background image

Basic Administrative Procedures and Setup Completion

39

NAS 4000s and 9000s Administration Guide

Installing the HP Network Teaming Utility

Before using the HP Network Teaming utility, it must be installed. 

Note:  

Installing and configuring NIC teaming should always be performed via iLO port or the 

console using a direct attached keyboard, monitor, and mouse since IP connections could be reset 

during the configuration process. Do not use Remote Desktop.

To install the HP Network Teaming utility:

1. In the URL field of the Web browser, enter the IP address of the Integrated Lights-Out 

port.

Note:  

The iLO port requires a license key. The key is included with the product inside the Country 

Kit. Refer to the iLO Advanced License Pack for activation instructions.

Note:  

The iLO port can also be accessed from the HP Utilities tab of the WebUI by clicking the 

remote management link.

2. At the Integrated Lights-Out Account Login screen, supply the username and password for 

the iLO and click Login.

3. Click the Remote Console tab. The Remote Console Information screen is displayed.

4. Click on the Remote Console choice in the menu on the left side of the screen.

5. Press the Ctrl-Alt-Del button to login to the console.

6. Supply an administrator username and password. The NAS server desktop is displayed.

7. Double-click the NIC Team Setup icon on the desktop. 

8. When the following message box is displayed, click Install.

Figure 13:  Installing Network Teaming

9. When the installation process is complete, the following screen is displayed. Click Close.

Summary of Contents for NAS 4000s

Page 1: ...Edition November 2003 Part Number 352405 001 This guide provides information on performing the administrative tasks necessary to manage the HP StorageWorks NAS 4000s or 9000s server Overview information as well as procedural instructions are included in this guide ...

Page 2: ...ge without the prior written consent of Hewlett Packard The information contained in this document is subject to change without notice Microsoft MS DOS MS Windows Windows and Windows NT are U S registered trademarks of Microsoft Corporation UNIX is a registered trademark of The Open Group Hewlett Packard Company shall not be liable for technical or editorial errors or omissions contained herein Th...

Page 3: ...ized Reseller 17 1 System Overview 19 Product Definition and Information 19 Server Hardware and Software Features 19 Product Manageability 19 Product Redundancy 20 Deployment Scenarios 21 Configuration Options for the NAS Server 21 NAS Server as a Single Device 22 NAS Server as a Clustered Pair 23 Multi Node Support Beyond Two Nodes 23 Connecting NAS Servers to the Network 23 NAS Server Single Dev...

Page 4: ... 29 NAS Management Console 30 NIC Team Setup 30 2 Basic Administrative Procedures and Setup Completion 31 Basic Administrative Procedures 31 Setting the System Date and Time 32 Shutting Down or Restarting the Server 33 Viewing and Maintaining Audit Logs 34 Using Remote Desktop 35 Improper Closure of Remote Desktop 35 Setting up E mail Alerts 36 Changing System Network Settings 37 Setup Completion ...

Page 5: ...Creating and Managing File Shares 49 3 Storage Management Overview 51 Storage Management Process 51 Storage Elements Overview 53 Physical Hard Drives 53 Arrays 53 Logical Drives LUNs 55 Fault Tolerance Methods 56 RAID 0 Data Striping 56 Advantages 56 Disadvantages 56 RAID 1 0 Drive Mirroring and Striping 57 Advantages 57 Disadvantages 57 RAID 5 Distributed Data Guarding 58 Advantages 58 Disadvanta...

Page 6: ... Storage 69 ACU Guidelines 72 Managing Disks 73 Creating a New Volume via the WebUI 74 Advanced Disk Management 75 Guidelines for Managing Disks 76 Volumes Page 77 Managing Volumes 79 Dynamic Growth 80 Expanding a LUN 80 To extend a LUN where space is available in the array MSA1000 only 80 To extend a LUN where space is not available in the array MSA1000 only 81 Extending a partition on a basic di...

Page 7: ...Disabling Shadow Copies 104 Managing Shadow Copies from the NAS Desktop 105 Shadow Copies for Shared Folders 106 SMB Shadow Copies 106 NFS Shadow Copies 107 Recovery of Files or Folders 108 Recovering a Deleted File or Folder 109 Recovering an Overwritten or Corrupted File 110 Recovering a Folder 110 Backup and Shadow Copies 110 6 User and Group Management 111 Domain Compared to Workgroup Environm...

Page 8: ...egrating Local File System Security into Windows Domain Environments 135 Comparing Administrative Hidden and Standard Shares 135 Planning for Compatibility between File Sharing Protocols 135 NFS Compatibility Issues 136 Managing Shares 136 Creating a New Share 136 Deleting a Share 137 Modifying Share Properties 138 Windows Sharing 138 UNIX Sharing 139 Web Sharing HTTP 140 Protocol Parameter Settin...

Page 9: ...he NFS User Mapping Server 158 Logging Events 159 Server for NFS Server Settings 160 Installing NFS Authentication Software on the Domain Controllers and Active Directory Domain Controllers 162 Understanding NTFS and UNIX Permissions 164 NFS File Shares 164 Creating a New Share 164 Deleting a Share 166 Modifying Share Properties 166 Anonymous Access to an NFS Share 168 Encoding Types 169 NFS Only ...

Page 10: ...nt 187 Installing Services for NetWare 188 Managing File and Print Services for NetWare 190 Creating and Managing NetWare Users 191 Adding Local NetWare Users 191 Enabling Local NetWare User Accounts 192 Managing NCP Volumes Shares 193 Creating a New NCP Share 193 Modifying NCP Share Properties 195 10 Cluster Administration 197 Cluster Overview 197 Multi Node Support Beyond Two Nodes 197 Cluster T...

Page 11: ...rum Disk 209 Configuring Shared Disks 210 Verifying Disk Access and Functionality 210 Install Cluster Service Software 211 Creating a Cluster 211 Adding Nodes to a Cluster 212 Geographically Dispersed Clusters 214 HP Storage Works NAS Software Updates 214 Cluster Groups and Resources including File Shares 214 Cluster Group Overview 215 Node Based Cluster Groups 215 Load Balancing 215 Cluster Resou...

Page 12: ...he Cluster 229 Powering Up the Cluster 230 Shadow Copies in a Clustered Environment 231 Creating a Cluster Printer Spooler 231 11 Remote Access Methods and Monitoring 233 Web Based User Interface 234 Remote Desktop 234 Integrated Lights Out Port 234 Features 235 Security Features 235 Manage Users Feature 235 Manage Alerts Feature 236 Integrated Lights Out Port Configuration 236 Using the Integrate...

Page 13: ...ormation to help administrators Plan the storage configuration Set up physical storage Manage users and groups Manage folders and shares Manage a UNIX file system Manage a NetWare file system Remotely access the NAS server About this Guide topics include Overview page 14 Conventions page 15 Rack Stability page 17 Getting Help page 17 ...

Page 14: ...ence This book is intended for use by system administrators who are experienced with setting up and managing a network server Prerequisites Before beginning make sure you consider the items below Knowledge of Microsoft Windows NT or Windows Storage Server 2003 operating system Knowledge of HP hardware Location of all documentation shipped with your server ...

Page 15: ...ath Caution Text set off in this manner indicates that failure to follow directions could result in damage to equipment or data Note Text set off in this manner presents commentary sidelights or interesting points of information Table 1 Document Conventions Element Convention Cross reference links Figure 1 Key and field names menu items buttons and dialog box titles Bold File names application nam...

Page 16: ...onnectors into this receptacle Any surface or area of the equipment marked with these symbols indicates the presence of a hot surface or hot component Contact with this surface could result in injury WARNING To reduce the risk of personal injury from a hot component allow the surface to cool before touching Power supplies or systems marked with these symbols indicate the presence of multiple sourc...

Page 17: ...bers for worldwide technical support are listed on the following HP website http www hp com support From this website select the country of origin Note For continuous quality improvement calls may be recorded or monitored Be sure to have the following information available before calling Technical support registration number if applicable Product serial numbers Product model names and numbers Appl...

Page 18: ...About this Guide 18 NAS 4000s and 9000s Administration Guide ...

Page 19: ...the enterprise class NAS 9000s are solutions that provide reliable performance manageability and continuous data availability through the fusion of Network Attached Storage NAS and Storage Area Network SAN technologies Server Hardware and Software Features Refer to the HP StorageWorks NAS 4000s 9000s Installation Guide for a listing of server hardware and software features For specific software pr...

Page 20: ...hance the overall dependability of the NAS server The server contains dual 36 4 GB hard drives preconfigured with the NAS operating system so that the active system volume is mirrored RAID 1 0 to the second drive If one of the internal drives fails the integrity of the system is preserved because the system will use the copy of the operating system on the remaining healthy drive The drives in the ...

Page 21: ... file sharing protocols allows companies to continue to invest in file storage space without concerns about obsolescence For example an administrator planning a future transition from Windows to Linux can deploy the NAS server with confidence that it can support both CIFS and NFS simultaneously assuring not only a smooth transition but also a firm protection of their investment Remote office deplo...

Page 22: ...ended but not required for stand alone deployments since dual HBAs allow for path failure while still providing access to the data SAN storage is not managed by the NAS server and requires coordination between the NAS administrator and the SAN administrator LUN requests need to be made and assigned to the NAS server using selective storage presentation from the SAN controller pairs Naming of the L...

Page 23: ... the unit of ownership among nodes is at the disk level Therefore individual fileshares can be accessed by only one node at a time based on which node owns the disk Figure 2 NAS server as a clustered pair of devices Multi Node Support Beyond Two Nodes The NAS 4000s and 9000s devices may be deployed in multi node clustering beyond two nodes Refer to the associated Storage Array documentation to det...

Page 24: ...tion be placed on a management LAN separate from the corporate infrastructure The NAS server supports the use of NIC teaming NIC teaming provides failover and load balancing of network ports of the NAS server NIC teaming requires the network cables to be installed on the same subnet to enable it to work For example in Figure 3 Eth1 and Eth2 would need to be on the same subnet to enable this functi...

