To configure your StoreFabric B-Series switches to be monitored by Insight RS, complete the following sections:
The HPE FlexNetwork 5130 HI Switch Series comprises Gigabit Ethernet switches that support static and RIP Layer 3 routing, diversified services, and IPv6 forwarding, as well as provide four 10 Gigabit Ethernet (10GbE) interfaces. Hewlett Packard Enterprise Support Center HPE Support Center. To install the HP Network Discovery Tool follow these steps: From a PC (running Windows Vista SP2, Windows 7 SP1, 8, 2008 SP2 or R1 SP1, or later), type in the URL. for the HP Network Discovery Tool into a browser’s address field and press Enter. When asked, open the file. In the resulting folder, double-click on the file setup. The HP 2610-24 Switch is a fanless switch with quiet operation, making it ideal for deployments in open spaces. TheHP 2610-24-PPoE, 2610-24-PoE, and 2610-48-PoE Switches are IEEE 802.3af compliant for Power over Ethernet (PoE) andprovide up to 15.4 W for 12, 24, and 48 ports. The 2610-24-PPoE switch has 24 10/100 ports and provides 12 ports of PoE. HPE Network Discovery Tool 1.0.0.77 is free to download from our software library. The software is included in Internet & Network Tools. The actual developer of the free software is Hewlett Packard Enterprise. You've discovered and mapped your network with SolarWinds network discovery tool.
Note: Test trap support for B-series SAN switches requires the installation of Fabric Operating System v6.3.0b firmware or higher. For more details, refer to the HPE Fabric OS 6.3.0b Customer Advisory at: http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01924282.
Note: Telnet or SSH is required for configuration collection support. Telnet and SSH are enabled by default on StoreFabric B-Series switches.
Install and configure communication software on SAN switchesTo configure your monitored devices, complete the following sections:
Configure SNMPYou can use SNMPv1 or SNMPv3 to monitor your B-Series switches. Follow the steps in one of the options below to configure SNMP on your switch.
Use the following procedure to configure SNMP on a B-Series switch so that it can be monitored with Insight Remote Support.
Display the current or default SNMPv1 settings:
> snmpconfig --show snmpv1
SNMPv1 community and trap recipient configuration:
Community 1: public (rw) No trap recipient configured yet
Community 2: public (rw) No trap recipient configured yet
Community 3: public (rw) No trap recipient configured yet
Community 4: public (ro) No trap recipient configured yet
Community 5: common (ro) No trap recipient configured yet
Community 6: FibreChannel (ro) No trap recipient configured yet
Set SNMPv1 community string and Trap recipient:
> snmpconfig --set snmpv1
SNMP community and trap recipient configuration:
Community (rw): [public] gcc-public ! Create new community
Trap Recipient's IP address : [0.0.0.0] 1.2.3.4
Trap recipient Severity level : (0..5) [0] 2
Trap recipient Port : (0..65535) [162] Community (rw): [public]
Trap Recipient's IP address : [0.0.0.0] Community (rw): [public]
Trap Recipient's IP address : [0.0.0.0] Community (ro): [public]
Trap Recipient's IP address : [0.0.0.0] Community (ro): [common]
Trap Recipient's IP address : [0.0.0.0] Community (ro): [FibreChannel]
Trap Recipient's IP address : [0.0.0.0] Committing configuration...done.
Note: The trap severity level is associated with each trap recipient IP address. The event trap level is in conjunction with the event's severity level. When an event occurs and if its severity level is at or below the set value, the SNMP event traps (swEventTrap
, swFabricWatchTrap
, and connUnitEventTrap
) are sent to the trap recipients.
By default, this value is set to 0, implying that no such traps are sent. The possible values are the following:
- 0 none
- 1 critical
- 2 error
- 3 warning
- 4 informational
- 5 debug
Display the new settings:
> snmpconfig --show snmpv1
SNMPv1 community and trap recipient configuration:
Community 1: gcc-public (rw) Trap recipient: 1.2.3.4 Trap port: 162 Trap recipient Severity level: 2
Community 2: public (rw) No trap recipient configured yet
Community 3: public (rw) No trap recipient configured yet
Community 4: public (ro) No trap recipient configured yet
Community 5: common (ro) No trap recipient configured yet
Community 6: FibreChannel (ro) No trap recipient configured yet
Set SNMP access control:
> snmpconfig --set accesscontrol
SNMP access list configuration:
Access host subnet area : [11.0.0.2] 1.2.3.4 ! set to the IP add of SIM Read/Write? (true, t, false, f): [true]
Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true] f
Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true] f
Access host subnet area : [1.2.3.4] 0.0.0.0 ! remove this one Read/Write? (true, t, false, f): [true] f
Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]
Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]
Committing configuration...done.
Remove the remaining IP address from the SNMP Access Control List if required:
> snmpconfig --set accesscontrol
SNMP access list configuration:
Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [false] f
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [false] f
Access host subnet area : [0.0.0.0] Read/Write? (true, t, false, f): [false]
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [true] f
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [true] f
Committing configuration...done.
