background image

Figure 10 Recovering a deleted file or folder

Recovering an overwritten or corrupted file

Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file
itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file:

1.

Right-click the overwritten or corrupted file, and then click 

Properties

.

2.

Click 

Previous Versions

.

3.

To view the old version, click 

View

. To copy the old version to another location, click 

Copy... 

to

replace the current version with the older version, click 

Restore

.

Recovering a folder

To recover a folder:

1.

Position the cursor so that it is over a blank space in the folder to be recovered. If the cursor
hovers over a file, that file is selected.

2.

Right-click, select 

Properties

 from the bottom of the menu, and then click the 

Previous Versions

tab.

3.

Click either 

Copy...

 or 

Restore

.

Clicking 

Restore

 enables the user to recover everything in that folder as well as all subfolders.

Clicking 

Restore

 does not delete any files.

File server management

46

Summary of Contents for X3800sb

Page 1: ...HP StorageWorks X1800sb and X3800sb Network Storage Blade user guide Part number 572092 001 First edition June 2009 ...

Page 2: ...uld be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein WARRANTY STATEMENT To obtain a copy of the warranty for this product see the warranty information website http www hp com go storagewarranty Intel Itanium Pentium Intel Inside and the Intel Inside logo are trademarks or registered trademarks of Intel Corpor...

Page 3: ... 16 Single Instance Storage 17 Print Management 18 2 Storage management overview 19 Storage management elements 19 Storage management example 19 Physical storage elements 20 Arrays 21 Fault tolerance 22 Online spares 22 Logical storage elements 22 Logical drives LUNs 22 Partitions 23 Volumes 23 File system elements 24 File sharing elements 24 Volume Shadow Copy Service overview 24 Using storage el...

Page 4: ...d drives 37 Managing shadow copies 37 The shadow copy cache file 38 Enabling and creating shadow copies 39 Viewing a list of shadow copies 40 Set schedules 40 Viewing shadow copy properties 40 Redirecting shadow copies to an alternate volume 41 Disabling shadow copies 41 Managing shadow copies from the storage system desktop 42 Shadow Copies for Shared Folders 42 SMB shadow copies 43 NFS shadow co...

Page 5: ...equirements 67 Cluster installation 67 Setting up networks 68 Configuring the private network adapter 68 Configuring the public network adapter 68 Renaming the local area connection icons 68 Verifying connectivity and name resolution 68 Verifying domain membership 68 Setting up a cluster account 68 About the Quorum disk 68 Configuring shared disks 69 Verifying disk access and functionality 69 Conf...

Page 6: ...nance and service 80 Maintenance updates 80 System updates 80 Firmware updates 80 Certificate of Authenticity 80 6 System recovery 81 The System Recovery DVD 81 To restore a factory image 81 The DON T ERASE partition 81 Managing disks after a restoration 81 A Regulatory compliance notices 83 Regulatory compliance identification numbers 83 Federal Communications Commission notice 83 FCC rating labe...

Page 7: ...e 90 Estonian notice 91 Finnish notice 91 French notice 91 German notice 91 Greek notice 92 Hungarian notice 92 Italian notice 92 Latvian notice 92 Lithuanian notice 93 Polish notice 93 Portuguese notice 93 Romanian notice 93 Slovak notice 94 Spanish notice 94 Swedish notice 94 Turkish notice 94 Battery replacement notices 95 Dutch battery notice 95 French battery notice 96 German battery notice 9...

Page 8: ...es stored on a separate volume 39 7 Accessing shadow copies from My Computer 42 8 Client GUI 44 9 Recovering a deleted file or folder 46 10 Properties dialog box Security tab 49 11 Advanced Security settings dialog box Permissions tab 50 12 User or group Permission Entry dialog box 51 13 Advanced Security Settings dialog box Auditing tab 52 14 Select User or Group dialog box 52 15 Auditing Entry d...

Page 9: ... 11 1 Summary of RAID methods 22 2 Tasks and utilities needed for storage system configuration 28 3 Sharing protocol cluster support 65 4 Power sequencing for cluster installation 67 5 X1800sb and X3800sb Network Storage Blade 9 ...

Page 10: ...10 ...