Page 25: ...ster node will assume the other node has gone down and initiate a failover A second cluster heartbeat path is often recommended as a redundant path The redundant path is often done over one of the remaining network segments and is not dedicated The client data segments of a cluster must reside on identical network segments for each node As illustrated in Figure 4 Eth2 from both nodes is shown on t...

Page 26: ...r no computing environment planning is required Note In a clustered deployment the clusters must be members of a domain Therefore workgroup environments are supported only in non clustered deployments Domain When operating in a Windows NT or Active Directory domain environment the NAS server is a member of the domain and the domain controller is the repository of all account information Client mac...

Page 27: ...share management and local storage management Refer to the HP StorageWorks NAS 4000s 9000s Installation Guide for detailed information on using the Rapid Startup Wizard for initial setup To access the WebUI launch a Web browser and enter the following in the address field https your NAS machine name or IP Address 3202 The default user name is Administrator The default password is hpinvent Online h...

Page 28: ...are from this tab Maintenance Maintenance tasks include setting date and time performing system restarts and shutdowns viewing audit logs setting up Email alerts linking to remote management and selecting and configuring your UPS HP Utilities Access HP system management utilities such as remote management enable floppy boot File and Print Services for NetWare and the HP System Management WebUI Clu...

Page 29: ... Directly connecting a keyboard mouse and monitor Using the WebUI Maintenance tab and selecting Remote Desktop Using the Integrated Lights Out port Note When using Remote Desktop to connect to the NAS desktop do not use the window close feature Click on Start Log Off Administrator to exit Remote Desktop See Improper Closure of Remote Desktop in Chapter 2 Figure 6 NAS server desktop The following i...

Page 30: ...ains access to the HP Array Configuration Utility and local disk management including a volume list and a graphical view of the disks File Sharing contains modules for the configuration of file sharing exports CIFS SMB Windows and NFS UNIX file shares are managed through this folder System contains system summary information NIC Team Setup Click this icon to install the HP Network Teaming and Conf...

Page 31: ...ation Overview tab from the primary WebUI screen Unless otherwise instructed all procedures are performed using the NAS Web Based User Interface WebUI Note The NAS Desktop can be accessed via a directly connected keyboard mouse and monitor through Remote Desktop or by using an Integrated Lights Out port Basic Administrative Procedures Basic administrative procedures include Setting the system date...

Page 32: ...gure 7 Maintenance menu Setting the System Date and Time To change the system date or time 1 From the WebUI select Maintenance and Date Time The Date and Time Settings dialog box is displayed 2 Enter the new values and then click OK The Maintenance menu is displayed Figure 8 Date and Time dialog box ...

Page 33: ...tdown Several options are displayed Restart Shut Down and Scheduled Shutdown Figure 9 Shutdown menu a To shut down and automatically restart the server click Restart b To shut down and power off the server click Shut Down c To schedule a shutdown click Scheduled Shutdown 2 Regardless of the choice a confirmation prompt is displayed After verifying that this is the desired action click OK Note Clie...

Page 34: ...s from the WebUI select Maintenance Logs The Logs menu is displayed Figure 10 Logs menu A variety of logs are available and are listed in Figure 10 Each log has viewing clearing printing and saving options Note You should not use the WebUI to view log files greater than 2 MB Select Log properties to adjust the maximum file size or download the file to view Note NFS logging is disabled by default E...

Page 35: ... window close feature to close that session of Remote Desktop Click Start Log Off Administrator to exit Remote Desktop Improper Closure of Remote Desktop Certain operations can leave the utilities running if the browser is closed versus exiting from the program via the application menu or logging off the Remote Desktop session The default timeout has been set to 15 minutes but it may require up to...

Page 36: ...s occurred Initiating a restart using the Windows Storage Server 2003 schedule or Desktop will not Messaging in the status bar and page is limited to the following areas WebUI Alerts NTBackup backup started NTBackup restore started Defrag started UPS power failure Restart pending Shutdown pending DFS not configured Date and time not configured No certificate Quota management alerts Event Log Messa...

Page 37: ...he appropriate boxes 5 After all settings have been entered click OK Changing System Network Settings Network properties are entered and managed from the Network menu Most of these settings are entered as part of the Rapid Startup process Settings made from this menu include adding the NAS server to a domain Online help is available for these settings Figure 12 is an illustration of the Network se...

Page 38: ... activation instructions To access the iLO port click on HP Utilities then click Remote Management Setting up Ethernet NIC Teams Optional The NAS server is equipped with the HP Network Teaming and Configuration utility The utility allows administrators to configure and monitor Ethernet network interface controllers NIC teams in a Windows based operating system These teams provide options for incre...

Page 39: ... inside the Country Kit Refer to the iLO Advanced License Pack for activation instructions Note The iLO port can also be accessed from the HP Utilities tab of the WebUI by clicking the remote management link 2 At the Integrated Lights Out Account Login screen supply the username and password for the iLO and click Login 3 Click the Remote Console tab The Remote Console Information screen is display...

Page 40: ...e system Caution To ensure proper functioning of the software the server must be restarted at this time Opening the HP Network Teaming Utility The HP Network Teaming utility is now accessible from the Windows toolbar at the bottom of the NAS server desktop To open the utility click the HP Network Teaming utility icon Figure 15 HP Network Teaming utility icon ...

Page 41: ...utility becomes unstable if static IP addresses subnets and DNS addresses are set before teaming Duplex and speed settings must be set to use the default values To team the NICs 1 Open the HP Network Teaming utility The Network Teaming and Configuration Properties dialog box is displayed The type of NIC and the slot and port used is shown Figure 16 HP Network Teaming Properties dialog box 2 Highli...

Page 42: ...Now option is disabled until Manual is selected and then OK is clicked Fail on Fault This setting automatically switches from a primary NIC to a secondary NIC when the primary NIC fails Smart Switch This setting lets a member of a team be selected as the preferred Primary Smart Switch NIC As long as this NIC is operational it is always the active NIC If the NIC fails and it is eventually restored ...

Page 43: ... team members by the switch If a failure of any team member occurs the packets are load balanced among the remaining adapters There is no primary adapter in a Switch assisted Load Balancing team Balance with MAC Address This feature allows load balancing of IP packets among the teamed NICs using the last four bits of the MAC Address See following Note Balance with IP Address This feature allows lo...

Page 44: ...aming the teamed connection Selecting the option to show an icon on the taskbar Configuring TCP IP on the new team Renaming the Teamed Connection The assigned name for the new NIC team connection is Local Area Connection X where X represents the next available connection number generated by the system HP recommends changing this name to a more meaningful name such as NIC Team To change the name of...

Page 45: ...ual network adapter for the team is automatically created However by default the new adapter is set to DHCP To manually configure the IP address perform the following steps To enter the TCP IP address information for the team 1 From the desktop go to the Network and Dial up Connections screen and click Properties Right click the NIC Team icon and then select Properties A screen similar to the foll...

Page 46: ... Figure 21 NIC Team TCP IP Properties dialog box Note If a NIC is teamed do not modify the TCP IP settings for the individual NIC ports 4 Select Use the following IP address and enter the IP address and subnet mask If desired enter the default gateway 5 Click OK The Ethernet Team should be working ...

Page 47: ...47 NAS 4000s and 9000s Administration Guide Checking the Status of the Team To check the status of the Ethernet Team open the HP Network Teaming utility The Configuration Properties screen is displayed showing the teamed NICs Figure 22 NIC Teaming status ...

Page 48: ...tive Installed inactive The NIC is installed and is OK but is not active Cable fault The driver is installed in the registry and is loaded The broken cable indicator means that the cable is unplugged loose broken or the switch or hub is not operating properly If this icon is displayed check all network connections and make sure the hub switch is working properly When the connection is restored thi...

Page 49: ... Disk Manager to manage volumes and Shadow Copies to manage snapshots See the following chapters for more detailed information on managing system storage Chapter 3 provides a storage management overview Chapter 4 discusses disk management procedures Chapter 5 discusses snapshot shadow copy management procedures Chapter 7 discusses folder and share management procedures Creating and Managing Users ...

Page 50: ...Basic Administrative Procedures and Setup Completion 50 NAS 4000s and 9000s Administration Guide ...

Page 51: ...s at the physical drive level Physical drives are grouped into arrays for better performance and fault tolerance The arrays are then configured with RAID fault tolerance and presented to the operating system as logical drives or units which are called LUNs At the virtual level of storage the WebUI is used to take the LUNs and create basic or dynamic disks which can then be broken down into partiti...

Page 52: ...ster Virtual Server Groups Network Name IP Address Cluster Admin File Folders Storage Elements Logical Storage Elements File System Elements Shadow Copy Elements Cluster Elements File Sharing Elements CIFS and NFS File Shares Engineering Marketing Users Sales Engineering Marketing Users Sales Customers from 02 10 03 09 30 snapshot 0 from 02 10 03 11 30 snapshot 1 from 02 10 03 09 30 snapshot 0 fro...

Page 53: ...l Hard Drives For personal or small business use the capacity and performance of a single hard drive is adequate However larger businesses demand higher storage capacities higher data transfer rates and greater security from data loss if drives fail Merely adding extra drives to the system increases the total storage capacity but has little effect on the system efficiency because data can only be ...

Page 54: ...6 Figure 26 RAID 0 data striping S1 S4 of data blocks B1 B12 For data in the array to be readable the data block sequence within each stripe must be the same This sequencing process is performed by the array controller which sends the data blocks to the drive write heads in the correct order A natural consequence of the striping process is that each hard drive in a given array will contain the sam...

Page 55: ...to arrays they are ready to be converted into logical drives Options for working with arrays vary from SAN storage to SAN storage system The individual documentation included with each storage system should be reviewed It is important to note that a LUN may extend over span all physical drives within a storage controller subsystem but cannot span multiple storage controller subsystems After a LUN ...