Check the access to SNMP control list:
> snmpconfig --show accesscontrol
SNMP access list configuration:
Entry 0: Access host subnet area 1.2.3.4 (rw)
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
Set MIB Capability:
> snmpconfig --set mibcapability
The SNMP Mib/Trap Capability has been set to support FE-MIB SW-MIB FA-MIB HA-MIB SW-TRAP FA-TRAP HA-TRAP
FA-MIB (yes, y, no, n): [yes]
FICON-MIB (yes, y, no, n): [no]
HA-MIB (yes, y, no, n): [yes] yes
FCIP-MIB (yes, y, no, n): [no]
ISCSI-MIB (yes, y, no, n): [no]
SW-TRAP (yes, y, no, n): [yes]
swFCPortScn (yes, y, no, n): [no] yes
swEventTrap (yes, y, no, n): [no] yes
swFabricWatchTrap (yes, y, no, n): [no] yes
swTrackChangesTrap (yes, y, no, n): [no] yes
FA-TRAP (yes, y, no, n): [yes]
connUnitStatusChange (yes, y, no, n): [no] yes
connUnitEventTrap (yes, y, no, n): [no] yes
connUnitSensorStatusChange (yes, y, no, n): [no] yes
connUnitPortStatusChange (yes, y, no, n): [no] yes
SW-EXTTRAP (yes, y, no, n): [no] yes
Display the IP address of the switch, so it can be added to the Insight RS Console:
> ipaddrshow
SWITCH Ethernet IP Address: 1.2.3.4
Ethernet Subnetmask: 1.2.3.4
Fibre Channel IP Address: none
Fibre Channel Subnetmask: none
Gateway IP Address: 1.2.3.4
DHCP: Off
Modify the switch systemgroup
variables if required:
> snmpconfig --set systemGroup
Customizing MIB-II system variables ... At each prompt, do one of the following:
o to accept current value,
o enter the appropriate new value,
o to skip the rest of configuration, or
o to cancel any change.
To correct any input mistake: erases the previous character, erases the whole line,
sysDescr: [Fibre Channel Switch.] Brocade 4/16 FC Switch
sysLocation: [End User Premise.] HPE Building 11th floor
sysContact: [Field Support.] John Doe
authTrapsEnabled (true, t, false, f): [true]
Committing configuration...done.
Before configuring SNMPv3, you will need the SNMP username and appropriate credentials to be used (Auth, Priv, and passwords for each).
Important: HPE Insight RS supports the secure SNMPv3 protocol on B-Series switches that support SNMPv3. Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs. Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be at least 8 characters long. Refer to your device's documentation to determine the versions of SNMP your device supports.
To configure SNMPv3, complete the following steps. Example responses are shown in red.
- Using PuTTY or suitable SSH access tool, SSH to the switch and login as an Administrator user.
Disable SNMPv1 using the following command:
#snmpconfig –disable snmpv1
Configure MIB capability on the switch to enabled the HA MIB and HA TRAPS:
#snmpconfig –set mibcapability
FE-MIB (yes, y, no, n): [yes]
<return>
SW-MIB (yes, y, no, n): [yes]
<return>
FA-MIB (yes, y, no, n): [yes]
<return>
FICON-MIB (yes, y, no, n): [no]
<return>
HA-MIB (yes, y, no, n): [no]
Yes; if already Yes then <return>
FCIP-MIB (yes, y, no, n): [no]
<return>
IF-MIB (yes, y, no, n): [yes]
<return>
BD-MIB (yes, y, no, n): [yes]
<return>
BROCADE-MAPS-MIB (yes, y, no, n): [yes]
<return>
T11-FC-ZONE-SERVER-MIB (yes, y, no, n): [no]
<return>
SW-TRAP (yes, y, no, n): [yes]
<return>
swFCPortScn (yes, y, no, n): [yes]
<return>
swEventTrap (yes, y, no, n): [yes]
<return>
DesiredSeverity: (0..4) [0]
<return>
swIPv6ChangeTrap (yes, y, no, n): [yes]
<return>
swPmgrEventTrap (yes, y, no, n): [yes]
<return>
swFabricReconfigTrap (yes, y, no, n): [no]
<return>
swFabricSegmentTrap (yes, y, no, n): [no]
<return>
swExtTrap (yes, y, no, n): [yes]
<return>
swStateChangeTrap (yes, y, no, n): [no]
<return>
swPortMoveTrap (yes, y, no, n): [no]
<return>
swBrcdGenericTrap (yes, y, no, n): [no]
<return>
swDeviceStatusTrap (yes, y, no, n): [no]
<return>
swZoneConfigChangeTrap (yes, y, no, n): [no]
<return>
FA-TRAP (yes, y, no, n): [yes]
<return>
connUnitStatusChange (yes, y, no, n): [yes]
<return>
connUnitEventTrap (yes, y, no, n): [yes]
<return>
connUnitPortStatusChange (yes, y, no, n): [yes]
<return>
HA-TRAP (yes, y, no, n): [no] yes
fruStatusChanged (yes, y, no, n): [no] ye
s
cpStatusChanged (yes, y, no, n): [no] yes
fruHistoryTrap (yes, y, no, n): [no] yes
IF-TRAP (yes, y, no, n): [yes]
<return>
linkDown (yes, y, no, n): [yes]
<return>
linkUp (yes, y, no, n): [yes]
<return>
BD-TRAP (yes, y, no, n): [yes]
<return>
bdTrap (yes, y, no, n): [yes]
<return>
bdClearTrap (yes, y, no, n): [yes]
