Laptop User Manual
Table Of Contents
- Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
- Preface
- Contents
- Introducing Dell™ Filers
- Filer Administration Basics
- Overview
- Using the Administration Host
- About the Administration Host
- Administration Host Privileges
- Administration Host Entry in the /etc/hosts.equiv file
- Administration Host as the Mail Host
- Designating a Different Mail Host
- Requirements for Using an NFS Client as the Administration Host
- Requirements for Using a CIFS Client as the Administration Host
- The Root Volume
- Editing Configuration Files
- Obtaining Access to the Filer Shell
- Ways to Access the Command Line
- Sharing a Single telnet and Console Session
- telnet Session Restriction
- Closing a telnet Session
- telnet and Console Password Requirement
- rsh Support
- Commands Accepted From rsh
- Use Ctrl-C to Terminate the Command That Is Running
- Changing the System Password
- Where to Go to Learn More About Security
- About Multiple Administrative Users
- Creating Administrative Users
- Deleting Administrative Users
- Listing Administrative Users
- Changing an Administrative User Password
- Halting and Rebooting the Filer
- Understanding the Filer Default Configuration
- Default Exported and Shared Directories
- The /etc/rc File
- Naming Conventions for Network Interfaces
- Interface Types the Filer Supports
- How Interfaces Are Numbered
- How Multiple Ports Are Identified
- How Interfaces Are Named
- Virtual Interface Names
- About Using Interface Names in Scripts
- Filer Host Names
- Host Name Example
- Reasons to Follow a Special Recovery Procedure
- Procedure When the Filer Does Not Boot
- Procedure When Administration Host Cannot Access the Filer
- Core Files
- Message Logging
- About Message Logging
- About the syslogd Daemon and the /etc/syslog.conf File
- The /etc/syslog.conf File Format
- The facility Parameter
- The level Parameter
- The action Parameter
- Example Line From /etc/syslog.conf
- The /etc/messages File Restart Schedule
- Checking the /etc/messages File Daily
- Sample /etc/syslog.conf File
- For More Information
- Configuring Filer Options
- The options Command
- The vol options Command
- Sending Automatic Email
- How Automatic Email Messages Are Controlled
- How the autosupport Daemon Works
- Mail Host Requirement for autosupport
- About Configuring autosupport
- Events That Trigger autosupport Email
- Contents of Automatic Email Messages
- Use the options Command to Configure autosupport
- Disabling or Enabling the autosupport Daemon
- Specifying Addresses for autosupport Mail
- Specifying the Filer Administrator’s Address
- Sending an Immediate Message
- Sending a Short Message
- Filer System Time Synchronization
- Time Synchronization with the rdate Command
- Time Synchronization With SNTP
- Synchronizing Filer System Time
- Using options Command Options to Maintain Filer Security
- Software Licenses
- Disk and File System Management
- Disk Concepts
- Volume Concepts
- Procedures for Managing Disks and Volumes
- Disk Management Tasks
- Volume Management Tasks
- Introduction
- Creating Volumes
- After Creating a New Volume
- Adding Disks to a Volume
- Monitoring Volume Status
- Setting Volume Options
- Converting a Mirror Into a Regular Volume
- Making a Volume Inactive
- Reactivating an Off-line Volume
- Adding a Foreign Volume
- Destroying a Volume
- Renaming a Volume
- Handling Volume Failures
- File Statistics for Volumes
- Getting a File Statistics Summary
- filestats Command Options
- Volume Reversion Using SnapRestore
- About SnapRestore
- How SnapRestore Works
- What SnapRestore Reverts
- Files That SnapRestore Cannot Recover
- How SnapRestore Affects Recent SnapShots
- Typical Applications of SnapRestore
- Considerations Before Using SnapRestore
- How SnapRestore Works With SnapMirror
- Effects of Reverting a Root Volume
- Effects of SnapRestore on Filer Backup and Recovery
- Reverting a Volume to a Selected SnapShot
- Network Administration
- Working With Large Files
- Using SNMP
- Host Name Resolution
- Routing
- Using ifconfig to Configure an Interface
- About the ifconfig Command
- The ifconfig Command Syntax
- Reasons to Use the ifconfig Command
- Changing the Interface’s IP Address, Network Mask, or Broadcast Address
- Setting the Media Type on an Ethernet Interface
- Setting the Maximum Transmission Unit (MTU)
- Configuring the Interface Up or Down
- Edit /etc/rc File to Make Changes Persistent After Reboot
- Viewing Interface Configuration Information
- EtherChannel Trunking
- Kinds of Trunks
- Hardware Requirements for Trunks
- Virtual Interfaces
- Trunking Virtual Interfaces
- Second-Level Virtual Interfaces on a Single Filer
- Virtual Interface Management
- Creating a Single-Mode Trunk
- Specifying a Preferred Link in a SingleMode Trunk
- Removing a Link From Preferred Status in a Single-Mode Trunk
- Creating a Multiple-Mode Trunk
- Creating a Second-Level Virtual Interface on a Single Filer
- Adding Physical Interfaces to a Trunk
- Displaying the Status of a Trunk
- Displaying Trunk Statistics
- Destroying a Trunk
- Database File Protection
- Enabling and Disabling Database File Protection With nvfail
- Using the nvfail_rename File for Additional Database Protection
- File Sharing Between NFS and CIFS Users
- About This Chapter
- File-Locking Interactions
- Managing Symbolic Links for CIFS Access
- NFS and CIFS Use of the Read-Only Bit
- Naming Files Used by Both NFS and CIFS
- Languages and Character Sets
- Displaying a List of Supported Languages
- Setting the Console Encoding
- Setting the Language of a Volume
- Creating a Volume That Uses a Specified Language
- Displaying Which Volume Uses Which Language
- CIFS File Name Case
- Forcing CIFS File Names to Lowercase
- Preserving the Case of CIFS File Names
- Directory Conversion Time
- Speeding Up Conversion Time by Renaming NFS Directories
- How to Manage UNIX Access to NTFS Files
- How to Manage the WAFL Credential Cache
- Setting How Long Each WAFL Credential Cache Entry Is Valid
- Adding An Entry to the WAFL Credential Cache
- Deleting Entries From the WAFL Credential Cache
- Displaying WAFL Credential Cache Statistics
- Displaying a Mapping Result for a UNIX Name
- Displaying a Mapping Result for a Windows Name
- Toggling CIFS Login Tracing
- NFS Administration
- Managing NFS Exports
- Introducing the /etc/exports File
- Rules For Exporting Volumes And Directories
- Default /etc/exports Entries
- Restricting Access to Volumes and Directories
- The exportfs Command
- The /etc/netgroup File
- Exporting to Subnets
- Configuring a Filer for WebNFS
- About Configuring a Filer for WebNFS
- Setting Up WebNFS
- Managing WebNFS
- Displaying NFS Statistics
- About Displaying NFS Statistics
- CIFS Administration
- What Is CIFS?
- What You Can Do Only From the Filer Command Line or FilerView
- Effects of Renaming a Volume on Shares
- Scope of This Chapter
- CIFS limitations
- Limits on CIFS Open Files, Sessions, and Shares
- Changing or Viewing the Filer’s Description
- Adding CIFS Users to the Filer
- Adding Local Groups to the Filer
- Using CIFS Commands With a Remote Shell Program
- Enabling Guest and Generic Access
- Displaying a Filer’s Shares
- Creating and Changing a Share
- Displaying Information About Shares
- Deleting a Share
- Creating a Home Share for Each User
- Assigning and Changing Access Rights
- Displaying Access Rights to an NTFS File
- Changing UNIX Permissions and DOS Attributes From Windows
- Sending a Message to All Users on a Filer
- Event Auditing
- Event Log Detail Displays
- Event Auditing Overview
- Enabling CIFS Access Logging
- Disabling CIFS Access Logging
- Specifying the Active Event Log
- Setting a System ACL on a File
- Viewing Events in a Security Log
- Using Oplocks
- Displaying CIFS Statistics
- Displaying CIFS Session Information
- Stopping and Restarting CIFS Sessions
- Reconfiguring the Filer for CIFS
- HTTP Administration
- Snapshots
- Understanding Snapshots
- Snapshot Commands and Options
- Understanding Snapshot Disk Consumption
- Managing Snapshot Disk Consumption
- Accessing Snapshots From Clients
- qtree Administration
- Quotas and Maximum Number of Files
- Data Backup
- Introduction to Data Backup
- How the dump Command Works
- Purpose of the dump Command
- What the dump Command Can Back Up
- How the dump Command Uses Snapshots to Back Up Data
- Metadata Being Backed Up
- How to Exclude Certain Types of Data From the Backup
- Devices Used by the Dump Command
- Incremental Backups
- Where to Enter the Dump Command
- Benefits of Entering the dump Command Through rsh
- Benefits of Entering the dump Command on the Console
- Format of the Backup Data
- How the dump Command Writes and Stores Data on Tape
- Determining the Amount of Backup Data
- Determining the Number of Tapes for the Backup
- Prerequisites for the dump Command
- Recommendations for Performing a Backup
- The dump Command Syntax
- Using the dump Command to Back Up Data to Tape
- Description
- Prerequisites
- Restrictions
- Steps
- Examples of Level-0 Backups to a Local Tape File
- Examples of Backups to a Remote Tape File
- Example of an Incremental Backup to a Local Tape Drive
- Examples of Backups to Multiple Tape Files
- Example of Backing Up a Directory From a Snapshot
- Example of Backups to a Tape Stacker
- Example of Backing Up Multiple Files or Directories in One dump Command
- Example of Backing Up Data Without ACLs
- Example of Specifying a Blocking Factor
- Example of Specifying a Tape File Size
- Example of Excluding Files From a Backup
- Example of Backing Up to a Tape Stacker Shared by Multiple Filers
- Example of Backing Up the Entire Filer
- Data Recovery
- Introduction to Data Recovery
- The restore Command Syntax
- Using the restore Command
- Performing a Full Restore of a Volume Containing qtrees
- Examples of the restore Command
- Restarting the restore Command
- How to Use a Filer Tape Drive to Restore Files to Another System
- Tape Device Management
- Introduction to Tape Device Management
- How the Filer Displays Information About Various Tape Drives
- Displaying Tape Device Information
- Description
- Step for Displaying Information About Qualified Tape Devices
- Steps for Displaying Nonqualified Tape Devices
- Steps for Displaying Information About Tape Stackers
- Displaying Tape Device Information Along With Other Filer Information
- Example of the sysconfig -t Command for a Qualified Tape Drive
- Examples Of the sysconfig -t Command for a Nonqualified Tape Drive
- Example of the sysconfig -m Command
- Example of the sysconfig -v Command
- Using the mt Command to Control Tape Devices
- Volume Copy Using the vol copy Command Set
- About This Chapter
- Introduction to the Filer’s Commands for Copying Volumes
- Requirements and Recommendation For Copying a Volume
- Details About Copying One Volume to Another
- Management of a Volume Copy Operation When it Is in Progress
- Data Replication Using SnapMirror
- About This Chapter
- Purposes of SnapMirror
- How SnapMirror Works
- Snapshots Created During Data Replication
- How SnapMirror Works With Quotas
- How SnapMirror Works With the Dump Command
- The /etc/snapmirror.allow File
- The /etc/snapmirror.conf File
- Replicating a Volume
- Disabling Data Replication for the Entire Filer
- Resuming Data Replication for the Entire Filer
- Disabling Data Replication for One Volume
- Checking Data Replication Status
- Converting a Mirror to a Regular Volume
- Differences Between the vol copy Command and SnapMirror
- System Information and Performance
- Troubleshooting
- Getting Technical Assistance
- Booting From System Boot Diskette
- Restarting a Shut Down Filer
- NVRAM Problem
- Volume Problems
- Failed Mounts and Stale File Handles
- Volume Name Problems
- Disk Problems
- Disk Failure Without a Hot Spare Disk
- Disk Failure With a Hot Spare Disk
- Disk Errors
- Inconsistent File System
- Disk Operations in Maintenance Mode
- Configuration Problems
- How to Reset the Filer Password
- How to Initialize All Disks and Create a New File System
- Network Problems
- NFS Problems
- Windows Access Problems
- UNIX cpio Problems
- UNIX df Problems
- The df Version Must Support Large File Systems
- Enable NFS Option to Avoid Displaying Useless Data
- DOS, Windows, and Macintosh Clients Might Have Display Problem
- Filer df Command Always Shows Correct Disk Space
- qtrees Affect Disk Space Displayed by df
- Filer Quota Report Command Always Displays Correct Usage
- Serious Error Messages
- Detailed Options Information
- About options
- Autosupport Options
- CIFS Options
- What the CIFS Options Do
- The cifs.access_logging_enable Option
- The cifs.access_logging.filename Option
- The cifs.bypass_traverse_checking Option
- The cifs.guest_account Option
- The cifs.home_dir Option
- The cifs.idle_timeout Option
- The cifs.netbios_aliases Option
- The cifs.oplocks.enable Option
- The cifs.perm_check_use_gid Option
- The cifs.scopeid Option
- The cifs.search_domains Option
- The cifs.show_snapshot Option
- The cifs.symlinks.cycleguard Option
- The cifs.symlinks.enable Option
- DNS Options
- HTTP Options
- NFS Options
- NIS Options
- RAID Options
- timed Options
- volume Options
- Miscellaneous Options
- What the Miscellaneous Options Do
- The console.encoding Option
- The ip.match_any_ifaddr Option
- The ip.path_mtu_discovery.enable Option
- The rsh.enable Option
- The snmp.enable Option
- The telnet.enable Option
- The telnet.hosts Option
- The vol.copy.throttle Option
- The wafl.convert_ucode Option
- The wafl.create_ucode Option
- The wafl.default_nt_user Option
- The wafl.default_unix_user Option
- The wafl.maxdirsize Option
- The wafl.root_only_chown Option
- The wafl.wcc_minutes_valid Option
- Command Reference
- Glossary
- Index

___________________
Information in this document is subject to change without notice.
© 19981999 Network Appliance, Inc. Licensed to Dell Computer Corporation. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Computer Corporation is strictly forbidden.
No part of this book covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or mechanical,
including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written permission of the
copyright owner.
Portions of this product are derived from the Berkeley Net2 release and the 4.4-Lite-2 release, which are copyrighted and publicly
distributed by The Regents of the University of California.
Copyright © 19801995 The Regents of the University of California. All rights reserved.
Portions of this product are derived from NetBSD, which is copyrighted and publicly distributed by Carnegie Mellon University.
Copyright © 1994, 1995 Carnegie Mellon University. All rights reserved. Author Chris G. Demetriou.
Permission to use, copy, modify, and distribute this software and its documentation is hereby granted, provided that both the
copyright notice and its permission notice appear in all copies of the software, derivative works or modified versions, and any
portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS AS IS CONDITION. CARNEGIE MELLON DISCLAIMS
ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
Software derived from copyrighted material of The Regents of the University of California, Carnegie Mellon University, and
Network Appliance are subject to the following license and disclaimer:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notices, this list of conditions, and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notices, this list of conditions, and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Network Appliance reserves the right to change any products described herein at any time, and without notice. Network
Appliance assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to
in writing by Network Appliance. The use and purchase of this product do not convey a license under any patent rights,
trademark rights, or any other intellectual property rights of Network Appliance.
The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications.
RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.277-7103 (October 1988) and
FAR 52-227-19 (June 1987).
Trademarks used in this text: Dell, the DELL logo, and PowerVault are trademarks of Dell Computer Corporation; Data ONTAP,
SnapMirror, SnapRestore, Snapshot, WAFL, FilerView, and SecureShare are trademarks of Network Appliance, Inc.; MS-DOS,
Microsoft, Windows, and Windows NT are registered trademarks and Windows for Workgroups is a trademark of Microsoft
Corporation; UNIX is a registered trademark of The Open Group in the United States and other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or
their products. Dell Computer Corporation disclaims any proprietary interest in trademarks and trade names other than its own.
April 1999 P/N 4385P Rev. A00