Page 56: ...MSA1000 RAID 5DP is available only with HP Virtual Arrays and is equivalent to ADG These fault tolerance methods are discussed in the following paragraphs RAID 0 Data Striping This configuration provides striping of the array to improve read and write performance but offers no redundancy of data and therefore no protection against data loss when a drive fails However RAID 0 is useful for rapid sto...

Page 57: ...st of hard drives The operating system drives are mirrored If one drive fails the mirror drive immediately takes over and normal system operations are not interrupted Note HP supports a configuration that uses RAID 1 0 on the system drives in a two drive RAID array Caution If two drives being mirrored to each other both fail data loss occurs Advantages Drive mirroring offers The highest read and w...

Page 58: ... drives to reconstruct data from the failed drive RAID 5 allows the system to continue operating with reduced performance until the failed drive is replaced However if more than one drive fails RAID 5 also fails and all data in the array is lost Distributed data guarding uses the equivalent of one drive to store parity information and requires an array with a minimum of three physical drives In an...

Page 59: ...lity that data loss will occur when configured with RAID ADG or RAID 5DP is less than when configured with RAID 5 Note The ADG feature is available only with the MSA1000 RAID 5DP is available only with HP Virtual Arrays and is equivalent to ADG Figure 30 RAID ADG advanced data guarding with two sets of parity data Advanced Data Guarding technology offers the best combination of fault tolerance and...

Page 60: ...AID supported by the Smart Array controllers The decision chart in the following table may help determine which option is best for different situations Table 3 Summary of RAID Methods RAID 0 Striping no fault tolerance RAID 1 0 Mirroring RAID 5 Distributed Data Guarding RAID ADG Advanced Data Guarding Maximum number of hard drives N A N A 14 Storage system dependent Tolerant of single hard drive f...

Page 61: ...ogical Storage Elements Overview Logical Storage elements consist of those components that translate the physical storage elements to the file system elements as presented in Figure 23 The NAS server utilizes the WebUI to manage the various types of disk presented to the file system The WebUI has two types of LUN presentation basic disk and dynamic disk Each of these types of disk has special feat...

Page 62: ...ting and recreating the volume unless it is a simple volume Simple volumes can be mirrored or converted to spanned volumes Fault tolerant disks cannot be extended either Therefore selection of the volume type is important Please note that the same performance characteristics on numbers of reads and writes apply when using fault tolerant configurations as is the case with controller based RAID Thes...

Page 63: ...dow copies should not replace the current backup archive or business recovery system but they can help to simplify restore procedures For example shadow copies cannot protect against data loss due to media failures however recovering data from shadow copies can reduce the number of times needed to restore data from tape Detailed information on Shadow Copies can be found in Chapter 5 of this guide ...

Page 64: ...protocols cannot be set up through cluster administrator nor will they failover during a node failure Caution AppleTalk shares should not be created on clustered resources as this is not supported by Microsoft Clustering and data loss may occur Network names and IP address resources for the clustered file share resource may also be established for access across a network to a variety of clients Pe...

Page 65: ... as a supplement to this administration guide The primary web page for facilitating disks and volume creation is illustrated in Figure 31 The figure in the diagram illustrates the process of creating arrays volumes and shadow copies The diagram on the left illustrates the logical steps used to manage disks beginning with the array management at the top The process follows the diagram from top to b...

Page 66: ...erve disk capacity and status scan for new disks view detailed disk properties and create new volumes Volumes Manage disk space usage by enabling quotas scheduling disk defragmentation and performing detailed volume management using the Manage button Shadow Copies Manage shadow copies of shared folders on the volume Shadow copies are read only copies of shared data that provide users via network s...

Page 67: ...array controller in the left pane of the interface before beginning array configuration Some NAS systems are equipped with array controllers for both internal and external storage Consult the Help available in ACU for details on creating arrays if necessary Step 2 Create Logical Disks from the Array Space From the ACU 1 Select a previously created array 2 Click Create Logical Drive from the right ...

Page 68: ...ew logical disk 1 Click Create New Volume 2 Enter the volume size 3 Select a drive letter 4 Enter a mount point if desired 5 Select to format the volume if desired 6 Click OK 7 Select whether or not to quick format the volume 8 Enter a volume label 9 Enter the allocation unit size 10 Click OK ...

Page 69: ... of arrays Online RAID level and stripe size migration Manages OS and data drives Each time the Array Configuration Utility is run it analyzes the configuration of the Array Controllers installed in the system From the Main page various options are available to change or reconfigure the controller s This document only covers a subset of the functions available in the ACU For complete documentation...

Page 70: ... storage 4 Log in to the ACU utility The default user name is administrator and the default password is administrator Figure 33 Systems Management Homepage The Array Configuration Utility is displayed Figure 34 Array Configuration Utility 5 Select a controller from the list on the left side to begin configuration ...

Page 71: ... controller but it does offer more control over the configuration and provides for a more individualistic setup Standard Configuration default Select Standard Configuration to quickly configure a controller Choosing Standard Configuration is the fastest way to configure a controller but requires an intermediate to advanced level of knowledge concerning storage The Standard Configuration path offer...

Page 72: ... NAS OS Spanning more than 14 disks with a RAID 5 volume is not recommended Designate spares for RAID sets to provide greater protection against failures RAID sets cannot span controllers A single array can contain multiple logical drives of varying RAID settings Extending and Expanding Arrays and Logical Drives is supported RAID migration is supported ...

Page 73: ...y default drives are dynamically recognized by the system Occasionally a rescan of the hardware is required The rescan is not synchronous and may require a browser refresh after the scan is initiated to display the new content Initialize Disk Initializes any empty disk to type basic Disk Erase Erases the selected disk Convert Disk Converts the selected disk from basic to dynamic or dynamic to basi...

Page 74: ... new volume via the WebUI 1 Click the Disks tab then click Disks 2 Select the Disk to create the new volume on 3 Click Create New Volume Figure 36 Creating a new volume page 1 4 Enter the volume size 5 Select a drive letter 6 Enter a mount point if desired 7 Select to format the volume if desired 8 Click OK ...

Page 75: ...k Management button on the Manage Disks screen is selected the Disk Management Utility is opened in a remote desktop session The Disk Management tool is a system utility for managing hard disks and the volumes or partitions that they contain The WebUI provides most of the functionality required for NAS disk management However there are some instances where the Disk Manager is required For example ...

Page 76: ...the WebUI Do not alter the Operating System Disk Labeled Local Disk C Do not alter the disk labeled DON T ERASE The use of software RAID based dynamic volumes is not recommended use the array controller instead it is more efficient The largest disk that Windows Storage Server 2003 can accommodate from a storage system is 2 TB It is not recommended to span array controllers with dynamic volumes Use...

Page 77: ...nd since they provide the greatest level of support for snapshots encryption and compression Only basic disks can be formatted as FAT or FAT32 Dynamic disks are not supported nor can they be configured in a cluster Volumes Page On the Volumes page administrators can select to manage volumes schedule defragmentation and set or manage quotas The Volumes page displays all volumes that are formatted N...

Page 78: ...rag Select to schedule defragmentation for the selected volume Set Default Quota Select to set quota limits to manage use of the volume Settings on this page apply to new users and any users for whom user quota entries have not previously been set Set Quota Entries Select to show a list of user quota entries Then create a new quota entry delete a quota entry or view the properties of a quota entry...

Page 79: ...e Volumes screen Table 7 Manage Volumes Options Option Task Delete Select to delete the selected volume This is data destructive and there is no recovery other than from tape Extend Opens a page to extend a partition based on a basic disk or to extend dynamic based volumes Rescan Select to detect a volume or partition added to the system or to update the size of a volume that has undergone expansi...

Page 80: ...array configuration software applicable to the storage array in use In the case of the MSA1000 controller this is accomplished via the Array Configuration Utility presented on the Disk page LUN expansion may occur in Disk Arrays where space is available If insufficient space is available additional physical disks may be added to the array dynamically Figure 41 Expanding a LUN MSA1000 only To exten...

Page 81: ...he instructions for extending a LUN Extending a partition on a basic disk Partitions can be extended using either the WebUI extend function from the Managed Volumes page extend selection or by using the DiskPart command line utility The Windows Disk Manager cannot extend basic disk partitions To extend a partition using the WebUI follow the steps below 1 Click the Disks tab 2 Click the Volumes tab...

Page 82: ...xtending a Volume on Dynamic Disks non clustered systems only The WebUI allows for the extension of volumes based on a dynamic disk or a set of dynamic disks To extend a volume perform the following steps 1 Click the Disks tab 2 Click the Volumes tab 3 Click Manage 4 Select the volume to extend and select Extend ...

Page 83: ...top Complete help is available from the Windows Storage Server 2003 desktop under Start Help and Support To use DiskPart follow the steps below Connect to the box through remote desktop login and select the command prompt icon 1 Type Diskpart 2 From the Diskpart prompt type the following commands Type list to display all of the volumes Type select name of volume for example select Volume 4 to work...

Page 84: ...ecify when defragmentation will occur The available controls change according to the frequency that is selected 8 Click OK To disable defragmentation for a volume 1 On the primary navigation bar click Disks 2 Click Volumes 3 Select the volume to disable defragmentation 4 In the Tasks list choose Schedule Defrag 5 On the Manage the defragmentation schedule for VolumeName page clear the Schedule def...

Page 85: ...in drive letter information placing the drive letter into the volume label is recommended To change the drive letters to the appropriate ones go into Disk Management and perform the following steps for each volume 1 Right click the on the volume that needs to be changed 2 Select Change Drive Letter and Paths 3 In the Change Drive Letter and Paths dialog box select Change Figure 44 Change Drive Let...

Page 86: ...lick Yes to confirm the drive letter change Figure 46 Confirm drive letter change 6 If the dialog box in Figure 47 is displayed select Yes to continue If the old drive letter needs to be reused reboot the server after clicking Yes Figure 47 Disk Management warning ...

