2013 Switch Status Changed Message Arguments Table 127 \u2013 Switch Status Changed Alert Information <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Table 128 \u2013 Fabric Merge\/Segmentation Message Arguments Table 129 \u2013 Fabric Merge\/Segmentation Alert Information Table 130 \u2013 Switch Added\/Removed Message Arguments <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Table 131 \u2013 Switch Added\/Removed Alert Information Table 132 \u2013 Fabric Added\/Removed Message Arguments Table 133 \u2013 Fabric Added\/Removed Alert Information Table 134 \u2013 Security Policy change Message Arguments <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 9.3.5 Host Messages Table 135 \u2013 Security Policy change Alert Information Table 136 \u2013 Required Firmware Version Message Arguments Table 137 \u2013 Required Firmware Version Alert Information <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | Table 138 \u2013 Rec om ended Firmware Version Message Arguments Table 139 \u2013 Rec om ended Firmware Version Alert Information Table 140 \u2013 Controller OK Message Arguments Table 141 \u2013 Controller OK Alert Information Table 142 \u2013 Controller not OK Message Arguments <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 9.3.6 Media Library Messages Table 143 \u2013 Controller not OK Alert Information Table 144 \u2013 Bus rescan complete Alert Information Table 145 \u2013 Disk initialize Failed Message Arguments Table 146 \u2013 Disk initialize Failed Alert Information <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Table 147 \u2013 Read Warning Alert Information Table 148 \u2013 Write Warning Alert Information Table 149 \u2013 Hard Error Alert Information <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | Table 150 \u2013 Media Alert Information Table 151 \u2013 Read Failure Alert Information Table 152 \u2013 Write Failure Alert Information <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | Table 153 \u2013 Media Life Alert Information Table 154 \u2013 Not Data Grade Alert Information Table 155 \u2013 Write Protect Alert Information <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Table 156 \u2013 No Removal Alert Information Table 157 \u2013 Cleaning Media Alert Information Table 158 \u2013 Unsupported Format Alert Information <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | Table 159 \u2013 Recoverable Snapped Tape Alert Information Table 160 \u2013 Unrecoverable Snapped Tape Alert Information Table 161 \u2013 Memory Chip In Cartridge Failure Alert Information <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | Table 162 \u2013 Forced Eject Alert Information Table 163 \u2013 Read Only Format Alert Information Table 164 \u2013 Directory Corrupted On Load Alert Information <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | Table 165 \u2013 Nearing Media Life Alert Information Table 166 \u2013 Clean Now Alert Information Table 167 \u2013 Clean Periodic Alert Information <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | Table 168 \u2013 Expired Cleaning Media Alert Information Table 169 \u2013 Invalid Cleaning Media Alert Information Table 170 \u2013 Retention Requested Alert Information <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | Table 171 \u2013 Dual-Port Interface Error Alert Information Table 172 \u2013 Drive Maintenance Alert Information Table 173 \u2013 Hardware A Alert Information <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | Table 174 \u2013 Hardware B Alert Information Table 175 \u2013 Interface Alert Information Table 176 \u2013 Eject Media Alert Information <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Table 177 \u2013 Download Failure Alert Information Table 178 \u2013 Loader Hardware A Alert Information Table 179 \u2013 Loader Stray Media Alert Information <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | Table 180 \u2013 Loader Hardware B Alert Information Table 181 \u2013 Loader Door Alert Information Table 182 \u2013 Loader Hardware C Alert Information <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | Table 183 \u2013 Loader Magazine Alert Information Table 184 \u2013 Loader Predictive Failure Alert Information Table 185 \u2013 Load Statistics Alert Information <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | Table 186 \u2013 Media Directory Invalid at Unload Alert Information Table 187 \u2013 Media System area Write Failure Alert Information Table 188 \u2013 Media System Area Read Failure Alert Information <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Table 189 \u2013 No Start of Data Alert Information Table 190 \u2013 Loading Failure Alert Information Table 191 \u2013 Library Hardware A Alert Information <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | Table 192 \u2013 Library Hardware B Alert Information Table 193 \u2013 Library Hardware C Alert Information Table 194 \u2013 Library Hardware D Alert Information <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | Table 195 \u2013 Library Diagnostic Required Alert Information Table 196 \u2013 Library Interface Alert Information Table 197 \u2013 Failure Prediction Alert Information <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | Table 198 \u2013 Library Maintenance Alert Information Table 199 \u2013 Library Humidity Limits Alert Information Table 200 \u2013 Library Voltage Limits Alert Information <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Table 201 \u2013 Library Stray Media Alert Information Table 202 \u2013 Library Pick Retry Alert Information Table 203 \u2013 Library Place Retry Alert Information <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | Table 204 \u2013 Library Load Retry Alert Information Table 205 \u2013 Library Door Alert Information Table 206 \u2013 Library Mailslot Alert Information <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | Table 207 \u2013 Library Magazine Alert Information Table 208 \u2013 Library Security Alert Information Table 209 \u2013 Library Security Mode Alert Information <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | Table 210 \u2013 Library Offline Alert Information Table 211 \u2013 Library Drive Offline Alert Information Table 212 \u2013 Library Scan Retry Alert Information <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | Table 213 \u2013 Library Inventory Alert Information Table 214 \u2013 Library Illegal Operation Alert Information Table 215 \u2013 Pass Through Mechanism Failure Alert Information <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | Table 216 \u2013 Cartridge in Pass-through Mechanism Alert Information Table 217 \u2013 Unreadable barcode Labels Alert Information <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 10 Service discovery 10.1 Objectives 10.2 Overview <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 10.3 SLP Messages <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 10.4 Scopes Table 218 \u2013 Message Types <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 10.5 Services Definition 10.5.1 General 10.5.2 Service Type 10.5.3 Service Attributes <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 10.6 User Agents (UA) <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 10.7 Service Agents (SAs) 10.8 Directory Agents (DAs) 10.9 Service Agent Server (SA Server) 10.9.1 General Information <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 10.9.2 SA Server (SAS) Implementation 10.9.3 SA Server (SAS) Clients <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 10.9.4 SA Server Configuration Table 219 \u2013 Required Configuration Properties for SA as DA Table 220 \u2013 Required Configuration Properties for SA <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 10.9.5 SA Server Discovery 10.9.6 SAS Client Registration Figure 18 \u2013 SA Server Configuration <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 10.10 Configurations 10.10.1 General 10.10.2 Multicast Configurations 10.10.3 No Multicast configuration Figure 19 \u2013 Multicast Configuration <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 10.10.4 Multicast Islands Figure 20 \u2013 No Multicast configuration <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 10.11 \u2018Standard WBEM\u2019 Service Type Templates Figure 21 \u2013 Multicast Islands <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 11 Information Technology \u2013 Storage Management roles 11.1 Introduction to storage management roles Figure 22 \u2013 SMI_S Roles <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 11.2 Information Technology \u2013 Storage Management Client 11.2.1 Overview 11.2.2 SLP functions 11.2.3 WBEM protocol functions 11.2.4 Security considerations 11.2.5 Lock management functions 11.3 Dedicated Information Technology \u2013 Storage Management Server 11.3.1 Overview <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 11.3.2 SLP functions 11.3.3 WBEM protocol functions <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 11.3.4 Security considerations 11.3.5 Lock management functions 11.4 General Purpose Information Technology \u2013 Storage Management Server 11.4.1 Overview 11.4.2 SLP functions <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 11.4.3 CIM-XML protocol functions 11.4.4 Lock management functions 11.4.5 Provider Subrole 11.5 Directory Server 11.5.1 General 11.5.2 SLP functions <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | 11.5.3 CIM-XML protocol functions 11.5.4 Security considerations 11.5.5 Lock management functions 11.6 Combined roles on a single system 11.6.1 Overview 11.6.2 General Purpose Information Technology \u2013 Storage Management Server as a Profile Aggregator <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | 12 Installation and upgrade 12.1 Overview 12.2 Role of the administrator 12.3 Goals 12.3.1 Non-disruptive installation and De-installation 12.3.2 Plug-and-Play <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 12.4 Server deployment 12.4.1 General 12.4.2 Controlled environment 12.4.3 Multiple CIMOM systems <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | 12.4.4 Shared CIMOM <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 12.4.5 Uninstallation 12.4.6 Update 12.4.7 Reconfiguration 12.5 WBEM service support and related functions 12.5.1 Installation <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 12.5.2 Multiple CIM Servers on a Single Server System 12.5.3 Uninstallation\/Upgrade 12.5.4 Reconfiguration 12.5.5 Failure 12.6 Client 12.6.1 Uninstallation 12.6.2 Reconfiguration 12.7 Directory Service 12.7.1 Installation <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 12.7.2 Uninstallation\/Failure 12.8 Issues with Discovery mechanisms <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | 13 Security 13.1 Objectives 13.2 Overview 13.2.1 General <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | 13.2.2 General requirements for HTTP implementations <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 13.3 Description of SMI-S Security 13.3.1 General 13.3.2 Transport security <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | 13.3.3 SSL 3.0 and TLS <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 13.3.4 Authentication <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 13.3.5 Indications <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 13.3.6 Service Discovery <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 13.3.7 HTTP Realms <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 13.4 Security Guidance 13.4.1 SSL 3.0 and TLS guidance <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 13.4.2 Authentication guidance <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | 13.4.3 Authorization <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | Table 221 \u2013 ACL for File “XYZ” <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | 13.4.4 Using IT Infrastructure Securely \u2013 Service Discovery <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Annex A A.1 Purpose of this annex A.2 CIM-to-MIB mapping overview A.3 The SML MIB <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | Annex B B.1 Compliance statement B.2 How compliance of the architecture is declared B.3 How compliance of the model is declared B.4 The Server Profile and compliance B.4.1 General B.4.2 Example <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | B.5 Backward compatibility B.5.1 General <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | B.5.2 Overview Figure B.1 \u2013 Provider migration <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | B.5.3 Requirements <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | B.5.4 Implementation considerations B.6 Rules for combining (autonomous) profiles B.6.1 General B.6.2 Backward Compatibility Rules for combining profiles <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | B.6.3 Conditions for a new profile B.7 Rules for vendor extensions B.7.1 General B.7.2 Objectives for vendor extension rules <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | B.7.3 Vendor extensions and compliance rules B.7.4 Vendor extensions and backward compatibility rules <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | B.7.5 Vendor extensions and SMI-S Nullification B.7.6 Vendor Extensions that Avoid Client Confusion <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | Annex C C.1 Overview C.2 Instance creation C.2.1 Filter string C.2.2 Semantics C.3 Instance deletion C.3.1 Filter string C.3.2 Semantics C.4 Modification of any value in an array property C.4.1 WQL string <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | C.4.2 CQL string C.4.3 Semantics C.5 Modification to either of two specific values in an array property C.5.1 WQL string C.5.2 CQL string C.5.3 Semantics C.6 Alert C.6.1 Filter string C.6.2 Semantic <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Storage management – Common architecture<\/b><\/p>\n |