Page 11: ...s intended for technical professionals with knowledge of Microsoft administrative procedures System and storage configurations Related documentation The following documents and websites provide related information HP StorageWorks X1800sb Network Storage Blade installation instructions HP StorageWorks X3800sb Network Storage Gateway Blade installation instructions HP StorageWorks X1000 Automated St...

Page 12: ... text Code variables Command variables Monospace italic text Emphasized monospace text Monospace bold text WARNING Indicates that failure to follow directions could result in bodily harm or death CAUTION Indicates that failure to follow directions could result in damage to equipment or data IMPORTANT Provides clarifying information or specific instructions NOTE Provides additional information TIP ...

Page 13: ... level Detailed questions Customer self repair HP customer self repair CSR programs allow you to repair your StorageWorks product If a CSR part needs replacing HP ships the part directly to you so that you can install it at your convenience Some parts do not qualify for CSR Your HP authorized service provider will determine whether a repair can be accomplished by CSR For more information about CSR...

Page 14: ...m support manuals http www hp com support downloads Documentation feedback HP welcomes your feedback To make comments and suggestions about product documentation please send a message to storagedocsFeedback hp com All submissions become the property of HP About this guide 14 ...

Page 15: ...torage for shared folders For more information about using the HP Automated Storage Manager see the HP ASM online help or the HP StorageWorks X1000 Automated Storage Manager user guide Go to http www hp com go nas select your product family select your product model click Support for your product and then click Manuals Microsoft Windows Storage Server 2008 administration tools Microsoft Windows St...

Page 16: ...ge block SMB or NFS protocol Single Instance Storage SIS can be enabled or disabled for each volume that is displayed in Share and Storage Management SIS recovers disk space by reducing the amount of redundant data stored on a volume It identifies identical files storing only a single copy of the file in the SIS Common Store and replacing the files with pointers to the file in the SIS Common Store...

Page 17: ...ance of a duplicate file into a central folder The duplicate is then replaced by a link a reparse point to the central copy The link file contains information about the original file such as its current location size and attributes The Single Instance Storage Filter runs in kernel mode The Single Instance Storage Filter service cannot be stopped If this service is disabled the linked files are not...

Page 18: ...nagement filtering capability For example you can create a view that displays only printers in a particular error state You can also configure Print Management to send e mail notifications or run scripts when a printer or print server needs attention The filtering capability also allows you to bulk edit print jobs such as canceling all print jobs at once You can also delete multiple printers at th...

Page 19: ...r major divisions Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level s elements Storage management example Figure 1 depicts many of the storage elements that one would find on a storage device The following sections provide an overview of the storage elements X1800sb and X3800sb Network Storage Blad...

Page 20: ...wing policies Analyze current corporate and departmental structure Analyze the current file server structure and environment Plan properly to ensure the best configuration and use of storage Determine the desired priority of fault tolerance performance and storage capacity Use the determined priority of system characteristics to determine the optimal striping policy and RAID level Storage manageme...

Page 21: ...re simultaneously active the same amount of data is written to each drive during any given time interval Each unit of data is termed a block The blocks form a set of data stripes over all the hard drives in an array as shown in Figure 3 Figure 3 RAID 0 data striping S1 S4 of data blocks B1 B12 For data in the array to be readable the data block sequence within each stripe must be the same This seq...

Page 22: ...ne spare or hot spare to any configuration except RAID 0 This hard drive contains no data and is contained within the same storage subsystem as the other drives in the array When a hard drive in the array fails the controller can then automatically rebuild information that was originally on the failed drive onto the online spare This quickly restores the system to full RAID level fault tolerance p...

Page 23: ... points at this time The use of mount points in conjunction with NFS shares is not supported Volumes When planning dynamic disks and volumes there is a limit to the amount of growth a single volume can undergo Volumes are limited in size and can have no more than 32 separate LUNs with each LUN not exceeding 2 terabytes TB and volumes totaling no more than 64 TB of disk space The RAID level of the ...

Page 24: ...ile sharing protocols including Distributed File System DFS Network File System NFS File Transfer Protocol FTP Hypertext Transfer Protocol HTTP and Microsoft Server Message Block SMB On each folder or logical storage element different file sharing protocols can be enabled using specific network names for access across a network to a variety of clients Permissions can then be granted to those share...

Page 25: ...ources for the clustered file share resource can also be established for access across a network to a variety of clients Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols Network adapter teaming Network adapter teaming is software based technology used to increase a server s network availability and performance Teaming enables t...

Page 26: ...t Agents are installed with every SmartStart assisted installation or can be installed through the HP PSP The Systems Management homepage provides status and direct access to in depth subsystem information by accessing data reported through the Management Agents For additional information refer to the Management CD in the HP ProLiant Essentials Foundation Pack or the HP website http www hp com ser...

Page 27: ...l the SIS links pointing to it are deleted SIS automatically determines that two or more files have the same content and links them together File Server Resource Manager File Server Resource Manager is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers By using File Server Resource Manager administrators can place quot...

Page 28: ...ce and enhanced performance and then segmented into logical disks of appropriate sizes for particular storage needs These logical disks then become the volumes that appear as drives on the storage system CAUTION The first two logical drives are configured for the storage system operating system and should not be altered in any manner If the first two logical drives are altered the system recovery ...

Page 29: ...ility 2 If the Execution Mode for ACU is set to Remote Mode log on to the HP System Management Homepage The default user name is administrator and the default password is hpinvent To open the ACU in browser mode NOTE Confirm that the ACU Execution Mode is set to remote service 1 Open a browser and enter the server name or IP address of the destination server For example http servername 2301 or htt...

Page 30: ...e altered in any manner If the first two logical drives are altered the system recovery process may not function properly when using the System Recovery DVD Do not tamper with the DON T ERASE or local C volume These are reserved volumes and must be maintained as they exist HP does not recommend spanning array controllers with dynamic volumes The use of software RAID based dynamic volumes is not re...

Page 31: ... limit for the cache file is reached CAUTION Allocation unit size cannot be altered without reformatting the drive Data on a reformatted drive cannot be recovered For more information about disk defragmentation read the online help Disk quotas Disk quotas track and control disk space use in volumes NOTE To limit the size of a folder or share see Quota management on page 56 Configure the volumes on...

Page 32: ...dding new storage space to an existing logical drive on the same array usually after the array has been expanded Storage growth may occur in three forms Extend unallocated space from the original logical disks or LUNs Alter LUNs to contain additional storage Add new LUNs to the system The additional space is then extended through a variety of means depending on which type of disk structure is in u...

Page 33: ...delines for extending a dynamic volume Use the Disk Management utility You can extend a volume only if it does not have a file system or if it is formatted NTFS You cannot extend volumes formatted using FAT or FAT32 You cannot extend striped volumes mirrored volumes or RAID 5 volumes For more information see the Disk Management online help Expanding storage for EVA arrays using Command View EVA Pr...

Page 34: ... original blocks the cache file is typically smaller than the original volume In the snapshot s original form it takes up no space because blocks are not moved until an update to the disk occurs By using shadow copies a storage system can maintain a set of previous versions of all files on the selected volumes End users access the file or folder by using a separate client add on program which enab...

Page 35: ...sers want to access a previous version of a file that does not reside in a shared folder the administrator must first share the folder NOTE Shadow copies are available only on NTFS not FAT or FAT32 volumes Files or folders that are recorded by using Shadow Copy appear static even though the original data is changing Allocating disk space When determining the amount of space to allocate for storing...

Page 36: ...hadow copies are stored the maximum size should be changed to No Limit to reflect the space available on the storage area volume instead of the source volume where the user files are stored Disk space for shadow copies can be allocated on either the same volume as the source files or a different volume There is a trade off between ease of use and maintenance versus performance and reliability that...

Page 37: ...FS volume When enabling shadow copies on a volume that contains mounted drives the mounted drives are not included when shadow copies are taken In addition if a mounted drive is shared and shadow copies are enabled on it users cannot access the shadow copies if they traverse from the host volume where the mount point is stored to the mounted drive For example assume there is a folder F data users ...

Page 38: ...dow copies on the same volume as the original volume See Figure 6 The cache file is located in a hidden protected directory titled System Volume Information off of the root of each volume for which shadow copy is enabled Figure 6 Shadow copies stored on a source volume The cache file location can be altered to reside on a dedicated volume separate from the volumes containing files shares See Figur...

Page 39: ...eparate volume space limits can generally be set higher or set to No Limit See the online help for instructions on altering the cache file location CAUTION If the data on the separate volume L is lost the shadow copies cannot be recovered Enabling and creating shadow copies Enabling shadow copies on a volume automatically results in several actions Creates a shadow copy of the selected volume Sets...

Page 40: ...e There are a number of factors that can help determine the most effective shadow copy schedule for an organization These include the work habits and locations of the users For example if users do not all live in the same time zone or they work on different schedules it is possible to adjust the daily shadow copy schedule to allow for these differences Do not schedule shadow copies more frequently...

Page 41: ...ght click on it 3 Select Properties 4 Select the Shadow Copies tab 5 Select the volume that you want to redirect shadow copies from and ensure that shadow copies are disabled on that volume if enabled click Disable 6 Click Settings 7 In the Located on this volume field select an available alternate volume from the list NOTE To change the default shadow copy schedule settings click Schedule 8 Click...

Page 42: ...y supported clients and protocols There are two sets of supported protocols SMB and NFS All other protocols are not supported this includes HTTP FTP AppleTalk and NetWare Shares For SMB support a client side application denoted as Shadow Copies for Shared Folders is required The client side application is currently only available for Windows XP and Windows 2000 SP3 No additional software is requir...

Page 43: ...e share to open its Properties window clicking the Previous Versions tab and then selecting the desired shadow copy Users can view copy and restore all available shadow copies Shadow Copies for Shared Folders preserves the permissions set in the access control list ACL of the original folders and files Consequently users can only access shadow copies for shares to which they have access In other w...

Page 44: ...S shares via the NFS client no additional software is required Server for NFS exposes each of a share s available shadow copies as a pseudo subdirectory of the share Each of these pseudo subdirectories is displayed in exactly the same way as a regular subdirectory is displayed The name of each pseudo subdirectory reflects the creation time of the shadow copy using the format GMT YYYY MM DD HH MM S...

Page 45: ... common situation Accidental file replacement which may occur if a user selects Save instead of Save As File corruption It is possible to recover from all of these scenarios by accessing shadow copies There are separate steps for accessing a file compared to accessing a folder Recovering a deleted file or folder To recover a deleted file or folder within a folder 1 Access to the folder where the d...

Page 46: ... click View To copy the old version to another location click Copy to replace the current version with the older version click Restore Recovering a folder To recover a folder 1 Position the cursor so that it is over a blank space in the folder to be recovered If the cursor hovers over a file that file is selected 2 Right click select Properties from the bottom of the menu and then click the Previo...

Page 47: ...o tape processes is transport of shadow copies from the production server onto a backup server where they can then be backed up to tape Like the other two alternatives this option removes backup traffic from the production server While some backup applications might be designed with the hardware provider software that enables transport others are not The administrator should determine whether or n...

Page 48: ...red in the unit and the level of security access allowed Folders can be managed using Server Manager Tasks include Accessing a specific volume or folder Creating a new folder Deleting a folder Modifying folder properties Creating a new share for a volume or folder Managing shares for a volume or folder Managing file level permissions Security at the file level is managed using Windows Explorer Fil...

Page 49: ... click Add Follow the dialog box instructions To remove users and groups from the permissions list highlight the desired user or group and then click Remove The center section of the Security tab lists permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels X1800sb and X3800sb Network Storage Blade 49 ...

Page 50: ...Settings dialog box is illustrated in Figure 12 and includes Add a new user or group Click Add and then follow the dialog box instructions Remove a user or group Click Remove Replace permission entries on all child objects with entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Modify specific permissions assi...

Page 51: ...dit screen and some of the permissions Figure 13 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be added deleted viewed or modified through the Advanced Security Settings Auditing tab X1800sb and X3800sb Network Storag...

Page 52: ...tings dialog box Auditing tab 5 Click Add to display the Select User or Group dialog box Figure 15 Select User or Group dialog box NOTE Click Advanced to search for users or groups 6 Select the user or group File server management 52 ...

Page 53: ...o configure this information Use the local Computer Policy Editor to configure the audit policy on the storage system The Owner tab allows taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security configurations X1800sb and X...

Page 54: ...ows Explorer a command line interface or Server Manger NOTE Select servers can be deployed in a clustered as well as a non clustered configuration This chapter discusses share setup for a non clustered deployment As previously mentioned the file sharing security model of the storage system is based on the NTFS file level security model Share security seamlessly integrates with file security In add...

