background image

Storage Management Overview

53

NAS 2000s Administration Guide

Online Spares

Further protection against data loss can be achieved by assigning an online spare (or hot spare) 
to any configuration except RAID 0. This hard drive contains no data and is contained within 
the same storage sub system as the other drives in the array. When a hard drive in the array 
fails, the controller can then automatically rebuild information that was originally on the failed 
drive onto the online spare. This quickly restores the system to full RAID level fault tolerance 
protection. However, unless RAID ADG is being used, which can support two drive failures in 
an array, in the unlikely event that a third drive in the array should fail while data is being 
rewritten to the spare, the logical drive will still fail.

Physical Storage Best Practices

Minimally, choosing the best disk carving strategy includes the following policies: 

Analyze current corporate and departmental structure.

Analyze the current file server structure and environment.

Plan properly to ensure the best configuration and use of storage.

— Determine the desired priority of fault tolerance, performance, and storage capacity.

— Use the determined priority of system characteristics to determine the optimal striping 

policy and RAID level.

Logical Storage Elements Overview

Logical Storage elements consist of those components that translate the physical storage 
elements to the file system elements as presented in 

Figure 19

The NAS 2000s utilizes the 

Disk Manager (DM) to manage the various types of disk presented to the file system. DM has 
two types of LUN presentation, basic disk and dynamic disk. Each of these types of disk has 
special features that enable different types of management. Through the use of basic disks, 
primary partitions or extended partitions may be created. Partitions can only encompass one 
LUN. Through the use of dynamic disks, volumes can be created that span multiple LUNS. 

DM can be used to convert disks to dynamic and back to basic, and manage the volumes 
residing on dynamic disks. Other options include the ability to delete, extend, mirror, and 
repair these elements.

The sections below briefly discuss each of these types of representations and the 
considerations that need to be observed. 

More detailed information regarding DM use can be obtained through the online help of the 
tool.

Partitions

Partitions exist as either Primary Partitions or Extended Partitions and can be composed of 
only one Basic disk no larger than 2 TB. Basic disks can also only contain up to four primary 
partitions, or three primary partitions and one extended partition. In addition, the partitions on 
them cannot be extended beyond the limits of a single LUN. Extended partitions allow the user 
to create multiple logical drives. These partitions or logical disks can be assigned drive letters 
or be mounted as mount points on existing disks. The use of mount points in conjunction with 
NFS shares is not supported. 

Summary of Contents for 345646-001 - StorageWorks NAS 2000s External Storage Server

Page 1: ...dition September 2003 Part Number 345650 001 This guide provides information on performing the administrative tasks necessary to manage the HP StorageWorks NAS 2000s server Overview information as well as procedural instructions are included in this guide ...

Page 2: ...Packard The information contained in this document is subject to change without notice Compaq Computer Corporation is a wholly owned subsidiary of Hewlett Packard Company Microsoft MS DOS MS Windows Windows and Windows NT are U S registered trademarks of Microsoft Corporation UNIX is a registered trademark of The Open Group Hewlett Packard Company shall not be liable for technical or editorial err...

Page 3: ...g Help 15 HP Technical Support 15 HP Storage Website 15 HP Authorized Reseller 15 1 System Overview 17 Product Definition and Information 17 Server Hardware and Software Features 17 Product Manageability 17 Product Redundancy 18 Product Scalability 18 Deployment Scenarios 19 Environment Scenarios 20 Workgroup 20 Domain 20 User Interfaces 21 NAS 2000s Web Based User Interface 21 Menu Tabs 22 Status...

Page 4: ...e Server 27 Viewing and Maintaining Audit Logs 28 Using Remote Desktop 29 Improper Closure of Remote Desktop 29 Setting up E mail Alerts 30 Changing System Network Settings 31 Setup Completion 32 Activating the iLO Port Using the License Key 32 Setting up Ethernet NIC Teams Optional 32 Installing the HP Network Teaming Utility 33 Opening the HP Network Teaming Utility 34 Adding and Configuring NIC...

Page 5: ...Striping 49 Advantages 49 Disadvantages 50 RAID 5 Distributed Data Guarding 50 Advantages 51 Disadvantages 51 RAID ADG Advanced Data Guarding 51 Advantages 52 Disadvantage 52 Online Spares 53 Physical Storage Best Practices 53 Logical Storage Elements Overview 53 Partitions 53 Volumes 54 Utilizing DM Storage Elements 54 Volume Shadow Copy Service Overview 55 File System Elements 55 File Sharing El...

Page 6: ... a basic disk 70 Extending using DiskPart 71 Scheduling Defragmentation 72 Managing Disks After Quick Restore 73 Disk Quotas 75 Enabling Quota Management 75 Setting User Quota Entries 76 DiskPart 78 Example of using DiskPart 79 5 Shadow Copies 81 Overview 81 Shadow Copy Planning 82 Identifying the Volume 82 Allocating Disk Space 83 Identifying the Storage Area 84 Determining Creation Frequency 84 ...

Page 7: ...oup Management 101 Domain Compared to Workgroup Environments 101 User and Group Name Planning 102 Managing User Names 102 Managing Group Names 102 Workgroup User and Group Management 103 Managing Local Users 103 Adding a New User 104 Deleting a User 104 Modifying a User Password 105 Modifying User Properties 105 Managing Local Groups 106 Adding a New Group 107 Deleting a Group 107 Modifying Group ...

Page 8: ... 129 Web Sharing HTTP 130 Protocol Parameter Settings 131 DFS Protocol Settings 132 Deploying DFS 132 DFS Administration Tool 133 Accessing the DFS Namespace from other Computers 133 Setting DFS Sharing Defaults 134 Creating a Local DFS Root 134 Deleting a Local DFS Root 135 Publishing a New Share in DFS 136 Publishing an Existing Share in DFS 137 Removing a Published Share from DFS 137 Storage Ma...

Page 9: ...es 156 Encoding Types 158 NFS Only 158 NFS Protocol Properties Settings 158 NFS Async Sync Settings 159 NFS Locks 160 NFS Client Groups 162 Adding a New Client Group 163 Deleting a Client Group 163 Editing Client Group Information 164 NFS User and Group Mappings 165 Types of Mappings 165 Explicit Mappings 165 Simple Mappings 165 Squashed Mappings 166 User Name Mapping Best Practices 166 Creating a...

Page 10: ...reating a New NCP Share 180 Modifying NCP Share Properties using the NAS Management Console 184 NOTES 185 10 Remote Access Methods and Monitoring 187 Web Based User Interface 188 Remote Desktop 188 Integrated Lights Out Port 188 Features 189 Security Features 189 Manage Users Feature 189 Manage Alerts Feature 190 Integrated Lights Out Port Configuration 190 Using the Integrated Lights Out Port to ...

Page 11: ... to help administrators Plan the storage configuration Setup physical storage Manage users and groups Manage folders and shares Manage a UNIX file system Manage a NetWare file system Remotely access the NAS 2000s server About this Guide topics include Overview page 12 Conventions page 12 Rack Stability page 14 Getting Help page 15 ...

Page 12: ...ed with your server Conventions Conventions consist of the following Document Conventions Text Symbols Equipment Symbols Document Conventions The document conventions included in Table 1 apply in most cases Table 1 Document Conventions Element Convention Cross reference links Figure 1 Key and field names menu items buttons and dialog box titles Bold File names application names and text emphasis I...

Page 13: ...have the following meanings Any enclosed surface or area of the equipment marked with these symbols indicates the presence of electrical shock hazards Enclosed area contains no operator serviceable parts WARNING To reduce the risk of personal injury from electrical shock hazards do not open this enclosure Any RJ 45 receptacle marked with these symbols indicates a network interface connection WARNI...

Page 14: ...uce the risk of personal injury or damage to the equipment observe local occupational health and safety requirements and guidelines for manually handling material Rack Stability Rack stability protects personnel and equipment WARNING To reduce the risk of personal injury or damage to the equipment be sure that The leveling jacks are extended to the floor The full weight of the rack rests on the le...