Page 87: ...eir quota limit Enabling quotas and not limiting disk space use is useful to still allow users access to a volume but track disk space use on a per user basis It is also possible to specify whether or not to log an event when users exceed either their quota warning level or their quota limit When enabling disk quotas for a volume volume usage is automatically tracked from that point forward but ex...

Page 88: ...volume 1 On the primary navigation bar click Disks 2 Click Volumes 3 Select the volume to manage 4 In the Tasks list click Set Default Quota 5 On the Default Quota for volume page clear the check box to Use quota limits to manage use of the volume 6 Click OK Setting User Quota Entries The Set User Quotas page allows the administrator to set delete or change disk quotas for any user on the server T...

Page 89: ... Quota Entry 2 Select a user 3 Set the limit 4 Set the warning level 5 Click OK Figure 49 Add new quota entry To change a quota entry 1 Select the quota to change 2 Click Properties 3 Change the limit 4 Change the warning level 5 Click OK To delete a quota entry 1 Select the quota to change 2 Click Delete ...

Page 90: ...the volume with focus convert basic Converts an empty dynamic disk to a basic disk convert dynamic Converts a basic disk into a dynamic disk Any existing partitions on the disk become simple volumes create volume simple Creates a simple volume After creating the volume the focus automatically shifts to the new volume exit Exits the DiskPart command interpreter help Displays a list of the available...

Page 91: ...and Support search on DiskPart Example of using DiskPart The following example shows how to configure a volume on the NAS server In the cmd window type c diskpart DISKPART Rescan DISKPART select disk 2 DISKPART convert dynamic DISKPART REM Create a simple volume DISKPART create volume simple size 4000 DISKPART REM Assign drive letter E to the volume DISKPART assign letter E DISKPART list vol DISKP...

Page 92: ...Disk Management 92 NAS 4000s and 9000s Administration Guide ...

Page 93: ...le at a particular point in time Since the snapshot only contains a subset of the original blocks the cache file is typically smaller than the original volume In the snapshot s original form it takes up no space since blocks are not moved until an update to the disk occurs By using shadow copies a NAS server can maintain a set of previous versions of all files on the selected volumes End users acc...

Page 94: ...vious version of the file or be able to read the file after it has been restored Although shadow copies are taken for an entire volume users must use shared folders to access shadow copies Administrators on the local server must also specify the servername sharename path to access shadow copies If administrators or end users want to access a previous version of a file that does not reside in a sha...

Page 95: ...en determining the amount of space to allocate for storing shadow copies consider both the number and size of files that are being copied as well as the frequency of changes between copies For example 100 files that only change monthly require less storage space than 10 files that change daily To change the storage volume shadow copies must be deleted The existing file change history that is kept ...

Page 96: ...ease of setup and maintenance there may be a reduction in performance and reliability Caution If shadow copies are stored on the same volume as the user files note that a burst of disk input output I O can cause all shadow copies to be deleted If the sudden deletion of shadow copies is unacceptable to administrators or end users it is best to use a separate volume on separate disks to store shadow...

Page 97: ...ntfsinfo command To change the cluster size on a volume that contains data backup the data on the volume reformat it using the new cluster size and then restore the data Mounted Drives A mounted drive is a local volume attached to an empty folder called a mount point on an NTFS volume When enabling shadow copies on a volume that contains mounted drives the mounted drives are not included when shad...

Page 98: ...elect the check box next to the volume name and then choose a task from the Tasks list Copies Lists the number of shadow copies on the volume Used Space Lists the total disk space that is used by the shadow copies on the volume Shares Lists the number of shared folders that reside on the volume This information can help determine whether to enable shadow copies on a volume A greater number of shar...

Page 99: ...n can be altered to reside on a dedicated volume separate from the volumes containing files shares See Figure 52 Table 10 Shadow Copies Tasks Task Description Enable Click to enable Shadow Copies on the selected volume Disable Click to enable Shadow Copies on the selected volume New Shadow Copy Click to immediately create a new shadow copy on the selected volume View Shadow Copies Click to view a ...

Page 100: ...it too high takes up valuable storage space Setting the limit too low can cause shadow copies to be purged too soon or not created at all By storing shadow copies on a separate volume space for Shadow Copies may be manage separately limits can generally be set higher or set to No Limit See the properties tab of the shadow copy page for a volume to alter the cache file location covered later in thi...

Page 101: ...o enable the Shadow Copies service on Note After the first shadow copy is created it cannot be relocated Relocate the cache file by altering the cache file location under Properties prior to enabling shadow copy See Viewing Shadow Copy Properties in this chapter 4 Click Enable To create a shadow copy on a volume 1 On the primary navigation bar click Disks 2 Click the Shadow Copies tab 3 On the Man...

Page 102: ... volume 4 In the Tasks list click Set Schedule 5 On the Shadow Copy Schedules page click New 6 Select a frequency Once Daily Weekly or Monthly 7 Use the remaining controls to specify the recurrence pattern and the starting date and time The available controls change according to the frequency selected 8 Click OK Deleting a Shadow Copy Schedule To delete a shadow copy schedule on a volume 1 On the ...

Page 103: ...ilable disks and the space available on each is presented at the bottom of the page Managing the cache files on a separate disk is recommended Note If shadow copies have already been enabled the cache file location is grayed out To change this location after shadow copies have been enabled all shadow copies must be deleted and cannot be recovered Remember enabling Shadow Copies creates a Shadow Co...

Page 104: ...n bar click Disks 2 Click the Shadow Copies tab 3 On the Manage Shadow Copies page select one or more volumes on which to disable shadow copies 4 In the Tasks list click Disable The Disable Shadow Copies page identifies the volume for which shadow copies will be disabled 5 Click OK to delete all existing shadow copies and settings for the volume Caution When the Shadow Copies service is disabled a...

Page 105: ...Remote Desktop To access Shadow Copies from the NAS Desktop 1 From the WebUI select Remote Desktop from the Maintenance tab 2 Click My Computer 3 Select the volume 4 Right click the volume name and select Properties 5 Click the Shadow Copies tab The user interface provides the same functionality found in the WebUI but in Win32 form See Figure 54 Figure 54 Accessing Shadow Copies from My Computer ...

Page 106: ...AppleTalk or NetWare shares Consequently users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files However administrators can take advantage of Shadow Copies for Shared Folders to restore files on behalf of these users SMB Shadow Copies Windows users can independently access previous versions of files stored on SMB shares via th...

Page 107: ...om the folder history and so on NFS Shadow Copies UNIX users can independently access previous versions of files stored on NFS shares via the NFS client no additional software is required Server for NFS exposes each of a share s available shadow copies as a pseudo subdirectory of the share Each of these pseudo subdirectories is displayed in exactly the same way as a regular subdirectory is display...

Page 108: ...ystem for the arrival or removal of shadow copies and updates the root directory view accordingly Clients then capture the updated view the next time they issue a directory read on the root of the share Recovery of Files or Folders There are three common situations that may require recovery of files or folders Accidental file deletion the most common situation Accidental file replacement which may...

Page 109: ...ected 3 Right click the mouse and select Properties from the bottom of the menu Select the Previous Versions tab 4 Select the version of the folder that contains the file before it was deleted and then click View 5 View the folder and select the file or folder to recover The view may be navigated multiple folders deep 6 Select restore to restore the file or folder to its original location Selectin...

Page 110: ...ns tab 3 Choose either Copy or Restore 4 Choosing Restore enables the user to recover everything in that folder as well as all subfolders Selecting Restore will not delete any files Backup and Shadow Copies As mentioned previously Shadow Copies are only available on the network via the client application and only at a file or folder level as opposed to the entire volume Hence the standard backup a...

Page 111: ... credential includes the username password and if appropriate domain information Using the credential the server authenticates and provides the corresponding access to the user When a NAS server is deployed into a workgroup environment all user and group account access permissions to file resources are stored locally on the server By contrast when a NAS server is deployed into a domain environment...

Page 112: ...ionship between the username and the person who uses the account It is important that rules are established to ensure that usernames are Systematic Easy to follow and implement Easy to remember Using a combination of the user s first name middle initial and last name results in systematic usernames for every member of a particular organization Common examples include First initial followed by last...

Page 113: ...uld not be managed locally In a workgroup environment users and groups are managed through the WebUI of the NAS server Within the Users option there are two choices Managing local users Managing local groups User and group administrative tasks include adding deleting and modifying user and group information Managing local users and managing local groups are discussed in the following paragraphs Ma...

Page 114: ...ing paragraphs Existing user records can be retrieved in one of two ways By entering the user s User Name or Full Name in the Search fields to retrieve a specific user record To redisplay the complete user list space out the Search field By selecting the user from the list of displayed users in the dialog box The sort order of the display is controlled by clicking the Name field heading The names ...

Page 115: ...ser is added and the Local Users dialog box is displayed again Deleting a User To delete a user 1 In the Local Users dialog box select the user to delete and then click Delete The Delete User dialog box is displayed including a warning note about deleting users 2 To delete the user click OK The user is deleted and the Local Users dialog box is displayed again ...

Page 116: ...gain Modifying User Properties To modify other user properties 1 From the Local Users dialog box select the user whose record needs to be modified Then click Properties The General information page of the Properties dialog box is displayed Figure 59 is an illustration of the User Properties dialog box Figure 59 User Properties dialog box 2 The following information can be changed or set User name ...

Page 117: ... group Modifying group properties including user memberships Local groups in a workgroup environment are managed through the Users option in the WebUI In the WebUI under Users Local Groups is the Local Groups on Server dialog box All workgroup group administration tasks are performed in the Local Groups on Server Appliance dialog box Figure 60 Local Groups dialog box ...

Page 118: ...members of this group click Members See Modifying Group Properties for procedural instructions on entering group members 4 After all group information is entered click OK The group is added and the Local Groups dialog box is displayed again Deleting a Group To delete a group 1 From the Local Groups dialog box select the group to delete and then click Delete 2 The Delete Group dialog box is display...

Page 119: ...ch of these tabs is discussed in the following paragraphs 2 Enter the desired changes in each of the tabs Then click OK The Local Groups dialog box is displayed again General Tab Within the General tab basic group information can be changed including Group name Description Members Tab To indicate or change the members of a group click the Members tab Within this dialog box users are added and remo...

Page 120: ...o save the changes To add a user or group from a domain to this group the scroll bar at the right of the screen may need to be used to scroll up the screen display 1 Enter the user or group name to include in the indicated format domain username 2 Select Add 3 Enter a domain username and password 4 Click OK to complete adding the domain user or group Note To add domain users and groups to a local ...

Page 121: ...indows file system security is available on the Microsoft website www microsoft com Note The NAS 4000s and 9000s servers can be deployed in a clustered as well as a non clustered configuration This chapter discusses share setup for a non clustered deployment For information on managing file shares and printers in a cluster see the Cluster Administration chapter All procedures in this chapter are d...

Page 122: ...igate to a specific volume or folder from the WebUI select Shares and then Folders Initially the Volumes dialog box is displayed This initial dialog box displays all system volumes Figure 64 Volumes dialog box 2 From this dialog box navigate to a specific folder by selecting the appropriate volume and then clicking Manage Folders The Folders dialog box is displayed with a list of all of the folder...

Page 123: ...ties Creating a new share for the volume or folder Managing shares for the volume or folder Creating a New Folder To create a new folder 1 From the Shares directory navigate to the Folders menu and then select New The Create New Folder dialog box is displayed Two tabs are displayed General and Compress Use these two tabs to enter the parameters for the new folder 2 In the General tab enter a name ...

Page 124: ...elete Select the folder and then click Delete The Delete Folder dialog box is displayed Summary information about the deletion is displayed Note View the summary information to confirm that this is the intended share 2 Verify that the displayed folder is the folder to delete and then click OK The folder and all of its subfolders are deleted and the main dialog box is displayed again Modifying Fold...

Page 125: ... for a folder while working with that folder in the Folders screens A share can be created and if necessary new folders can be created while working with file shares in the Shares screens This section discusses creating shares from the Folders menu and is an overview of the procedures Complete details on the process of creating shares are included in the discussion that documents creating shares t...

Page 126: ... appropriate tab to enter protocol specific information See the Managing Shares section for detailed information about these entries 5 After entering all share information click OK Note The default permission settings for a new share are read only Managing Shares for a Volume or Folder Within the WebUI there are two access points to the same screens used to manage file shares While working with a ...

Page 127: ... the same whether shares are managed through the Folders menu or the Shares menu the procedures are only documented once See Deleting a New Share in the Share Management section for detailed procedural instructions on deleting file shares 4 To modify share properties select the share to modify and click Properties The Share Properties dialog box is displayed Because the screens are the same whethe...

Page 128: ...low the dialog box instructions To remove users and groups from the permissions list highlight the desired user or group and then click Remove The center section of the Security tab provides a listing of permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels To modify ownership of files or to modify indiv...

Page 129: ...in the Advanced screen 1 Select the desired user or group 2 Click Edit 3 Check all the permissions that you want to enable and clear the permissions that you want to disable Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission If neither box is selected permission is automatically disabled Figure 71 illustrates the Edit screen and some...

Page 130: ...Click Remove Replace permission entries on all child objects with entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Another area of the Advanced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be adde...

Page 131: ...ed Security Settings Auditing tab dialog box 4 Click Add to display the Select User or Group dialog box Figure 73 Select User or Group dialog box Note Click Advanced to search for users or groups 5 Select the user or group 6 Click OK Figure 74 illustrates the Auditing Entry screen that is displayed ...

Page 132: ...te Auditing must be enabled to configure this information Use the local Computer Policy Editor to configure the audit policy on the NAS server The Owner tab allows for taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security...

Page 133: ...alog box The current owner of the file or folder is listed at the top of the screen To take ownership 1 Select the appropriate user or group from the Change owner to list 2 If it is also necessary to take ownership of subfolders and files enable the Replace owner on subcontainers and objects box 3 Click OK to execute the commands ...

Page 134: ...NAS server can improve performance manageability and ease of use The content of shares should be carefully chosen to avoid two common pitfalls either having too many shares of a very specific nature or of having very few shares of a generic nature For example shares for general usage are easier to set up in the beginning but can cause problems later Frequently a better approach is to create separa...

Page 135: ...bdirectory apply instead This method results in a hierarchical security model where the network protocol permissions and the file permissions work together to provide appropriate security for shares on the device Note Share permissions and file level permissions are implemented separately It is possible for files on a file system to have different permissions from those applied to a share When thi...

Page 136: ...n the CIFS share name NFS service does not support exporting a child folder when its parent folder has already been exported An NFS client can access a child folder by selecting the parent folder and then navigating to the child folder If strict cross platform compatibility is an administration goal CIFS must be managed in the same way Do not share a folder through CIFS if the parent folder is alr...

Page 137: ...folder at the same time it creates the share Protocol specific tabs are available to enter sharing and permissions information for each sharing type See Modifying Share Properties for detailed information on these tabs 3 After entering all share information click OK Deleting a Share Caution Before deleting a share warn all users to exit that share and confirm that no one is using the share To dele...

Page 138: ... selected share is displayed 2 To enter or change client protocol information check the appropriate boxes and then click the corresponding tabs Windows Sharing UNIX Sharing Web Sharing HTTP Each of these tabs is discussed in the following paragraphs 3 After all share information has been entered click OK The Share menu is displayed again Windows Sharing From the Windows Sharing tab of the Share Pr...

Page 139: ...is added to the Permissions box To remove access to a currently approved user or group select the user or group from the Permissions box and then click Remove To indicate the type of access allowed for each user select the user and then expand the Allow and Deny drop down boxes Select the appropriate option 4 After all Windows Sharing information is entered either click the next Sharing tab or cli...

Page 140: ...share Use this permission to assign administrative access to the share This will allow the client computer to have root access to the NFS share Map the UNIX root user to the Windows user Administrator Also map the group that this UNIX root belongs to to the Windows group Administrator Read write Root Use this permission to allow clients to read or write to the share Use this permission to assign a...

Page 141: ...pter for information about protocol selection and management in a cluster To access and enter protocol parameter settings 1 From the Shares menu select Sharing Protocols The File Sharing Protocols dialog box is displayed Figure 80 File Sharing Protocols dialog box 2 Protocols and their statuses are listed The following options are available Enabling a protocol Disabling a protocol Modifying Protoc...

Page 142: ...as a domain root distributed file system The type of a distributed file system determines which client computers can access the distributed file system A stand alone DFS root Does not use Active Directory to manage DFS Cannot have more than one root on a server Does not support automatic file replication using the File Replication service FRS Is not fault tolerant and if the root fails the entire ...

Page 143: ...online help In addition general information on DFS may be found at http www microsoft com windowsserver2003 techinfo overview dfs mspx Accessing the DFS Namespace from other Computers In addition to the server based DFS component of the Windows Storage Server 2003 family there is a client based DFS component The DFS client caches a referral to a DFS root or a DFS link for a specific length of time...

Page 144: ...e to the local DFS root select Publish new shares to the local DFS root To set the default to publish the share to another DFS root select Publish new shares to a domain DFS root or a stand alone DFS root on a different server In the DFS root box type the path of the default DFS root To not publish the share to a DFS root select Do not publish new shares to a DFS root 5 Choose OK Creating a Local ...

Page 145: ...lone DFS root on the server only The Distributed File System administrative tool must be used to manage Domain DFS Roots Hence if there is more than one root on the server the first root in alphabetical order with local stand alone roots grouped ahead of domain roots will be available to be deleted If only domain roots exist on the server the first domain root will be listed but it cannot be delet...

Page 146: ... publish a share in a DFS root Figure 84 DFS share example 1 Select Shares from the WebUI 2 Type in a new share name 3 Type in a folder name select the checkbox Create folder if appropriate 4 Verify that the Windows checkbox is selected DFS is dependent on the SMB protocol 5 Under DFS check the box if unchecked Note The default behavior can be set to publish all shares to DFS In this case the box ...

Page 147: ...wing steps 1 Select Shares from the WebUI 2 Select the target share from the table and select Publish in DFS 3 Enter the name of the DFS root to publish the share too 4 Click OK The share will appear in the DFS underneath the DFS root Removing a Published Share from DFS Once a share is published in DFS it may be removed from the virtual namespace via the Shares Property page To remove a share from...

Page 148: ...ted in the Cluster Installation Guide See Figure 86 Figure 86 Uninstall storage manager Directory Quotas Directory quotas provide a way to limit and monitor space consumed by all files in a folder For information on setting quotas on volumes see Chapter 5 Directory quotas limit the size of the managed object regardless of who writes to or who owns files in the managed object For example if a 50MB ...

Page 149: ... allocation table FAT file systems may add to the confusion because the entire cluster is always allocated regardless of the file size NTFS file systems store very small files in the index file and typically have more reasonable cluster sizes Because of the differences in the amount of storage requested for a file extension operation and the amount actually allocated by Windows Storage Server 2003...

Page 150: ...Management 150 NAS 4000s and 9000s Administration Guide Each of these policies provides an example of a particular policy type Custom policies should be created to meet the needs of the environment Figure 87 Policies main page ...

Page 151: ...shares default policies can be set in advance for new devices added to the system via the preferences button on the Directory Quota Page File Screening File screening allows the administrator to limit or monitor files based on extension for example disallow all pst and mp3 files It should be noted that the filter is merely based on extensions and not the content of the files Hence if a file extens...

Page 152: ...s Storage reports allow the administrator to analyze the contents of the storage server via standard reports for common tasks The reports can be displayed using text simple HTML tables or Active HTML When using Active HTML the ActiveX control provides graphs A complete online help guide in the WebUI is provided for reporting via the in the right hand corner of the UI Reports can be scheduled or pr...

Page 153: ...rmation is needed to choose the correct printer driver The manufacturer and model are usually enough to uniquely identify the printer and its language However some printers support multiple languages and the configuration printout usually lists them Also the configuration printout often lists installed options such as extra memory paper trays envelope feeders and duplex units 3 Choose a printer na...