<return>
MAPS-TRAP (yes, y, no, n): [yes]
<return>
Verify that the configuration changes have been accepted:
#snmpconfig –show mibcapability
FE-MIB: YES
SW-MIB: YES
FA-MIB: YES
FICON-MIB: NO
HA-MIB: YES
FCIP-MIB: NO
IF-MIB: YES
BD-MIB: YES
BROCADE-MAPS-MIB: YES
T11-FC-ZONE-SERVER-MIB: NO
SW-TRAP: YES
swFCPortScn: YES
swEventTrap: YES
DesiredSeverity:None
swIPv6ChangeTrap: YES
swPmgrEventTrap: YES
swFabricReconfigTrap: NO
swFabricSegmentTrap: NO
swExtTrap: YES
swStateChangeTrap: NO
swPortMoveTrap: NO
swBrcdGenericTrap: NO
swDeviceStatusTrap: NO
swZoneConfigChangeTrap: NO
FA-TRAP: YES
connUnitStatusChange: YES
connUnitEventTrap: YES
connUnitPortStatusChange: YES
FICON-TRAP: NO
linkRNIDDeviceRegistration: NO
linkRNIDDeviceDeRegistration: NO
linkLIRRListenerAdded: NO
linkLIRRListenerRemoved: NO
linkRLIRFailureIncident: NO
HA-TRAP: YES
fruStatusChanged: YES
cpStatusChanged: YES
fruHistoryTrap: YES
IF-TRAP: YES
BD-TRAP: YES
bdTrap: YES
bdClearTrap: YES
MAPS-TRAP: YES
T11-FC-ZONE-SERVER-TRAP: NO
t11ZsRequestRejectNotify: NO
t11ZsMergeFailureNotify: NO
t11ZsMergeSuccessNotify: NO
t11ZsDefZoneChangeNotify: NO
t11ZsActivateNotify: NO
Begin to configure SNMPv3. Identify a configured SNMP user to use:
#snmpconfig -- show snmpv3
SNMPv3 USM configuration:
User 1 (rw): snmpadmin1
User 2 (rw): snmpadmin2
Auth Protocol: noAuth
Priv Protocol: noPriv
User 3 (rw): snmpadmin3
User 4 (ro): snmpuser1
Auth Protocol: noAuth
Priv Protocol: noPriv
User 5 (ro): snmpuser2
User 6 (ro): snmpuser3
Auth Protocol: noAuth
Priv Protocol: noPriv
SNMPv3 Trap/Informs configuration:
Trap Entry 1: No trap recipient configured yet
Notify Type: TRAP(1)
Trap Entry 2: No trap recipient configured yet
Notify Type: TRAP(1)
Trap Entry 3: No trap recipient configured yet
Notify Type: TRAP(1)
Trap Entry 4: No trap recipient configured yet
Notify Type: TRAP(1)
Trap Entry 5: No trap recipient configured yet
Notify Type: TRAP(1)
Trap Entry 6: No trap recipient configured yet
Notify Type: TRAP(1)
Choose a user not already defined in the SNMPv3 Trap/Inform configuration. In the example above, no SNMPv3 Trap/Inform configuration has been defined so all the listed users are available for use. In this example, we will use snmpadmin1.
Once you have selected the SNMP user and have the appropriate credentials you want to use for the Auth/Priv configuration you can begin to configure SNMPv3.
SNMP Informs Enabled (true, t, false, f): [false]
<return>; needs to be “false”
SNMPv3 user configuration (snmp user not configured in FOS user database will have physical AD and admin role as the default):
User (rw): [snmpadmin1]
<return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3)
1; example selects MD5
New Auth Passwd:
<enter password, must be at least 8 chracters>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (1..4)
1; example selects DES
New Priv Passwd:
<enter password, must be at least 8 chracters>
User (rw): [snmpadmin2]
<return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
<return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2]
<return>
User (rw): [snmpadmin3]
<return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
<return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2]
<return>
User (ro): [snmpuser1]
<return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
<return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2]
<return>
User (ro): [snmpuser2]
<return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
<return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2]
<return>
User (ro): [snmpuser3]
<return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
<return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2]
<return>
SNMPv3 trap/inform recipient configuration:
Trap Recipient's IP address : [0.0.0.0]
<Add RS Host IP Here>
Notify Type [TRAP(1)/INFORM(2)]: (1..1) [1]
<return>; leave 1 for Traps
UserIndex: (1..6)
[1]; snmpadmin1 is the first in the list above, so 1 represents that user
Trap recipient Severity level : (0..5) [2]
4
Trap recipient Port : (0..65535) [162]
1162; must be 1162 for Insight RS listener
Trap Recipient's IP address : [0.0.0.0]
<return>
Trap Recipient's IP address : [0.0.0.0]
<return>
Trap Recipient's IP address : [0.0.0.0]
<return>
Trap Recipient's IP address : [0.0.0.0]
<return>
Trap Recipient's IP address : [0.0.0.0]
<return>
The configuration of the Brocade is now complete.
