Hp StoreAll Storage User Manual Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 254
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
Analyzing the integrity of a file system on all segments...........................................................46
Clearing the INFSCK flag on a file system.............................................................................46
Troubleshooting file systems......................................................................................................46
Segment of a file system is accidently deleted........................................................................46
ibrix_pv -a discovers too many or too few devices..................................................................47
Cannot mount on an IBRIX 9000 client.................................................................................47
NFS clients cannot access an exported file system..................................................................48
User quota usage data is not being updated.........................................................................48
File system alert is displayed after a segment is evacuated.......................................................48
SegmentNotAvailable is reported.........................................................................................48
SegmentRejected is reported...............................................................................................48
ibrix_fs -c failed with "Bad magic number in super-block"........................................................50
5 Using NFS...............................................................................................51
Exporting a file system............................................................................................................51
Unexporting a file system....................................................................................................54
Using case-insensitive file systems ............................................................................................54
Setting case insensitivity for all users (NFS/Linux/Windows)....................................................55
Viewing the current setting for case insensitivity......................................................................55
Clearing case insensitivity (setting to case sensitive) for all users (NFS/Linux/Windows)..............55
Log files............................................................................................................................56
Case insensitivity and operations affecting directories.............................................................56
6 Configuring authentication for SMB, FTP, and HTTP.......................................58
Using Active Directory with LDAP ID mapping............................................................................58
Using LDAP as the primary authentication method.......................................................................59
Requirements for LDAP users and groups...............................................................................59
Configuring LDAP for IBRIX software.....................................................................................59
Configuring authentication from the GUI....................................................................................60
Viewing or changing authentication settings...............................................................................68
Configuring authentication from the CLI.....................................................................................69
Configuring Active Directory ...............................................................................................69
Configuring LDAP..............................................................................................................69
Configuring LDAP ID mapping.............................................................................................70
Configuring Local Users and Groups authentication................................................................71
7 Using SMB..............................................................................................73
Configuring file serving nodes for SMB......................................................................................73
Starting or stopping the SMB service and viewing SMB statistics...................................................73
Monitoring SMB services.........................................................................................................74
SMB shares...........................................................................................................................75
Configuring SMB shares with the GUI...................................................................................76
Configuring SMB signing ...................................................................................................80
Managing SMB shares with the GUI....................................................................................81
Configuring and managing SMB shares with the CLI..............................................................82
Managing SMB shares with Microsoft Management Console...................................................83
Linux static user mapping with Active Directory...........................................................................87
Configuring Active Directory................................................................................................88
Assigning attributes............................................................................................................89
Synchronizing Active Directory 2008 with the NTP server used by the cluster.............................90
Consolidating SMB servers with common share names................................................................90
SMB clients............................................................................................................................92
Viewing quota information..................................................................................................92
Differences in locking behavior............................................................................................92
SMB shadow copy.............................................................................................................92
Permissions in a cross-protocol SMB environment.........................................................................94
4 Contents
Page view 3
1 2 3 4 5 6 7 8 9 ... 253 254

Comments to this Manuals

No comments