Page 154: ...izard is not able to connect the Additional Port Information Required page appears a Verify that the ip address or name that was entered is correct b Select Standard to identify the printer network adapter A list of manufacturers and models of the network adapters will be displayed Select the appropriate printer from the Standard list c If the printer network adapter uses nonstandard settings clic...

Page 155: ... Add Standard TCP IP Printer Port Wizard starts Click Next 6 Type the name or IP address of the printer The IP address is usually listed on the printer configuration page The wizard completes the Port Name field Click Next 7 The wizard attempts to connect to the printer If the wizard is able to connect the Completing the Add Standard TCP IP Printer Port Wizard page appears and click Finish If the ...

Page 156: ...ab 4 Select Additional Drivers 5 Select the desired operating systems and click OK 6 A dialog will appear to add the additional drivers from disk Installing Print Services for UNIX 1 Log on as administrator or as a member of the Administrators group 2 Click Start Control Panel and then click Add or Remove Programs 3 Click Add Remove Windows Components 4 In the Components list click Other Network F...

Page 157: ...rsion 2 and Version 3 and supports them both on the TCP and UDP network protocols Services for NFS is more fully integrated into the operating system than other third party NFS server packages The administrative interface for NFS exports is similar to the Server Message Block SMB sharing interface used by Windows platforms With Server for NFS properly configured the administrator can create shares...

Page 158: ...Squashing is the conversion of an unknown or filtered user to an anonymous user This anonymous user has very restricted permissions on the system Squashing helps administrators manage access to their exports by allowing them to restrict access to certain individuals or groups and to squash all others down to restricted or no access Squashing enables the administrator to allow permissions instead o...

Page 159: ...ter review and establishes log setting behavior Some behavior examples include events logged and log file size See the online Services for NFS help for more information 1 Use Remote Desktop to access the NAS Management Console click File Sharing Microsoft Services for Network File System Server for NFS Click the Logging tab 2 To log events to the event viewer application log click the check box fo...

Page 160: ...ling between TCP and UDP NFS versions 2 and 3 Other Server for NFS server settings include those that affect how file names are presented to NFS clients such as allowing hidden files and allowing case sensitive lookups Note The NFS Server service needs to be restarted when changing these settings Notify users when stopping and restarting the NFS Server service Use Remote Desktop to access the NAS ...

Page 161: ...Microsoft Services for NFS 161 NAS 4000s and 9000s Administration Guide Figure 90 Server for NFS screen Server Settings tab ...

Page 162: ...to open it Windows Installer is opened Note If the domain controller used does not have Windows Installer installed locate the file InstMSI exe on the SFU 3 0 directory and run it After this installation the Windows Installer program starts when opening setup exe 4 In the Microsoft Windows Services for UNIX Setup Wizard dialog box click Next 5 In the User name box type your name If the name of you...

Page 163: ... terms in the License Agreement and then click Next to continue installation If you click I do not accept the License Agreement Exit Setup the installation procedure terminates 6 Click Custom Installation and then click Next 7 In the Components pane click the down arrow next to Windows Services for UNIX and then click Entire component will not be available 8 Click the plus sign next to Authenticat...

Page 164: ...es NFS file shares are created in the same manner as other file shares however there are some unique settings Procedures for creating and managing NFS file shares are documented in the same sections as creating file shares for other protocols See the Folder and Share Management chapter for more information Note NFS specific information is extracted from the Folder and Share Management chapter and ...

Page 165: ...e character If you plan to use the same name when sharing a folder through SMB and then exporting it through NFS do not put spaces in the SMB share name To create a folder for the share check the indicated box and the system will create the folder at the same time it creates the share 3 Select the NFS Sharing tab to enter NFS specific information See Modifying Share Properties for information on t...

Page 166: ...ick Delete 2 Verify that this is the correct share and then click OK Modifying Share Properties To change share settings 1 From the Shares menu select the share to modify and then click Properties The General tab of the Share Properties dialog box is displayed Figure 92 Share Properties dialog box General tab The name and path of the selected share is displayed 2 To enter or change client protocol...

Page 167: ...ct all access to the share 4 Select whether or not to allow root access Check the Allow root access checkbox to add the root permission Read only Root Use this permission to restrict write access to the share Use this permission to assign administrative access to the share This will allow the client computer to have root access to the NFS share Map the UNIX root user to the Windows user Administra...

Page 168: ...user with administrative privileges due to Windows Storage Server 2003 security with anonymous users and the Everyone group 1 From the WebUI select Maintenance 2 Click Remote Desktop Log on to the NAS machine 3 Click Start Control Panel Administrative Tools and then click Local Security Policy 4 In Security Settings double click Local Policies and then click Security Options 5 Right click Network ...

Page 169: ...ance and is intended for NFS clients only The executable file nfsonly exe allows a share to be modified to do more aggressive caching to improve NFS performance This option can be set on a share by share basis Do not use this function on any file share that can be accessed by any means other than by NFS clients as data corruption can occur The syntax of this command is nfsonly sharename enable dis...

Page 170: ...nc Settings As mentioned in a previous section there are two versions of NFS Version 2 and Version 3 Version 3 supports additional file operations that Version 2 did not have such as asynchronous file operations To indicate whether to use asynchronous or synchronous write settings 1 From the WebUI access the NFS Protocol Properties menu by selecting Shares Sharing Protocols Select NFS Protocol and...

Page 171: ...S service to be restarted Notify users before toggling this setting Figure 95 NFS Async Sync Settings dialog box NFS Locks NFS supports the ability to lock files File locking helps prevent two or more users from working with the same files at the same time NFS locking depends on the software application components to manage the locks If an application does not lock a file or if a second applicatio...

Page 172: ...og box All clients that have locks on system files are listed in the Clients that hold locks box 3 To manually clear locks that a client has on files select the client from the displayed list and then click OK 4 To indicate the amount of time after a system failure that the locks are kept active enter the number of seconds in the Wait period box The NAS server keeps the locks active for the specif...

Page 173: ...ludes control over the naming conventions of client groups and users If the client group is given the same name as a client the client is obscured from the view of the server For example assume that a client d4 exists If a client group called d4 is created permissions can no longer be assigned to just the client d4 Any reference to d4 now refers to client group d4 To manage NFS client groups 1 Fro...

Page 174: ...lick Add The system adds the client to the displayed list of members 5 To remove a client from the group select the client from the Members box and then click Remove 6 After all clients have been added to the group click OK The NFS Client Groups dialog box is displayed again Deleting a Client Group To delete a group 1 From the NFS Client Groups dialog box select the group to delete and click Delet...

Page 175: ...bers of the group are listed in the Members box Figure 99 Edit NFS Client Groups dialog box 2 To add a client to the group enter the client name or IP address in the Client name box and then click Add The client is automatically added to the Members list 3 To delete a client from the group select the client from the Members list and then click Remove The client is removed from the list 4 After all...

Page 176: ...ith both UNIX and Windows clients Because the files are stored in the native Windows NT file system the server has to map the UNIX users to Windows users to determine the user access level of the files Note User mapping is not designed to address existing user database problems in the existing environment All UIDs and GIDs must be unique across all NIS Network Information Service domains and all u...

Page 177: ... ls al command the return listing of files contains user information the user and group that own the file The ls al command is a UNIX command It returns a long or full listing of all files Because this information is contained in a Windows NT Access Control List ACL it is not UNIX ready The ACL information has to be converted back to UNIX UIDs and GIDs for the UNIX systems to understand and displa...

Page 178: ...g Protocols Select NFS Protocol and then click Properties The NFS Properties menu is displayed 2 In the NFS Properties Menu select User and Group Mappings The User and Group Mappings dialog box is displayed There are four tabs in the User and Group Mappings dialog box General information Sets the mapping information source which is either NIS or password and group files Simple Mapping Indicates wh...

Page 179: ...e path and name of the group file 3 After this basic information is entered click OK Simple Mapping Tab Simple or implicit mapping is the first level of user name mapping In simple mode user and group names that match exactly in name are automatically equated While simple mappings are the most easily managed and are the most forthright type of map security problems can arise For example if a UNIX ...

Page 180: ...le mapping for most users and then using advanced mappings for the users with unique names on the different systems Alternatively simple mapping can be disabled completely relying solely on explicit mappings Explicit mappings create the most secure mapping environment Security issues seen in simple mappings do not exist in explicit mappings Explicit user mappings specifically correlate two users t...

Page 181: ...s box at the bottom of the screen Repeat this process until all desired users have been mapped 4 To map multiple Windows users to one UNIX user one of the mapped Windows users must be set as the primary mapping To indicate which user map is the primary mapping highlight the desired map in the Explicitly mapped users box and then click the Set Primary button 5 To delete a map highlight the map in t...

Page 182: ...n Windows group to a UNIX group enter the domain and the group name in the box in the middle of the screen use the Domain groupname format and highlight the UNIX group to map and then click Add The map is added to the Explicitly mapped groups box at the bottom of the screen Repeat this process until all desired groups have been mapped 4 To map multiple Windows groups to one UNIX group one of the W...

Page 183: ...the NAS Management Console click File Sharing Microsoft Services for Network File System Click User Name Mapping then Map Maintenance Figure 105 User Name Mapping screen Map Maintenance tab Backing up User Mappings 1 Select the Map Maintenance tab from the User Name Mapping screen 2 Type the path and name of the file to be used for backup in the File path and name field or click Browse to locate t...

Page 184: ...ame mappings is not necessary See the section Anonymous Access to an NFS Share in this chapter for additional information 5 Verify the NTFS permissions are correct on the NFS share If the NFS share was assigned All Machines read write then the NTFS ACLs on the NFS share must allow read write permissions for the user or group Example e share1 is the name of the NFS share and share1 has All Machines...

