Preparing the 7-Mode systems and hosts for inventory collection

Contributors Download PDF of this page

You must ensure that the 7-Mode systems and hosts meet certain network and protocol requirements for successfully generating an inventory report.

Steps
  1. Enable HTTPS on the 7-Mode system:

    options httpd.admin.ssl.enable on

  2. Enable TLS on the 7-Mode system:

    options tls.enable on

    Important The best practice is to enable TLS because of the security vulnerabilities in SSLv3.
  3. Enable SSL and disable SSLv2 and SSLv3 on the 7-Mode system:

    1. Set up and start SSL:

      secureadmin setup ssl

    2. Enable SSL:

      options ssl.enable on

    3. Disable SSLv2 and SSLv3:
      options ssl.v2.enable off

      options ssl.v3.enable off

      Important The best practice is to disable SSLv2 and SSLv3 to avoid security vulnerabilities.
  4. Enable SSH on the 7-Mode system:

    1. Set up SSH on the 7-Mode system:

      secureadmin setup -f ssh

      The -f option forces the setup to run even if the SSH server is already configured.

    2. Enable SSH:

      secureadmin enable ssh2

    3. Enable password authentication on the SSH server:

      options ssh.passwd_auth.enable

    4. Enable SSH access to the host:

      options ssh.access

  5. Prepare your Windows host systems:

    • Enable WMI access.

      For more information about enabling WMI access, see the host documentation.

    • If you have Windows Server 2003, verify that you have installed the Microsoft Fibre Channel Information Tool (fcinfo) package and run the tool once on your Windows host system.

      This tool enables you to collect the HBA configuration information of the host.

  6. Enable SSH on the Linux or ESXi host.

    For more information about enabling SSH, see the host documentation.

  7. Verify that you have installed the latest NetApp Host Utilities software for each host.

    For information about downloading and installing the NetApp Host Utilities software, see the NetApp Support Site.

  8. Verify that all the hosts and storage systems can be reached by the Windows system from which the Inventory Collect Tool is run.