Page 55: ...nt In a multidomain environment user and group permissions from several domains can apply to files stored on the same device Users and groups local to the storage system can be given access permissions to shares managed by the device The domain name of the storage system supplies the context in which the user or group is understood Permission configuration depends on the network and domain infrast...

Page 56: ...sers to exit that share and confirm that no one is using that share File Server Resource Manager File Server Resource Manager FSRM is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers Some of the tasks you can perform are Quota management File screening management Storage reports Server Manager provides access to FSRM...

Page 57: ...vailable to you look in the Help and Support Center under Support Tasks click Tools and then click Tools by Category NOTE The Windows Support Tools and Windows Resource Kit Tools including documentation for these tools are available in English only If you install them on a non English language operating system or on an operating system with a Multilingual User Interface Pack MUI you see English co...

Page 58: ...ownload the utility see the StorageWorks L TT web site at http h18006 www1 hp com products storageworks ltt Antivirus The server should be secured by installing the appropriate antivirus software anything File server management 58 ...

Page 59: ...state of each cluster node Each node sends out periodic messages to the other nodes these messages are called heartbeats If a node stops sending heartbeats the cluster service fails over any resources that the node owns to another node For example if the node that owns the Quorum disk is shut down for any reason its heartbeat stops The other nodes detect the lack of the heartbeat and another node ...

Page 60: ... be brought online and taken offline They can be managed in a cluster They can be owned by only one node at a time Examples of cluster resources are IP addresses network names physical disk resources and file shares Resources represent individual system components These resources are organized into groups and managed as a group Some resources are created automatically by the system and other resou...

Page 61: ... the cluster service performs certain procedures First all of the resources are taken offline in an order defined by the resource dependencies Secondly the cluster service attempts to transfer the group to the next node on the preferred owner s list If the transfer is successful the resources are brought online in accordance with the resource dependency structure The system failover policy defines...

Page 62: ... to the file shares showing the relationship between both the cluster elements and the physical devices underlying them While the diagram only illustrates two nodes the same concepts apply for multi node deployments Figure 19 Cluster concepts diagram Sequence of events for cluster resources The sequence of events in the diagram includes 1 Physical disks are combined into RAID arrays and LUNs 2 LUN...

Page 63: ... as Fileserver1 Eng1 with an IP address of 172 18 1 99 For cluster resources to function properly two very important requirements should be adhered to Dependencies between resources of a group must be established Dependencies determine the order of startup when a group comes online In the above case the following order should be maintained 1 File Share Dependent on Physical Disk Resource and Netwo...

Page 64: ... the LUN only one node should be given access to the LUN at a time All shared disks must be configured as basic not dynamic All partitions on the disks must be formatted as NTFS Network planning Clusters require more sophisticated networking arrangements than a stand alone storage system A Windows NT domain or Active Directory domain must be in place to contain the cluster names virtual server nam...

Page 65: ...can take advantage of clustering If a protocol does not support clustering it will not have a cluster resource and will not failover with any cluster group In the case of a failover a client cannot use the virtual name or virtual IP address to access the share since the protocol cannot failover with the cluster group The client must wait until the initial node is brought back online to access the ...

Page 66: ...vailability Clusters can be configured with single path but if a failure in the path occurs all of the node resources will be failed to the non affected node Pathing software is required in configurations where multipathing to the storage is desired or required Multipathing software allows for datapath failure to occur without forcing a node failover Checklists for cluster server installation Thes...

Page 67: ...protected by the cluster software Use Table 5 to determine which nodes and storage devices should be presented during each step Table 5 Power sequencing for cluster installation Comments Storage Additional Nodes Node 1 Step Verify that all storage devices on the shared bus are not presented Power on all nodes Not Presented On On Setting up net works Shut down all nodes Present the shared storage t...

Page 68: ...the public network adapter use long lease periods to assure that the dynamically assigned lease address remains valid even if the DHCP service is temporarily lost Keep in mind that Cluster service recognizes only one network interface per subnet Renaming the local area connection icons HP recommends changing the names of the network connections for clarity The naming helps identify a network and c...