Page 15: ...on available before calling Technical support registration number if applicable Product serial numbers Product model names and numbers Applicable error messages Operating system type and revision level Detailed specific questions HP Storage Website The HP website has the latest information on this product as well as the latest drivers Access storage at http www hp com country us eng prodserv stora...

Page 16: ...About this Guide 16 NAS 2000s Administration Guide ...

Page 17: ...re and software features For specific software product recommendations go to the HP website http h18000 www1 hp com products storageworks nas supportedsoftware html Product Manageability The NAS 2000s ships with the following utilities and features that ease the administration tasks associated with managing the system The Rapid Startup Wizard is a user friendly configuration utility that ensures e...

Page 18: ...rver is running To ensure redundancy it is important to connect each power supply to a separate power source If one power source fails the server remains operational through the second power source Through a seamless hardware based graphical remote console the Integrated Lights Out port provides the administrator with full control of the server from a remote location Using a client browser the adm...

Page 19: ...tocol support of the NAS 2000s allows it to support many types of client computers concurrently Protocol and platform transitions When a transition between platforms is being planned the ability of the NAS 2000s to support most file sharing protocols allows companies to continue to invest in file storage space without concerns about obsolescence For example an administrator planning a future trans...

Page 20: ... of the workgroup Workgroups are typical for very small deployments where little or no computing environment planning is required Domain When operating in a Windows NT or Active Directory domain environment the NAS 2000s is a member of the domain and the domain controller is the repository of all account information Client machines are also members of the domain and users log on to the domain thro...

Page 21: ...luding user and group management share management and local storage management Refer to the HP StorageWorks NAS 2000s Installation Guide for detailed information on using the Rapid Startup Wizard for initial setup To access the WebUI launch a Web browser and enter the following in the address field https your NAS machine name or IP Address 3202 The default user name is Administrator The default pa...

Page 22: ...ption See Chapter 6 for additional information Maintenance Maintenance tasks include setting date and time performing system restarts and shutdowns viewing audit logs setting up Email alerts linking to remote management and selecting and configuring your UPS HP Utilities Access HP system management utilities such as remote management enable floppy boot File and Print Services for Netware and the H...

Page 23: ...y connecting a keyboard mouse and monitor Using the WebUI Maintenance tab and selecting Remote Desktop Using the Integrated Lights Out port Note When using Remote Desktop to connect to the NAS 2000s desktop do not use the window close feature Click on Start Log Off Administrator to exit Remote Desktop See Improper Closure of Remote Desktop in Chapter 2 Figure 2 NAS 2000s desktop The following icon...

Page 24: ...cess to the Compaq Array Configuration Utility and local disk management including a volume list and a graphical view of the disks File Sharing contains modules for the configuration of file sharing exports CIFS SMB Windows and NFS UNIX file shares are managed through this folder System contains system summary information NIC Team Setup Click this icon to install the HP Network Teaming and Configu...

Page 25: ...iew tab from the primary WebUI screen Unless otherwise instructed all procedures are performed using the NAS Web Based User Interface WebUI Note The NAS 2000s Desktop can be accessed via a directly connected keyboard mouse and monitor through Remote Desktop or by using an Integrated Lights Out port Basic Administrative Procedures Basic administrative procedures include Setting the system date and ...

Page 26: ...3 Maintenance menu Setting the System Date and Time To change the system date or time 1 From the WebUI select Maintenance and Date Time The Date and Time Settings dialog box is displayed 2 Enter the new values and then click OK The Maintenance menu is displayed Figure 4 Date and Time dialog box ...

Page 27: ...Several options are displayed Restart Shut Down and Scheduled Shutdown Figure 5 Shutdown menu a To shut down and automatically restart the server click Restart b To shut down and power off the server click Shut Down c To schedule a shutdown click Scheduled Shutdown 2 Regardless of the choice a confirmation prompt is displayed After verifying that this is the desired action click OK Note Client com...

Page 28: ...m the WebUI select Maintenance Logs The Logs menu is displayed Figure 6 Logs menu A variety of logs are available and are listed in Figure 6 Each log has viewing clearing printing and saving options Note You should not use the WebUI to view log files greater than 2 MB Select Log properties to adjust the maximum file size or download the file to view Note NFS logging is disabled by default Enable N...

Page 29: ... that session of Remote Desktop Click Start Log Off Administrator to exit Remote Desktop Improper Closure of Remote Desktop Certain operations such as drive management via ACU can leave the utilities running if the browser is closed versus exiting from the program via the application menu or logging off the Remote Desktop session In the case of ACU the drive lights will remain blinking until one o...

Page 30: ...s some event log messages Some alerts such as the restart of the server only occur if the WebUI was utilized to initiate the request For example a restart initiated using the WebUI will general an e mail message indicating a restart has occurred Initiating a restart using the Windows 2000 schedule or Desktop will not Messaging in the status bar and page is limited to the following areas WebUI Aler...

Page 31: ...ppropriate boxes 5 After all settings have been entered click OK Changing System Network Settings Network properties are entered and managed from the Network menu Most of these settings are entered as part of the Rapid Startup process Settings made from this menu include adding the NAS 2000s to a domain Online help is available for these settings Figure 8 is an illustration of the Network settings...

Page 32: ...ivation instructions To access the iLO port click on HP Utilities then click Remote Management Setting up Ethernet NIC Teams Optional The NAS 2000s is equipped with the HP Network Teaming and Configuration utility The utility allows administrators to configure and monitor Ethernet network interface controllers NIC teams in a Windows based operating system These teams provide options for increasing...

Page 33: ...The iLO port can also be accessed from the HP Utilities tab of the WebUI by clicking the remote management link 2 At the Integrated Lights Out Account Login screen supply the username and password for the iLO and click Login 3 Click the Remote Console tab The Remote Console Information screen is displayed 4 Click on the Remote Console choice in the menu on the left side of the screen 5 Press the C...

Page 34: ...tem Caution To ensure proper functioning of the software the server must be restarted at this time Opening the HP Network Teaming Utility The HP Network Teaming utility is now accessible from the Windows toolbar at the bottom of the NAS server desktop To open the utility click the HP Network Teaming utility icon Figure 11 HP Network Teaming utility icon ...

Page 35: ...ty becomes unstable if static IP addresses subnets and DNS addresses are set before teaming Duplex and speed settings must be set to use the default values To team the NICs 1 Open the HP Network Teaming utility The Network Teaming and Configuration Properties dialog box is displayed The type of NIC and the slot and port used is shown Figure 12 HP Network Teaming Properties dialog box 2 Highlight t...

Page 36: ...hen Switch Now is clicked Note The Switch Now option is disabled until Manual is selected and then OK is clicked Fail on Fault This setting automatically switches from a primary NIC to a secondary NIC when the primary NIC fails Smart Switch This setting lets a member of a team be selected as the preferred Primary Smart Switch NIC As long as this NIC is operational it is always the active NIC If th...

Page 37: ...g device driver The receive packets are load balanced among all team members by the switch If a failure of any team member occurs the packets are load balanced among the remaining adapters There is no primary adapter in a Switch assisted Load Balancing team Balance with MAC Address This feature allows load balancing of IP packets among the teamed NICs using the last four bits of the MAC Address Se...

Page 38: ...res include Renaming the teamed connection Selecting the option to show an icon on the taskbar Configuring TCP IP on the new team Renaming the Teamed Connection The assigned name for the new NIC team connection is Local Area Connection X where X represents the next available connection number generated by the system HP recommends changing this name to a more meaningful name such as NIC Team To cha...

Page 39: ...ew Team After teaming the NICs a new virtual network adapter for the team is automatically created However by default the new adapter is set to DHCP To manually configure the IP address perform the following steps To enter the TCP IP address information for the team 1 From the desktop go to the Network and Dial up Connections screen and click Properties Right click the NIC Team icon and then selec...

Page 40: ...perties The following screen is displayed Figure 17 NIC Team TCP IP Properties dialog box Note If a NIC is teamed do not modify the TCP IP settings for the individual NIC ports 4 Select Use the following IP address and enter the IP address and subnet mask If desired enter the default gateway 5 Click OK The Ethernet Team should be working ...