Configure firewall and port settingsSAN Switch Connectivity - Firewall/Port RequirementsProtocol | Ports | Source | Destination | Function | Optional |
---|
ICMP | N/A | Hosting Device | Monitored Systems | Provides system reachability (ping) check during system discovery and before other operations. | Required |
UDP | 161 | Hosting Device | Monitored Systems | SNMP. This is the standard port used by SNMP agents on monitored systems. The Hosting Device sends requests to devices on this port. | Required |
UDP | 162 | Monitored Systems | Hosting Device | SNMP Trap. This is the port used by Insight RS to listen to SNMP traps. | Required* |
UDP | 1162 | Monitored Device | Hosting Device | SNMPv3 Trap. This is the port used by Insight RS to listen to SNMPv3 traps. | Required* |
TCP | 22 | Hosting Device | Monitored Systems | SSH: Remote Data Collection | Optional |
TCP | 23 | Hosting Device | Monitored Systems | Telnet: Remote Data Collection | Optional |
* Dependent on the version of SNMP used on the monitored device.
Add protocol credentials and start discoveryTo discover your monitored devices, complete the following sections:
Create an SNMP protocol credential in the Insight RS ConsoleCreate an SNMPv1 or SNMPv3 protocol credential to correspond to the protocol you configured on your switch in Option 1: Configure SNMPv1orOption 2: Configure SNMPv3.
Option 1: SNMPv1If your device's SNMP community string is set to public and your community access mode is read only, Insight RS automatically associates an SNMPv1 protocol with your device. If you use a different community string or use a nonstandard port, you must create an SNMPv1 protocol credential in the Insight RS Console.
To configure SNMPv1 in the Insight RS Console, complete the following steps:
- In a web browser, log on to the Insight RS Console.
- In the main menu, select Discovery and click the Credentials tab.
- From the Select and Configure Protocol drop-down list, select Simple Network Management Protocol Version 1, V2C (SNMPv1, SNMPv2C).
Click New. The New Credential dialog box appears.
- Type the Community String you have configured on your device.
- Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
Option 2: SNMPv3To configure SNMPv3 in the Insight RS Console, complete the following steps:
Create a Named Credential for every set of Management Group credentials:
- In the Insight RS Console, navigate to Company Information → Named Credentials.
- Click Add New Credential.
- Type a Credential Name, for example: Brocade SNMPv3.
- In the Protocol drop-down list, select Simple Network Management Protocol Version 3 (SNMPv3).
- Use the default port of
161
. In the SNMP Account Credential fields, add:
- Type the Username for the user identified in Option 2: Configure SNMPv3.
Account Authentication Protocol: MD5
or SHA
The example used MD5
in Option 2: Configure SNMPv3.
- Account Authentication Password.
Account Privacy Protocol: DES, DES3, AES128, AES192, AES256
The example used DES
in Option 2: Configure SNMPv3.
Account Privacy Passphrase.
Leave the Context Name blank.
- Click Save.
Add Discovery credentials for the B-Series switches:
- In the Insight RS Console, navigate to Discovery → Credentials.
Create discovery protocol credentials for the Named Credential created earlier.
- In the Select and Configure Protocol drop-down list, select Simple Network Management Protocol Version 3 (SNMPv3).
- Click New.
- In the Named Credential drop-down list, select the Named Credential created earlier.
- Click Add.
Discover the device in the Insight RS ConsoleTo discover the device from the Insight RS Console, complete the following steps:
- In a web browser, log on to the Insight RS Console.
- In the main menu, select Discovery and click the Sources tab.
Expand the IP Addresses section and add the IP address for your device:
- Click New.
- Select the Single Address, Address Range, or Address List option.
- Type the IP address(es) of the devices to be discovered.
- Click Add.
- Click Start Discovery.
Verify discovery and device statusHpe Network Discovery Tool
To verify the device was discovered correctly, complete the following steps:
- In a web browser, log on to the Insight RS Console.
- In the main menu, select Devices and click the Device Summary tab.
Make sure the Status column contains a success icon ().
If there is no success icon, see Resolve monitored device status issues for troubleshooting information.
