Instruction Manual
Table Of Contents
- Dell FluidFS V3 NAS Solutions For PowerVault NX3500, NX3600, And NX3610 Administrator's Guide
- Introduction
- How PowerVault FluidFS NAS Works
- FluidFS Terminology
- Key Features Of PowerVault FluidFS Systems
- Overview Of PowerVault FluidFS Systems
- PowerVault FluidFS Architecture
- Data Caching And Redundancy
- File Metadata Protection
- High Availability And Load Balancing
- Ports Used by the FluidFS System
- Other Information You May Need
- Upgrading to FluidFS Version 3
- FluidFS Manager User Interface Overview
- FluidFS 3.0 System Management
- Connecting to the FluidFS Cluster
- Managing Secured Management
- Adding a Secured Management Subnet
- Changing the Netmask for the Secured Management Subnet
- Changing the VLAN ID for the Secured Management Subnet
- Changing the VIP for the Secured Management Subnet
- Changing the NAS Controller IP Addresses for the Secured Management Subnet
- Deleting the Secured Management Subnet
- Enabling Secured Management
- Disabling Secured Management
- Managing the FluidFS Cluster Name
- Managing Licensing
- Managing the System Time
- Managing the FTP Server
- Managing SNMP
- Managing the Health Scan Throttling Mode
- Managing the Operation Mode
- Managing Client Connections
- Displaying the Distribution of Clients between NAS Controllers
- Viewing Clients Assigned to a NAS Controller
- Assigning a Client to a NAS Controller
- Unassigning a Client from a NAS Controller
- Manually Migrating Clients to another NAS Controller
- Failing Back Clients to Their Assigned NAS Controller
- Rebalancing Client Connections across NAS Controllers
- Shutting Down and Restarting NAS Controllers
- Managing NAS Appliance and NAS Controller
- FluidFS 3.0 Networking
- Managing the Default Gateway
- Managing DNS Servers and Suffixes
- Managing Static Routes
- Managing the Internal Network
- Managing the Client Networks
- Viewing the Client Networks
- Creating a Client Network
- Changing the Netmask for a Client Network
- Changing the VLAN Tag for a Client Network
- Changing the Client VIPs for a Client Network
- Changing the NAS Controller IP Addresses for a Client Network
- Deleting a Client Network
- Viewing the Client Network MTU
- Changing the Client Network MTU
- Viewing the Client Network Bonding Mode
- Changing the Client Network Bonding Mode
- Managing SAN Fabrics
- FluidFS 3.0 Account Management And Authentication
- Account Management and Authentication
- Default Administrative Accounts
- Default Local User and Local Group Accounts
- Managing Administrator Accounts
- Managing Local Users
- Managing Password Age and Expiration
- Managing Local Groups
- Managing Active Directory
- Managing LDAP
- Managing NIS
- Managing User Mappings between Windows and UNIX/Linux Users
- FluidFS 3.0 NAS Volumes, Shares, and Exports
- Managing the NAS Pool
- Managing NAS Volumes
- File Security Styles
- Thin and Thick Provisioning for NAS Volumes
- Choosing a Strategy for NAS Volume Creation
- Example NAS Volume Creation Scenarios
- NAS Volumes Storage Space Terminology
- Configuring NAS Volumes
- Cloning a NAS Volume
- NAS Volume Clone Defaults
- NAS Volume Clone Restrictions
- Managing NAS Volume Clones
- Managing CIFS Shares
- Managing NFS Exports
- Managing Quota Rules
- Viewing Quota Rules for a NAS Volume
- Setting the Default Quota per User
- Setting the Default Quota per Group
- Adding a Quota Rule for a Specific User
- Adding a Quota Rule for Each User in a Specific Group
- Adding a Quota Rule for an Entire Group
- Changing the Soft Quota or Hard Quota for a User or Group
- Enabling or Disabling the Soft Quota or Hard Quota for a User or Group
- Deleting a User or Group Quota Rule
- Managing Data Reduction
- FluidFS 3.0 Data Protection
- FluidFS 3.0 Monitoring
- FluidFS 3.0 Maintenance
- Troubleshooting
- Getting Help

• NTFS security style: Permissions are controlled by Windows and NTFS. The UNIX/ Linux user adheres
to the permissions of the corresponding Windows user, regardless of the UNIX/Linux permission
settings.
• UNIX security style: Permissions are based on the UNIX/Linux permissions. The Windows user adheres
to the permissions of the corresponding UNIX/Linux user.
• Mixed security style: Both UNIX/Linux and Windows permissions are used. Each user can override the
other userʹ permission settings; therefore, be careful when using the Mixed security style.
Managing the User Mapping Policy
Configure the FluidFS cluster mapping policy to automatically map all users or to only allow mappings
between specific users.
Mapping Windows and UNIX/Linux Users Automatically
Automatically map all Windows users in Active Directory to the identical UNIX/Linux users in LDAP or NIS,
and map all UNIX/Linux users to the identical Windows users. Mapping rules override automatic mapping.
1. Click the Access Control tab on the left.
2. Click the User Mapping tab on the top.
3. In the Mapping Policy pane, click .
4. Click Modify Policy.
The Modify User Mapping Policy dialog box appears.
5. Select Automatically map CIFS and NFS users with the same name.
6. Click OK.
Mapping Windows and UNIX/Linux Users by Mapping Rules Only
Only allow mappings between specific Windows users in Active Directory and the identical UNIX/Linux
users in LDAP or NIS.
1. Click the Access Control tab on the left.
2. Click the User Mapping tab on the top.
3. In the Mapping Policy pane, click .
4. Click Modify Policy.
The Modify User Mapping Policy dialog box appears.
5. Select Map based on the mapping rules only.
6. Click OK.
Managing User Mapping Rules
Manage mapping rules between specific users. Mapping rules override automatic mapping.
Creating a User Mapping Rule
Create a mapping rule between a specific Windows user in Active Directory and the identical UNIX/Linux
user in LDAP or NIS. Mapping rules override automatic mapping.
1. Click the Access Control tab on the left.
2. Click the User Mapping tab on the top.
3. In the Mapping Rules pane, click .
4. Click New.
The New User Mapping Rule dialog box appears.
84