Page 41: ...ons for RJ 45 NICs Table 2 NIC Teaming Troubleshooting RJ 45 Description Active OK The NIC is operating properly The driver is installed in the registry and is loaded If the NIC is a member of a team the NIC is active Installed inactive The NIC is installed and is OK but is not active Cable fault The driver is installed in the registry and is loaded The broken cable indicator means that the cable ...

Page 42: ... group information is stored on the domain To enter local user and group information see Chapter 6 Creating and Managing File Shares Files shares must be set up granting and controlling file access to users and groups See Chapter 7 for complete information on managing file shares UNIX specific information is discussed in the Microsoft Services for NFS chapter Hardware failure The driver is install...

Page 43: ...in the following chapters Chapter 4 discusses disk management procedures Chapter 5 discusses snapshot shadow copy management procedures Chapter 7 discusses folder and share management procedures Storage Management Process The lowest level of storage management occurs at the physical drive level Physical drives are grouped into arrays for better performance and fault tolerance The arrays are then c...

Page 44: ...ows Device Manager Partitioning Win2K Disk Manager NFS Volumes Logical Disk Manager Shadow Copies Snapshots File Folders Logical Storage Elements File System Elements Shadow Copies Elements Engineering Marketing Users Sales GMT 2003 04 27 04 00 00 GMT 2003 04 28 04 00 00 CIFS SMB and NFS File Shares Users Sales Marketing Engineering Snapshot 0 Snapshot 1 File Sharing Elements R Q Q Q ...

Page 45: ...ever larger businesses demand higher storage capacities higher data transfer rates and greater security from data loss if drives fail Merely adding extra drives to the system increases the total storage capacity but has little effect on the system efficiency because data can only be transferred to one hard drive at a time Figure 20 illustrates the read write process with separate physical hard dri...

Page 46: ...ure 22 RAID 0 data striping S1 S4 of data blocks B1 B12 For data in the array to be readable the data block sequence within each stripe must be the same This sequencing process is performed by the array controller which sends the data blocks to the drive write heads in the correct order A natural consequence of the striping process is that each hard drive in a given array will contain the same num...

Page 47: ...exist as well HP recommends creating one logical drive from the array After the physical drives are grouped into arrays they are ready to be converted into logical drives It is important to note that a LUN may extend over span all physical drives within a storage controller subsystem but cannot span multiple storage controller subsystems After a LUN has been created it is possible to extend the si...

Page 48: ...te The ADG feature is available only with the optional Smart Array 5304 6404 Controller installed RAID 1 0 support requires an even number of drives Refer to Table 3 for more information These fault tolerance methods are discussed in the following paragraphs RAID 0 Data Striping This configuration provides striping of the array to improve read and write performance but offers no redundancy of data...

Page 49: ...a is striped across all of the drives in the array Figure 24 RAID 1 0 drive mirroring of P1 onto P2 This method is useful when high performance and data protection are more important than the cost of hard drives The operating system drives are mirrored If one drive fails the mirror drive immediately takes over and normal system operations are not interrupted Note HP supports a configuration that u...

Page 50: ...ity information P Spreading the parity across all the drives allows more simultaneous read operations and higher performance than data guarding RAID 4 If one drive fails the controller uses the parity data and the data on the remaining drives to reconstruct data from the failed drive RAID 5 allows the system to continue operating with reduced performance until the failed drive is replaced However ...

Page 51: ...d by drive failure With RAID ADG however two different sets of parity data are used This allows data to still be preserved if two drives fail As can be seen from Figure 26 each set of parity data uses up a capacity equivalent to that of one of the constituent drives for a total parity usage of two drives of space This method is most useful when data loss is unacceptable but cost must also be minim...

Page 52: ...ormance High data availability any two drives can fail without loss of critical data Disadvantage Relatively low write performance lower than RAID 5 due to the need for two sets of parity data The table below summarizes the important features of the different kinds of RAID supported by the Smart Array controllers The decision chart in the following table may help determine which option is best for...

Page 53: ...late the physical storage elements to the file system elements as presented in Figure 19 The NAS 2000s utilizes the Disk Manager DM to manage the various types of disk presented to the file system DM has two types of LUN presentation basic disk and dynamic disk Each of these types of disk has special features that enable different types of management Through the use of basic disks primary partitio...

Page 54: ...racteristics on numbers of reads and writes apply when using fault tolerant configurations as is the case with controller based RAID These volumes can also be assigned drive letters or be mounted as mount points off existing drive letters In general HP recommends utilizing the Array controller for the management of fault tolerance over the use of DM since DM places an additional level of operating...

Page 55: ... recovering data from shadow copies can reduce the number of times needed to restore data from tape Detailed information on Shadow Copies can be found in Chapter 5 of this guide File System Elements File system elements are composed of the folders and subfolders that are created under each Logical Storage element partitions logical disks and volumes Folders are used to further subdivide the availa...

Page 56: ...Storage Management Overview 56 NAS 2000s Administration Guide ...

Page 57: ...ent process as a supplement to this administration guide The primary web page for facilitating disks and volume creation is illustrated in Figure 27 The figure in the diagram illustrates the process of creating arrays volumes and shadow copies The diagram on the left illustrates the logical steps used to manage disks beginning with the ACU at the top The process follows the diagram from top to bot...

Page 58: ...s Manage logical disks Observe disk capacity and status scan for new disks view detailed disk properties create new volumes by launching the advanced Disks Management interface Volumes Manage disk space usage by enabling quotas scheduling disk defragmentation and performing detailed volume management using the Manage item Shadow Copies Manage shadow copies of shared folders on the volume Shadow co...

Page 59: ...ete the logical drive creation wizard to designate some or all of the array space as a logical disk Depending on how many physical disks are included in the array several different types of logical disks are possible Consult the ACU Help for details on creating logical disk drives Step 3 Verify newly created logical disks 1 Click Disks on the Disk tab 2 Click Rescan to scan for newly created logic...

Page 60: ...es OS and data drives Each time the Array Configuration Utility is run it analyzes the configuration of the Array Controllers installed in the system From the Main page various options are available to change or reconfigure the controller s This document only covers a subset of the functions available in the ACU For complete documentation on ACU refer to the comprehensive online help found within ...

Page 61: ...omepage The Array Configuration Utility is displayed Figure 29 Array Configuration Utility 4 Select a controller from the list on the left side to begin configuration The controller named Smart Array 5i Controller in the embedded slot is for all drives in the server chassis and drives contained in an external storage enclosure attached to the Smart Array 5i on the server head if present ...

Page 62: ...c setup Standard Configuration default Select Standard Configuration to quickly configure a controller Choosing Standard Configuration is the fastest way to configure a controller but requires an intermediate to advanced level of knowledge concerning storage The Standard Configuration path offers the least amount of help or step by step guides and does not provide a FAQ panel assuming the user kno...

Page 63: ...logical drives of varying RAID settings Extending and Expanding Arrays and Logical Drives is supported RAID migration is supported Managing Disks From the Disks tab of the WebUI select Disks The page displays the physical disks that are associated with the NAS device and the volumes that are created on them Multiple volumes may appear on multiple disks depending on whether the volumes are simple s...

Page 64: ...vided with the Disk Management Utility for assistance in using the product Table 5 Manage Disks Options Option Task Rescan Select to detect a new disk added to the system By default drives are dynamically recognized by the system Occasionally a rescan of the hardware is required The rescan is not synchronous and may require a browser refresh after the scan is initiated to display the new content C...

Page 65: ...he utility Do not alter the Operating System Disk Labeled Local Disk C Do not alter the disk labeled DON T ERASE The use of software RAID based dynamic volumes is not recommended use the array controller instead it is more efficient The largest disk that Windows 2003 Storage Server can accommodate from a storage system is 2 TB It is not recommended to span array controllers with dynamic volumes Us...

Page 66: ...since they provide the greatest level of support for snapshots encryption and compression Only basic disks can be formatted as FAT or FAT32 Volumes Page On the Volumes page administrators can select to manage volumes schedule defragmentation and set or manage quotas The Volumes page displays all volumes that are formatted NTFS on the system It does not display the volume type for example simple or...

Page 67: ...elect to schedule defragmentation for the selected volume Set Default Quota Select to set quota limits to manage use of the volume Settings on this page apply to new users and any users for whom user quota entries have not previously been set Set Quota Entries Select to show a list of user quota entries Then create a new quota entry delete a quota entry or view the properties of a quota entry ...

Page 68: ...AS device regardless of their format NTFS FAT or FAT32 Do not tamper with the Don t Erase or the Local C volume These are reserved volumes and must be maintained as they exist Figure 33 Manage Volumes screen Table 7 Manage Volumes Options Option Task Create New Select to open the Disk Utility and create a new volume Create a new volume will open a remote desktop session to the Windows Disk Manager...

Page 69: ...e Array Configuration Utility presented on the Disk page LUN expansion may occur in Disk Arrays where space is available If insufficient space is available additional physical disks may be added to the array dynamically Figure 34 Expanding a LUN Extend Opens a page to extend a partition based on a basic disk or it opens Windows Disk Management to extend dynamic based volumes Rescan Select to detec...

Page 70: ...e appropriate storage device and select Refresh 2 To add an unassigned physical disk to the array use the following steps a Select the appropriate array controller and the appropriate array that the logical drive is contained in b Select Expand Array c Select the appropriate physical disk and click OK The array is expanded 3 Follow the instructions for extending a LUN Extending a partition on a ba...

Page 71: ...volume If no more space is available on the current dynamic disk add an additional dynamic disk to the list of available disks and utilize space from it Extending using DiskPart DiskPart may also be used to extend a partition or volume from the CMD prompt of the NAS operating system via Remote Desktop Complete help is available from the Windows 2003 desktop under Start Help and Support To use Disk...

Page 72: ...sks 2 Click the Volumes tab 3 Select the volume to schedule defragmentation 4 In the Tasks list choose Schedule Defrag 5 On the Manage the defragmentation schedule for VolumeName page select the Schedule defragmentation for this volume check box 6 Select the frequency Once Weekly or Monthly 7 Use the remaining controls to specify when defragmentation will occur The available controls change accord...

Page 73: ...e is 4 KB or smaller Managing Disks After Quick Restore After a Quick Restore drive letters may be assigned to the wrong volume Windows Storage Server 2003 assigns drive letters after the restoration in the order of discovery To help maintain drive letter information placing the drive letter into the volume label is recommended To change the drive letters to the appropriate ones go into Disk Manag...

Page 74: ...e letter 5 Click Yes to confirm the drive letter change Figure 38 Confirm drive letter change 6 If the dialog box in Figure 39 is displayed select Yes to continue If the old drive letter needs to be reused reboot the server after clicking Yes Figure 39 Disk Management warning ...

Page 75: ...uota limit Enabling quotas and not limiting disk space use is useful to still allow users access to a volume but track disk space use on a per user basis It is also possible to specify whether or not to log an event when users exceed either their quota warning level or their quota limit When enabling disk quotas for a volume volume usage is automatically tracked from that point forward but existin...

Page 76: ...e 1 On the primary navigation bar click Disks 2 Click Volumes 3 Select the volume to manage 4 In the Tasks list click Set Default Quota 5 On the Default Quota for volume page clear the check box to Use quota limits to manage use of the volume 6 Click OK Setting User Quota Entries The Set User Quotas page allows the administrator to set delete or change disk quotas for any user on the server To set...

Page 77: ...a Entry 2 Select a user 3 Set the limit 4 Set the warning level 5 Click OK Figure 41 Add new quota entry To change a quota entry 1 Select the quota to change 2 Click Properties 3 Change the limit 4 Change the warning level 5 Click OK To delete a quota entry 1 Select the quota to change 2 Click Delete ...

Page 78: ...olume with focus convert basic Converts an empty dynamic disk to a basic disk convert dynamic Converts a basic disk into a dynamic disk Any existing partitions on the disk become simple volumes create volume simple Creates a simple volume After creating the volume the focus automatically shifts to the new volume exit Exits the DiskPart command interpreter help Displays a list of the available comm...

Page 79: ...earch on DiskPart Example of using DiskPart The following example shows how to configure a volume on the NAS server In the cmd window type c diskpart DISKPART Rescan DISKPART select disk 2 DISKPART convert dynamic DISKPART REM Create a simple volume DISKPART create volume simple size 4000 DISKPART REM Assign drive letter E to the volume DISKPART assign letter E DISKPART list vol DISKPART Exit ...

Page 80: ...Disk Management 80 NAS 2000s Administration Guide ...

Page 81: ...he snapshot s original form it takes up no space since blocks are not moved until an update to the disk occurs By using shadow copies a NAS 2000s server can maintain a set of previous versions of all files on the selected volumes End users access the file or folder by using a separate client add on program which enables them to view the file in Windows Explorer Accessing previous versions of files...

Page 82: ...tories and My Documents folders that are redirected by using Group Policy or other shared folders in which users store data Shadow copies work with compressed or encrypted files and retain whatever permissions were set on the files when the shadow copies were taken For example if a user is denied permission to read a file that user would not be able to restore a previous version of the file or be ...

Page 83: ...he oldest shadow copy is purged The minimum amount of storage space that can be specified is 100 megabytes MB The default storage size is 10 of the source volume the volume being copied If the shadow copies are stored on a separate volume change the default to reflect the space available on the storage volume instead of the source volume Remember that when the storage limit is reached older versio...

Page 84: ...mple by keeping the shadow copy on the same volume although there is a potential gain in ease of setup and maintenance there may be a reduction in performance and reliability Caution If shadow copies are stored on the same volume as the user files note that a burst of disk input output I O can cause all shadow copies to be deleted If the sudden deletion of shadow copies is unacceptable to administ...

Page 85: ...nfo command To change the cluster size on a volume that contains data backup the data on the volume reformat it using the new cluster size and then restore the data Mounted Drives A mounted drive is a local volume attached to an empty folder called a mount point on an NTFS volume When enabling shadow copies on a volume that contains mounted drives the mounted drives are not included when shadow co...

Page 86: ... the check box next to the volume name and then choose a task from the Tasks list Copies Lists the number of shadow copies on the volume Used Space Lists the total disk space that is used by the shadow copies on the volume Shares Lists the number of shared folders that reside on the volume This information can help determine whether to enable shadow copies on a volume A greater number of shared fo...

Page 87: ... be altered to reside on a dedicated volume separate from the volumes containing files shares See Figure 44 Table 10 Shadow Copies Tasks Task Description Enable Click to enable Shadow Copies on the selected volume Disable Click to enable Shadow Copies on the selected volume New Shadow Copy Click to immediately create a new shadow copy on the selected volume View Shadow Copies Click to view a list ...

Page 88: ...o high takes up valuable storage space Setting the limit too low can cause shadow copies to be purged too soon or not created at all By storing shadow copies on a separate volume space for Shadow Copies may be manage separately limits can generally be set higher or set to No Limit See the properties tab of the shadow copy page for a volume to alter the cache file location covered later in this cha...

Page 89: ...enable the Shadow Copies service on Note After the first shadow copy is created it cannot be relocated Relocate the cache file by altering the cache file location under Properties prior to enabling shadow copy See Viewing Shadow Copy Properties in this chapter 4 Click Enable To create a shadow copy on a volume 1 On the primary navigation bar click Disks 2 Click the Shadow Copies tab 3 On the Manag...

Page 90: ...e 4 In the Tasks list click Set Schedule 5 On the Shadow Copy Schedules page click New 6 Select a frequency Once Daily Weekly or Monthly 7 Use the remaining controls to specify the recurrence pattern and the starting date and time The available controls change according to the frequency selected 8 Click OK Deleting a Shadow Copy Schedule To delete a shadow copy schedule on a volume 1 On the primar...

Page 91: ...e disks and the space available on each is presented at the bottom of the page Managing the cache files on a separate disk is recommended Note If shadow copies have already been enabled the cache file location is grayed out To change this location after shadow copies have been enabled all shadow copies must be deleted and cannot be recovered Remember enabling Shadow Copies creates a Shadow Copy by...

Page 92: ...es will be disabled 5 Click OK to delete all existing shadow copies and settings for the volume Caution When the Shadow Copies service is disabled all shadow copies on the selected volumes are deleted Once deleted shadow copies cannot be restored Managing Shadow Copies from the NAS Desktop As an alternative to managing Shadow Copies via the WebUI the NAS Desktop may be accessed via Remote Desktop ...

Page 93: ...Shadow Copies 93 NAS 2000s Administration Guide Figure 46 Accessing shadow copies from My Computer ...

Page 94: ... shares Consequently users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files However administrators can take advantage of Shadow Copies for Shared Folders to restore files on behalf of these users SMB Shadow Copies Windows users can independently access previous versions of files stored on SMB shares via the Shadow Copies for ...

Page 95: ... folder history and so on NFS Shadow Copies UNIX users can independently access previous versions of files stored on NFS shares via the NFS client no additional software is required Server for NFS exposes each of a share s available shadow copies as a pseudo subdirectory of the share Each of these pseudo subdirectories is displayed in exactly the same way as a regular subdirectory is displayed The...

Page 96: ...ituations that may require recovery of files or folders Accidental file deletion the most common situation Accidental file replacement which may occur if a user selects Save instead of Save As File corruption It is possible to recover from all of these scenarios by accessing shadow copies There are separate steps for accessing a file compared to accessing a folder As documented previously the use ...

Page 97: ...l be selected 3 Right click the mouse and select Properties from the bottom of the menu Select the Previous Versions tab 4 Select the version of the folder that contains the file before it was deleted and then click View 5 View the folder and select the file or folder to recover The view may be navigated multiple folders deep 6 Select restore to restore the file or folder to its original location ...

Page 98: ...e placement of the file folder to a new location Figure 49 Recovering a deleted file or folder sharepoint In some situations the name of the folder or file can not be recalled In this case if the user has access to the root or the administrator is available the following procedure may be followed 1 Select Start Run and Type in name_of_server A window will open with all of the shares listed on the ...

Page 99: ...d file because the file itself can be right clicked instead of the folder To recover an overwritten or corrupted file use the following procedure 1 Right click the overwritten or corrupted file and click Properties 2 Select Previous Versions 3 To view the old version click View To copy the old version to another location click Copy to replace the current version with the older version click Restor...

Page 100: ...the network via the client application and only at a file or folder level as opposed to the entire volume Hence the standard backup associated with a volume backup will not work to back up the previous versions of the file system To answer this particular issue Shadow Copies are available for back up in two situations If the backup software in question supports the use of Shadow Copies and can com...

Page 101: ...credential includes the username password and if appropriate domain information Using the credential the server authenticates and provides the corresponding access to the user When a NAS 2000s is deployed into a workgroup environment all user and group account access permissions to file resources are stored locally on the server By contrast when a NAS 2000s is deployed into a domain environment it...

Page 102: ...p between the username and the person who uses the account It is important that rules are established to ensure that usernames are Systematic Easy to follow and implement Easy to remember Using a combination of the user s first name middle initial and last name results in systematic usernames for every member of a particular organization Common examples include First initial followed by last name ...

Page 103: ...nd groups are managed through the WebUI of the NAS 2000s Within the Users option there are two choices Managing local users Managing local groups User and group administrative tasks include adding deleting and modifying user and group information Managing local users and managing local groups are discussed in the following paragraphs Managing Local Users Managing users includes the following tasks...

Page 104: ...ing the user from the list of displayed users in the dialog box The sort order of the display is controlled by clicking the Name field heading The names are displayed in alphanumeric order or reverse alphanumeric order Adding a New User To add a user 1 From the Local Users dialog box click New The Create New User dialog box is displayed Figure 52 Create New User dialog box 2 Enter the user informa...

Page 105: ...Modifying User Properties To modify other user properties 1 From the Local Users dialog box select the user whose record needs to be modified Then click Properties The General information page of the Properties dialog box is displayed Figure 53 is an illustration of the User Properties dialog box Figure 53 User Properties dialog box 2 The following information can be changed or set User name Full ...

Page 106: ...p Modifying group properties including user memberships Local groups in a workgroup environment are managed through the Users option in the WebUI In the WebUI under Users Local Groups is the Local Groups on Server dialog box All workgroup group administration tasks are performed in the Local Groups on Server Appliance dialog box Figure 54 Local Groups dialog box ...

Page 107: ...rs of this group click Members See Modifying Group Properties for procedural instructions on entering group members 4 After all group information is entered click OK The group is added and the Local Groups dialog box is displayed again Deleting a Group To delete a group 1 From the Local Groups dialog box select the group to delete and then click Delete 2 The Delete Group dialog box is displayed Ve...

Page 108: ... these tabs is discussed in the following paragraphs 2 Enter the desired changes in each of the tabs Then click OK The Local Groups dialog box is displayed again General Tab Within the General tab basic group information can be changed including Group name Description Members Tab To indicate or change the members of a group click the Members tab Within this dialog box users are added and removed f...

Page 109: ...ve the changes To add user or group from a domain to this group the scroll bar at the right of the screen may need to be used to scroll up the screen display 1 Enter the user or group name to include in the indicated format domain username 2 Select Add 3 Enter a domain username and password 4 Click OK to complete adding the domain user or group Note To add domain users and groups to a local group ...

Page 110: ...User and Group Management 110 NAS 2000s Administration Guide ...

Page 111: ...NetWare File System Management chapter More information about Windows file system security is available on the Microsoft website www microsoft com All procedures in this chapter are documented using the WebUI In addition to this guide you may use the WebUI online help Folder Management Volumes and folders on any system are used to organize data Regardless of system size systematic structuring and ...

Page 112: ...lders Initially the Volumes dialog box is displayed This initial dialog box displays all system volumes Figure 58 Volumes dialog box 2 From this dialog box navigate to a specific folder by selecting the appropriate volume and then clicking Manage Folders The Folders dialog box is displayed with a list of all of the folders within that volume 3 To navigate to a subfolder select the folder in which ...

Page 113: ...Creating a new share for the volume or folder Managing shares for the volume or folder Creating a New Folder To create a new folder 1 From the Shares directory navigate to the Folders menu and then select New The Create New Folder dialog box is displayed Two tabs are displayed General and Compress Use these two tabs to enter the parameters for the new folder 2 In the General tab enter a name for t...

Page 114: ... Select the folder and then click Delete The Delete Folder dialog box is displayed Summary information about the deletion is displayed Note View the summary information to confirm that this is the intended share 2 Verify that the displayed folder is the folder to delete and then click OK The folder and all of its subfolders are deleted and the main dialog box is displayed again Modifying Folder Pr...

Page 115: ...to create file shares A share can be created for a folder while working with that folder in the Folders screens A share can be created and if necessary new folders can be created while working with file shares in the Shares screens This section discusses creating shares from the Folders menu and is an overview of the procedures Complete details on the process of creating shares are included in the...

Page 116: ... specific information See the Managing Shares section for detailed information about these entries 5 After entering all share information click OK Note The default permission settings for a new share are read only Managing Shares for a Volume or Folder Within the WebUI there are two access points to the same screens used to manage file shares While working with a folder in the Folders dialog boxes...

Page 117: ... same whether shares are managed through the Folders menu or the Shares menu the procedures are only documented once See Deleting a New Share in the Share Management section for detailed procedural instructions on deleting file shares 4 To modify share properties select the share to modify and click Properties The Share Properties dialog box is displayed Because the screens are the same whether sh...

Page 118: ...he dialog box instructions To remove users and groups from the permissions list highlight the desired user or group and then click Remove The center section of the Security tab provides a listing of permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels To modify ownership of files or to modify individual...

Page 119: ...e Advanced screen 1 Select the desired user or group 2 Click Edit 3 Check all the permissions that you want to enable and clear the permissions that you want to disable Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission If neither box is selected permission is automatically disabled Figure 65 illustrates the Edit screen and some of t...

Page 120: ... Remove Replace permission entries on all child objects with entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Another area of the Advanced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be added del...

Page 121: ...curity Settings Auditing tab dialog box 4 Click Add to display the Select User or Group dialog box Figure 67 Select User or Group dialog box Note Click Advanced to search for users or groups 5 Select the user or group 6 Click OK Figure 68 illustrates the Auditing Entry screen that is displayed ...