Verify warranty and contract informationVerify that the warranty and contract information was discovered correctly in the Insight RS Console:
- In the Insight RS Console, navigate to Devices and click the switch Device Name.
Expand the Hardware section, and make sure the Acquired Serial Number and Acquired Product Number are correct. If they are not correct, type the correct values in the Override Serial Number and Override Product Number fields and click Save Changes.
Note: If your SAN switch is covered by a critical service level contract then add CS4SAN to the Custom Delivery ID field in order to elevate the response to service events.
Verify communication between monitored device and Insight RSTo verify communication between your monitored device and Insight RS, complete the following sections:
Send a test eventSince B-Series Fabric-OS v6.3.x was released, B-Series switches can emit test traps to ensure that the complete end-to-end event flow can be verified. The user must log on to the switch CLI admin interface and issue the following command:
Send SNMP traps to test the configuration:
- Telnet or SSH to the B-Series switch.
Show the available traps you can send as tests:
snmptraps --show
Send a blanket test trap for all tests:
snmptraps --send
Or send a specific test trap:
snmptraps --send --trap_name
<trapname>
For example:
snmptraps --send -trap_name cp-status-change-trap -ip_address
<hosting_device_ip>
where <hosting_device_ip> is the IP address of the Hosting Device. If the switch reports that the test trap cannot be sent, make sure snmpmibcaps
is configured to send HA traps. If it is configured correctly, this command should create a test event visible in the Insight RS Console and also submit an incident to HPE.
Note: Not all traps result in an incident being delivered to the Insight RS Console. Not all traps are sent and not all are received. Some get received as ‘unregistered event’ if you have that option selected as a receive option in Events. The events that show up as ‘unregistered’ are not compiled in the SIM Mibs. FA-MIB’s generate a valid hardware event.
See the B-Series Switch documentation for more details.
Verify collections in the Insight RS ConsoleHpe Network Switches
Collections are not automatically run after discovery. HPE recommends that you manually run a collection after discovery completes in order to verify connectivity. Run the collection schedule manually on the Collection Services → Collection Schedules tab. For more information about scheduling collections, see Manage Collection Schedules.
Verify that this collection ran successfully on the Collection Services → SAN Storage Collection Results tab in the Insight RS Console.
- Log on to the Insight RS Console.
- In the main menu, select Collection Services and then click the SAN Storage Collection Results tab.
- Expand the Storage Configuration Collection section.
- Locate the entry for your device and check the Result column. If the collection was successful, a success icon appears (). If it failed, an error icon appears ().
_HP_HTML5_bannerTitle.htm
Hpe Switch Selector
HPE Smart Storage Administrator (HPE SSA) for Windows 64-bit By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement. Note: Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee. Type: | Software - System Management | Version: | 2.60.18.0(24 Oct 2016) | Operating System(s): | Microsoft Windows 8.1 (64-bit) | Microsoft Windows Server 2008 R2 | Microsoft Windows Server 2008 R2 Foundation Edition | Microsoft Windows Server 2008 x64 | Microsoft Windows Server 2012 | Microsoft Windows Server 2012 R2 | Microsoft Windows Server 2016 | Microsoft Windows Vista (64-bit) | Microsoft Windows XP Professional x64 Edition | Microsoft Windows 7 (64-bit) | File name: | cp029559.exe (13 MB) |
The HPE Smart Storage Administrator (HPE SSA) is a web-based application that helps you configure, manage, diagnose, and monitor HPE ProLiant Smart Array Controllers and now other storage devices as well, such as host bus adapters (HBAs), HPE Storage controllers, and future devices such as SCSI Express drives, and SAS switch devices. HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility. Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Support for:
- Smart Array H240nr
- Smart Array P240nr
- Smart Array P542D
- Added Sanitize Erase for supporting controllers
- Added ability to enable erase and stop erase on multiple drives
- Added support for the Microsoft® Windows Server® 2016 OS.
To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value: 354b65016ceb9cb11a417c76aeba4079ac74f9a430588c0e9d7e633f4caa3a1f | cp029559.exe |
Reboot Requirement: Reboot is not required after installation for updates to take effect and hardware stability to be maintained. Installation:
If there is an older version of HPE SSA installed on the system, please uninstall it by going to 'Control Panel -> Uninstall a program' and then uninstall 'HP Smart Storage Administrator'. Download the Smart Component to a directory on your hard drive and change to that directory. The downloaded file is a self-extracting executable with a filename based on the Smart Component Number. From that drive and directory, execute the downloaded file. Click the 'Install' button to proceed with the installation. The utility will automatically be installed. End User License Agreements: HPE Software License Agreement v1 Hewlett-Packard End User License Agreement
Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Important:
HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware. HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility. Notes:
For support for HPE SSA or Smart Array controllers, please visit Contact HP. Users will automatically be logged out after a predetermined period of inactivity when using HPE SSA and will have to re-login. On the Web-based Management Device Homepage, under 'options', 'Anonymous Access' should be enabled when using HPE SSA. When clicking on a controller that is currently being configured in a different HPE SSA session, a message will appear which allows you to override the other HPE SSA session or cancel. If you choose to override the other HPE SSA session, any unsaved changes in the other session will be discarded. To uninstall HPE SSA, use Add/Remove Programs located in the Control Panel on Windows Systems. To run HPE SSA in local application mode on Windows, Internet Explorer must be the default browser. The following are known issues: - Sometimes the login on the Device Home Page will not work the first time. Click on the Device Home Page link again or refresh the page and re-login.
HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware. HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility. Version:4.21.7.0 (5 Oct 2020) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. ADU report does not capture Slotx log greater than 4GiB size if configured. Added support for HPE Smart Array S100i SR Gen10 Plus SW RAID Version:4.17.6.0 (9 Mar 2020) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Split Mirror Primary Array's Acceleration Mode displays an invalid message that indicates caching can be enabled or disabled for each individual logical drive even if the array does not contain a logical drive that can have caching enabled. Version:4.15.6.0 (20 Dec 2019) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Added support to enable SmartCache on volumes greater than 256TB
Version:3.47.6.0 (9 Sep 2019) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Added support for SSD WearGauge reporting for NVMe drives. Version:3.40.3.0 (2 Apr 2019) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Supports Online Firmware Activation reporting
Version:3.30.14.0(A) (27 Nov 2018) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.
Note: If version 3.30.14.0 was previously installed, then it is not necessary to upgrade to version 3.30.14.0 (A). - Added support for Microsoft Windows Server 2019
Version:3.30.14.0 (26 Jun 2018) Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience.
It is recommended to update to this 3.30.13.0 version of HPE Smart Storage Administrator if you update your system BIOS using the 2018.06 version of SPP. Any array created with the BIOS configuration utility from the 2018.06 version of SPP will not be accessible with an older version of HPE Smart Storage Administrator. - Added the ability to enable or disable Drive Write Cache for configured and unconfigured drives
Version:3.25.4.0 (5 Feb 2018) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Added support for Freeze/Anti-freeze of the Sanitize command.
Version:3.10.3.0 (12 Jul 2017) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Initial firmware release for HPE P/E-Class SR Gen10 controllers.
Version:2.65.7.0 (21 Apr 2017) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. SSA incorrectly displays 64 characters for the encryption master key length in local mode. The length was changed to 32 characters. Version:2.60.18.0 (24 Oct 2016) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Support for:
- Smart Array H240nr
- Smart Array P240nr
- Smart Array P542D
- Added Sanitize Erase for supporting controllers
- Added ability to enable erase and stop erase on multiple drives
- Added support for the Microsoft® Windows Server® 2016 OS.
Version:2.40.13.0 (1 Apr 2016) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. New features: Support for Drive Sanitize on Smart Array Px2x and Smart Array Px3x controllers Allows users to forcefully re-enable failed encrypted volumes when their encryption keys are permanently lost and all the failed drives have been replaced Added logical drive numbers/physical drive locations to primary and secondary boot volume information
Version:2.30.6.0 (1 Oct 2015) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Updated HP EULA for encryption licensing Version:2.20.11.0 (15 Jun 2015) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for: New Features: - Transformation support for H-series controllers
- Includes plaintext and rekey operations for Encryption
- NVMe drive support for discovery and Wear Gauge information
- New Solid State device view
Version:2.10.14.0 (30 Mar 2015) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for:
- HP Smart Array P246br
- HP Smart Array P741
- HP Smart Array P841
New Features:
- Parallel Surface Scan
- Encryption Key Manager Authentication
- Express Local Encryption
- Volatile Encryption Keys
- Re-enable Cache Module
- Available only for specific cases where cache is disabled due to battery interruption
Version:2.0.23.0 (9 Sep 2014) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for the following devices: - Smart Array P244br
- Smart Array P440
- Smart Array P440ar
- Smart Array P441
- Smart Array P840
- Dynamic Smart Array B140i
- Smart HBA H240
- Smart HBA H240ar
- Smart HBA H241
- Smart HBA H244br
- 12G SAS Expander
Support for the following new features: - Write-back cache write policy for HP SmartCache
- HDD Flexible Latency Optimization (FLS)
- Power Mode Management
- HBA mode for latest generation Smart Array P-series controllers
- RAID/Array mode for Smart HBA H-series controllers
Version:1.60.17.0 (18 Feb 2014) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for Smart Array P230i Smart Array P530 Smart Array P531 Smart Array P830 Smart Array P830i HP Secure Encryption Rapid Rebuild Priority SSD OPO (Over Provisioning Optimization) 512e Physical Drive support Auto RAID 0
Version:1.50.4.0 (10 Sep 2013) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Support for:
- Smart Array P430
- Smart Array P431
- Smart Array P731m
- Features supported with appropriate firmware versions and devices as base features (no longer requires SAAP license keys):
- Drive Erase
- Heal Array
- HP SmartCache
- HP SSD Smart Path
- HP SmartSSD Wear Gauge
- Online Expansions and Extensions of Arrays and Logical Drives
- Moving and Deleting of Individual Logical Drive
- Removes previous limitation of having to delete all logical drives in order until target was reache
- Allows moving from one drive type to another...SATA to SAS, SAS to SAT
- Advanced Capacity Expansions
- Split Mirror Backup and Rollback
- Online Mirror Splitting with Recombining in Offline Mode
- Online RAID Migrations
- Online Strip Size Migrations
- Mismatched Drive Firmware Notifications
- Supports following RAID levels as base features (no longer requires SAAP license keys):
- RAID 0
- RAID 1, RAID 1(ADM, Advanced Data Mirroring)
- RAID 10, RAID 10(ADM, Advanced Data Mirroring)
- RAID 5
- RAID 50
- RAID 6
- RAID 60
- Rapid Parity Initialization
- Shrink Array, Move Array, and Replace Array
- Spare Management
- Dedicated (multiple arrays covered by one spare)
- Auto-Replace Drive (spare becomes data replacement drive and covers RAID 0 when set in Predictive Spare Mode)
- Video on Demand (VOD) Performance Optimization
Type: | Software - System Management | Version: | 2.60.18.0(24 Oct 2016) | Operating System(s): | Microsoft Windows 7 (64-bit) | Microsoft Windows 8.1 (64-bit) | Microsoft Windows Server 2008 R2 | Microsoft Windows Server 2008 R2 Foundation Edition | Microsoft Windows Server 2008 x64 | Microsoft Windows Server 2012 | Microsoft Windows Server 2012 R2 | Microsoft Windows Server 2016 | Microsoft Windows Vista (64-bit) | Microsoft Windows XP Professional x64 Edition |
|
DescriptionThe HPE Smart Storage Administrator (HPE SSA) is a web-based application that helps you configure, manage, diagnose, and monitor HPE ProLiant Smart Array Controllers and now other storage devices as well, such as host bus adapters (HBAs), HPE Storage controllers, and future devices such as SCSI Express drives, and SAS switch devices. HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility. EnhancementsUpgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Support for:
- Smart Array H240nr
- Smart Array P240nr
- Smart Array P542D
- Added Sanitize Erase for supporting controllers
- Added ability to enable erase and stop erase on multiple drives
- Added support for the Microsoft® Windows Server® 2016 OS.
Installation InstructionsTo ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value: 354b65016ceb9cb11a417c76aeba4079ac74f9a430588c0e9d7e633f4caa3a1f | cp029559.exe |
Reboot Requirement: Reboot is not required after installation for updates to take effect and hardware stability to be maintained. Installation:
If there is an older version of HPE SSA installed on the system, please uninstall it by going to 'Control Panel -> Uninstall a program' and then uninstall 'HP Smart Storage Administrator'. Download the Smart Component to a directory on your hard drive and change to that directory. The downloaded file is a self-extracting executable with a filename based on the Smart Component Number. From that drive and directory, execute the downloaded file. Click the 'Install' button to proceed with the installation. The utility will automatically be installed. Release NotesEnd User License Agreements: HPE Software License Agreement v1 Hewlett-Packard End User License Agreement
Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Important:
HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware. HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility. Notes:
For support for HPE SSA or Smart Array controllers, please visit Contact HP. Users will automatically be logged out after a predetermined period of inactivity when using HPE SSA and will have to re-login. On the Web-based Management Device Homepage, under 'options', 'Anonymous Access' should be enabled when using HPE SSA. When clicking on a controller that is currently being configured in a different HPE SSA session, a message will appear which allows you to override the other HPE SSA session or cancel. If you choose to override the other HPE SSA session, any unsaved changes in the other session will be discarded. To uninstall HPE SSA, use Add/Remove Programs located in the Control Panel on Windows Systems. To run HPE SSA in local application mode on Windows, Internet Explorer must be the default browser. The following are known issues: - Sometimes the login on the Device Home Page will not work the first time. Click on the Device Home Page link again or refresh the page and re-login.
ImportantHPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware. HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility. Revision HistoryVersion:4.21.7.0 (5 Oct 2020) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. ADU report does not capture Slotx log greater than 4GiB size if configured. Added support for HPE Smart Array S100i SR Gen10 Plus SW RAID Version:4.17.6.0 (9 Mar 2020) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Split Mirror Primary Array's Acceleration Mode displays an invalid message that indicates caching can be enabled or disabled for each individual logical drive even if the array does not contain a logical drive that can have caching enabled. Version:4.15.6.0 (20 Dec 2019) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Added support to enable SmartCache on volumes greater than 256TB
Version:3.47.6.0 (9 Sep 2019) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Added support for SSD WearGauge reporting for NVMe drives. Version:3.40.3.0 (2 Apr 2019) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Supports Online Firmware Activation reporting
Version:3.30.14.0(A) (27 Nov 2018) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.
Note: If version 3.30.14.0 was previously installed, then it is not necessary to upgrade to version 3.30.14.0 (A). - Added support for Microsoft Windows Server 2019
Version:3.30.14.0 (26 Jun 2018) Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience.
It is recommended to update to this 3.30.13.0 version of HPE Smart Storage Administrator if you update your system BIOS using the 2018.06 version of SPP. Any array created with the BIOS configuration utility from the 2018.06 version of SPP will not be accessible with an older version of HPE Smart Storage Administrator. - Added the ability to enable or disable Drive Write Cache for configured and unconfigured drives
Version:3.25.4.0 (5 Feb 2018) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Added support for Freeze/Anti-freeze of the Sanitize command.
Version:3.10.3.0 (12 Jul 2017) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Initial firmware release for HPE P/E-Class SR Gen10 controllers.
Version:2.65.7.0 (21 Apr 2017) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. SSA incorrectly displays 64 characters for the encryption master key length in local mode. The length was changed to 32 characters. Version:2.60.18.0 (24 Oct 2016) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Support for:
- Smart Array H240nr
- Smart Array P240nr
- Smart Array P542D
- Added Sanitize Erase for supporting controllers
- Added ability to enable erase and stop erase on multiple drives
- Added support for the Microsoft® Windows Server® 2016 OS.
Version:2.40.13.0 (1 Apr 2016) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. New features: Support for Drive Sanitize on Smart Array Px2x and Smart Array Px3x controllers Allows users to forcefully re-enable failed encrypted volumes when their encryption keys are permanently lost and all the failed drives have been replaced Added logical drive numbers/physical drive locations to primary and secondary boot volume information
Version:2.30.6.0 (1 Oct 2015) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Updated HP EULA for encryption licensing Version:2.20.11.0 (15 Jun 2015) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for: New Features: - Transformation support for H-series controllers
- Includes plaintext and rekey operations for Encryption
- NVMe drive support for discovery and Wear Gauge information
- New Solid State device view
Version:2.10.14.0 (30 Mar 2015) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for:
- HP Smart Array P246br
- HP Smart Array P741
- HP Smart Array P841
New Features:
- Parallel Surface Scan
- Encryption Key Manager Authentication
- Express Local Encryption
- Volatile Encryption Keys
- Re-enable Cache Module
- Available only for specific cases where cache is disabled due to battery interruption
Version:2.0.23.0 (9 Sep 2014) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for the following devices: - Smart Array P244br
- Smart Array P440
- Smart Array P440ar
- Smart Array P441
- Smart Array P840
- Dynamic Smart Array B140i
- Smart HBA H240
- Smart HBA H240ar
- Smart HBA H241
- Smart HBA H244br
- 12G SAS Expander
Support for the following new features: - Write-back cache write policy for HP SmartCache
- HDD Flexible Latency Optimization (FLS)
- Power Mode Management
- HBA mode for latest generation Smart Array P-series controllers
- RAID/Array mode for Smart HBA H-series controllers
Version:1.60.17.0 (18 Feb 2014) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Support for Smart Array P230i Smart Array P530 Smart Array P531 Smart Array P830 Smart Array P830i HP Secure Encryption Rapid Rebuild Priority SSD OPO (Over Provisioning Optimization) 512e Physical Drive support Auto RAID 0
Version:1.50.4.0 (10 Sep 2013) Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. - Support for:
- Smart Array P430
- Smart Array P431
- Smart Array P731m
- Features supported with appropriate firmware versions and devices as base features (no longer requires SAAP license keys):
- Drive Erase
- Heal Array
- HP SmartCache
- HP SSD Smart Path
- HP SmartSSD Wear Gauge
- Online Expansions and Extensions of Arrays and Logical Drives
- Moving and Deleting of Individual Logical Drive
- Removes previous limitation of having to delete all logical drives in order until target was reache
- Allows moving from one drive type to another...SATA to SAS, SAS to SAT
- Advanced Capacity Expansions
- Split Mirror Backup and Rollback
- Online Mirror Splitting with Recombining in Offline Mode
- Online RAID Migrations
- Online Strip Size Migrations
- Mismatched Drive Firmware Notifications
- Supports following RAID levels as base features (no longer requires SAAP license keys):
- RAID 0
- RAID 1, RAID 1(ADM, Advanced Data Mirroring)
- RAID 10, RAID 10(ADM, Advanced Data Mirroring)
- RAID 5
- RAID 50
- RAID 6
- RAID 60
- Rapid Parity Initialization
- Shrink Array, Move Array, and Replace Array
- Spare Management
- Dedicated (multiple arrays covered by one spare)
- Auto-Replace Drive (spare becomes data replacement drive and covers RAID 0 when set in Predictive Spare Mode)
- Video on Demand (VOD) Performance Optimization
|
|
Hpe Switch Discovery Tool Kit
Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models. |
|