HP Data Protector Integrating an ACSLS server through a firewall

7
From the boot process:
Note: The STL L20 library is detected on tgt0, lun0. So the SCSI address of the STK L20 library is 0:0.
From the output of the command dmesg after the system is booted:
Note: The STSK L20 Library is detected on tgt0, lun0. So the SCSI address of the STK L20 library is 0:0.
Setting the ACSLS user password
Optionally, you can set passwords to prevent a security exposure for the user IDs acsss, acssa, and acsdb.
To set the passwords (optional), use the command passwd acsss and supply the new password at the prompt.
If the acsss, acssa, or acsdb user IDs were not defined with their home directories matching the ACSLS installation
directory, and the installation script displayed a warning, modify these user IDs so that their home directories are
under the ACSLS base directory.
The following commands modify the usershome directories (you must be logged in as root):
usermod -d /export/home/ACSSS acsss
usermod -d /export/home/ACSSA acssa
usermod -d /export/home/ascbd ascbd
Configuring an ACSLS server with a firewall
This section explains how to configure the ACSLS server to work with existing firewall setup. Configuring the
firewall using any application or hardware is left to the choice of the user. ACSLS needs to be configured and
defined ports (default: 30031) have to be permitted in the existing firewall setup. You can always change the
default ports and can use self-defined ports depending upon availability. Make sure that the defined port is
specified while configuring ACSLS to work through the firewall.
Configuring the CSI variables
Log in as acsss user and configure the CSI variables, as in the following example:
# su – acsss
Sun Microsystems Inc. SunOS 5.9 Generic May 2002
$ acsss_config
ACSLS feature configuration
Please enter the number followed by Return for your choice from the following menu
to configure product behavior in that area.
Press ? followed by the Return key for help.
1: Set CSI tuning variables
2: Set event logging variables
3: Set general product behavior variables
4: Set access control variables
5: Set automatic backup parameters
6: Rebuild Access Control information
7: Event Notification settings
8: Define or Change Library Configuration
E: Exit
Menu choice: 1