Page 122: ...uditing must be enabled to configure this information Use the local Computer Policy Editor to configure the audit policy on the NAS 2000s The Owner tab allows for taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security conf...

Page 123: ...box The current owner of the file or folder is listed at the top of the screen To take ownership 1 Select the appropriate user or group from the Change owner to list 2 If it is also necessary to take ownership of subfolders and files enable the Replace owner on subcontainers and objects box 3 Click OK to execute the commands ...

Page 124: ...ther having too many shares of a very specific nature or of having very few shares of a generic nature For example shares for general usage are easier to set up in the beginning but can cause problems later Frequently a better approach is to create separate shares with a specific purpose or group of users in mind However creating too many shares also has its drawbacks Take care to avoid creating s...

Page 125: ...ctory apply instead This method results in a hierarchical security model where the network protocol permissions and the file permissions work together to provide appropriate security for shares on the device Note Share permissions and file level permissions are implemented separately It is possible for files on a file system to have different permissions from those applied to a share When this sit...

Page 126: ...me name when sharing a folder through CIFS and then exporting it through NFS do not put spaces in the CIFS share name NFS service does not support exporting a child folder when its parent folder has already been exported An NFS client can access a child folder by selecting the parent folder and then navigating to the child folder If strict cross platform compatibility is an administration goal CIF...

Page 127: ...r at the same time it creates the share Protocol specific tabs are available to enter sharing and permissions information for each sharing type See Modifying Share Properties for detailed information on these tabs 3 After entering all share information click OK Deleting a Share Caution Before deleting a share warn all users to exit that share and confirm that no one is using the share To delete a ...

Page 128: ...cted share is displayed 2 To enter or change client protocol information check the appropriate boxes and then click the corresponding tabs Windows Sharing UNIX Sharing Web Sharing HTTP Each of these tabs is discussed in the following paragraphs 3 After all share information has been entered click OK The Share menu is displayed again Windows Sharing From the Windows Sharing tab of the Share Propert...

Page 129: ...ded to the Permissions box To remove access to a currently approved user or group select the user or group from the Permissions box and then click Remove To indicate the type of access allowed for each user select the user and then expand the Allow and Deny drop down boxes Select the appropriate option 4 After all Windows Sharing information is entered either click the next Sharing tab or click OK...

Page 130: ... Use this permission to assign administrative access to the share This will allow the client computer to have root access to the NFS share Map the UNIX root user to the Windows user Administrator Also map the group that this UNIX root belongs to to the Windows group Administrator Read write Root Use this permission to allow clients to read or write to the share Use this permission to assign admini...

Page 131: ...To access and enter protocol parameter settings 1 From the Shares menu select Sharing Protocols The File Sharing Protocols dialog box is displayed Figure 74 File Sharing Protocols dialog box 2 Protocols and their statuses are listed The following options are available Enabling a protocol Disabling a protocol Modifying Protocol Settings Because enabling and disabling a protocol are self explanatory...

Page 132: ...a domain root distributed file system The type of a distributed file system determines which client computers can access the distributed file system A stand alone DFS root Does not use Active Directory to manage DFS Cannot have more than one root on a server Does not support automatic file replication using the File Replication service FRS Is not fault tolerant and if the root fails the entire nam...

Page 133: ...line help In addition general information on DFS may be found at http www microsoft com windowsserver2003 techinfo overview dfs mspx Accessing the DFS Namespace from other Computers In addition to the server based DFS component of the Windows Server 2003 family there is a client based DFS component The DFS client caches a referral to a DFS root or a DFS link for a specific length of time defined b...

Page 134: ...the local DFS root select Publish new shares to the local DFS root To set the default to publish the share to another DFS root select Publish new shares to a domain DFS root or a stand alone DFS root on a different server In the DFS root box type the path of the default DFS root To not publish the share to a DFS root select Do not publish new shares to a DFS root 5 Choose OK Creating a Local DFS R...

Page 135: ...DFS root on the server only The Distributed File System administrative tool must be used to manage Domain DFS Roots Hence if there is more than one root on the server the first root in alphabetical order with local stand alone roots grouped ahead of domain roots will be available to be deleted If only domain roots exist on the server the first domain root will be listed but it cannot be deleted us...

Page 136: ...ish a share in a DFS root Figure 78 DFS share example 1 Select Shares from the WebUI 2 Type in a new share name 3 Type in a folder name select the checkbox Create folder if appropriate 4 Verify that the Windows checkbox is selected DFS is dependent on the SMB protocol 5 Under DFS check the box if unchecked Note The default behavior can be set to publish all shares to DFS In this case the box will ...

Page 137: ...steps 1 Select Shares from the WebUI 2 Select the target share from the table and select Publish in DFS 3 Enter the name of the DFS root to publish the share too 4 Click OK The share will appear in the DFS underneath the DFS root Removing a Published Share from DFS Once a share is published in DFS it may be removed from the virtual namespace via the Shares Property page To remove a share from DFS ...

Page 138: ...imits with two real time space alarms The Directory Quota feature includes the following components Active and passive space limits on directories Best practice storage resource management policies A severe alarm threshold A warning alarm threshold Auto discovery of drives Customized messages Alarms sent to the event log Alarms sent to the user Storage reports that can be sent to an intranet Web s...

Page 139: ...f the cluster size is 8 KB Windows 2003 will actually allocate 8 KB for the file The user has now used 104 KB and while this is allowed future attempts to create or extend files will fail Establishing Directory Quotas Directory quotas are established in a two part fashion First a policy is defined using the policies selection from the Directories Policy Page After a policy is established it can be...

Page 140: ...s default policies can be set in advance for new devices added to the system via the preferences button on the Directory Quota Page File Screening File screening allows the administrator to limit or monitor files based on extension for example disallow all pst and mp3 files It should be noted that the filter is merely based on extensions and not the content of the files Hence if a file extension i...

Page 141: ...rage reports allow the administrator to analyze the contents of the storage server via standard reports for common tasks The reports can be displayed using text simple HTML tables or Active HTML When using Active HTML the ActiveX control provides graphs A complete online help guide in the WebUI is provided for reporting via the in the right hand corner of the UI Reports can be scheduled or produce...

Page 142: ...ver The manufacturer and model are usually enough to uniquely identify the printer and its language However some printers support multiple languages and the configuration printout usually lists them Also the configuration printout often lists installed options such as extra memory paper trays envelope feeders and duplex units 3 Choose a printer name Users running Windows based client computers cho...

Page 143: ...is not able to connect the Additional Port Information Required page appears a Verify that the ip address or name that was entered is correct b Select Standard to identify the printer network adapter A list of manufacturers and models of the network adapters will be displayed Select the appropriate printer from the Standard list c If the printer network adapter uses nonstandard settings click Cust...

Page 144: ...Standard TCP IP Printer Port Wizard starts Click Next 6 Type the name or IP address of the printer The IP address is usually listed on the printer configuration page The wizard completes the Port Name field Click Next 7 The wizard attempts to connect to the printer If the wizard is able to connect the Completing the Add Standard TCP IP Printer Port Wizard page appears and click Finish If the wizar...

Page 145: ...Select Additional Drivers 5 Select the desired operating systems and click OK 6 A dialog will appear to add the additional drivers from disk Installing Print Services for UNIX 1 Log on as administrator or as a member of the Administrators group 2 Click Start Control Panel and then click Add or Remove Programs 3 Click Add Remove Windows Components 4 In the Components list click Other Network File a...

Page 146: ...Folder Printer and Share Management 146 NAS 2000s Administration Guide ...

Page 147: ...g system than other third party NFS server packages The administrative interface for NFS exports is similar to the Server Message Block SMB sharing interface used by Windows platforms With Server for NFS properly configured the administrator can create shares that are simultaneously accessible by multiple client types For example some of the options for shares include configurations for CIFS SMB s...

Page 148: ...ing is the conversion of an unknown or filtered user to an anonymous user This anonymous user has very restricted permissions on the system Squashing helps administrators manage access to their exports by allowing them to restrict access to certain individuals or groups and to squash all others down to restricted or no access Squashing enables the administrator to allow permissions instead of deny...

Page 149: ...e for later review and establishes log setting behavior Some behavior examples include events logged and log file size See the online Services for NFS help for more information 1 Use Remote Desktop to access the NAS Management Console click File Sharing Services for UNIX Server for NFS Click the Logging tab 2 To log events to the event viewer application log click the check box for Log events to e...

Page 150: ...between TCP and UDP NFS versions 2 and 3 Other Server for NFS server settings include those that affect how file names are presented to NFS clients such as allowing hidden files and allowing case sensitive lookups Note The NFS Server service needs to be restarted when changing these settings Notify users when stopping and restarting the NFS Server service Use Remote Desktop to access the NAS Deskt...

Page 151: ...Microsoft Services for NFS 151 NAS 2000s Administration Guide Figure 83 Server for NFS screen Server Settings tab ...

Page 152: ...en it Windows Installer is opened Note If the domain controller used does not have Windows Installer installed locate the file InstMSI exe on the SFU 3 0 directory and run it After this installation the Windows Installer program starts when opening setup exe 4 In the Microsoft Windows Services for UNIX Setup Wizard dialog box click Next 5 In the User name box type your name If the name of your org...

Page 153: ...cept the terms in the License Agreement and then click Next to continue installation If you click I do not accept the License Agreement Exit Setup the installation procedure terminates 6 Click Custom Installation and then click Next 7 In the Components pane click the down arrow next to Windows Services for UNIX and then click Entire component will not be available 8 Click the plus sign next to Aut...

Page 154: ...S file shares are created in the same manner as other file shares however there are some unique settings Procedures for creating and managing NFS file shares are documented in the same sections as creating file shares for other protocols See the Folder and Share Management chapter for more information Note NFS specific information is extracted from the Folder and Share Management chapter and dupli...

Page 155: ...n an export into an underscore character If you plan to use the same name when sharing a folder through SMB and then exporting it through NFS do not put spaces in the SMB share name To create a folder for the share check the indicated box and the system will create the folder at the same time it creates the share 3 Select the NFS Sharing tab to enter NFS specific information See Modifying Share Pr...

Page 156: ... Modifying Share Properties To change share settings 1 From the Shares menu select the share to modify and then click Properties The General tab of the Share Properties dialog box is displayed Figure 85 Share Properties dialog box General tab The name and path of the selected share is displayed 2 To enter or change client protocol information check the UNIX NFS client type box and then click the U...

Page 157: ...l access to the share 4 Select whether or not to allow root access Check the Allow root access checkbox to add the root permission Read only Root Use this permission to restrict write access to the share Use this permission to assign administrative access to the share This will allow the client computer to have root access to the NFS share Map the UNIX root user to the Windows user Administrator A...

Page 158: ...and is intended for NFS clients only The executable file nfsonly exe allows a share to be modified to do more aggressive caching to improve NFS performance This option can be set on a share by share basis Do not use this function on any file share that can be accessed by any means other than by NFS clients as data corruption can occur The syntax of this command is nfsonly sharename enable disable ...

Page 159: ...ings As mentioned in a previous section there are two versions of NFS Version 2 and Version 3 Version 3 supports additional file operations that Version 2 did not have such as asynchronous file operations To indicate whether to use asynchronous or synchronous write settings 1 From the WebUI access the NFS Protocol Properties menu by selecting Shares Sharing Protocols Select NFS Protocol and then c...

Page 160: ...vice to be restarted Notify users before toggling this setting Figure 88 NFS Async Sync Settings dialog box NFS Locks NFS supports the ability to lock files File locking helps prevent two or more users from working with the same files at the same time NFS locking depends on the software application components to manage the locks If an application does not lock a file or if a second application doe...

Page 161: ...x All clients that have locks on system files are listed in the Clients that hold locks box 3 To manually clear locks that a client has on files select the client from the displayed list and then click OK 4 To indicate the amount of time after a system failure that the locks are kept active enter the number of seconds in the Wait period box The NAS 2000s keeps the locks active for the specified nu...

Page 162: ... control over the naming conventions of client groups and users If the client group is given the same name as a client the client is obscured from the view of the server For example assume that a client d4 exists If a client group called d4 is created permissions can no longer be assigned to just the client d4 Any reference to d4 now refers to client group d4 To manage NFS client groups 1 From the...

Page 163: ...Add The system adds the client to the displayed list of members 5 To remove a client from the group select the client from the Members box and then click Remove 6 After all clients have been added to the group click OK The NFS Client Groups dialog box is displayed again Deleting a Client Group To delete a group 1 From the NFS Client Groups dialog box select the group to delete and click Delete 2 A...

Page 164: ...of the group are listed in the Members box Figure 92 Edit NFS Client Groups dialog box 2 To add a client to the group enter the client name or IP address in the Client name box and then click Add The client is automatically added to the Members list 3 To delete a client from the group select the client from the Members list and then click Remove The client is removed from the list 4 After all addi...

Page 165: ... and Windows clients Because the files are stored in the native Windows NT file system the server has to map the UNIX users to Windows users to determine the user access level of the files Note User mapping is not designed to address existing user database problems in the existing environment All UIDs and GIDs must be unique across all NIS Network Information Service domains and all user names mus...

Page 166: ... command the return listing of files contains user information the user and group that own the file The ls al command is a UNIX command It returns a long or full listing of all files Because this information is contained in a Windows NT Access Control List ACL it is not UNIX ready The ACL information has to be converted back to UNIX UIDs and GIDs for the UNIX systems to understand and display the ...

Page 167: ...he NFS Properties Menu select User and Group Mappings The User and Group Mappings dialog box is displayed There are four tabs in the User and Group Mappings dialog box General information Sets the mapping information source which is either NIS or password and group files Simple Mapping Indicates whether simple mappings are being used Explicit User Mapping Lists exceptional user mappings that will ...

Page 168: ... and name of the group file 3 After this basic information is entered click OK Simple Mapping Tab Simple or implicit mapping is the first level of user name mapping In simple mode user and group names that match exactly in name are automatically equated While simple mappings are the most easily managed and are the most forthright type of map security problems can arise For example if a UNIX user i...

Page 169: ...pping for most users and then using advanced mappings for the users with unique names on the different systems Alternatively simple mapping can be disabled completely relying solely on explicit mappings Explicit mappings create the most secure mapping environment Security issues seen in simple mappings do not exist in explicit mappings Explicit user mappings specifically correlate two users togeth...

Page 170: ... at the bottom of the screen Repeat this process until all desired users have been mapped 4 To map multiple Windows users to one UNIX user one of the mapped Windows users must be set as the primary mapping To indicate which user map is the primary mapping highlight the desired map in the Explicitly mapped users box and then click the Set Primary button 5 To delete a map highlight the map in the Ex...

Page 171: ...ows group to a UNIX group enter the domain and the group name in the box in the middle of the screen use the Domain groupname format and highlight the UNIX group to map and then click Add The map is added to the Explicitly mapped groups box at the bottom of the screen Repeat this process until all desired groups have been mapped 4 To map multiple Windows groups to one UNIX group one of the Windows...

Page 172: ...AS Management Console click File Sharing Microsoft Services for Network File System Click User Name Mapping then Map Maintenance Figure 98 User Name Mapping screen Map Maintenance tab Backing up User Mappings 1 Select the Map Maintenance tab from the User Name Mapping screen 2 Type the path and name of the file to be used for backup in the File path and name field or click Browse to locate the fil...

Page 173: ...trollers that have user name mappings See Installing NFS Authentication Software on the Domain Controllers and Active Directory Domain Controllers section Also see User and Group Mappings in this chapter for instructions on setting up user name mappings 5 Verify that the mappings exist Use Remote Desktop to log in to the NAS 2000s and access the command line interface mapadmin list all 6 On the Li...

Page 174: ... from a command prompt Remote Desktop is included in the WebUI of the NAS 2000s To open a Remote Desktop session from the WebUI select Maintenance Remote Desktop See the Remote Access Methods and Monitoring chapter for information on setting up and using Remote Desktop Table 12 describes some common Services for NFS commands Table 12 Command Line Interface Command Prompts Command Function nfsstat ...

Page 175: ...int server administration by making the NAS 2000s emulate a NetWare file and print server FPNW eases the addition of the NAS 2000s into a mixed infrastructure by providing a NetWare user interface UI to a Windows 2000 based server administrators and users see their same familiar NetWare UI Additionally the same logon for clients is maintained without a need for any client configuration changes Thi...

Page 176: ...tions NetWare asp Note The printing capabilities of File and Print Services for NetWare are not supported on the NAS 2000s To install Services for NetWare 1 From the desktop of the NAS 2000s click Start Settings Network Connections Local Area Connection and then right click Properties 2 Click Install The Select Network Component Type dialog box is displayed Figure 99 is an example of the Select Ne...

Page 177: ...double click FPNW Figure 101 File and Print Services for NetWare screen 2 Enter an FPNW Server Name and Description This name must be different from the server name used by Windows or LAN Manager based clients to refer to the server If you are changing an existing name the new name will not be effective until you stop and restart File and Print Services for NetWare For example in Figure 101 the Wi...

Page 178: ...o See users connected to specific volume and to disconnect users from a specific volume 6 Click Files to View open files and close open files Creating and Managing NetWare Users To use Services for NetWare the Novell clients must be entered as local users on the NAS 2000s Adding Local NetWare Users 1 From the NAS 2000s desktop click the NAS Management Console icon click Core Operating System and t...

Page 179: ...ne of the screen and then click Properties 2 Select the NetWare Services tab Figure 103 NetWare Services tab 3 Select Maintain NetWare compatible login 4 Set other NetWare options for the user and click OK Note The installation of File and Print Services for NetWare will also create a supervisor account which is used to manage FPNW The supervisor account is required if the NAS 2000s was added as a...

Page 180: ...icrosoft Services for NetWare is installed See the previous section Installing Services for NetWare for instructions on installing SFN Creating a New NCP Share To create a new file share 1 From the NAS 2000s desktop click the NAS Management Console icon click File Sharing Shared Folders and then Shares 2 Right click Shares and then click New Share The Create Shared Folder dialog box is displayed F...

Page 181: ...NetWare File System Management 181 NAS 2000s Administration Guide 4 In Share Name type the name of the share Users will see this name 5 In Description type a description for the share Click Next ...

Page 182: ...5 NetWare Basic Share Permissions dialog box 7 Select the appropriate permissions level If a custom permissions level is desired select the Customize share and folder permissions radio button and then click Custom The Customize Permissions dialog box is displayed Figure 106 is an illustration of the Customize Permissions dialog box ...

Page 183: ...e Permissions dialog box Share Permissions tab 8 In the Share Permissions tab select the appropriate permissions level for each user or group that is configured to have access to that share 9 To enter file system permissions select the Security tab The following dialog box is displayed ...

Page 184: ...es using the NAS Management Console To change share settings through the NAS Management Console 1 From the NAS 2000s desktop select the NAS Management Console icon and then select File Sharing Shared Folders and Shares 2 In the details pane right click the desired share and then click Properties 3 Click the Share Permissions tab 4 To grant permissions to an additional group or user click Add selec...

Page 185: ...stem 2 Share permissions are effective only when the share is accessed over the network 3 The group of permissions you set for the share applies equally to all files and subdirectories in the volume 4 Permissions on an NTFS share operate in addition to NTFS permissions set on the directory itself Share permissions specify the maximum access allowed ...

Page 186: ...NetWare File System Management 186 NAS 2000s Administration Guide ...

Page 187: ...ated Lights Out Port Features Integrated Lights Out Port Configuration Using the Integrated Lights Out Port to Access the NAS 2000s Telnet Server Enabling Telnet Server Configuring Telnet Server Insight Manager Insight Manager Console Insight Manager Agent Web Interface Enterprise management applications HP OpenView Windows Based Operating System Tivoli NetView AIX These options let administrators...

Page 188: ...emote Desktop to access The NAS 2000s desktop The NAS Management Console A command line interface Backup software Antivirus programs Telnet Server To access Remote Desktop from the WebUI select Maintenance Remote Desktop For additional procedural information on Remote Desktop see the Setup Completion and Basic Administrative Procedures chapter Integrated Lights Out Port The following information p...

Page 189: ...replay Auto configuration of IP address through domain name system DNS or Dynamic Host Configuration Protocol DHCP Virtual power button Security Features SSL encryption for login and network traffic User administration allows capability to define user profiles Event generation for invalid login attempts Logging of user action in the Event Log Manage Users Feature The Manage Users feature allows th...

Page 190: ...d Startup Utility SNMP is enabled and the Insight Management Agents are preinstalled The Integrated Lights Out port comes with factory default settings which the administrator can change Administrators may want to add users change SNMP trap destinations or change networking settings Refer to the Integrated Lights Out Port User Guide for information about changing these settings There are several m...

Page 191: ...emote Console tab The Remote Console Information screen is displayed 4 Click on the Remote Console choice in the menu on the left side of the screen 5 Press Ctrl Alt Del to login to the console 6 Supply an administrator username and password The NAS server desktop is displayed Note The remote desktop feature of the iLO port requires a license key The key is included with the product inside the Cou...

Page 192: ...essions HP Insight Manager Version 7 The NAS 2000s is equipped with the latest Insight Management Agents for Servers allowing easy manageability of the server through HP System Management HP OpenView and Tivoli NetView Insight Manager is a comprehensive management tool that monitors and controls the operation of HP servers and clients HP Insight Manager Version 7 0 or later is needed to successful...

Page 193: ...administration 102 share support 125 client groups adding NFS 163 deleting NFS 163 editing NFS 164 managing NFS 162 conventions document 12 equipment symbols 13 text symbols 13 creating NFS file shares 154 D data blocks 46 data guarding explained 50 data striping 46 48 date system changing 26 DM Disk Manager 53 54 document conventions 12 prerequisites 12 domain controller configuring 102 domain en...

Page 194: ...der recovery 96 folders auditing access 120 compress tab 114 creating new 113 creating new share 115 deleting 114 general tab 113 managing 111 managing shares for 116 modifying properties 114 navigating to 112 FPNW accessing 177 described 175 installing 176 G getting help 15 group names examples 102 managing 102 groups adding from a domain 109 adding local users 108 adding to permissions list 118 ...

Page 195: ...8 features 189 license key 32 L license key iLO port 32 load balancing 37 switch assisted 37 transmit 37 with IP address 37 with MAC address 37 localhost 148 locks NFS 160 logging Services for NFS events 149 logical drives See LUNs logical storage elements 53 logs accessing 28 audit 28 options 28 LUNs and storage controller subsystems 47 creating basic or dynamic disks 43 defined 43 largest size 4...

Page 196: ...NFS async sync settings 159 authenticating user access 147 client groups 162 adding 163 deleting 163 editing 164 compatibility issues 126 deleting shares 156 file share creating 154 file shares creating 154 file sharing tests 173 group mappings 165 locks 160 modifying share properties 156 protocol properties settings 158 Server settings 150 share properties 159 user mapping server 148 user mapping...

Page 197: ...et Server 192 WebUI 188 Remote Desktop defined 29 described 188 exiting 29 opening 29 using 174 restarting the server 27 S scalability 18 scheduled shutdown 27 security auditing 120 file level permissions 117 ownership of files 122 Server for NFS components 147 described 147 Services for NFS commands 174 described 147 event logging 149 setup completing 32 e mail alerts 30 Ethernet NIC teams 32 sha...

Page 198: ... subsystems and LUNs 47 storage management elements 43 subfolder navigating to 112 switch assisted load balancing 37 symbols in text 13 symbols on equipment 13 system date changing 26 system storage managing 42 system time changing 26 T TCP IP configuring on NIC team 39 technical support HP 15 Telnet Server enabling 192 sessions information 192 text symbols 13 time system changing 26 transmit load...

Page 199: ... volumes creating new share 115 creating Novell 175 managing shares for 116 navigating to 112 NCP 180 planning 54 W warning rack stability 14 symbols on equipment 13 web sharing 130 websites HP storage 15 WebUI accessing 21 defined 17 launching 188 Windows sharing 128 workgroup environment 20 ...

Page 200: ...Index 200 NAS 2000s Administration Guide ...

Reviews: