background image

NOTE:

After the first shadow copy is created, it cannot be relocated. Relocate the cache file by altering the cache
file location under Properties prior to enabling shadow copy. See

Viewing shadow copy properties

” on page 37.

Viewing a list of shadow copies

To view a list of shadow copies on a volume:

1.

Access Disk Management.

2.

Select the volume or logical drive, then right-click on it.

3.

Select 

Properties

.

4.

Select 

Shadow Copies

 tab.

All shadow copies are listed, sorted by the date and time they were created.

NOTE:

It is also possible to create new shadow copies or delete shadow copies from this page.

Set schedules

Shadow copy schedules control how frequently shadow copies of a volume are made. There are a
number of factors that can help determine the most effective shadow copy schedule for an organization.
These include the work habits and locations of the users. For example, if users do not all live in the
same time zone, or they work on different schedules, it is possible to adjust the daily shadow copy
schedule to allow for these differences.

Do not schedule shadow copies more frequently than once per hour.

NOTE:

When deleting a shadow copy schedule, that action has no effect on existing shadow copies.

Viewing shadow copy properties

The Shadow Copy Properties page lists the number of copies, the date and time the most recent
shadow copy was made, and the maximum size setting.

NOTE:

For volumes where shadow copies do not exist currently, it is possible to change the location of the cache
file. Managing the cache files on a separate disk is recommended.

HP ProLiant SB460c SAN Gateway Storage Server 

37

Summary of Contents for ProLiant SB460c

Page 1: ...HP ProLiant SB460c SAN Gateway Storage Server user guide Part number AN583 96001 First edition September 2008 ...

Page 2: ...s warranty statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein Intel Itanium Pentium Intel Inside and the Intel Inside logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other coun...

Page 3: ...titions 19 Volumes 19 File system elements 20 File sharing elements 20 Volume Shadow Copy Service overview 20 Using storage elements 21 Clustered server elements 21 Network adapter teaming 21 Management tools 21 HP Systems Insight Manager 21 Management Agents 22 2 File server management 23 File services features in Windows Storage Server 2003 R2 23 Storage Manager for SANs 23 Single Instance Stora...

Page 4: ...hadow copies to an alternate volume 38 Disabling shadow copies 38 Managing shadow copies from the storage server desktop 39 Shadow Copies for Shared Folders 39 SMB shadow copies 40 NFS shadow copies 41 Recovery of files or folders 42 Recovering a deleted file or folder 42 Recovering an overwritten or corrupted file 43 Recovering a folder 43 Backup and shadow copies 44 Shadow Copy Transport 44 Fold...

Page 5: ...itional references for print services 62 4 Microsoft Services for Network File System MSNFS 63 MSNFS Features 63 UNIX Identity Management 63 MSNFS use scenarios 64 MSNFS components 64 Administering MSNFS 65 Server for NFS 65 User Name Mapping 70 Microsoft Services for NFS troubleshooting 72 Microsoft Services for NFS command line tools 72 Optimizing Server for NFS performance 72 Print services for...

Page 6: ...Resources 90 Cluster groups 91 Virtual servers 91 Failover and failback 91 Quorum disk 91 Cluster concepts 92 Sequence of events for cluster resources 92 Hierarchy of cluster resource components 93 Cluster planning 93 Storage planning 94 Network planning 94 Protocol planning 95 Preparing for cluster installation 96 Before beginning installation 96 Using multipath data paths for high availability 9...

Page 7: ...ministration on a server cluster 106 Best practices for running Server for NFS in a server cluster 106 Print services in a cluster 107 Creating a cluster printer spooler 107 Advanced cluster administration procedures 108 Failing over and failing back 108 Restarting one cluster node 108 Shutting down one cluster node 108 Powering down the cluster 109 Powering up the cluster 109 Additional informati...

Page 8: ...ery replacement notice 121 Taiwan battery recycling notice 121 Power cords 121 Japanese power cord notice 122 Electrostatic discharge 122 Preventing electrostatic discharge 122 Grounding methods 122 Waste Electrical and Electronic Equipment WEEE directive 122 Czechoslovakian notice 122 Danish notice 123 Dutch notice 123 English notice 123 Estonian notice 124 Finnish notice 124 French notice 124 Ge...

Page 9: ...x Security tab 46 11 Advanced Security settings dialog box Permissions tab 47 12 User or group Permission Entry dialog box 48 13 Advanced Security Settings dialog box Auditing tab 49 14 Select User or Group dialog box 49 15 Auditing Entry dialog box for folder name NTFS Test 50 16 Advanced Security Settings dialog box Owner tab 51 17 Accessing MSNFS from HP Storage Server Management console 65 18 ...

Page 10: ...f RAID methods 18 2 Tasks and utilities needed for storage server configuration 25 3 Authentication table 66 4 MSNFS command line administration tools 72 5 Sharing protocol cluster support 95 6 Power sequencing for cluster installation 98 7 10 ...

Page 11: ...the Manuals page of the HP Business Support Center website http www hp com support manuals In the Storage section click Disk Storage Systems and then select your product Document conventions and symbols Table 1 Document conventions Element Convention Cross reference links and e mail addresses Blue text Table 1 Website addresses Blue underlined text http www hp com Keys that are pressed Text typed ...