Page 185: ...side and the Windows side a List the permissions on the UNIX side ls l mount point file1 Example screen display r r unixuser1 unixgroup1 b List the permissions on the Windows side change to the nfs share directory From a command line interface accessed from Remote Desktop on the NAS server cacls file1 Example display DOMAIN1 Windowsuser1 R c Compare and verify the permissions from UNIX and Windows...

Page 186: ...op or from a command prompt Remote Desktop is included in the WebUI of the NAS server To open a Remote Desktop session from the WebUI select Maintenance Remote Desktop See the Remote Access Methods and Monitoring chapter for information on setting up and using Remote Desktop Table 12 describes some common Services for NFS commands Table 12 Command Line Interface Command Prompts Command Function nf...

Page 187: ...int server FPNW eases the addition of the NAS server into a mixed infrastructure by providing a NetWare user interface UI to a Windows Storage Server 2003 based server administrators and users see their same familiar NetWare UI Additionally the same logon for clients is maintained without a need for any client configuration changes This service also provides the ability to create Novell volumes wh...

Page 188: ...und at www microsoft com WINDOWS2000 guide server solutions NetWare asp Note The printing capabilities of File and Print Services for NetWare are not supported on the NAS server To install Services for NetWare 1 From the desktop of the NAS server click Start Settings Network Connections Local Area Connection and then click Properties 2 Click Install The Select Network Component Type dialog box is ...

Page 189: ...Guide 6 Select File and Print Services for NetWare and click OK Figure 107 Select network service 7 Click OK Figure 108 Install File and Print Services for NetWare 8 Select or change items as necessary 9 Click OK The system must be rebooted for the changes to take effect ...

Page 190: ...en Properties Figure 109 File and Print Services for NetWare screen 3 Enter an FPNW Server Name and Description This name must be different from the server name used by Windows or LAN Manager based clients to refer to the server If you are changing an existing name the new name will not be effective until you stop and restart File and Print Services for NetWare For example in Figure 109 the Window...

Page 191: ...es to See users connected to specific volume and to disconnect users from a specific volume 7 Click Files to View open files and close open files Creating and Managing NetWare Users To use Services for NetWare the Novell clients must be entered as local users on the NAS server Adding Local NetWare Users 1 From the NAS server desktop click the NAS Management Console icon click Core Operating System...

Page 192: ...t pane of the screen and then click Properties 2 Select the NetWare Services tab Figure 111 NetWare Services tab 3 Select Maintain NetWare compatible login 4 Set other NetWare options for the user and click OK Note The installation of File and Print Services for NetWare will also create a supervisor account which is used to manage FPNW The supervisor account is required if the NAS server was added...

Page 193: ... shares can be created only after Microsoft Services for NetWare is installed See the previous section Installing Services for NetWare for instructions on installing SFN Creating a New NCP Share To create a new file share 1 From the NAS server desktop choose Start Settings Control Panel Administrative Tools Server Manager 2 Choose FPNW Shared Volumes 3 Click Create Volume Figure 112 Create Shared ...

Page 194: ...ox 6 Click Add to add additional users and groups and to set their permissions Figure 114 Add Users and Groups dialog box 7 Highlight the desired user or group then click Add 8 Select the Type of Access from the drop down list Note Type of Access can also be set from the Access Through Share Permissions dialog box ...

Page 195: ...s have been added 10 Click OK on the Create Volume dialog box 11 Click Close Modifying NCP Share Properties To modify a file share 1 From the NAS server desktop choose Start Settings Control Panel Administrative Tools Server Manager 2 Choose FPNW Shared Volumes 3 Highlight the volume to modify 4 Click Properties ...

Page 196: ...NetWare File System Management 196 NAS 4000s and 9000s Administration Guide ...

Page 197: ...of each cluster node Each node sends out periodic messages to the other node these messages are called heartbeats If a node stops sending messages the cluster service will fail over any resources that the node owns to the other node For example if the node that owns the Quorum disk is shut down for any reason its heartbeat will stop The other node detects the lack of the heartbeat and takes over o...

Page 198: ...f a cluster then the server heads are referred to as nodes Resources Hardware and software components that are managed by the cluster service are called cluster resources Cluster resources have three defining characteristics They can be brought online and taken offline They can be managed in a cluster They can be owned by only one node at a time Examples of cluster resources are IP addresses netwo...

Page 199: ...ffline in an order defined by the resource dependencies Secondly the cluster service attempts to transfer the group to the next node on the preferred owners list If the transfer is successful the resources are brought online in accordance with the resource dependency structure The system failover policy defines how the cluster detects and responds to the failure of individual resources in the grou...

Page 200: ...them While the diagram only illustrates two nodes the same concepts apply for multi node deployments Sequence of Events for Cluster Resources The sequence of events in the diagram includes 1 Physical disks are combined into RAID arrays and LUNs 2 LUNS are designated as basic disks formatted and assigned a drive letter via Disk Manager 3 Physical Disk resource are created for each basic disk inside...

Page 201: ...ster Resource IP Address 172 18 1 98 Cluster Resource Network Name Fileserver2 Cluster Resource File Share Mar1 F Mar1 Cluster Resource Disk G Cluster Resource File Share Mar4 G Mar4 Basic Disk E E eng1 E eng2 E eng3 Raidsets 1 3 Physical Disks 1 4 Physical Disks 1 4 Physical Disks 9 12 Physical Disks 9 12 F Mar1 F Mar2 F Mar3 G Mar4 G Mar5 G Mar6 Raidsets 4 5 Physical Disks 13 16 Physical Disks 2...

Page 202: ... by one of the nodes of the cluster but may transition to the other nodes during failover conditions The diagram illustrates a cluster containing two nodes Each node has ownership of one group Contained within each group are singular file shares that are known on the network by the associated Network Name and IP address In the specific case of Node1 file share Eng1 relates to E Eng1 This file shar...

Page 203: ...isk The Quorum disk is the shared storage used by the cluster nodes to coordinate the internal cluster state One or more RAID arrays are dedicated to each cluster node for data storage Each cluster node will assume ownership of at least one physical disk resource That owner node will serve all shares within that physical disks resource until a failover condition occurs When a failover occurs the p...

Page 204: ... Name and IP address Node A s name and IP address Node B s name and IP address At least one virtual server name and IP address for Node A At least one virtual server name and IP address for Node B Cluster Interconnect static IP addresses for Node A and Node B In multi node deployments additional network addresses are required For each additional node three static IP addresses are required Virtual ...

Page 205: ...ne HP recommends placing cluster aware and non cluster aware protocols on different file shares Use the information in Table 13 to determine whether it is advantageous to use clustering Note AppleTalk is not supported on clustered disk resources AppleTalk requires local memory for volume indexing On failover events the memory map is lost and data corruption can occur Table 13 Sharing Protocol Clus...

Page 206: ...0 MB 500 MB is recommended Additional LUNS may also be presented for use as shared disk resources Cluster configurations should be deployed with dual data paths for high availability Dual data paths from each node enable a path failure to occur that does not force the failover of the node Clusters can be configured with single path but if a failure in the path does occur all of the node resources ...

Page 207: ...ster A domain user account for Cluster service all nodes must be members of the same domain Each node should have at least two network adapters one for connection to the public network and the other for the node to node private cluster network If only one network adapter is used for both connections the configuration is unsupported A separate private network adapter is required for HCL certificati...

Page 208: ...te network adapter establishes node to node communication cluster status signals and cluster management Each node s public network adapter connects the cluster to the public network where clients reside Verify that all network connections are correct with private network adapters connected to other private network adapters only and public network adapters connected to the public network Table 14 P...

Page 209: ...ses set static IP addresses for the private network connector Keep in mind that Cluster service will recognize only one network interface per subnet Rename the Local Area Network Icons HP recommends changing the names of the network connections for clarity The naming will help to identify a network and correctly assign its role Verifying Connectivity and Name Resolution To verify name resolution p...

Page 210: ...se the WebUI to configure additional shared disk resources Verify that all shared disks are formatted as NTFS and are designated as Basic Additional shared disk resources will be automatically added into the cluster as physical disk resources during the installation of cluster services Each physical disk resource will reside in its own cluster group Verifying Disk Access and Functionality Write a ...

Page 211: ...e specific array in use under Windows Storage Server 2003 Creating a Cluster From the WebUI select the Cluster tab Figure 118 Cluster tab 1 Select Advanced Cluster Management to launch a Remote Desktop session 2 Log into the Remote Desktop session 3 Click OK when the error message regarding a cluster failure is displayed 4 Select File New Cluster 5 In the Welcome to the new server cluster window s...

Page 212: ...not going to be used it should be disabled 3 After all issues have been resolved click Next to continue 4 In the New Server Cluster Wizard window enter the Cluster IP address and click Next 5 In the New Server Cluster Wizard window enter the login information for the domain account under which the cluster service will be run Click Next 6 In the New Server Cluster Wizard window review the proposed ...

Page 213: ... select Next to continue 8 The next screen analyzes the configuration to determine the cluster configuration Potential configuration errors are displayed Fix any potential errors and select Re analyze Click Next to continue 9 In the Add Nodes Wizard window enter the password for the cluster account and click Next to continue 10 The next screen displays a proposed cluster configuration summary Conf...

Page 214: ...ebUI The Cluster Installation Guide is located under the Cluster tab This must be done after the cluster installation is complete It is necessary to run this tool on all cluster nodes Figure 120 Cluster update tool This completes the initial cluster installation Cluster Groups and Resources including File Shares Management tasks for a cluster include creating and managing cluster resources and clu...

Page 215: ...ance the load of the groups and their resources on the cluster between the two nodes Node Based Cluster Groups Creating only one resource group and one virtual server for each node facilitates group and resource administration This setup allows administrators to include all file share resources under one group Clients access all of the resources owned by one node through a virtual server name In n...

Page 216: ... files can easily move from one node to the other as circumstances require If the cluster node owning the group of file shares should be shut down or fail the other node in the cluster will begin sharing the directories until the original owner node is brought back on line At that time ownership of the group and its resources can be brought back to the original owner node Resource Planning 1 Creat...

Page 217: ...ion to the user name mapping best practices outlined in the Microsoft Services for NFS chapter there are additional recommendations For convenience all suggestions are listed below Back up user and group mappings To avoid loss of complex advanced mappings in the case of a system failure back up the mappings whenever the mappings have been edited or new mappings have been added Map consistently Gro...

Page 218: ...otocols are not cluster aware and will experience service interruption if installed on a clustered resource during failover events of the resource Service interruptions will be similar to those experienced during a server outage Data that has not been save to disk prior to the outage will experience data loss In the case of SFM it is not supported because SFM maintains state information in memory ...

Page 219: ... If the disk does not appear in the list of available disks on the Manage Disks page then select Rescan to rescan for new disks and refresh the page Open the WebUI and select the Cluster tab Follow the procedures listed below to create a physical disk resource See the Cluster Storage Guide on the WebUI Cluster tab for detailed information on adding storage elements into the cluster Creating Physic...

Page 220: ...t the resource and select Bring Online 12 Select OK on the Bring a Resource Online page to bring the new physical disk resource online 13 Present the LUN to the additional cluster nodes 14 Move the physical disk resource to the other nodes to confirm functionality To move a resource 1 Under the Cluster tab in the WebUI select Cluster Groups 2 Select the group and select Move 3 Specify the new loca...

Page 221: ...n Figure 123 Creating a file share resource 5 Click Next 6 Select the possible owners and click Next to continue 7 Specify the dependencies for the file share resource The physical disk should always be selected as a dependency It is also possible to set the file share to be dependent on the network name for the cluster group it will reside in If a dependency is set on the network name the file sh...

Page 222: ...esource Online page to bring the new file share resource online Setting Permissions for a SMB File Share When a share resource is created via the WebUI and brought online the default permission is set to Everyone Read Only To change the default permissions 1 From the Cluster tab click Advanced Cluster Management 2 Log into Remote Desktop 3 Click the group 4 Right click the resource then click Prop...

Page 223: ...rce type The resource type should be NFS Share 5 Click Next 6 Select the possible owners and click Next to continue 7 Specify the dependencies and click Next to continue 8 Specify the share name path Share Root Only or Share Sub directories only encoding anonymous access and anonymous UID GID and click Next to continue 9 Review the configuration and click Finish to create the NFS share 10 After th...

Page 224: ...WebUI and brought online the default permission is set to Everyone Read Only To change the default permissions 1 From the Cluster tab click Advanced Cluster Management 2 Log into Remote Desktop 3 Click the group 4 Right click the resource then click Properties Figure 126 NFS Share Resource parameters 5 Click the Parameters tab 6 Click Permissions ...

Page 225: ...Cluster Administration 225 NAS 4000s and 9000s Administration Guide Figure 127 Set NFS Share resource permissions 7 Set the permissions then click OK ...

Page 226: ...k Next 6 Select the possible owners and click Next to continue 7 Specify the dependencies and click Next to continue 8 Specify the address subnet mask network and whether to enable NetBIOS for this address and click Next to continue Figure 128 Creating an IP address resource 9 Review the configuration and click Finish to create the resource 10 After the resource is created it is necessary to bring...

Page 227: ...k Next 6 Select the possible owners and click Next to continue 7 Specify the dependencies and click Next to continue Figure 129 Network Name Parameters 8 Select whether or not DNS registration must succeed and whether to enable kerberos authentication and click Next to continue 9 Review the configuration and click Finish to create the resource 10 After the resource is created it is necessary to br...

Page 228: ...nal node or will leave the resources failed over waiting for the resources to be moved back manually See Managing Cluster Resource Groups for information on allowing or preventing failback and moving these resources from one node to another Note If the NAS server is not set to automatically fail back the resources to their designated owner the resources must be moved back manually each time a fail...

Page 229: ... and rejoins the cluster Powering Down the Cluster The power down process for the NAS cluster is similar to the process for a single node but with the cluster extra care must be taken with the storage subsystem and the sequence of the shutdown The power down process is divided into two main steps 1 Shutting down the cluster nodes 2 Removing power from the cluster nodes The sequence of these steps ...

Page 230: ...m is confirmed to be operating normally power up a single node by pressing the power button on the front of the device Wait for the node to come completely up before powering up the subsequent node If more than one node is powered up at the same time the first node that completes the sequence will gain ownership of the cluster quorum and will control the cluster database Designate a particular nod...

Page 231: ... the Shadow Copy schedule may be done via the Cluster Administrator tool the WebUI or the file system Creating a Cluster Printer Spooler Printer spoolers should be created in a separate group dedicated to this purpose for ease of management For each printer spooler a physical resource is required to instantiate the print spooler resource In some cases dedicated physical resources are not available...

Page 232: ...een and select add printer A wizard will start c Select create a new port and click Next d Enter the IP address of the network printer e Update the Port Name if desired and click Next then Finish f Select the appropriate driver and click Next g If presented with a dialog to replace the driver present click keep the driver and click Next h Name the printer and click Next i Provide a share name for ...

Page 233: ...rovided Web based user interface Remote Desktop Integrated Lights Out Port Features Integrated Lights Out Port Configuration Using the Integrated Lights Out Port to Access the NAS server Telnet Server Enabling Telnet Server Configuring Telnet Server Insight Manager Insight Manager Console Insight Manager Agent Web Interface These options let administrators use interfaces with which they are alread...

Page 234: ...Use Remote Desktop to access The NAS server desktop The NAS Management Console A command line interface Backup software Antivirus programs Telnet Server To access Remote Desktop from the WebUI select Maintenance Remote Desktop For additional procedural information on Remote Desktop see the Setup Completion and Basic Administrative Procedures chapter Integrated Lights Out Port The following informa...

Page 235: ...ence replay Auto configuration of IP address through domain name system DNS or Dynamic Host Configuration Protocol DHCP Virtual power button Security Features SSL encryption for login and network traffic User administration allows capability to define user profiles Event generation for invalid login attempts Logging of user action in the Event Log Manage Users Feature The Manage Users feature allo...

Page 236: ... Rapid Startup Utility SNMP is enabled and the Insight Management Agents are preinstalled The Integrated Lights Out port comes with factory default settings which the administrator can change Administrators may want to add users change SNMP trap destinations or change networking settings Refer to the Integrated Lights Out Port User Guide for information about changing these settings There are seve...

Page 237: ...icking the remote management link 2 At the Integrated Lights Out Account Login screen supply the username and password for the iLO and click Login 3 Click the Remote Console tab The Remote Console Information screen is displayed 4 Click the Remote Console choice in the menu on the left side of the screen 5 Press Ctrl Alt Del to log in to the console 6 Supply an administrator username and password ...

Page 238: ... 3 Check the Enable Telnet access to this appliance box 4 Click OK Sessions Information The sessions screen provides the ability to view or terminate active sessions HP Insight Manager Version 7 The NAS server is equipped with the latest Insight Management Agents for Servers allowing easy manageability of the server through HP System Management HP OpenView and Tivoli NetView Insight Manager is a c...

Page 239: ...iting NFS 175 managing NFS 173 cluster adding new storage 219 analysis 212 components hierarchy 202 concepts 200 concepts diagram 201 creating 211 diagram 198 dual data paths 206 geographically dispersed 214 group 215 group creating 218 groups node based 215 installation 208 installation checklist 207 load balancing 215 managing access rights 217 managing file share permissions 217 multi node supp...

Page 240: ...nments domain compared to workgroup 111 overview 26 equipment symbols 16 Ethernet NIC teams adding 41 checking status 47 configuring 42 configuring properties 44 configuring TCP IP 45 renaming the connection 44 setting up 38 showing connection icon 45 troubleshooting 48 events Services for NFS logging 159 explicit group mapping 181 explicit mappings 176 180 exports 158 F fail on fault setting 42 f...

Page 241: ...17 HP authorized reseller 17 storage website 17 technical support 17 HP Network Teaming Utility installing 39 opening 40 I iLO See Integrated Lights Out Port Insight Manager defined 20 described 238 installation cluster preparing for 206 Integrated Lights Out port accessing NAS servers 237 activating 38 configuration 236 described 20 234 features 235 license key 38 IP address resource 202 226 L LA...

Page 242: ... network name resource 202 227 network planning 204 network requirements cluster 207 network settings changing 37 networks setting up 208 NFS async sync settings 170 authenticating user access 157 client groups 173 adding 174 deleting 174 editing 175 cluster specific issues 217 compatibility issues 136 deleting shares 166 file share creating 164 file shares creating 164 file sharing tests 184 grou...

Page 243: ...ning 17 RAID ADG advantages 60 ADG disadvantages 60 ADG explained 59 level on server 20 RAID 0 54 RAID 0 advantages 56 RAID 0 disadvantages 56 RAID 0 explained 56 RAID 1 advantages 57 RAID 1 disadvantages 57 RAID 1 explained 57 RAID 1 0 explained 57 RAID 5 advantages 58 RAID 5 disadvantages 58 RAID 5 explained 58 summary of methods 60 rapid startup wizard defined 19 redundancy 20 remote access iLO...

Page 244: ...ties 166 modifying properties 138 NCP 193 NFS tests 184 NFS creating 164 NFS deleting 166 path 126 standard 135 UNIX 139 web HTTP 140 Windows tab 138 shutting down the server 33 simple mapping 179 simple mappings 176 smart switch 42 software installing Authentication 162 software features 19 software updates 214 squashed mappings 177 squashing 158 storage controller subsystems and LUNs 55 storage ...

Page 245: ...names managing 112 NetWare adding 191 enabling 192 V verifying connectivity 209 disk access 210 domain membership 209 name resolution 209 virtual server 202 virtual server defined 199 virtual storage 51 Volume Shadow Copy Service 93 volumes creating new share 125 creating Novell 187 managing shares for 126 navigating to 122 NCP 193 planning 62 W warning rack stability 17 symbols on equipment 16 we...

Page 246: ...Index 246 NAS 4000s and 9000s Administration Guide ...

Reviews: