5 using nfs, 7 using smb – HP StoreAll Storage User Manual

Page 4

Advertising
background image

Analyzing the integrity of a file system on all segments...........................................................46
Clearing the INFSCK flag on a file system.............................................................................46

Troubleshooting file systems......................................................................................................46

Segment of a file system is accidently deleted........................................................................46
ibrix_pv -a discovers too many or too few devices..................................................................47
Cannot mount on an IBRIX 9000 client.................................................................................47
NFS clients cannot access an exported file system..................................................................48
User quota usage data is not being updated.........................................................................48
File system alert is displayed after a segment is evacuated.......................................................48
SegmentNotAvailable is reported.........................................................................................48
SegmentRejected is reported...............................................................................................48
ibrix_fs -c failed with "Bad magic number in super-block"........................................................50

5 Using NFS...............................................................................................51

Exporting a file system............................................................................................................51

Unexporting a file system....................................................................................................54

Using case-insensitive file systems ............................................................................................54

Setting case insensitivity for all users (NFS/Linux/Windows)....................................................55
Viewing the current setting for case insensitivity......................................................................55
Clearing case insensitivity (setting to case sensitive) for all users (NFS/Linux/Windows)..............55
Log files............................................................................................................................56
Case insensitivity and operations affecting directories.............................................................56

6 Configuring authentication for SMB, FTP, and HTTP.......................................58

Using Active Directory with LDAP ID mapping............................................................................58
Using LDAP as the primary authentication method.......................................................................59

Requirements for LDAP users and groups...............................................................................59
Configuring LDAP for IBRIX software.....................................................................................59

Configuring authentication from the GUI....................................................................................60
Viewing or changing authentication settings...............................................................................68
Configuring authentication from the CLI.....................................................................................69

Configuring Active Directory ...............................................................................................69
Configuring LDAP..............................................................................................................69
Configuring LDAP ID mapping.............................................................................................70
Configuring Local Users and Groups authentication................................................................71

7 Using SMB..............................................................................................73

Configuring file serving nodes for SMB......................................................................................73
Starting or stopping the SMB service and viewing SMB statistics...................................................73
Monitoring SMB services.........................................................................................................74
SMB shares...........................................................................................................................75

Configuring SMB shares with the GUI...................................................................................76
Configuring SMB signing ...................................................................................................80
Managing SMB shares with the GUI....................................................................................81
Configuring and managing SMB shares with the CLI..............................................................82
Managing SMB shares with Microsoft Management Console...................................................83

Linux static user mapping with Active Directory...........................................................................87

Configuring Active Directory................................................................................................88
Assigning attributes............................................................................................................89
Synchronizing Active Directory 2008 with the NTP server used by the cluster.............................90

Consolidating SMB servers with common share names................................................................90
SMB clients............................................................................................................................92

Viewing quota information..................................................................................................92
Differences in locking behavior............................................................................................92
SMB shadow copy.............................................................................................................92

Permissions in a cross-protocol SMB environment.........................................................................94

4

Contents

Advertising