Page 12: ...ific instructions NOTE Provides additional information TIP Provides helpful hints and shortcuts Rack stability Rack stability protects personnel and equipment WARNING To reduce the risk of personal injury or damage to equipment Extend leveling jacks to the floor Ensure that the full weight of the rack rests on the leveling jacks Install stabilizing feet on the rack In multiple rack installations f...

Page 13: ... repair can be accomplished by CSR For more information about CSR contact your local service provider For North America see the CSR website http www hp com go selfrepair Product warranties For information about HP StorageWorks product warranties see the warranty information website http www hp com go storagewarranty Subscription service HP recommends that you register your product at the Subscribe...

Page 14: ...on feedback HP welcomes your feedback To make comments and suggestions about product documentation please send a message to storagedocsFeedback hp com All submissions become the property of HP About this guide 14 ...

Page 15: ... four major divisions Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level s elements Storage management example Figure 1 depicts many of the storage elements that one would find on a storage device The following sections provide an overview of the storage elements HP ProLiant SB460c SAN Gateway Stora...

Page 16: ...0 snapshot 1 Q Q Q R R R R T S S U U Users VirtualServerA IP Addresss 172 1 1 1 VirtualServerA IP Addresss 172 1 1 2 Sales Marketing Engineering Snapshot 0 Snapshot 1 Sales Users Customers Marketing Engineering Snapshot 0 Snapshot 1 T gl0044 Figure 1 Storage management process example Physical storage elements The lowest level of storage management occurs at the physical drive level Minimally choo...

Page 17: ...ive the same amount of data is written to each drive during any given time interval Each unit of data is termed a block The blocks form a set of data stripes over all the hard drives in an array as shown in Figure 3 S1 S2 S3 S4 B1 B4 B7 B2 B5 B8 B11 B10 B12 B6 B3 B9 gl0043 Figure 3 RAID 0 data striping S1 S4 of data blocks B1 B12 For data in the array to be readable the data block sequence within ...

Page 18: ... spare or hot spare to any configuration except RAID 0 This hard drive contains no data and is contained within the same storage subsystem as the other drives in the array When a hard drive in the array fails the controller can then automatically rebuild information that was originally on the failed drive onto the online spare This quickly restores the system to full RAID level fault tolerance pro...

Page 19: ...upport mount points at this time The use of mount points in conjunction with NFS shares is not supported Volumes When planning dynamic disks and volumes there is a limit to the amount of growth a single volume can undergo Volumes are limited in size and can have no more than 32 separate LUNs with each LUN not exceeding 2 terabytes TB and volumes totaling no more than 64 TB of disk space The RAID l...

Page 20: ...ile sharing protocols including Distributed File System DFS Network File System NFS File Transfer Protocol FTP Hypertext Transfer Protocol HTTP and Microsoft Server Message Block SMB On each folder or logical storage element different file sharing protocols can be enabled using specific network names for access across a network to a variety of clients Permissions can then be granted to those share...

Page 21: ...created on clustered resources as this is not supported by Microsoft Clustering and data loss may occur Network names and IP address resources for the clustered file share resource can also be established for access across a network to a variety of clients Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols Network adapter teaming...

Page 22: ...through HP SIM software and thirdparty SNMP management platforms Management Agents are installed with every SmartStart assisted installation or can be installed through the HP PSP The Systems Management homepage provides status and direct access to in depth subsystem information by accessing data reported through the Management Agents For additional information refer to the Management CD in the HP...

Page 23: ...R2_Storage_Management doc NOTE Storage Manager for SANs is only available on Standard and Enterprise editions of Windows Storage Server 2003 R2 Single Instance Storage Single Instance Storage SIS provides a copy on write link between multiple files Disk space is recovered by reducing the amount of redundant data stored on a server If a user has two files sharing disk storage by using SIS and someo...

Page 24: ...ion firewall NOTE Windows SharePoint Services is only available on Standard and Enterprise editions of Windows Storage Server 2003 R2 HP Storage Server Management Console The HP Storage Server Management Console is a user interface in Windows Storage Server 2003 R2 and Windows Unified Data Storage Server 2003 that provides one place to manage files or print serving components The console is access...

Page 25: ... then become the volumes that appear as drives on the storage server CAUTION The first two logical drives are configured for the storage server operating system and should not be altered in any manner If the first two logical drives are altered the system recovery process may not function properly when using the System Recovery DVD Do not tamper with the DON T ERASE or local C volume These are res...

Page 26: ... is hpinvent To open the ACU in browser mode NOTE Confirm that the ACU Execution Mode is set to remote service 1 Open a browser and enter the server name or IP address of the destination server For example http servername 2301 or http 192 0 0 1 2301 2 Log on to the HP System Management Homepage The default user name is administrator and the default password is hpinvent 3 Click Array Configuration ...

Page 27: ... spanning array controllers with dynamic volumes The use of software RAID based dynamic volumes is not recommended Use the array controller instead it is more efficient Use meaningful volume labels with the intended drive letter embedded in the volume label if possible For example volume e might be named Disk E Volume labels often serve as the only means of identification Record all volume labels ...

Page 28: ...umes on the server to perform the following tasks Prevent further disk space use and log an event when a user exceeds a specified disk space limit Log an event when a user exceeds a specified disk space warning level When enabling disk quotas it is possible to set both the disk quota limit and the disk quota warning level The disk quota limit specifies the amount of disk space a user is allowed to...

Page 29: ...tions If your server has Windows Storage Server 2003 R2 Enterprise Edition see the Cluster Administration chapter for expanding and extending storage in a cluster environment Expanding storage Expansion is the process of adding physical disks to an array that has already been configured The logical drives or volumes that exist in the array before the expansion takes place are unchanged because onl...

Page 30: ...t To make a virtual disk available to a host you must present it You can present a virtual disk to a host during or after virtual disk creation The virtual disk must be completely created before the host presentation can occur If you choose host presentation during virtual disk creation the management agent cannot complete any other task until that virtual disk is created and presented Therefore H...

Page 31: ...g a separate client add on program which enables them to view the file in Windows Explorer Accessing previous versions of files or shadow copies enables users to Recover files that were accidentally deleted Previous versions can be opened and copied to a safe location Recover from accidentally overwriting a file A previous version of that file can be accessed Compare several versions of a file whi...

Page 32: ...d size of files that are being copied as well as the frequency of changes between copies For example 100 files that only change monthly require less storage space than 10 files that change daily If the frequency of changes to each file is greater than the amount of space allocated to storing shadow copies no shadow copy is created Administrators should also consider user expectations of how many v...

Page 33: ...stored on the same volume as the user files note that a burst of disk input output I O can cause all shadow copies to be deleted If the sudden deletion of shadow copies is unacceptable to administrators or end users it is best to use a separate volume on separate disks to store shadow copies Determining creation frequency The more frequently shadow copies are created the more likely that end users...

Page 34: ...the mount point is stored to the mounted drive For example assume there is a folder F data users and the Users folder is a mount point for G If shadow copies are enabled on both F and G F data is shared as server1 data and G data users is shared as server1 users In this example users can access previous versions of server1 data and server1 users but not server1 data users Managing shadow copies Th...

Page 35: ...s the original volume See Figure 6 The cache file is located in a hidden protected directory titled System Volume Information off of the root of each volume for which shadow copy is enabled F cache file G cache file H cache file Figure 6 Shadow copies stored on a source volume The cache file location can be altered to reside on a dedicated volume separate from the volumes containing files shares S...

Page 36: ...y storing shadow copies on a separate volume space limits can generally be set higher or set to No Limit See the online help for instructions on altering the cache file location CAUTION If the data on the separate volume L is lost the shadow copies cannot be recovered Enabling and creating shadow copies Enabling shadow copies on a volume automatically results in several actions Creates a shadow co...

Page 37: ... a number of factors that can help determine the most effective shadow copy schedule for an organization These include the work habits and locations of the users For example if users do not all live in the same time zone or they work on different schedules it is possible to adjust the daily shadow copy schedule to allow for these differences Do not schedule shadow copies more frequently than once ...

Page 38: ...e then right click on it 3 Select Properties 4 Select the Shadow Copies tab 5 Select the volume that you want to redirect shadow copies from and ensure that shadow copies are disabled on that volume if enabled click Disable 6 Click Settings 7 In the Located on this volume field select an available alternate volume from the list NOTE To change the default shadow copy schedule settings click Schedul...

Page 39: ...clients and protocols There are two sets of supported protocols SMB and NFS All other protocols are not supported this includes HTTP FTP AppleTalk and NetWare Shares For SMB support a client side application denoted as Shadow Copies for Shared Folders is required The client side application is currently only available for Windows XP and Windows 2000 SP3 No additional software is required to enable...

Page 40: ...ing on the share to open its Properties window clicking the Previous Versions tab and then selecting the desired shadow copy Users can view copy and restore all available shadow copies Shadow Copies for Shared Folders preserves the permissions set in the access control list ACL of the original folders and files Consequently users can only access shadow copies for shares to which they have access I...

Page 41: ... the NFS client no additional software is required Server for NFS exposes each of a share s available shadow copies as a pseudo subdirectory of the share Each of these pseudo subdirectories is displayed in exactly the same way as a regular subdirectory is displayed The name of each pseudo subdirectory reflects the creation time of the shadow copy using the format GMT YYYY MM DD HH MM SS To prevent...

Page 42: ... the most common situation Accidental file replacement which may occur if a user selects Save instead of Save As File corruption It is possible to recover from all of these scenarios by accessing shadow copies There are separate steps for accessing a file compared to accessing a folder Recovering a deleted file or folder To recover a deleted file or folder within a folder 1 Access to the folder wh...

Page 43: ... To copy the old version to another location click Copy to replace the current version with the older version click Restore Recovering a folder To recover a folder 1 Position the cursor so that it is over a blank space in the folder to be recovered If the cursor hovers over a file that file is selected 2 Right click select Properties from the bottom of the menu and then click the Previous Versions...

Page 44: ...e Edition Windows Storage Server 2003 Enterprise Edition and Windows Server 2003 Datacenter Edition It is an advanced solution that works only if it has a hardware provider on the storage array A shadow copy transport can be used for a number of purposes including Tape backups An alternative to traditional backup to tape processes is transport of shadow copies from the production server onto a bac...

Page 45: ...less of system size systematic structuring and naming conventions of volumes and folders eases the administrative burden Moving from volumes to folders to shares increases the level of granularity of the types of data stored in the unit and the level of security access allowed Folders can be managed using the HP Storage Server Management Console Tasks include Accessing a specific volume or folder ...

Page 46: ...ions list click Add Follow the dialog box instructions To remove users and groups from the permissions list highlight the desired user or group and then click Remove The center section of the Security tab lists permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels File server management 46 ...

Page 47: ...log box is illustrated in Figure 12 and includes Add a new user or group Click Add and then follow the dialog box instructions Remove a user or group Click Remove Replace permission entries on all child objects with entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Modify specific permissions assigned to a pa...

Page 48: ...ates the Edit screen and some of the permissions Figure 13 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be added deleted viewed or modified through the Advanced Security Settings Auditing tab File server management 4...

Page 49: ... box Auditing tab 5 Click Add to display the Select User or Group dialog box Figure 15 Select User or Group dialog box NOTE Click Advanced to search for users or groups 6 Select the user or group HP ProLiant SB460c SAN Gateway Storage Server 49 ...

Page 50: ... enabled to configure this information Use the local Computer Policy Editor to configure the audit policy on the storage server The Owner tab allows taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security configurations Fil...

Page 51: ...ne interface or the HP Storage Server Management Console NOTE Select servers can be deployed in a clustered as well as a non clustered configuration This chapter discusses share setup for a non clustered deployment As previously mentioned the file sharing security model of the storage server is based on the NTFS file level security model Share security seamlessly integrates with file security In a...

Page 52: ...environment In a multidomain environment user and group permissions from several domains can apply to files stored on the same device Users and groups local to the storage server can be given access permissions to shares managed by the device The domain name of the storage server supplies the context in which the user or group is understood Permission configuration depends on the network and domai...

Page 53: ...is using that share File Server Resource Manager File Server Resource Manager FSRM is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers Some of the tasks you can perform are Quota management File screening management Storage reports The HP Storage Server Management Console provides access to FSRM tasks For procedures ...

Page 54: ...ols such as Windows Support Tools or Windows Resource Kit Tools information about these tools might appear in Help and Support Center To see the tools that are available to you look in the Help and Support Center under Support Tasks click Tools and then click Tools by Category NOTE The Windows Support Tools and Windows Resource Kit Tools including documentation for these tools are available in Eng...

Page 55: ... from Microsoft at http www microsoft com technet itsolutions smbiz mits av mit_av mspx Security For guidance on hardening file servers see the Microsoft Windows Server 2003 Security Guide The guide can be viewed or downloaded at http www microsoft com technet security prodtech windowsserver2003 w2003hg sgch00 mspx More information The following web sites provide detailed information for using pri...

Page 56: ...File server management 56 ...

Page 57: ...nclusion of the HP Install Network Printer Wizard INPW utility on the factory image is new INPW simplifies the process of installing network printers including configuration settings on the print server INPW identifies HP Jetdirect network print devices and allows the user to select the printer to install on the print server HP Download Manager for Jetdirect Printer Devices The inclusion of the HP...

Page 58: ...d to open the file and print sharing ports TCP 139 and 445 and UDP 137 and 138 If this does not fix the problem or if these ports are already open you may need to turn off the Windows Firewall to display printers To open the file and print sharing ports 1 Click Start point to Control Panel and click Windows Firewall 2 On the Exceptions tab ensure that the File and Printer Sharing check box is sele...

Page 59: ...turer and model The printer name is usually fewer than 31 characters in length 4 Choose a share name A user can connect to a shared printer by entering this name or by selecting it from a list of share names The share name is usually fewer than 8 characters for compatibility with MS DOS and Windows 3 x clients 5 Optional Choose a location description and a comment These can help identify the locat...

Page 60: ...PRINTERS on the storage server Print drivers are also available for download on the HP Support web site for individual network printers User mode vs kernel mode drivers Drivers can be written in either user mode also called version 3 drivers or kernel mode also called version 2 drivers Native drivers on Windows 2000 and later run in user mode Windows Server 2003 and Windows Storage Server 2003 can...

Page 61: ... in the C hpnas Components PrintMigrator folder on the storage server For more information about the Print Migrator utility see http www microsoft com WindowsServer2003 techinfo overview printmigrator3 1 mspx Best practices The following is practical advice for managing print devices Printers and print servers should be published in Active Directory Locate printers in common areas such as near con...

Page 62: ...l as other system related known issues and workarounds are addressed in release notes To view the latest version visit http www hp com go support Select See support and troubleshooting information and enter a product name number Under self help resources select the manuals guides supplements addendums etc link Additional references for print services The following web sites provide detailed inform...

Page 63: ...ver file access latencies UNIX special device support Microsoft Services for NFS supports UNIX special devices mknod Enhanced UNIX support Microsoft Services for NFS now supports the following versions of UNIX Hewlett Packard HP UX version 11i IBM AIX version 5L 5 2 Red Hat Linux version 9 Sun Microsystems Solaris version 9 The following features that were previously available in Services for UNIX...

Page 64: ...s running Windows Server 2003 R2 to access these resources when the file servers are running NFS software NOTE Services for NFS can be implemented in both clustered and non clustered environments using select storage servers This chapter discusses Services for NFS in a non clustered deployment If your storage server is capable of using clusters see the Cluster administration chapter for more infor...

Page 65: ...t Services for Network File System from the HP Storage Server Management console 1 Access the HP Storage Server Management console by clicking on the shortcut icon on the desktop 2 In the left pane of the console select the Share Folder Management listing 3 In the center pane under Share Utilities select Microsoft Services for NFS see Figure 18 Figure 18 Accessing MSNFS from HP Storage Server Mana...

Page 66: ...ment uses pre 2003 domain controllers See Table 4 for guidance as to when to use NFS Authentication DLL instead of S4U legacy NFS and R2 MSNFS Table 4 Authentication table MSNFS WSS2003 R2 Legacy NFS pre WSS2003 R2 Domain controller type Requires NFS Authentication DLL on domain controller Requires NFS Authentication DLL on domain controller Legacy domain controller pre WSS2003 Uses the built in S...

Page 67: ...Agreement Exit Setup the installation procedure terminates 6 Click Custom Installation and then click Next 7 In the Components pane click the down arrow next to Windows Services for UNIX and then click Entire component will not be available 8 Click the plus sign next to Authentication Tools 9 In the Components pane click the plus sign next to Authentication Tools 10 Click Server for NFS Authentica...

Page 68: ...UNIX UID and GID information is mapped to a Windows user and group accounts the Windows names are returned to Server for NFS which then uses the Windows user and group names to grant file access If the UNIX UID and GID information is not mapped then Server for NFS will deny file access There are two ways to specify how Server for NFS on the storage server obtains Windows user and group information...

Page 69: ...ws account is treated by Server for NFS as an anonymous user By default the user identifier UID and group identifier GID is 2 For example if files are created on an NFS Share by UNIX users who are not mapped to Windows users the owner of those files are listed as anonymous user and anonymous group 2 2 By default Server for NFS does not allow anonymous users to access a shared directory When an NFS...

Page 70: ...aintain a single mapping database making it easier to configure account mapping for multiple computers running MSNFS In addition to one to one mapping between Windows and UNIX user and group accounts User Name Mapping permits one to many mapping This lets you associate multiple Windows accounts with a single UNIX account This can be useful for example when you do not need to maintain separate UNIX...

Page 71: ...cumentation for Identity Management for UNIX For information about enabling Active Directory Lookup see Specifying how Server for NFS obtains Windows user and group information available in the online help User Name Mapping Administration The User Name Mapping administration online help contains information for the following topics Understanding the User Name Mapping component Starting and stoppin...

Page 72: ... Views exports from the server and their export permissions showmount e Removes NFS mounted drives unmount For further details see the online help for Microsoft Services for Network File System Optimizing Server for NFS performance The following sources provide useful information on how to optimize performance for Microsoft Services for NFS The MSNFS online help covers the following topic areas Ad...

Page 73: ...Point and print from UNIX to Windows Server 2003 Point and Print behavior from UNIX clients to Windows Server 2003 and Windows Storage Server 2003 is similar to the behavior for Windows 95 Windows 98 and Windows Millennium Edition clients because all these clients create SMB connections However the non Windows operating systems maintain their own driver model so these clients do not automatically ...

Page 74: ...Microsoft Services for Network File System MSNFS 74 ...

Page 75: ...ry Services account This requires no changes or additions to the software on the NetWare client computers NOTE FPNW is not a clusterable protocol With FPNW on both nodes of a cluster the shares do not fail over because the protocol is not cluster aware NOTE IPX SPX protocol is required on the Novell servers Installing Services for NetWare The installation of FPNW on the storage server allows for a...

Page 76: ...og ons Support packet burst and Large Internet Packet LIP Support NetWare locking and synchronization primitives that are used by some NetWare specific applications Support long file names compatible with OS 2 long file name LFN support File and Print Services for NetWare does not support the following NetWare groups and functions Workgroup Managers Accounting User disk volume restrictions Setting...

Page 77: ...relative to where the Sysvol volume is installed This is the root location for the individual home directories If the directory specified does not already exist it must first be created 5 Click Users to See connected users disconnect users send broadcast messages to all users connected to the server and to send a message to a specific user 6 Click Volumes to See users connected to specific volume ...

Page 78: ...w User dialog box 3 Enter the user information including the user s User name Full name Description and Password 4 Click Create 5 Repeat these steps until all NetWare users have been entered Enabling local NetWare user accounts 1 In the Users folder MC Core Operating System Local Users and Groups right click an NCP client listed in the right pane of the screen and then click Properties Other netwo...

Page 79: ...NW The supervisor account is required if the storage server was added as a bindery object into NDS Managing NCP volumes shares NCP file shares are created the same way as other file shares however there are some unique settings NCP shares can be created and managed using Server Manager NOTE NCP shares can be created only after FPNW is installed See the previous section Installing Services for Netw...

Page 80: ...e to modify 4 Click Properties Print Services for NetWare With File and Print Services for NetWare installed the print server appears to a NetWare client as a NetWare 3 x compatible print server Print services presents the same dialog boxes to the client as a NetWare based server uses to process a print job from a client A user can display and search for printers on the print server just like in a...

Page 81: ...network integration simplifies administration by maintaining just one set of user accounts instead of separate user accounts for example one on the Macintosh server and another on the computer running Windows server software Installing the AppleTalk protocol 1 From the desktop of the storage server select Start Settings Network Connections Right click Local Area Connection and then click Propertie...

Page 82: ...es for Macintosh Consult the following resource for information about installing Print Services for Macintosh How To Install Print Services for Macintosh in Windows Server 2003 http support microsoft com scid kb en us 323421 Point and Print from Macintosh to Windows Server 2003 Point and Print behavior from Macintosh clients to Windows Server 2003 or Windows Storage Server 2003 is similar to the b...

Page 83: ...out modification however any 32 bit applications that are run on this operating system should be thoroughly tested before releasing the storage server to a production environment Windows Server Remote Administration Applet Remote administration from non Microsoft computers uses the Windows Server Remote Administration Applet and is accessed from a browser The browser on the client computer can be ...

Page 84: ...et are iSCSI virtual disks which are files in the virtual hard disk VHD format These virtual disks offer flexible and effective storage They are dynamically extendable to provide extra capacity on demand enable efficient storage utilization and minimize the time required to create new disks and the down time typically required to install new disks Snapshots To facilitate backup and recovery operat...

Page 85: ...rget Identification page type a name and description for the iSCSI Target and then click Next 6 On the iSCSI Initiators Identifiers page type the iSCSI Qualified Name IQN of the iSCSI initiator requesting access to the iSCSI Target in the IQN identifier field The IQN is found on the General tab of the Microsoft iSCSI Initiator interface Figure 22 iSCSI Initiators Identifiers page 7 To enter additi...

Page 86: ...equired that physical disks are formatted as NTFS 1 In the Microsoft iSCSI Software Target MMC snap in click the Devices node 2 On the details view right pane of the Devices node right click a volume and select Create Virtual Disk 3 Click Next on the Welcome page of the wizard 4 On the File page specify the full path to use as the virtual disk and click Next 5 On the Size page specify the size to ...

Page 87: ...import the virtual disk s Extend Virtual Disk Wizard This section describes how to extend a virtual disk using the Extend Virtual Disk Wizard 1 In the Microsoft iSCSI Software Target MMC snap in click the Devices node 2 On the details view right pane of the Devices node right click a virtual disk and select Extend Virtual Disk 3 Click Next on the Welcome page of the wizard 4 On the Size page type ...

Page 88: ...apshots from iSCSI initiators You install this hardware provider on the iSCSI initiator server and the server that is to perform backups The backup software you use must support transporting snapshots Cluster support In a cluster with servers running Windows Unified Data Storage Server 2003 Enterprise Edition and using an external storage array as the shared cluster disk you can use iSCSI Software...

Page 89: ...communication amongst themselves in order to track the state of each cluster node Each node sends out periodic messages to the other nodes these messages are called heartbeats If a node stops sending heartbeats the cluster service fails over any resources that the node owns to another node For example if the node that owns the Quorum disk is shut down for any reason its heartbeat stops The other n...

Page 90: ...y the cluster service are called cluster resources Cluster resources have three defining characteristics They can be brought online and taken offline They can be managed in a cluster They can be owned by only one node at a time Examples of cluster resources are IP addresses network names physical disk resources and file shares Resources represent individual system components These resources are or...

Page 91: ...he cluster service performs certain procedures First all of the resources are taken offline in an order defined by the resource dependencies Secondly the cluster service attempts to transfer the group to the next node on the preferred owner s list If the transfer is successful the resources are brought online in accordance with the resource dependency structure The system failover policy defines h...

Page 92: ...oup FS1Eng Node 1 Cluster Resource Disk F Cluster Resource File Share Mar1 F Mar1 Cluster Resource File Share Mar4 G Mar4 Cluster Resource Network Name Fileserver2 Cluster Resource IP Address 172 18 1 98 Cluster Resource Disk G Cluster Group FS1Market Node 2 E eng1 E eng2 E eng3 F Mar1 F Mar2 F Mar3 Raidsets 1 3 Raidsets 4 5 Raidsets 6 G Mar4 G Mar5 G Mar6 Cluster Resource Physical Disk E Cluster ...

Page 93: ...s Fileserver1 Eng1 with an IP address of 172 18 1 99 For cluster resources to function properly two very important requirements should be adhered to Dependencies between resources of a group must be established Dependencies determine the order of startup when a group comes online In the above case the following order should be maintained 1 File Share Dependent on Physical Disk Resource and Network...

Page 94: ... HP web site at http h20000 www2 hp com bc docs support SupportManual c00663737 c00663737 pdf must be installed and the fiber cables attached to the HBAs before the cluster installation is started All shared disks including the Quorum disk must be accessible from all nodes When testing connectivity between the nodes and the LUN only one node should be given access to the LUN at a time All shared d...

Page 95: ...network subnet It is impossible for a cluster node to serve the data to a network to which it is not connected Protocol planning Not all file sharing protocols can take advantage of clustering If a protocol does not support clustering it will not have a cluster resource and will not failover with any cluster group In the case of a failover a client cannot use the virtual name or virtual IP address...

Page 96: ... for high availability HP recommends that cluster configurations be deployed with dual data paths for high availability Clusters can be configured with single path but if a failure in the path occurs all of the node resources will be failed to the non affected node Pathing software is required in configurations where multipathing to the storage is desired or required Multipathing software allows f...

Page 97: ...played 4 Check the Microsoft Services for NFS subcomponent 5 Click OK then Next followed by Finish 6 After NFS is installed you can view the details of the Microsoft Services for NFS subcomponent to see which of its subcomponents were installed The subcomponents listed below are preinstalled at the factory Verify that the Server for NFS and User Name Mapping services have been reinstalled Microsof...

Page 98: ...accessible from all nodes When testing connectivity between the nodes and the LUN only one node should be given access to the LUN at a time All shared disks must be configured as basic not dynamic All partitions on the disks must be formatted as NTFS Cluster installation During the installation process nodes are shut down and rebooted These steps guarantee that the data on disks that are attached ...

Page 99: ...tatic IP addresses for the private network connector Configuring the public network adapter While the public network adapter s IP address can be automatically obtained if a DHCP server is available this is not recommended for cluster nodes HP strongly recommends setting static IP addresses for all network adapters in the cluster both private and public If IP addresses are obtained though DHCP acce...

Page 100: ...rum disk It is also helpful to label the volume Quorum NOTE It is possible to change the Quorum disk by clicking the Quorum button This displays a list of available disks that can be used for the Quorum disk Select the appropriate disk and then click OK to continue Configuring shared disks Use the Windows Disk Management utility to configure additional shared disk resources Verify that all shared ...

Page 101: ...guration and identify potential problems A comprehensive and easy to read report is created listing any potential configuration issues before the cluster is created Some issues that can occur are No shared disk for the Quorum disk A shared disk must be created with a NTFS partition at least 50 MB in size Use of DHCP addresses for network connections All Network adapters must be configured with sta...

Page 102: ...name of this default cluster group CAUTION Do not delete or rename the Cluster Group or IP Address Doing so results in losing the cluster and requires reinstallation of the cluster When creating groups the administrator s first priority is to gain an understanding of how to manage the groups and their resources Administrators may choose to create a resource group and a virtual server for each node...

Page 103: ...e brought back to the original owner node Resource planning 1 Create a cluster group for each node in the cluster with an IP address resource and a network name resource Cluster resource groups are used to balance the processing load on the servers Distribute ownership of the groups between the virtual servers 2 For NFS environments configure the NFS server NFS specific procedures include entering...

Page 104: ...t properly replicated among the nodes in the cluster In a clustered deployment if PCNFS password and group files are being used to provide user and group information these files must be located on each node of the system Example If the password and group files are located at c maps on node 1 then they must also be at c maps on node 2 The contents of the password and group files must be the same on...

Page 105: ...e Using a server cluster with large numbers of file shares NOTE A file share resource must reside in the same cluster group as the physical disk resource it will reside on The physical disk resource specified in this step must reside in the same cluster group as specified in the beginning of this wizard Creating NFS share resources To create an NFS share resource see MSNFS administration on a serv...

Page 106: ...ed cluster resource Using Microsoft Services for NFS with server clusters Understanding how Server for NFS works with server clusters Using Server for NFS on a server cluster Configuring User Name Mapping on a server cluster For further details see the online help for Microsoft Services for Network File System Best practices for running Server for NFS in a server cluster Stop Server for NFS before...

Page 107: ...urce for the Virtual Server to be created if required see note 4 Create a Virtual Server Resource Network Name if required see note NOTE If the printer spool resource is added to an existing group with a physical resource IP address and virtual server resource steps 1 4 are not required 5 Create a Print Spool resource 6 To add a printer to the virtual server a Double click the printers and faxes i...

Page 108: ...tomatically fail back the resources to their designated owner the resources must be moved back manually each time a failover occurs Restarting one cluster node CAUTION Restarting a cluster node should be done only after confirming that the other node s in the cluster are functioning normally Adequate warning should be given to users connected to resources of the node being restarted Attached conne...

Page 109: ...d be shut down at a time Powering up the cluster The power up process for the storage server cluster is more complex than it is for a single node because extra care must be taken with the storage subsystem The sequence of the power up steps is critical Improper power up procedures can cause corruption and loss of data CAUTION Do not power up the cluster nodes without first powering up the storage ...

Page 110: ...stered print server http support microsoft com default aspx scid kb en us 278455 How to Set up a print spooler on Microsoft Cluster Server http support microsoft com kb 197046 How to Troubleshoot printing issues on a Windows Server 2003 Cluster http support microsoft com default aspx scid kb en us 302539 Creating and configuring a highly available print server under Microsoft Windows Server 2003 u...

Page 111: ...e product model of the storage server such as ML110 G5 These guides contain specific troubleshooting information for the server The guides are available by selecting the applicable ProLiant Server series model then the Manuals guides supplements addendums etc link For example instead of using ML110 G5 storage server enter ML110 G5 server for the product to search then select the HP ProLiant ML110 ...

Page 112: ...e Guide for your storage server model This document can be obtained at http www hp com support manuals Under the servers section select ProLiant and tc series servers and then select your product Additional documentation can also be found on the inside of the access panel of certain server models Maintenance updates Regular updates to the storage server are supplied on the HP ProLiant Storage Serv...

Page 113: ... part back to HP for replacement Certificate of Authenticity The Certificate of Authenticity COA label is used to Upgrade the factory installed operating system using the Microsoft Upgrade program for license validation Reinstall the operating system because of a failure that has permanently disabled it The COA label location varies by server model On rack mounted server models the COA label is lo...

Page 114: ...Troubleshooting servicing and maintenance 114 ...

Page 115: ... restoration process only and does not host a secondary operating system Be sure to back up your user data and then use the Recovery and Installation DVD to restore the server to the factory state Managing disks after a restoration After a system has been restored drive letters may be assigned to the wrong volume Windows Storage Server 2003 assigns drive letters after the restoration in the order ...

Page 116: ...System recovery 116 ...

Page 117: ...rovide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in ...

Page 118: ...514 3333 To identify this product see the Part Series or Model number found on the product Modifications The FCC requires the user to be notified that any changes or modifications made to this device that are not expressly approved by Hewlett Packard Company may void the user s authority to operate the equipment Cables Connections to this device must be made with shielded cables with metallic RFI ...

Page 119: ...rements of the Canadian Interference Causing Equipment Regulations Cet appareil numérique de la classe A respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference Causing Equipment Regulations Cet appareil numérique de la classe B respecte toutes les exigences du Règlement sur...

Page 120: ...BSMI notice Japanese notice Korean notice A B Class A equipment Class B equipment Regulatory compliance and safety 120 ...

Page 121: ...ticle 15 of the Waste Disposal Act to indicate the recovery marks on the batteries used in sales giveaway or promotion Contact a qualified Taiwanese recycler for proper battery disposal Power cords The power cord set must meet the requirements for use in the country where the product was purchased If the product is to be used in another country purchase a power cord that is approved for use in tha...

Page 122: ... several methods for grounding Use one or more of the following methods when handling or installing electrostatic sensitive parts Use a wrist strap connected by a ground cord to a grounded workstation or computer chassis Wrist straps are flexible straps with a minimum of 1 megohm 10 percent resistance in the ground cords To provide proper grounding wear the strap snug against the skin Use heel str...

Page 123: ...door privé gebruikers in de Europese Unie Dit symbool op het product of de verpakking geeft aan dat dit product niet mag worden gedeponeerd bij het normale huishoudelijke afval U bent zelf verantwoordelijk voor het inleveren van uw afgedankte apparatuur bij een inzamelingspunt voor het recyclen van oude elektrische en elektronische apparatuur Door uw oude apparatuur apart aan te bieden en te recyc...

Page 124: ...ettäväksi saa ottamalla yhteyttä jätehuoltoon tai liikkeeseen josta tuote on ostettu French notice Élimination des appareils mis au rebut par les ménages dans l Union européenne Le symbole apposé sur ce produit ou sur son emballage indique que ce produit ne doit pas être jeté avec les déchets ménagers ordinaires Il est de votre responsabilité de mettre au rebut vos appareils en les déposant dans l...

Page 125: ...nságos feldolgozását A begy jtés pontos helyér l b vebb tájékoztatást a lakhelye szerint illetékes önkormányzattól az illetékes szemételtakarító vállalattól illetve a terméket elárusító helyen kaphat Italian notice Smaltimento delle apparecchiature da parte di privati nel territorio dell Unione Europea Questo simbolo presente sul prodotto o sulla sua confezione indica che il prodotto non può esser...

Page 126: ...ba parduotuv kurioje sigijote gamin Polish notice Pozbywanie si zu ytego sprz tu przez u ytkowników w prywatnych gospodarstwach domowych w Unii Europejskiej Ten symbol na produkcie lub jego opakowaniu oznacza e produktu nie wolno wyrzuca do zwykłych pojemników na mieci Obowi zkiem u ytkownika jest przekazanie zu ytego sprz tu do wyznaczonego punktu zbiórki w celu recyklingu odpadów powstałych ze s...

Page 127: ...o službo ali trgovino kjer ste izdelek kupili Spanish notice Eliminación de residuos de equipos eléctricos y electrónicos por parte de usuarios particulares en la Unión Europea Este símbolo en el producto o en su envase indica que no debe eliminarse junto con los desperdicios generales de la casa Es responsabilidad del usuario eliminar los residuos de este tipo depositándolos en un punto limpio pa...

Page 128: ...nniskors hälsa och miljön Kontakta ditt lokala kommunkontor din närmsta återvinningsstation för hushållsavfall eller affären där du köpte produkten för att få mer information om var du kan lämna ditt avfall för återvinning Regulatory compliance and safety 128 ...

Page 129: ...s node based 102 installation 98 installation checklist 97 load balancing 103 managing access rights 103 managing file share permissions 103 network requirements 97 nodes powering down 109 powering up 109 restarting 108 overview 89 89 preparing for installation 96 printer spooler 107 protocols non cluster aware 104 resources 102 resources defined 90 setting up user account 100 clustered server ele...

Page 130: ... sharing protocols 20 files ownership 50 folder management 45 folder recovery 42 folders auditing access 48 managing 45 FPNW accessing 76 described 75 installing 75 G grounding methods 122 group cluster 93 groups adding to permissions list 46 H help obtaining 13 HP Array Configuration Utility 25 Storage Manager 26 Storage Server Management Console 24 53 65 101 technical support 13 Web Jetadmin 58 ...

Page 131: ...RAID data striping 17 LUNs in volumes 19 summary of methods 18 regulatory compliance 117 related documentation 11 resources cluster 90 S safety 121 SAN Connection and Management white paper 96 SAN Connection and Management white paper 24 98 96 98 SAN environment 24 security auditing 48 file level permissions 45 ownership of files 50 Server for NFS Authentication DLL 66 described 65 Service for Use...

Page 132: ... user account setting up 100 user mode drivers 60 users adding to permission list 46 NetWare adding 78 enabling 78 V verifying connectivity 99 disk access 100 domain membership 100 name resolution 99 virtual server defined 91 Volume Shadow Copy Service 31 volumes creating Novell 75 NCP 79 planning 19 vssadmin tool 34 W warning rack stability 12 WEBES Web Based Enterprise Services 112 websites cust...

Reviews: