6.1 HP IBRIX X9000 Network Storage System File System User Guide (TA768-96061, June 2012)
Deleting segments, volume groups, and physical volumes........................................................42
Deleting file serving nodes and X9000 clients.......................................................................42
Checking and repairing file systems..........................................................................................42
Analyzing the integrity of a file system on all segments...........................................................43
Clearing the INFSCK flag on a file system.............................................................................44
Troubleshooting file systems......................................................................................................44
ibrix_pv -a discovers too many or too few devices..................................................................44
Cannot mount on an X9000 client.......................................................................................44
NFS clients cannot access an exported file system..................................................................44
User quota usage data is not being updated.........................................................................44
File system alert is displayed after a segment is evacuated.......................................................45
SegmentNotAvailable is reported.........................................................................................45
SegmentRejected is reported...............................................................................................45
ibrix_fs -c failed with "Bad magic number in super-block"........................................................47
5 Using NFS...............................................................................................48
Exporting a file system............................................................................................................48
Unexporting a file system....................................................................................................51
Using case-insensitive file systems ............................................................................................51
Setting case insensitivity for all users (NFS/Linux/Windows)....................................................51
Viewing the current setting for case insensitivity......................................................................52
Clearing case insensitivity (setting to case sensitive) for all users (NFS/Linux/Windows)..............52
Log files............................................................................................................................52
Case insensitivity and operations affecting directories.............................................................53
6 Configuring authentication for CIFS, FTP, and HTTP.......................................54
Using Active Directory with LDAP ID mapping............................................................................54
Using LDAP as the primary authentication method.......................................................................55
Requirements for LDAP users and groups...............................................................................55
Configuring LDAP for X9000 software..................................................................................55
Configuring authentication from the GUI....................................................................................56
Viewing or changing authentication settings...............................................................................64
Configuring authentication from the CLI.....................................................................................65
Configuring Active Directory ...............................................................................................65
Configuring LDAP..............................................................................................................65
Configuring LDAP ID mapping.............................................................................................66
Configuring Local Users and Groups authentication................................................................67
7 Using CIFS..............................................................................................69
Configuring file serving nodes for CIFS......................................................................................69
Starting or stopping the CIFS service and viewing CIFS statistics....................................................69
Monitoring CIFS services.........................................................................................................70
CIFS shares............................................................................................................................71
Configuring CIFS shares with the GUI...................................................................................71
Configuring SMB signing ...................................................................................................75
Managing CIFS shares with the GUI.....................................................................................76
Configuring and managing CIFS shares with the CLI...............................................................77
Managing CIFS shares with Microsoft Management Console...................................................78
Linux static user mapping with Active Directory...........................................................................83
Configuring Active Directory................................................................................................83
Assigning attributes............................................................................................................85
Consolidating SMB servers with common share names................................................................86
CIFS clients............................................................................................................................87
Viewing quota information..................................................................................................87
Differences in locking behavior............................................................................................88
CIFS shadow copy.............................................................................................................88
4 Contents