HP StorageWorks P4000 G2 Unified NAS Gateway User Guide Part Number: 5697-0624 First edition: November 2010
Legal and notice information © Copyright 2010, 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice.
Contents 1 Component identification .................................................................. 11 P4000 G2 Unified NAS Gateway hardware components .............................................................. 11 2 Installing and configuring the server ................................................... 15 Setup overview ......................................................................................................................... Determine an access method ...............................
Network planning .............................................................................................................. Protocol planning ............................................................................................................... Cluster groups and resources, including file shares ........................................................................ Cluster group overview .......................................................................................................
Guidelines for managing disks and volumes .......................................................................... Disk quotas ....................................................................................................................... Adding storage .................................................................................................................. Expanding storage ......................................................................................................
System updates .......................................................................................................... 100 Firmware updates ............................................................................................................. 100 Certificate of Authenticity ......................................................................................................... 100 8 Support and other resources ............................................................ 101 Contacting HP .......
English notice .................................................................................................................. Bulgarian notice ............................................................................................................... Czech notice ................................................................................................................... Danish notice ..............................................................................................................
Figures 1 P4000 G2 Unified NAS Gateway front panel components ........................................... 11 2 P4000 G2 Unified NAS Gateway front panel LEDs ..................................................... 12 3 P4000 G2 Unified NAS Gateway rear panel components ........................................... 12 4 P4000 G2 Unified NAS Gateway rear panel LEDs ..................................................... 13 5 P4000 G2 Unified NAS Gateway network infrastructure ........................................
33 Client GUI ............................................................................................................. 83 34 Recovering a deleted file or folder ............................................................................. 85 35 Properties dialog box, Security tab ............................................................................ 88 36 Advanced Security settings dialog box, Permissions tab ...............................................
Tables 1 P4000 G2 Unified NAS Gateway front panel LED descriptions ..................................... 12 2 P4000 G2 Unified NAS Gateway rear panel LED descriptions ..................................... 13 3 P4000 G2 Unified NAS Gateway RAID configuration ................................................. 22 4 Sharing protocol cluster support ................................................................................ 42 5 Tasks and utilities needed for storage system configuration ....................
1 Component identification This chapter provides illustrations of the storage system hardware components. NOTE: The keyboard, mouse, and monitor are used only for the direct attached method of accessing the server. They are not provided with your storage system. P4000 G2 Unified NAS Gateway hardware components The following figures show components and LEDs located on the front and rear panels of the P4000 G2 Unified NAS Gateway. Figure 1 P4000 G2 Unified NAS Gateway front panel components . 1. 2. 3. 4.
Figure 2 P4000 G2 Unified NAS Gateway front panel LEDs . Table 1 P4000 G2 Unified NAS Gateway front panel LED descriptions Item / Description Status Green = System health is normal. 1. Internal health LED Amber = System health is degraded. Red = System health is critical. Off = System health is normal (when in standby mode). 2. NIC 1 link/activity LED 3. NIC 2 link/activity LED 4. Drive activity LED Green = Network link exists. Flashing green = Network link and activity exist.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Power cord connector Mouse connector 10/100/1000 NIC 1 connector/shared iLO 2 management port 10/100/1000 NIC 2 connector Serial connector Low profile PCIe slot (occupied by Smart Array P212 controller) Full-sized PCIe slot (occupied by NC364T 4-port NIC) Dedicated iLO 2 management port (this port is optional and must be purchased separately) Video connector USB connectors (2) Keyboard connector Figure 4 P4000 G2 Unified NAS Gateway rear panel LEDs .
Component identification
2 Installing and configuring the server Setup overview The HP StorageWorks P4000 G2 Unified NAS Gateway comes preinstalled with the Microsoft Windows® Storage Server™ 2008 R2 Enterprise x64 Edition operating system with Microsoft iSCSI Software Target and a Microsoft Cluster Service (MSCS) license included.
• • • • • HP StorageWorks Storage System Recovery DVD End User License Agreement Certificate of Authenticity Card Slide rail assembly HP ProLiant Essentials Integrated Lights-Out 2 Advanced Pack Locate the serial number, Certificate of Authenticity, and End User License Agreement For technical support purposes, locate the storage system's serial number, Certificate of Authenticity (COA), and End User License Agreement (EULA).
IMPORTANT: Only the direct attach and remote management access methods can be used to install the storage system. After the storage system installation process is complete and the system's IP address has been assigned, you can then additionally use the remote browser and remote desktop methods to access the storage system. • Direct attach — Connect the following cables to the back panel of the storage system in the following sequence: keyboard, mouse, network cable, monitor cable, and power cable.
1. Power on the system by pushing the power button on the front panel. If using iLO 2, click Momentary Press on the Power Management page to power on the server, then click Launch on the Status Summary page to open the iLO 2 Integrated Remote Console and complete the installation process. The storage system starts and displays an HP Network Storage System installation screen. The storage system installation process takes approximately 10–15 minutes.
will read Windows is activated. If your copy of Windows has not been activated, you must manually activate it within three days of the initial storage system installation. To manually activate your copy of Windows: 1. If needed, change your locale settings (Control Panel > Regional and Language Options). 2. Record the product key located on the Certificate of Authenticity. 3. In Control Panel, double-click System. 4. Under Windows Activation, click Activate Windows Now. 5.
• Activating iLO 2 Advanced features using a license key—The Remote Console feature of iLO 2 requires a license key. The key is included with the storage system inside the Country Kit. See the iLO 2 Advanced License Pack for activation instructions. • Adjusting logging settings for system, application, and security events. • Installing third-party software applications such as an antivirus application. • Registering the server — To register the server, refer to the HP Registration website (http://register.
IMPORTANT: When using the remote browser method to access the storage system, always close the remote session before closing your Internet browser. Closing the Internet browser does not close the remote session. Failure to close your remote session impacts the limited number of remote sessions allowed on the storage system at any given time.
IMPORTANT: The first two logical drives are configured for the storage system operating system. The Operating System volume default factory settings can be customized after the operating system is up and running.
• If a single drive failure occurs, it is transparent to the OS.
Installing and configuring the server
3 Cluster configuration HP StorageWorks P4000 G2 Unified NAS Gateway hardware components are configured in a clustered environment to a P4000 SAN Solution. The P4000 SAN Solution provides iSCSI block services while the P4000 G2 Unified NAS Gateway provides data services using CIFS/NFS protocols. The P4000 G2 Unified NAS Gateway also supports optional data protection services with tools such as HP Data Protector, Data Protection Manager (DPM), VMWare, and VMware Consolidated Backup (VCB).
5. P4000 SAN segment IMPORTANT: Instructions and illustrations in this document describe the installation and configuration of a 2–node P4000 G2 Unified NAS Gateway. If you purchased the 1–node P4000 G2 Unified NAS Gateway, all instructions related to installing and configuring the second node of the solution do not apply.
Figure 6 P4000 G2 Unified NAS Gateway connections . 1. 2. 3. 4. 5.
4. Identify the public and private connections: a. Right-click one of the connections and select Status. The connection status of the private connections will indicate Local in the IPv4 Connectivity field; the connection status of the public-facing connections will indicate Internet in this field. Figure 7 Private connection status . Figure 8 Public connection status . b. After identifying the private and public connections, click Close.
5. To assign static IP addresses to a private connection: a. Right-click the private connection and select Properties. b. Clear all items on the General tab except for HP Network Configuration Utility, Internet Protocol Version 4 (TCP/IPv4), and Internet Protocol Version 6 (TCP/IPv). c. Select Internet Protocol Version 4 (TCP/IPv4) and then click Properties. NOTE: For the purposes of this document, the IPv4 Internet Protocol is the documented IP version.
2. On the Computer Name tab, click Change. Figure 9 Computer Name tab of System Properties . 3. On the Computer Name/Domain Changes dialog box, in the Computer name field, enter a unique name for the server. 4. Select the Domain radio button and type the name of the domain on which the cluster will reside and then click OK. Figure 10 Computer Name Changes dialog box . 5. When prompted for credentials, enter valid domain account credentials and then click OK. 6.
7. When prompted, click Yes to restart the server. 8. Repeat these steps for Server 2. Initialize and format the storage disks The storage referenced in this section must be created and configured on the P4000 SAN. See the HP StorageWorks P4000 Configuration Guide for more information about connecting the SAN volumes to the Windows Storage Server instance. 1. From Server 1, open Server Manager, and under Storage, click Disk Management. 2.
6. 7. Complete the New Simple Volume Wizard with the following settings: • Accept the default assigned partition size • Assign drive letter Q • Formatted as NTFS • Label the volume Witness • Check Perform a quick format Repeat the preceding steps to initialize and format the remaining data disks, assigning properties such as volume size and labels as appropriate for the intended use of the storage.
3. Click Next. 4. On the Select Servers or a Cluster page, enter and add the names of Server 1 and Server 2 and then click Next. Figure 14 Select servers to be validated for the cluster . 5. Select Run all tests and then click Next.
6. Review the details of the Confirmation page and then click Next. Figure 15 Validating the cluster configuration . 7. After the validation tests have run, click View Report to review the validation test results. Use the information provided in the Failover Cluster Validation Report to troubleshoot issues that would prevent the successful creation of the cluster. After addressing the issues, re-run the Validate a Configuration wizard. 8. Click Finish to exit the Validate a Configuration wizard.
4. On the Access Point for Administering the Cluster page, type a unique name for the cluster and then click Next. Figure 16 Entering cluster name . 5. Review the information on the Confirmation page and then click Next. After the cluster is successfully created, the Summary page lists basic cluster information. Click View Report to view a detailed report. Click Finish to exit the Create Cluster Wizard.
4. Select File Server from the list and then click Next. Figure 17 Select Service or Application . 5. Follow the instructions in the wizard to specify the following details: • A name for the clustered file server • The storage volume or volumes that the clustered file server should use NOTE: The clustered file server name is the name of the server that users should use to access their file content. 6. On the Summary page, review the configuration details and then click Finish. 7.
Verify that the cluster is operational In order to test cluster functionality, move the clustered file server from one server to the other server. When services or applications are moved, they should fail over to the other node in the cluster. • Right-click the clustered file server, select Move this service or application to another node, and click the available choice of node. When prompted, confirm your choice.
Cluster configuration
4 Cluster administration One important feature of HP StorageWorks P4000 G2 Unified NAS Gateways is that they can operate as a single node or as a cluster. This chapter discusses cluster installation and management issues. Cluster overview Up to eight server nodes can be connected to each other and deployed as a no single point of failure (NSPOF) cluster. Utilizing a private network allows for communication amongst servers, allowing you to track the state of each cluster node.
• FTP file share resources • iSCSI resources Cluster groups Cluster resources are placed together in cluster groups. Groups are the basic unit of failover between nodes. Resources do not fail over individually; they fail over with the group in which they are contained. Virtual servers A virtual server is a cluster group that consists of a static IP Address resource and a Network Name resource. Several virtual servers can be created.
Cluster planning Successful cluster planning includes: • Storage planning • Network planning • Protocol planning Storage planning For clustering, a basic disk must be designated for the cluster and configured as the Quorum disk. Additional basic disks are presented to each cluster node for data storage as physical disk resources. The physical disk resources are required for the basic disks to successfully work in a cluster environment, protecting it from simultaneous access from each node.
Virtual names and addresses are the only identification used by clients on the network. Because the names and addresses are virtual, their ownership can transition from one node to the other during a failover, preserving access to the resources in the cluster group. A cluster uses at least two network connections on each node: • The private cluster interconnect or “heartbeat” crossover cable connects to one of the network ports on each cluster node.
NOTE: AppleTalk is not supported on clustered disk resources. AppleTalk requires local memory for volume indexing. On failover events, the memory map is lost and data corruption can occur. Cluster groups and resources, including file shares The Failover Cluster Management tool (Start > Administrative Tools > Failover Cluster Management) provides complete online help for all cluster administration activities. Cluster resources include administrative types of resources as well as file shares.
Load balancing The creation of separate cluster groups for each virtual server provides more flexibility in balancing the processing load on the cluster between the two nodes. Each cluster group can be assigned to a cluster node using the preferred owner parameter. For example, if there are two cluster groups, the cluster could be set up to have the first cluster group owned by Node A and the second cluster group owned by Node B. This allows the network load to be handled by both devices simultaneously.
NFS cluster-specific issues • Back up user and group mappings. To avoid loss of complex advanced mappings in the case of a system failure, back up the mappings whenever the mappings have been edited or new mappings have been added. • Map consistently. Groups that are mapped to each other should contain the same users and the members of the groups should be properly mapped to each other to ensure proper file access. • Map properly. • Valid UNIX users should be mapped to valid Windows users.
The tasks described below are used to add storage to a cluster. See the online help for clustering for additional details. Creating physical disk resources A physical disk resource must reside within a cluster group. An existing cluster group can be used or a new cluster group may be created. For information on creating disk resources, see the cluster online help topic Physical Disk resource type. NOTE: • Physical disk resources usually do not have any dependencies set.
Extend a LUN in a cluster To extend a LUN on a storage array in a cluster, review the requirements and procedures from the storage array hardware provider for expanding or extending storage. For additional information associated with extending a LUN in a cluster, see the P4000 SAN documentation at http://www.hp.com/go/p4000.
Creating a cluster printer spooler Printer spoolers should be created in a separate group dedicated to this purpose for ease of management. For each printer spooler, a physical resource is required to instantiate the print spooler resource. In some cases, dedicated physical resources are not available and hence sharing of the physical resource among other members of the group is acceptable, remembering that all members of a group are managed as a unit. Hence, the group will failover and failback as a group.
excluded from the possible owners list to prevent a resource from coming online on a particular node. Lastly the preferred owners list can be ordered, to provide an ordered list of failover nodes. Using these tools, the failover of resources can be controlled with in a multinode cluster to provide a controlled balanced failover methodology that balances the increased work load.
The power down process is divided into two main steps: 1. Shutting down the cluster nodes 2. Removing power from the cluster nodes The sequence of these steps is critical. The devices must be shut down before the storage subsystem. Improperly shutting down the nodes and the storage subsystem causes corruption and loss of data. CAUTION: Before powering down the cluster nodes, follow the proper shutdown procedure as previously illustrated. See “Shutting down one cluster node.
5 Administration tools HP StorageWorks P4000 G2 Unified NAS Gateways include several administration tools to simplify storage system management tasks. Microsoft Windows Storage Server 2008 R2 administration tools Microsoft® Windows® Storage Server 2008 R2 operating systems provide a user interface for initial server configuration, unified storage system management, simplified setup and management of storage and shared folders, and support for Microsoft iSCSI Software Target.
NOTE: You must have a VDS Hardware Provider that is appropriate for your storage system installed in order to provision storage on an iSCSI target. If you have Microsoft iSCSI Software Target running on a Windows Storage Server 2008 R2 storage system, install the Microsoft iSCSI Software Target VDS Hardware Provider on the client computer. • Provision a Shared Folder Wizard for creating and configuring shared folders that can be accessed by using either the server message block (SMB) or NFS protocol.
• The backup software used must support SIS-enabled volumes. • The SIS volume, SIS Common Store folder, and reparse points (links) to the files must be restored to a Windows 2000 NTFS version 5.0 (or later) file system or partition that supports reparse points or junction points. • The Single Instance Storage Filter must be installed or enabled to access the data in the SIS volume.
For more detailed information about the Phase 1 and Phase 2 scripts, see the Microsoft Knowledge Base article Description of scripts to use to simplify user account mapping between a UNIX client and a Windows-based server at http://support.microsoft.com/kb/973840. Microsoft hotfix 2222746 HP supports Microsoft hotfix 2222746. This hotfix applies to Windows Storage Server 2008 R2 as well as the products listed in the KB article.
Figure 18 AD LDS Role and Instance . To verify the installation of the Services for Network File System (NFS) Role, in Server Manager, under Roles, click File Services. In the System Services table, Server for NFS is listed. Phase 2 scripts Phase 2 scripts are located in the c:\hpnas\components\ADLDS folder. You create NFS mappings for users and groups by running the nfs-adlds-config.js script. This script takes as inputs a standard UNIX password file and a standard UNIX group file.
Each line of a standard UNIX group file follows this format: group:password:GID:group list All fields are required, but only the group, GID, and group list fields are used. The GID field value must match the GID field value in the password file for those users that belong to the group. NOTE: If you create the group and password files, you must have corresponding users and groups on the UNIX system.
Figure 19 AD LDS script execution help screen . As a best practice, specify all of the above parameters so that Windows accounts and NFS mappings are created; however, you can provide finer control as follows. If you omit the /ldf option, the script creates Windows accounts but not NFS mappings. Likewise, omitting the /usercmd option creates NFS mappings but not Windows accounts. The /execute option controls whether Windows accounts and NFS mappings are actually made to the system.
The newly-created NFS mappings are stored as Active Directory objects and can be verified as follows: 1. Click Start > Administrative Tools > ADSI Edit. 2. On the Action menu, select Connect to.... 3. In the Connection Settings dialog box, under Computer, select the radio button labeled Select or type a domain or server: (Server|Domain[:port]). 4. In the Select or type a domain or server: (Server|Domain[:port]) field, type localhost:389 and then click OK.
Figure 21 NFS-mapped users and groups in ADSI Edit . Because the imported users and groups are now Windows users and groups as well as UNIX users and groups, you can use NFS sharing so that volumes, folders and files are visible in both the Windows file system and the UNIX file system. When you set ownership or permissions in the Windows file system, the proper ownership and permissions are set on the UNIX side.
Step 1 If you have not already run the Phase 1 script factory-setup-adlds.cmd, do so now. The script is located in the c:\hpnas\components\postinstaller\adlds folder.
Figure 22 NFS Advanced Sharing dialog box . Click the Permissions button. In the Type of access list, select Read-Write. Check the Allow root access check box. Figure 23 NFS Share Permissions dialog box . Click OK twice to return to the NfsTest Properties dialog box.
Step 5 In the NfsTest Properties dialog box, select the Security tab. This tab shows the current security settings for the folder. The following steps will add permissions for Everyone to have access to the NfsTest folder. To do this, click Edit… and then click Add…. Under Group or user names: type Everyone and then click OK. In the Permissions for NfsTest dialog box, check the Allow check box for Full control under Permissions for Everyone. Figure 24 Permissions for NfsTest dialog box .
check the Owner check box and then click OK. Note that root is part of the owner name. This verifies that NFS mapping is functional for the root user. Step 8 On the Windows system as Administrator, create a file file.txt in C:\NfsTest. Windows Explorer now displays its properties: On the UNIX system, issue a listing of the /mnt/nfstest directory. This listing displays the following information. Note that file permissions on your system may be different than those shown here.
Step 10 On the UNIX system, issue a listing of the /mnt/nfstest directory. Because you changed the owner of file.txt on the Windows system to user1, the owner of the file on the UNIX side is also user1. Because user1 is in the allusers group on the Windows system, the group ownership of file.txt is allusers on the UNIX side. If the group for file.txt is listed as nfsnobody, you must enable Microsoft hotfix 2222746 and restart the storage system as described in “Shared access example” on page 59.
Figure 27 Replace owner on subcontainers and objects . Click OK four times to dismiss the Properties dialog box. Return to the Properties dialog box, select the Security tab, and then click Edit. Select Everyone in the list of groups and user names and then click Remove. Next, click Add and add user1. Select full control for its permissions. Figure 28 Permissions for NfsTest dialog box . Click OK twice to dismiss the NfsTest Permissionsand Properties dialog boxes.
Administration tools
6 File server management This chapter begins by identifying file services in Windows Storage Server 2008 R2. The remainder of the chapter describes the many tasks and utilities that play a role in file server management. File services features in Windows Storage Server 2008 R2 Single Instance Storage Single Instance Storage (SIS) provides a copy-on-write link between multiple files. Disk space is recovered by reducing the amount of redundant data stored on a server.
Configuring data storage The HP StorageWorks P4000 G2 Unified NAS Gateway is configured only for the operating system. The administrator must configure data storage for the storage system. Configuring additional data storage involves creating arrays, logical disks, and volumes. Table 5 shows the general task areas to be performed as well as the utilities needed to configure storage for an HP Smart Array-based storage system.
NOTE: The ACU is used to configure and manage array-based storage. Software RAID-based storage systems use Microsoft Disk Manager to manage storage. You need administrator or root privileges to run the ACU. Array Configuration Utility The HP ACU supports the Smart Array controllers and hard drives installed on the storage system. To open the ACU from the storage system desktop: NOTE: If this is the first time that the ACU is being run, you will be prompted to select the Execution Mode for ACU.
Disk Management utility The Disk Management tool is a system utility for managing hard disks and the volumes, or partitions, that they contain. Disk Management is used to initialize disks, create volumes, format volumes with the FAT, FAT32, or NTFS file systems, and create fault-tolerant disk systems. Most disk-related tasks can be performed in Disk Management without restarting the system or interrupting users. Most configuration changes take effect immediately.
NOTE: To limit the size of a folder or share, see “Quota management” on page 95 . Configure the volumes on the server to perform the following tasks: • Prevent further disk space use and log an event when a user exceeds a specified disk space limit. • Log an event when a user exceeds a specified disk space warning level. When enabling disk quotas, it is possible to set both the disk quota limit and the disk quota warning level.
NOTE: This section addresses only single storage system node configurations. If your server has Windows Storage Server 2008 R2 Enterprise Edition, see the Cluster Administration chapter for expanding and extending storage in a cluster environment. Expanding storage Expansion is the process of adding physical disks to an array that has already been configured.
• You cannot extend striped volumes, mirrored volumes, or RAID 5 volumes. For more information, see the Disk Management online help. Volume shadow copies NOTE: Select storage systems can be deployed in a clustered as well as a non-clustered configuration. This chapter discusses using shadow copies in a non-clustered environment. The Volume Shadow Copy Service provides an infrastructure for creating point-in-time snapshots (shadow copies) of volumes. Shadow Copy supports 64 shadow copies per volume.
Identifying the volume Shadow copies are taken for a complete volume, but not for a specific directory. Shadow copies work best when the server stores user files, such as documents, spreadsheets, presentations, graphics, or database files. NOTE: Shadow copies should not be used to provide access to previous versions of application or e-mail databases.
The minimum amount of storage space that can be specified is 350 megabytes (MB). The default storage size is 10 percent of the source volume (the volume being copied). If the shadow copies are stored on a separate volume, change the default to reflect the space available on the storage volume instead of the source volume. Remember that when the storage limit is reached, older versions of the shadow copies are deleted and cannot be restored.
If defragmenting volumes on which shadow copies are enabled, use a cluster (or allocation unit) size of 16 KB or larger. Using this allocation unit size reduces the number of copy outs occurring on the snapshot. Otherwise, the number of changes caused by the defragmentation process can cause shadow copies to be deleted faster than expected. Note, however, that NTFS compression is supported only if the cluster size is 4 KB or smaller.
Figure 29 System administrator view of Shadow Copies for Shared Folders . The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied (with a minimum of 350 MB), and store the shadow copies on the same volume as the original volume. (See Figure 30). The cache file is located in a hidden protected directory titled “System Volume Information” off of the root of each volume for which shadow copy is enabled.
Figure 31 Shadow copies stored on a separate volume . The main advantage to storing shadow copies on a separate volume is ease of management and performance. Shadow copies on a source volume must be continually monitored and can consume space designated for file sharing. Setting the limit too high takes up valuable storage space. Setting the limit too low can cause shadow copies to be purged too soon, or not created at all.
NOTE: After the first shadow copy is created, it cannot be relocated. Relocate the cache file by altering the cache file location under Properties prior to enabling shadow copy. See “Viewing shadow copy properties” on page 79. Viewing a list of shadow copies To view a list of shadow copies on a volume: 1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select Shadow Copies tab.
CAUTION: Use caution when reducing the size limit for all shadow copies. When the size is set to less than the total size currently used for all shadow copies, enough shadow copies are deleted to reduce the total size to the new limit. A shadow copy cannot be recovered after it has been deleted. Redirecting shadow copies to an alternate volume IMPORTANT: Shadow copies must be initially disabled on the volume before redirecting to an alternate volume.
Managing shadow copies from the storage system desktop To access shadow copies from the storage system desktop: The storage system desktop can be accessed by using Remote Desktop to manage shadow copies. 1. On the storage system desktop, double-click My Computer. 2. Right-click the volume name, and select Properties. 3. Click the Shadow Copies tab. See Figure 32. Figure 32 Accessing shadow copies from My Computer .
NOTE: Shadow Copies for Shared Folders clients are not available for HTTP, FTP, AppleTalk, or NetWare shares. Consequently, users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files. However, administrators can take advantage of Shadow Copies for Shared Folders to restore files for these users.
Figure 33 Client GUI . When users view a network folder hosted on the storage system for which shadow copies are enabled, old versions (prior to the snapshot) of a file or directory are available. Viewing the properties of the file or folder presents users with the folder or file history—a list of read-only, point-in-time copies of the file or folder contents that users can then open and explore like any other file or folder.
.@GMT-2003.04.29-04:00:00 Access to NFS shadow copy pseudo-subdirectories is governed by normal access-control mechanisms using the permissions stored in the file system. Users can access only those shadow copies to which they have read access at the time the shadow copy is taken. To prevent users from modifying shadow copies, all pseudo-subdirectories are marked read-only, regardless of the user's ownership or access rights, or the permissions set on the original files.
Figure 34 Recovering a deleted file or folder . Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file: 1. Right-click the overwritten or corrupted file, and then click Properties. 2. Click Previous Versions. 3. To view the old version, click View. To copy the old version to another location, click Copy...
Backup and shadow copies Shadow copies are only available on the network via the client application, and only at a file or folder level as opposed to the entire volume. Hence, the standard backup associated with a volume backup will not work to back up the previous versions of the file system. To answer this particular issue, shadow copies are available for backup in two situations.
NOTE: Select servers can be deployed in a clustered or non-clustered configuration. This section discusses share setup for a non-clustered deployment. Folder management Volumes and folders on any system are used to organize data. Regardless of system size, systematic structuring and naming conventions of volumes and folders eases the administrative burden.
2. Click Properties, and then click the Security tab. Figure 35 Properties dialog box, Security tab . Several options are available on the Security tab: • To add users and groups to the permissions list, click Add. Follow the dialog box instructions. • To remove users and groups from the permissions list, highlight the desired user or group, and then click Remove. • The center section of the Security tab lists permission levels.
3. To modify ownership of files, or to modify individual file access level permissions, click Advanced. Figure 36 illustrates the properties available on the Advanced Security Settings dialog box. Figure 36 Advanced Security settings dialog box, Permissions tab . Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure 36 and includes: • Add a new user or group—Click Add, and then follow the dialog box instructions. • Remove a user or group— Click Remove.
4. Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission. If neither box is selected, permission is automatically disabled. Figure 37 illustrates the Edit screen and some of the permissions. Figure 37 User or group Permission Entry dialog box . Another area of the Advanced Security Settings is the Auditing tab. Auditing allows you to set rules for the auditing of access, or attempted access, to files or folders.
Figure 38 Advanced Security Settings dialog box, Auditing tab . 5. Click Add to display the Select User or Group dialog box. Figure 39 Select User or Group dialog box . NOTE: Click Advanced to search for users or groups. 6. Select the user or group.
7. Click OK. The Auditing Entry dialog box is displayed. Figure 40 Auditing Entry dialog box for folder name NTFS Test . 8. Select the desired Successful and Failed audits for the user or group. 9. Click OK. NOTE: Auditing must be enabled to configure this information. Use the local Computer Policy Editor to configure the audit policy on the storage system. The Owner tab allows taking ownership of files.
Figure 41 Advanced Security Settings dialog box, Owner tab . The current owner of the file or folder is listed at the top of the screen. To take ownership: 1. Click the appropriate user or group in the Change owner to list. 2. If it is also necessary to take ownership of subfolders and files, enable the Replace owner on subcontainers and objects box. 3. Click OK. Share management There are several ways to set up and manage shares.
The content of shares should be carefully chosen to avoid two common pitfalls: either having too many shares of a very specific nature, or of having very few shares of a generic nature. For example, shares for general use are easier to set up in the beginning, but can cause problems later. Frequently, a better approach is to create separate shares with a specific purpose or group of users in mind. However, creating too many shares also has its drawbacks.
• Standard shares are shares that do not end in a $ character. Standard shares are listed whenever a CIFS client browses for available shares on a CIFS server. The storage system supports both administrative and standard CIFS shares. To create an administrative share, end the share name with the $ character when setting up the share. Do not type a $ character at the end of the share name when creating a standard share. Managing shares Shares can be managed using Server Manager.
File screening management On the File Screening Management node of the File Server Resource Manager snap-in, you can perform the following tasks: • Create file screens to control the types of files that users can save and to send notifications when users attempt to save blocked files. • Define file screening templates that can be easily applied to new volumes or folders and that can be used across an organization. • Create file screening exceptions that extend the flexibility of the file screening rules.
For more information, and to download the utility, see the StorageWorks L&TT web site at http:// h18006.www1.hp.com/products/storageworks/ltt. Antivirus The server should be secured by installing the appropriate antivirus software.
File server management
7 Troubleshooting, servicing, and maintenance Troubleshooting the storage system The “Support and troubleshooting” task at the HP Support & Drivers web site (http://www.hp.com/ go/support) can be used to troubleshoot problems with the storage system.
• CCAT (Computer Crash Analysis Tool) • SEA (System Event Analyzer) If you have a warranty or service contract with HP you are entitled to these tools free of charge. You must, however, upgrade the tools at least once a year because the software expires after one year. For more information about WEBES, see http://h18023.www1.hp.com/support/svctools/webes/. To install WEBES on your storage system, run the setup executable located in the C:\hpnas\ Components\WEBES folder.
8 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.
• http://www.hp.com/support/downloads • http://www.hp.com/storage/whitepapers Typographic conventions Table 6 Document conventions Convention Element Blue text: Table 6 Cross-reference links and e-mail addresses Blue, underlined text: http://www.hp.
TIP: Provides helpful hints and shortcuts. Rack stability Rack stability protects personnel and equipment. WARNING! To reduce the risk of personal injury or damage to equipment: • Extend leveling jacks to the floor. • Ensure that the full weight of the rack rests on the leveling jacks. • Install stabilizing feet on the rack. • In multiple-rack installations, fasten racks together securely. • Extend only one rack component at a time. Racks can become unstable if more than one component is extended.
Support and other resources
9 System recovery This chapter describes how to use the System Recovery DVD that is provided with your storage system. The System Recovery DVD The HP StorageWorks Storage System Recovery DVD that is provided with your storage system allows you to install an image or recover from a catastrophic failure. At any later time, you may boot from the DVD and restore the server to the factory condition. This allows you to recover the system if all other means to boot the server fail.
3. Click Restore Factory Image. The upgrade process completes with little user intervention required. The server automatically reboots more than once. IMPORTANT: Do not interrupt the upgrade process. When the upgrade process nears completion, the Windows Storage Server 2008 R2 desktop displays the following message: The user's password must be changed before logging on the first time. Log on to the storage system by establishing an Administrator password: 4. Click OK. 5.
11. Enter format fs=fat32 quick. NOTE: If your USB Flash Drive does not support the FAT32 file system, format the drive as NTFS instead. Omitting the quick parameter lengthens the format time considerably. 12. Enter active to mark the partition as active. 13. Enter assign letter= to assign a drive letter to the USB drive. For example, assign letter=U. 14. Insert the System Recovery DVD provided with the system. 15.
5. Type an Administrator password in the New password box. 6. Re-type the Administrator password in the Confirm password box. 7. Click the blue arrow next to the Confirm password box. 8. Click OK. After the Administrator password has been set, the storage system completes the recovery process. 9. Remove the USB Flash drive from the X Series system or client PC.
A Regulatory compliance notices This section contains regulatory notices for the HP StorageWorks family of products. Regulatory compliance identification numbers For the purpose of regulatory compliance certifications and identification, this product has been assigned a unique regulatory model number. The regulatory model number can be found on the product nameplate label, along with all required approval markings and information.
of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at personal expense. Class B equipment This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numérique de la class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. European Union notice Products bearing the CE marking comply with the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/EEC) issued by the Commission of the European Community.
Korean notices Class A equipment Class B equipment Taiwanese notices BSMI Class A notice Taiwan battery recycle statement Recovery mark: • Four-in-one recycling symbol 112 Regulatory compliance notices Recovery text: • “Please recycle waste batteries”
Laser compliance notices English laser notice This device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S. FDA regulations and the IEC 60825-1. The product does not emit hazardous laser radiation. WARNING! Use of controls or adjustments or performance of procedures other than those specified herein or in the laser product's installation guide may result in hazardous radiation exposure.
French laser notice German laser notice Italian laser notice 114 Regulatory compliance notices
Japanese laser notice Spanish laser notice Recycling notices English notice P4000 G2 Unified NAS Gateway User Guide 115
Bulgarian notice Czech notice Danish notice Dutch notice 116 Regulatory compliance notices
Estonian notice Finnish notice French notice German notice P4000 G2 Unified NAS Gateway User Guide 117
Greek notice Hungarian notice Italian notice Latvian notice 118 Regulatory compliance notices
Lithuanian notice Polish notice Portuguese notice Romanian notice P4000 G2 Unified NAS Gateway User Guide 119
Slovak notice Spanish notice Swedish notice Turkish notice Türkiye Cumhuriyeti: EEE Yönetmeliğine Uygundur 120 Regulatory compliance notices
Battery replacement notices Dutch battery notice P4000 G2 Unified NAS Gateway User Guide 121
French battery notice German battery notice 122 Regulatory compliance notices
Italian battery notice Japanese battery notice P4000 G2 Unified NAS Gateway User Guide 123
Spanish battery notice 124 Regulatory compliance notices
Index A access rights, managing, 44 Accessing the storage system Remote Desktop method, 21 Accessing the storage system remote browser method, 20 ACL, defining, 94 Active Directory® Lightweight Directory Services (AD LDS), 53 ActiveX enabling, 20 Array Configuration Utility, 69 B backup, with shadow copies, 86 battery replacement notices, 121 boot sequence, 22 C cache file, shadow copies, 77 Canadian notice, 110 Certificate of Authenticity (COA), 16 CIFS, share support, 95 cluster adding new storage, 45 g
folders auditing access, 90 managing, 87 G groups, adding to permissions list, 88 H help obtaining, 101 HP Array Configuration Utility, 68 Storage Manager, 69 technical support, 101 HP StorageWorks Initial Configuration Tasks, 19 physical configuration, 21 planning network, 41 network access method, 15 protocol, 42 storage, 41 power on server, 17 printer spooler, creating in a cluster, 48 protocols non cluster aware, 45 planning, 42 Q Quorum disk defined, 40 quota management, 95 J R Japanese notices,
setting up overview, 15 setup completion, 19 shadow copies in a cluster, 46 uses, 73 shadow copies backups, 86 cache file, 77 defragmentation, 75 described, 73 disabling, 80 file or folder recovery, 84 managing, 76 mounted drives, 76 on NFS shares, 83 on SMB shares, 82 planning, 73 redirecting, 80 scheduling, 79 viewing list, 79 Shadow Copies for Shared Folders, 81 share management, 93 shares administrative, 95 managing, 93 standard, 95 Single Instance Storage, 67 storage configurations, 21 storage reports,
Index