Page 69: ...to verify functionality At this time shut down the first node power on the next node and repeat the Verifying Disk Access and Functionality step above for all cluster nodes When it has been verified that all nodes can read and write from the disks turn off the cluster nodes and power on the first and then continue with this guide Configuring cluster service software Cluster Administrator cluadmin ...

Page 70: ...owing rules must be followed with geographically dispersed clusters A network connection with latency of 500 milliseconds or less ensures that cluster consistency can be maintained If the network latency is over 500 milliseconds the cluster consistency cannot be easily maintained All nodes must be on the same subnet Cluster groups and resources including file shares The Cluster Administrator tool ...

Page 71: ...n the two nodes Each cluster group can be assigned to a cluster node with the preferred owner parameter For example if there are two cluster groups the cluster could be set up to have the first cluster group owned by Node A and the second cluster group owned by Node B This allows the network load to be handled by both devices simultaneously If only one cluster group exists it can only be owned by ...

Page 72: ...ific issues For convenience all suggestions are listed below Back up user and group mappings To avoid loss of complex advanced mappings in the case of a system failure back up the mappings whenever the mappings have been edited or new mappings have been added Map consistently Groups that are mapped to each other should contain the same users and the members of the groups should be properly mapped ...

Page 73: ...ils over to the opposing node Adding new storage to a cluster Present the new storage to one node in the cluster This can be accomplished through selective storage presentation or through SAN zoning The tasks described below are used to add storage to a cluster See the online help for clustering for additional details Creating physical disk resources A physical disk resource must reside within a c...

Page 74: ...e help Using Shadow Copies of Shared Folders in a server cluster Enable Shadow Copies for shared folders in a cluster Extend a LUN in a cluster To extend a LUN on a storage array in a cluster review the requirements and procedures from the storage array hardware provider for expanding or extending storage For additional information associated with extending a LUN in a cluster see the following Mic...

Page 75: ...r service on a clustered print server may be hosted on any of the nodes in the cluster As with all cluster resources clients should access the print server by its virtual network name or virtual IP address Creating a cluster printer spooler Printer spoolers should be created in a separate group dedicated to this purpose for ease of management For each printer spooler a physical resource is require...

Page 76: ...ailed over to another node Processing continues but in a reduced manner because all operations must be processed on the remaining node s In clusters containing more than two nodes additional fail over rules can be applied For instance groups can be configured to fail over different nodes to balance the additional work load imposed by the failed node Nodes can be excluded from the possible owners l...

Page 77: ...g that the other node s in the cluster are functioning normally Adequate warning should be given to users connected to resources of the node being shutdown Shutting down a cluster node causes all cluster resources served by that node to fail over to the other node s This causes any currently executing client read and write operations to fail until the cluster failover process completes The other n...

Page 78: ...up the additional node s To power up the cluster nodes 1 After the storage subsystem is confirmed to be operating normally power up a single node Wait for the node to come completely up before powering up the subsequent node s If more than one node is powered up at the same time the first node that completes the sequence gains ownership of the cluster quorum and controls the cluster database Desig...

Page 79: ...ubleshooting information for the server HP ProLiant Servers Troubleshooting Guide The guide provides common procedures and solutions for many levels of troubleshooting with a ProLiant server The guide is available at http h20000 www2 hp com bc docs support SupportManual c00300504 c00300504 pdf IMPORTANT Some troubleshooting procedures found in ProLiant server guides may not apply to the HP Storage...

Page 80: ...or of the system when it is first switched on and for passing control of the server to the operating system When referring to the firmware on the system board of the server it is called the System ROM or the BIOS When referring to the firmware on another piece of hardware configured in the server it is called Option ROM Storage systems have hard drives Smart Array Controllers Remote Insight Lights...

Page 81: ... or if your storage system does not have a DVD drive you can run the system recovery from a bootable USB flash drive The DON T ERASE partition The DON T ERASE logical disk supports the restoration process only and does not host a secondary operating system Be sure to back up your user data and then use the Recovery and Installation DVD to restore the server to the factory state Managing disks afte...

Page 82: ...he appropriate drive letter then click OK 5 Click Yes to confirm the drive letter change 6 Click Yes to continue If the old drive letter needs to be re used reboot the server after clicking Yes System recovery 82 ...

Page 83: ...overed by these rules These rules place computers and related peripheral devices into two classes A and B depending upon their intended installation Class A devices are those that may reasonably be expected to be installed in a business or commercial environment Class B devices are those that may reasonably be expected to be installed in a residential environment for example personal computers The...

Page 84: ... the receiver is connected Consult the dealer or an experienced radio or television technician for help Declaration of Conformity for products marked with the FCC logo United States only This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received incl...

Page 85: ... EEC issued by the Commission of the European Community Compliance with these directives implies conformity to the following European Norms in parentheses are the equivalent international standards and regulations EN 55022 CISPR 22 Electromagnetic Interference EN55024 IEC61000 4 2 3 4 5 6 8 11 Electromagnetic Immunity EN61000 3 2 IEC61000 3 2 Power Line Harmonics EN61000 3 3 IEC61000 3 3 Power Lin...

Page 86: ... A equipment Class B equipment Taiwanese notices BSMI Class A notice Taiwan battery recycle statement Recovery text Please recycle waste batteries Recovery mark Four in one recycling symbol Regulatory compliance notices 86 ...

Page 87: ...sure to hazardous radiation Do not try to open the module enclosure There are no user serviceable components inside Do not operate controls make adjustments or perform procedures to the laser device other than those specified herein Allow only HP Authorized Service technicians to repair the unit The Center for Devices and Radiological Health CDRH of the U S Food and Drug Administration implemented...

Page 88: ...French laser notice German laser notice Italian laser notice Regulatory compliance notices 88 ...

Page 89: ...Japanese laser notice Spanish laser notice Recycling notices English notice X1800sb and X3800sb Network Storage Blade 89 ...

Page 90: ...Bulgarian notice Czech notice Danish notice Dutch notice Regulatory compliance notices 90 ...

Page 91: ...Estonian notice Finnish notice French notice German notice X1800sb and X3800sb Network Storage Blade 91 ...

Page 92: ...Greek notice Hungarian notice Italian notice Latvian notice Regulatory compliance notices 92 ...

Page 93: ...Lithuanian notice Polish notice Portuguese notice Romanian notice X1800sb and X3800sb Network Storage Blade 93 ...

Page 94: ...Slovak notice Spanish notice Swedish notice Turkish notice Türkiye Cumhuriyeti EEE Yönetmeli ine Uygundur Regulatory compliance notices 94 ...

Page 95: ...Battery replacement notices Dutch battery notice X1800sb and X3800sb Network Storage Blade 95 ...

Page 96: ...French battery notice German battery notice Regulatory compliance notices 96 ...

Page 97: ...Italian battery notice Japanese battery notice X1800sb and X3800sb Network Storage Blade 97 ...

Page 98: ...Spanish battery notice Regulatory compliance notices 98 ...

Page 99: ...7 installation checklist 66 load balancing 71 managing access rights 72 managing file share permissions 72 network requirements 66 nodes powering down 77 powering up 78 restarting 77 overview 59 59 preparing for installation 66 printer spooler 75 protocols non cluster aware 73 resources 70 resources defined 60 setting up user account 68 clustered server elements 25 Command View EVA expanding stora...

Page 100: ...s managing 72 file share resource planning 71 file share resources 63 file system elements 24 file sharing protocols 24 files ownership 53 folder management 48 folder recovery 45 folders auditing access 51 managing 48 G group cluster 63 groups adding to permissions list 49 H help obtaining 13 HP Array Configuration Utility 29 Storage Manager 29 technical support 13 I installation cluster preparing...

Page 101: ...ntation 11 resources cluster 60 S SAN environment 28 security auditing 51 file level permissions 48 ownership of files 53 Services for UNIX 25 Services for UNIX 23 shadow copies in a cluster 74 uses 34 shadow copies 24 backups 47 cache file 38 defragmentation 37 described 34 disabling 41 file or folder recovery 45 managing 37 mounted drives 37 on NFS shares 44 on SMB shares 43 planning 34 redirect...

Page 102: ... domain membership 68 name resolution 68 virtual server defined 61 Volume Shadow Copy Service 34 volumes planning 23 vssadmin tool 37 W warning rack stability 12 WEBES Web Based Enterprise Services 79 websites customer self repair 13 HP 13 HP Subscriber s Choice for Business 13 product manuals 11 Index 102 ...

Reviews: