HP ProLiant Storage Server user guide 440584-003 Part number: 440584-003 First edition: September 2007
Legal and notice information © Copyright 1999, 2007 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice.
Contents About this guide . . . . . . . . . . . . . . . . . . . . . . . . . Intended audience . . . . . . . . Related documentation . . . . . . Document conventions and symbols Rack stability . . . . . . . . . . HP technical support . . . . . . . Customer self repair . . . . . . . Product warranties . . . . . . . . Subscription service . . . . . . . HP websites . . . . . . . . . . . Documentation feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Volume Shadow Copy Service Using storage elements . . . Clustered server elements . . Network adapter teaming . . . . 3 File server management overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . File services features in Windows Storage Server 2003 R2 . . . . . . . . .
Comparing administrative (hidden) and standard Managing shares . . . . . . . . . . . . . File Server Resource Manager . . . . . . . . . . . . Quota management . . . . . . . . . . . . . . File screening management . . . . . . . . . . . Storage reports . . . . . . . . . . . . . . . . Other Windows disk and data management tools . . . Additional information and references for file services . . Backup . . . . . . . . . . . . . . . . . . . . HP StorageWorks Library and Tape Tools . . . . . Antivirus . . . . . .
Adding local NetWare users . . . . . . . . . . Enabling local NetWare user accounts . . . . . . Managing NCP volumes (shares) . . . . . . . . . . Creating a new NCP share . . . . . . . . . . . Modifying NCP share properties . . . . . . . . . Print Services for NetWare . . . . . . . . . . . . . Point and Print from Novell to Windows Server 2003 Additional resources . . . . . . . . . . . . . . AppleTalk and file services for Macintosh . . . . . . . . . Installing the AppleTalk protocol . . . . . . . . . . .
Verifying domain membership . . . . . . . . . . . . . Setting up a cluster account . . . . . . . . . . . . . . About the Quorum disk . . . . . . . . . . . . . . . . Configuring shared disks . . . . . . . . . . . . . . . Verifying disk access and functionality . . . . . . . . . Configuring cluster service software . . . . . . . . . . . . . . Using Cluster Administrator . . . . . . . . . . . . . . . . Using Cluster Administrator remotely . . . . . . . . . . The HP Storage Server Management Console . . . . . .
DL585 G2 hardware components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B Configuring storage server for Web access (optional) . . . . . . . . . Setting up an Internet connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C Regulatory compliance and safety . . . . . . . . . . . . . . . . . Federal Communications Commission notice . . . . . . . . . . . Class A equipment . . . . . . . . . . . . . . . . . . . . Class B equipment . . . . . . . . . . . . . . . . . . . .
Figures 1 ..Internet options screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 ..HP Storage Server Management console 23 . . . . . . . . . . . . . . . . . . . . . 24 3 ..Storage management process example . . . . . . . . . . . . . . . . . . . . . . 32 4 ..Configuring arrays from physical drives . . . . . . . . . . . . . . . . . . . . . . 33 5 ..RAID 0 (data striping) (S1-S4) of data blocks (B1-B12) . . . . . . . . . . . . . . . 33 6 ..
37 ..Automatic configuration settings . . . . . . . . . . . . . . . . . . . . . . . . . 139 38 ..Proxy server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tables 1 ..Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 ..Network access methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 ..Installation and configuration checklist . . . . . . . . . . . . . . . . . . . . . . 13 18 19 4 ..HP ProLiant hardware RAID configurations . . . . . . . . . . . . . . . . . . . . . 20 5 ..Server configuration worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6 ..Summary of RAID methods . . . . . . . . . . . . .
About this guide This guide provides information about: • Installing and configuring HP ProLiant Storage Servers • Managing HP ProLiant Storage Servers • Troubleshooting and servicing HP ProLiant Storage Servers Intended audience This guide is intended for technical professionals with knowledge of: • Microsoft® administrative procedures • System and storage configurations Related documentation The following documents [and websites] provide related information: • HP Integrated Lights-Out 2 user guide You c
WARNING! Indicates that failure to follow directions could result in bodily harm or death. CAUTION: Indicates that failure to follow directions could result in damage to equipment or data. IMPORTANT: Provides clarifying information or specific instructions. NOTE: Provides additional information. TIP: Provides helpful hints and shortcuts. Rack stability Rack stability protects personnel and equipment.
Customer self repair HP customer self repair (CSR) programs allow you to repair your StorageWorks product. If a CSR part needs replacing, HP ships the part directly to you so that you can install it at your convenience. Some parts do not qualify for CSR. Your HP-authorized service provider will determine whether a repair can be accomplished by CSR. For more information about CSR, contact your local service provider. For North America, see the CSR website: http://www.hp.
About this guide
1 Installing and configuring the server Setup overview Your HP ProLiant Storage Server comes preinstalled with either the Windows® Storage Server™ 2003 R2 operating system (32-bit or 64-bit version) or the Microsoft® Windows® Unified Data Storage Server 2003, Enterprise x64 Edition operating system. Microsoft Windows Storage Server 2003 R2 extends the Windows Storage Server 2003 operating system, providing a more efficient way to manage and control access to local and remote resources.
Table 2 Network access methods Access method I.E. 5.5 or later required? Storage server desktop accessible? HP ProLiant Rapid Startup Wizard access Direct attachment No Yes Directly from the storage server desktop. Requires a monitor, mouse, and keyboard. Remote browser Yes No Directly from the HP ProLiant Storage Server Management console. Does not display the storage server desktop. Remote desktop No Yes Indirectly from the storage server desktop.
Table 3 Installation and configuration checklist Steps Reference 1. Unpack server, check kit contents, and become familiar with front and back panels of storage server. Locate and write down serial number of storage server. See “Checking kit contents” on page 19. 2. If you plan to rack the server, complete the rail installation instructions. See the HP ProLiant rail installation instructions and tower-to-rack conversion instructions, if applicable. 3.
• ProLiant Essentials Integrated Lights-Out 2 Advanced Pack Powering on the server Power on the server after connecting the cables. For more information on your storage server model's hardware components, see “Server components” on page 125. 1. Power on server by pushing the power button. The power LED illuminates green. 2. When the server powers on, an installation progress screen is displayed. The installation process takes approximately 10 to 15 minutes to complete and the server will reboot twice.
NOTE: The hardware RAID configuration information listed for the DL380 G5 applies to all DL380 G5 models except for the DL380 G5 1.16 TB SAS model. NOTE: In the HP Array Configuration Utility (ACU), logical disks are labeled 1 and 2. In Microsoft Disk Manager, logical disks are displayed as 0 and 1. For HP Smart Array configuration information, see http://h18004.www1.hp.com/products/servers/proliantstorage/arraycontrollers/.
IMPORTANT: An IP address can be substituted for a storage server's serial number and hyphen when using either remote browser or Remote Desktop methods to access the HP Storage Server Management console. For example: 192.0.0.1 can be substituted for TWT08466-. NOTE: iLO 2 is not supported on the HP ProLiant DL100 G2 Storage Server. Using the direct attach method You can access the HP Storage Server Management console using a monitor, mouse, and keyboard directly attached to the storage server.
Figure 1 Internet options screen 2. On the Security screen, select Internet or Local intranet Web content zone, then click Custom Level. 3. Scroll down to locate the ActiveX Controls and plug-ins settings. 4. At Download signed ActiveX controls settings, select Enable to enable ActiveX or Prompt to launch a notice requiring approval before ActiveX is enabled. 5. Click OK to close the Security Settings dialog box. 6. If prompted Are you sure you want to change the security settings for this zone, click YES.
NOTE: You can change the administrator name and password when you configure the server using the “Rapid Startup Wizard” on page 28. 4. To complete network configuration using the Rapid Startup Wizard, see “Configuring the server on the network” on page 27. IMPORTANT: If you are using the remote browser method to access the HP Storage Server Management console and Rapid Startup Wizard, always close the remote session before closing your Internet browser.
2. Enter the serial number of the storage server followed by a hyphen (-) in the Computer box and click Connect. For example: D4059ABC3433-. NOTE: If you are able to determine the IP address from your DHCP server, you can substitute the IP address for the serial number and hyphen (-). For example: 192.100.0.1. 3. Log on to the HP ProLiant Storage Server with the default user name administrator and the password hpinvent.
• For the Telnet service to be started manually on every reboot, in the Startup Type drop-down box, click Manual, and then click OK. On the storage server, access the command line interface, either by Remote Desktop or a direct connection, and then enter the following command: net start tlntsvr Sessions information The sessions screen provides the ability to view or terminate active sessions.
7. Access the HP ProLiant Storage Server using the iLO 2 Remote Console functionality. Log on to the HP ProLiant Storage Server with the default user name administrator and the password hpinvent. The HP ProLiant Storage Server Management console starts automatically. NOTE: When the Remote Console feature is enabled, you can get access to the storage server's login screen. The Integrated Lights-Out 2 port comes with factory default settings, which the administrator can change.
Configuration Worksheet Trap destination No. 1 The IP address of a management computer that will receive SNMP messages from the storage server using the above community name. Community name No. 2 Same as above. Trap destination No. 2 Same as above. Network Interfaces (to be completed for non-DHCP configurations) Local area connection 1 A local area connection is automatically created for each network adapter that is detected. IP address An Internet Protocol (IP) address is assigned to the server.
Completing system configuration After the storage server is physically set up and the basic configuration is established, additional setup tasks must be completed. Depending on the deployment scenario of the storage server, these steps can vary. These additional steps can include: • Running Microsoft Windows Update—HP highly recommends that you run Microsoft Windows updates to identify, review, and install the latest, applicable, critical security updates on the storage server.
Installing and configuring the server
2 Storage management overview This chapter provides an overview of some of the components that make up the storage structure of the HP ProLiant Storage Server. Storage management elements Storage is divided into four major divisions: • • • • Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level's elements.
Physical Disks Single Server Cluster Implementation RAID Arrays Storage Elements Logical Drives Selective Storage Presentaion Visible Disks Logical Storage Elements Partitioning NTFS Volumes Q: File System Elements Shadow Copy Elements File Folders Shadow Copies (Snapshots) \Engineering \Marketing \Users \Sales \Engineering \Marketing from 02/10/03 09:30 \snapshot.0 R: from 02/10/03 09:30 \snapshot.0 from 02/10/03 11:30 \snapshot.1 R: from 02/10/03 11:30 \snapshot.
Arrays See Figure 4. With an array controller installed in the system, the capacity of several physical drives (P1–P3) can be logically combined into one or more logical units (L1) called arrays. When this is done, the read/write heads of all the constituent physical drives are active simultaneously, dramatically reducing the overall time required for data transfer. NOTE: Depending on the storage server model, array configuration may not be possible or necessary.
To protect against data loss from hard drive failure, storage servers should be configured with fault tolerance. HP recommends adhering to RAID 5 configurations. The table below summarizes the important features of the different kinds of RAID supported by the Smart Array controllers. The decision chart in the following table can help determine which option is best for different situations.
A1 A2 L3 L1 L4 L2 L5 gl0045 Figure 6 Two arrays (A1, A2) and five logical drives (L1 through L5) spread over five physical drives NOTE: This type of configuration may not apply to all storage servers and serves only as an example. Through the use of basic disks, primary partitions or extended partitions can be created. Partitions can only encompass one LUN. Through the use of dynamic disks, volumes can be created that span multiple LUNs.
NOTE: Dynamic disks cannot be used for clustering configurations because Microsoft Cluster only supports basic disks. File system elements File system elements are composed of the folders and subfolders that are created under each logical storage element (partitions, logical disks, and volumes). Folders are used to further subdivide the available file system, providing another level of granularity for management of the information space.
CAUTION: AppleTalk shares should not be created on clustered resources as this is not supported by Microsoft Clustering, and data loss may occur. Network names and IP address resources for the clustered file share resource can also be established for access across a network to a variety of clients. Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols.
Storage management overview
3 File server management This chapter begins by identifying file services in Windows Storage Server 2003 R2. The remainder of the chapter describes the many tasks and utilities that play a role in file server management. File services features in Windows Storage Server 2003 R2 Storage Manager for SANs The Storage Manager for SANs (also called Simple SAN) snap-in enables you to create and manage the LUNs that are used to allocate space on storage arrays.
• Schedule periodic storage reports that allow users to identify trends in disk usage and to monitor attempts to save unauthorized files, or generate the reports on demand. Windows SharePoint Services Windows SharePoint Services is an integrated set of collaboration and communication services designed to connect people, information, processes, and systems, both within and beyond the organization firewall.
Table 7 Tasks and utilities needed for storage server configuration Task Storage management utility Create disk arrays HP Array Configuration Utility or Storage Manager Create logical disks from the array space HP Array Configuration Utility or Storage Manager Verify newly created logical disks Windows Disk Management Create a volume on the new logical disk Windows Disk Management NOTE: The type of configuration may not apply to all supported storage components and serves only as an example provid
To open the ACU from the storage server desktop: NOTE: If this is the first time that the ACU is being run, you will be prompted to select the Execution Mode for ACU. Selecting Local Application Mode allows you to run the ACU from a Remote Desktop, remote console, or storage server web access mode. Remote service mode allows you to access the ACU from a remote browser. 1. Select Start > Programs > HP Management Tools > Array Configuration Utility. 2.
Guidelines for managing disks and volumes When managing disks and volumes: • The first two logical drives are configured for the storage server operating system and should not be altered in any manner. If the first two logical drives are altered, the system recovery process may not function properly when using the System Recovery DVD. Do not tamper with the “DON’T ERASE” or local C: volume. These are reserved volumes and must be maintained as they exist.
CAUTION: Allocation unit size cannot be altered without reformatting the drive. Data on a reformatted drive cannot be recovered. For more information about disk defragmentation, read the online help. Disk quotas Disk quotas track and control disk space use in volumes. NOTE: To limit the size of a folder or share, see “Directory quotas” on page 67 .
NOTE: This section addresses only single storage server node configurations. If your server has Windows Storage Server 2003 R2 Enterprise Edition, see the Cluster Administration chapter for expanding and extending storage in a cluster environment. Expanding storage Expansion is the process of adding physical disks to an array that has already been configured.
Expanding storage for EVA arrays using Command View EVA Presenting a virtual disk offers its storage to a host. To make a virtual disk available to a host, you must present it. You can present a virtual disk to a host during or after virtual disk creation. The virtual disk must be completely created before the host presentation can occur. If you choose host presentation during virtual disk creation, the management agent cannot complete any other task until that virtual disk is created and presented.
of snapshots is the ability to instantly recover data from shadow copies, reducing the number of times needed to restore data from tape.
NOTE: Regardless of the volume space that is allocated for shadow copies, there is a maximum of 64 shadow copies for any volume. When the 65th shadow copy is taken, the oldest shadow copy is purged. The minimum amount of storage space that can be specified is 350 megabytes (MB). The default storage size is 10 percent of the source volume (the volume being copied).
snapshot. Otherwise, the number of changes caused by the defragmentation process can cause shadow copies to be deleted faster than expected. Note, however, that NTFS compression is supported only if the cluster size is 4 KB or smaller. NOTE: To check the cluster size of a volume, use the fsutil fsinfo ntfsinfo command. To change the cluster size on a volume that contains data, back up the data on the volume, reformat it using the new cluster size, and then restore the data.
Figure 7 System administrator view of Shadow Copies for Shared Folders The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied (with a minimum of 350 MB), and store the shadow copies on the same volume as the original volume. (See Figure 8). The cache file is located in a hidden protected directory titled “System Volume Information” off of the root of each volume for which shadow copy is enabled.
F: G: H: L: cache file cache file cache file Figure 9 Shadow copies stored on a separate volume The main advantage to storing shadow copies on a separate volume is ease of management and performance. Shadow copies on a source volume must be continually monitored and can consume space designated for file sharing. Setting the limit too high takes up valuable storage space. Setting the limit too low can cause shadow copies to be purged too soon, or not created at all.
Viewing a list of shadow copies To view a list of shadow copies on a volume: 1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select Shadow Copies tab. All shadow copies are listed, sorted by the date and time they were created. NOTE: It is also possible to create new shadow copies or delete shadow copies from this page. Set schedules Shadow copy schedules control how frequently shadow copies of a volume are made.
1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select the Shadow Copies tab. 5. Select the volume that you want to redirect shadow copies from and ensure that shadow copies are disabled on that volume; if enabled, click Disable. 6. Click Settings. 7. In the Located on this volume field, select an available alternate volume from the list. NOTE: To change the default shadow copy schedule settings, click Schedule. 8. Click OK. 9.
Figure 10 Accessing shadow copies from My Computer Shadow Copies for Shared Folders Shadow copies are accessed over the network by supported clients and protocols. There are two sets of supported protocols, SMB and NFS. All other protocols are not supported; this would include HTTP, FTP, AppleTalk, and NetWare Shares. For SMB support, a client-side application denoted as Shadow Copies for Shared Folders is required.
Shadow Copies for Shared Folders preserves the permissions set in the access control list (ACL) of the original folders and files. Consequently, users can only access shadow copies for shares to which they have access. In other words, if a user does not have access to a share, he also does not have access to the share's shadow copies. The Shadow Copies for Shared Folders client pack installs a Previous Versions tab in the Properties window of files and folders on network shares.
The following example shows an NFS share named “NFSShare” with three shadow copies, taken on April 27, 28, and 29 of 2003 at 4 a.m. NFSShare .@GMT-2003.04.27-04:00:00 .@GMT-2003.04.28-04:00:00 .@GMT-2003.04.29-04:00:00 Access to NFS shadow copy pseudo-subdirectories is governed by normal access-control mechanisms using the permissions stored in the file system. Users can access only those shadow copies to which they have read access at the time the shadow copy is taken.
Figure 12 Recovering a deleted file or folder Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file: 1. Right-click the overwritten or corrupted file, and then click Properties. 2. Click Previous Versions. 3. To view the old version, click View. To copy the old version to another location, click Copy...
will not work to back up the previous versions of the file system. To answer this particular issue, shadow copies are available for back up in two situations. If the backup software in question supports the use of shadow copies and can communicate with underlying block device, it is supported, and the previous version of the file system will be listed in the backup application as a complete file system snapshot.
NOTE: Select servers can be deployed in a clustered or non-clustered configuration. This section discusses share setup for a non-clustered deployment. Folder management Volumes and folders on any system are used to organize data. Regardless of system size, systematic structuring and naming conventions of volumes and folders eases the administrative burden.
Figure 13 Properties dialog box, Security tab Several options are available on the Security tab: • To add users and groups to the permissions list, click Add. Follow the dialog box instructions. • To remove users and groups from the permissions list, highlight the desired user or group, and then click Remove. • The center section of the Security tab lists permission levels. When new users or groups are added to the permissions list, select the appropriate boxes to configure the common file-access levels. 3.
Figure 14 Advanced Security settings dialog box, Permissions tab Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure 14 and includes: • Add a new user or group—Click Add, and then follow the dialog box instructions. • Remove a user or group— Click Remove. • Replace permission entries on all child objects with entries shown here that apply to child objects—This allows all child folders and files to inherit the current folder permissions by default.
Figure 15 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab. Auditing allows you to set rules for the auditing of access, or attempted access, to files or folders. Users or groups can be added, deleted, viewed, or modified through the Advanced Security Settings Auditing tab.
Figure 16 Advanced Security Settings dialog box, Auditing tab 5. Click Add to display the Select User or Group dialog box. Figure 17 Select User or Group dialog box NOTE: Click Advanced to search for users or groups. 6. Select the user or group. 7. Click OK. The Auditing Entry dialog box is displayed.
Figure 18 Auditing Entry dialog box for folder name NTFS Test 8. Select the desired Successful and Failed audits for the user or group. 9. Click OK. NOTE: Auditing must be enabled to configure this information. Use the local Computer Policy Editor to configure the audit policy on the storage server. The Owner tab allows taking ownership of files. Typically, administrators use this area to take ownership of files when the file ACL is incomplete or corrupt.
Figure 19 Advanced Security Settings dialog box, Owner tab The current owner of the file or folder is listed at the top of the screen. To take ownership: 1. Click the appropriate user or group in the Change owner to list. 2. If it is also necessary to take ownership of subfolders and files, enable the Replace owner on subcontainers and objects box. 3. Click OK. Share management There are several ways to set up and manage shares.
creating too many shares also has its drawbacks. For example, if it is sufficient to create a single share for user home directories, create a “homes” share rather than creating separate shares for each user. By keeping the number of shares and other resources low, the performance of the storage server is optimized. For example, instead of sharing out each individual user's home directory as its own share, share out the top-level directory and let the users map personal drives to their own subdirectory.
• Modifying share properties • Publishing in DFS NOTE: These functions can operate in a cluster on select servers, but should only be used for non-cluster-aware shares. Use Cluster Administrator to manage shares for a cluster. The page will display cluster share resources. CAUTION: Before deleting a share, warn all users to exit that share and confirm that no one is using that share.
• Monitor attempts to save unauthorized files for all users or a selected group of users. • Generate storage reports instantly. Other Windows disk and data management tools When you install certain tools, such as Windows Support Tools or Windows Resource Kit Tools, information about these tools might appear in Help and Support Center. To see the tools that are available to you, look in the Help and Support Center under Support Tasks, click Tools, and then click Tools by Category.
• Microsoft Windows Storage Server 2003 http://www.microsoft.com/windowsserversystem/wss2003/default.mspx • Performance Tuning Guidelines for Windows Server 2003 http://www.microsoft.com/windowsserver2003/evaluation/performance/tuning.mspx • Windows SharePoint Services http://www.microsoft.com/windowsserver2003/technologies/sharepoint/default.
File server management
4 Print services Microsoft Print Management Console Print Management in the Microsoft Windows Server 2003 R2 operating system is a Microsoft Management Console (MMC) snap-on that system administrators can use to perform common print management tasks in a large enterprise. It provides a single interface that administrators can use to perform printer and print server management tasks efficiently with detailed control.
Print services management Print services information to plan, set up, manage, administer, and troubleshoot print servers and print devices are available online using the Help and Support Center feature. To access the Help and Support Center, select Start > Help and Support, then Printers and Faxes under Help Contents.
the clients. Additionally, the set of client operating systems determines which of these drivers need to be installed on the server during the print server role installation. 2. At the printer, print a configuration or test page that includes manufacturer, model, language, and installed options. This information is needed to choose the correct printer driver. The manufacturer and model are usually enough to uniquely identify the printer and its language.
Driver updates Print drivers The latest print drivers for many HP network printers are supplied on the Service Release DVD. If selected as part of the service release installation process, updated print drivers are copied to the print drivers folder C:\hpnas\PRINTERS on the storage server. Print drivers are also available for download on the HP Support web site for individual network printers. User-mode vs.
For more information about the Print Migrator utility, see http://www.microsoft.com/ WindowsServer2003/techinfo/overview/printmigrator3.1.mspx. Best practices The following is practical advice for managing print devices: • • • • • • • • • • Printers and print servers should be published in Active Directory. Locate printers in common areas, such as near conference rooms. Protect print servers using antivirus software. Ensure the print server is included in the backup configuration.
Print services
5 Microsoft Services for Network File System (MSNFS) This chapter discusses networking features in Microsoft Services for Network File System (MSNFS). MSNFS Features MSNFS is an update to the NFS components that were previously available in Services for UNIX 3.5.
1. Access Add/Remove Programs. 2. Select Add/Remove Windows Components > Active Directory Services > Details. 3. Install Identity Management for Windows. MSNFS use scenarios The following use scenarios are supported by MSNFS file services: • Allow UNIX clients to access resources on computers running Windows Server 2003 R2. Your company may have UNIX clients accessing resources, such as files, on UNIX file servers.
Administering MSNFS To access Microsoft Services for Network File System from the Start menu: 1. Select Start > Programs > Administrative Tools. 2. Click Microsoft Services for Network File System. To access Microsoft Services for Network File System from the HP Storage Server Management console: 1. Access the HP Storage Server Management console by clicking on the shortcut icon on the desktop. 2. In the left pane of the console, select the Share Folder Management listing. 3.
Therefore, the administrator needs to install the Server for NFS Authentication DLL on Windows 2000 domain controllers when: • The NFS file serving environment uses previous NFS releases (NAS, SFU, and so on). • The Windows domain environment uses pre-2003 domain controllers. See Table 8 for guidance as to when to use NFS Authentication DLL instead of S4U legacy NFS and R2 MSNFS.
6. Click Custom Installation, and then click Next. 7. In the Components pane, click the down arrow next to Windows Services for UNIX, and then click Entire component will not be available. 8. Click the plus sign (+) next to Authentication Tools. 9. In the Components pane, click the plus sign (+) next to Authentication Tools. 10. Click Server for NFS Authentication, click Will be installed on local hard drive, and then click Next. 11. Follow the remaining instructions in the Wizard.
the Windows user and group names to grant file access. If the UNIX UID and GID information is not mapped, then Server for NFS will deny file access. There are two ways to specify how Server for NFS on the storage server obtains Windows user and group information: • Using the Windows interface • Using a command line (nfsadmin.
When allowing anonymous access to an NFS Share, the following must be performed by a user with administrative privileges due to Windows Storage Server 2003 security with anonymous users and the Everyone group. 1. Click Remote Desktop. Log on to the storage server. 2. Click Start >Control Panel > Administrative Tools, and then click Local Security Policy. 3. In Security Settings, double-click Local Policies, and then click Security Options. 4.
You can use simple maps, which map Windows and UNIX accounts with identical names. You can also create advanced maps to associate Windows and UNIX accounts with different names, which you can use in conjunction with simple maps. User Name Mapping can obtain UNIX user, password, and group information from one or more Network Information Service (NIS) servers or from password and group files located on a local hard drive. The password and group files can be copied from a UNIX host or from a NIS server.
Microsoft Services for NFS troubleshooting The following information on how to troubleshoot issues with Microsoft Services for NFS is available using the online help: • General issues • Troubleshooting Server for NFS • Troubleshooting User Name Mapping For further details, see the online help for Microsoft Services for Network File System. Microsoft Services for NFS command-line tools Table 9 provides a listing of Windows command-line administration tools.
3. Click Add/Remove Windows Components. 4. In the Components list, click Other Network File and Print Services (but do not select or clear the check box), and then click Details. 5. In the Subcomponents of Other Network File and Print Services list, select Print Services for UNIX, if appropriate to the print services that you want to install: Print Services for UNIX: This option permits UNIX clients to print to any printer that is available to the print server.
6 Other network file and print services This chapter discusses file and print services for NetWare and Macintosh. File and Print Services for NetWare (FPNW) File and Print Services for NetWare (FPNW) is one part of the Microsoft software package called Services for NetWare. The most common use of the NetWare network operating system is as a file and print server.
5. Select the NETSFNTSRV file, and then click OK. File and Print Services for NetWare should now be displayed as an option to install. 6. Select File and Print Services for NetWare, and then click OK. Managing File and Print Services for NetWare FPNW resources are managed through Server Manager. Server Manager can be used to modify FPNW properties and manager shared volumes.
Figure 21 File and Print Services for NetWare dialog box 3. Enter an FPNW Server Name and Description. This server name must be different from the server name used by Windows or LAN Manager-based clients. If changing an existing name, the new name is not effective until stopping and restarting FPNW. For example, in Figure 21 the Windows server name is Alamo and the FPNW server name is Alamo_FPNW. 4. Indicate a Home directory root path. This path is relative to where the Sysvol volume is installed.
2. Right-click the Users folder, and then click New User. Figure 22 New User dialog box 3. Enter the user information, including the user's User name, Full name, Description, and Password. 4. Click Create. 5. Repeat these steps until all NetWare users have been entered. Enabling local NetWare user accounts 1. In the Users folder (MC, Core Operating System, Local Users and Groups), right-click an NCP client listed in the right pane of the screen, and then click Properties. 2.
Figure 23 NetWare Services tab 3. Select Maintain NetWare compatible login. 4. Set other NetWare options for the user, and then click OK. NOTE: The installation of File and Print Services for NetWare also creates a supervisor account, which is used to manage FPNW. The supervisor account is required if the storage server was added as a bindery object into NDS. Managing NCP volumes (shares) NCP file shares are created the same way as other file shares; however, there are some unique settings.
1. From the storage server desktop, select Start > Settings > Control Panel > Administrative Tools > Server Manager. 2. Select File and Print Service for NetWare> Shared Volumes. 3. Click Create Volume. 4. Specify the volume name and path. 5. Click Permissions to set permissions. 6. Click Add to add additional users and groups, and to set their permissions. 7. Highlight the desired user or group, and then click Add. 8. Select the Type of Access in the drop down list.
AppleTalk and file services for Macintosh The AppleTalk network integration allows the storage server to share files and printers between your server and any Apple Macintosh clients that are connected to your network. After installing Microsoft Windows Services for Macintosh, the administrator can use the AppleTalk protocol to configure the storage server to act as an AppleTalk server. The AppleTalk protocol is the communications protocol used by clients running a Macintosh operating system.
Print services for Macintosh Macintosh clients can send print jobs to a print server when Print Server for Macintosh is installed on the server. To the Macintosh-based client, the print server or FPA appears to be an AppleTalk printer on the network, and no reconfiguration of the client is necessary.
7 Enterprise storage servers Some HP ProLiant Storage Servers use the Microsoft® Windows® Unified Data Storage Server 2003 operating system. This operating system provides unified storage server management capabilities, simplified setup and management of storage and shared folders, and support for Microsoft iSCSI Software Target.
NOTE: Administrative credentials are not required to establish a browser-based connection, but are required to manage the storage server. NOTE: If Java Runtime Environment (JRE) is not installed correctly, the Additional plug-ins are required to display all the media on this page message may be displayed. For information about installing JRE on a non-Microsoft system, see Installation Instructions (http://go.microsoft.com/fwlink/?LinkId=70026).
3. Click the iSCSI Targets node. On the details view (right pane), right-click and select Create iSCSI Target. 4. Click Next on the Welcome page of the wizard. 5. On the iSCSI Target Identification page, type a name and description for the iSCSI Target and then click Next. 6. On the iSCSI Initiators Identifiers page, type the iSCSI Qualified Name (IQN) of the iSCSI initiator requesting access to the iSCSI Target in the IQN identifier field.
Figure 25 Advanced Identifiers page Figure 26 Add/Edit Identifier page 8. Click Next. 9. Click Finish to complete the wizard and create the iSCSI Target. Create Virtual Disk Wizard This section describes how to create an iSCSI Virtual Disk using the Create Virtual Disk Wizard. NOTE: In order to create iSCSI Virtual Disks, it is required that physical disks are formatted as NTFS. 1. In the Microsoft iSCSI Software Target MMC snap-in, click the Devices node. 2.
6. 7. 8. 9. Enter a description for the iSCSI virtual disk (optional) and click Next. On the Access page, click Add to assign the iSCSI virtual disk to an iSCSI Target. On the Add Targets dialog box, select a Target and click OK. Click Finish to complete the wizard and create the iSCSI virtual disk. NOTE: If you delete a virtual disk, it is removed from the iSCSI Software Target MMC snap-in, but the virtual disk file (.vhd) is not removed from the physical disk.
Hardware providers To support advanced management of iSCSI virtual disks and snapshots, you can use the following hardware providers, which come preinstalled on the HP ProLiant Storage Server: • Microsoft iSCSI Software Target Virtual Disk Service Hardware Provider Microsoft Windows Server 2003 introduced Virtual Disk Service (VDS), a set of application programming interfaces (APIs) that provides a single interface for managing disks.
8 Cluster administration NOTE: Not all HP ProLiant Storage Servers can be clustered. See the HP ProLiant Storage Server QuickSpecs to determine if your storage server can be clustered. Windows Storage Server 2003 Release 2 clusters can include up to eight nodes. One important feature of the HP ProLiant Storage Server clusterable models is that they can operate as a single node or as a cluster. This chapter discusses cluster installation and cluster management issues.
Cluster Node A Cluster Node B Private Network Node A HBA 2 Node A HBA 1 + + + + + + + + +++++++++++++++++++++++++++++++++++++++++++++++++++ + + + Node B + Node B HBA 1 HBA 2 SAN Switch SAN Switch Storage Area Network Cluster Quorum Mirrorset LUN 1 Data RAID set Node A LUN 2 Data RAID set Node B LUN 3 Figure 27 Storage server cluster diagram Cluster terms and components Nodes The most basic parts of a cluster are the servers, referred to as nodes.
• iSCSI resources Cluster groups Cluster resources are placed together in cluster groups. Groups are the basic unit of failover between nodes. Resources do not fail over individually; they fail over with the group in which they are contained. Virtual servers A virtual server is a cluster group that consists of a static IP Address resource and a Network Name resource. Several virtual servers can be created.
Node 1 Node 2 Cluster Group FS1Eng Cluster Group FS1Market Cluster Resource: IP Address 172.18.1.99 Cluster Resource: Disk E Cluster Resource: Disk F 5 Cluster Resource: Network Name Fileserver1 Cluster Resource: File Share Eng1 E:\eng1 Cluster Resource: File Share Mar1 F:\Mar1 Cluster Resource: Disk G Cluster Resource: File Share Mar4 G:\Mar4 Cluster Resource: IP Address 172.18.1.
• Physical Disk resources are placed in a cluster group and relate to the basic disk. When a Physical Disk resource is created through Cluster Administrator, the resource should be inserted into an existing cluster group or a corresponding group should be created for the resource to reside in. • File share resources are placed in a group and relate to the actual directory on the drive on which the share is being created.
NOTE: The LUN underlying the basic disk should be presented to only one node of the cluster using selective storage presentation or SAN zoning, or having only one node online at all times until the physical resource for the basic disk is established. In preparing for the cluster installation: • All software components listed in the HP ProLiant Storage Server SAN Connection and Management white paper (located on the HP web site at http://h20000.www2.hp.com/bc/ docs/support/SupportManual/c00663737/c00663737.
a client cannot use the virtual name or virtual IP address to access the share since the protocol cannot failover with the cluster group. The client must wait until the initial node is brought back online to access the share. HP recommends placing cluster aware and non cluster aware protocols on different file shares.
Using multipath data paths for high availability HP recommends that cluster configurations be deployed with dual data paths for high availability. Clusters can be configured with single path, but if a failure in the path occurs, all of the node resources will be failed to the non-affected node. Pathing software is required in configurations where multipathing to the storage is desired or required. Multipathing software allows for datapath failure to occur without forcing a node failover.
• • • • • • Microsoft Services for NFS Administration RPC External Data Representation RPC Port Mapper Server for NFS Server for NFS Authentication User Name Mapping Checklists for cluster server installation These checklists assist in preparing for installation. Step-by-step instructions begin after the checklists.
Table 11 Power sequencing for cluster installation Step Node 1 Additional Nodes Storage Comments Setting up networks On On Not Presented Verify that all storage devices on the shared bus are not presented; Power on all nodes. Setting up shared disks (including the Qurom disk) On Off Presented Shut down all nodes. Present the shared storage, then power on the first node. Verifying disk configuration Off On Presented Shut down first node, power on next node.
Verifying connectivity and name resolution To verify name resolution, ping each node from a client using the node's machine name instead of its IP address. Verifying domain membership All nodes in the cluster must be members of the same domain and able to access a domain controller and a DNS Server. Setting up a cluster account The Cluster service requires a domain user account under which the Cluster service can run.
Using Cluster Administrator Cluster Administrator shows information about the groups and resources on all of your clusters and specific information about the clusters themselves. A copy of Cluster Administrator is automatically installed on a cluster node when the Cluster service is installed. Using Cluster Administrator remotely For remote administration, copies of Cluster Administrator can be installed on other computers on your network.
• All nodes must be on the same subnet. Cluster groups and resources, including file shares The Cluster Administrator tool provides complete online help for all cluster administration activities. Cluster resources include administrative types of resources as well as file shares. The following paragraphs include overview and planning issues for cluster groups, cluster resources, and clustered file shares. Creating and managing these resources and groups must be managed through Cluster Administrator.
as circumstances require. If the cluster node owning the group of file shares should be shut down or fail, the other node in the cluster will begin sharing the directories until the original owner node is brought back on line. At that time, ownership of the group and its resources can be brought back to the original owner node. Resource planning 1. Create a cluster group for each node in the cluster with an IP address resource and a network name resource.
If NFS administration tasks are performed on a computer that belongs to a domain that is not trusted by the domain of the cluster, the changes are not properly replicated among the nodes in the cluster. • In a clustered deployment, if PCNFS password and group files are being used to provide user and group information, these files must be located on each node of the system. Example: If the password and group files are located at c:\maps on node 1, then they must also be at c:\maps on node 2.
NOTE: • A file share resource must reside in the same cluster group as the physical disk resource it will reside on. • The physical disk resource specified in this step must reside in the same cluster group as specified in the beginning of this wizard. Creating NFS share resources To create an NFS share resource, see “MSNFS administration on a server cluster” on page 116. Shadow copies in a cluster It is recommended that the location of the cache file be placed on a separate disk from the original data.
• • • • • • • • • • • • Ensure share availability when a node fails. Use the appropriate tool to manage Network File System (NFS) share cluster resources. Avoid conflicting share names. Ensure the availability of audit logs. Move file shares or take them offline before stopping Server for NFS. Take resources offline before modifying. Administer Server for NFS only from computers in a trusted domain. Restart the Server for NFS service after the cluster service restarts. Choose the appropriate sharing mode.
k. l. Click Yes to print a test page, click Next, and then click Finish. A dialog box appears regarding the test page. Select the appropriate answer. The Printer Spool is now a clustered resource. Advanced cluster administration procedures Failing over and failing back As previously mentioned, when a node goes offline, all resources dependent on that node are automatically failed over to another node.
failover process completes. The other node(s) are placed under a heavier load by the extra work until the second node is powered up and rejoins the cluster. Powering down the cluster The power down process for the storage server cluster is similar to the process for a single node, but with the cluster, extra care must be taken with the storage subsystem and the sequence of the shutdown. The power down process is divided into two main steps: 1. Shutting down the cluster nodes 2.
• How to: Troubleshoot printing issues on a Windows Server 2003 Cluster http://support.microsoft.com/default.aspx?scid=kb;en-us;302539 • Creating and configuring a highly available print server under Microsoft Windows Server 2003 using a server cluster http://www.microsoft.com/WindowsServer2003/techinfo/overview/availableprinter.
9 Troubleshooting, servicing, and maintenance Troubleshooting the storage server The “Support and troubleshooting” task at the HP Support & Drivers web site (http://www.hp.com/go/ support) can be used to troubleshoot problems with the storage server.
Maintenance and service documentation For specific documentation for the maintenance and servicing of HP ProLiant Storage Servers, see the HP ProLiant Server Maintenance and Service Guide for your storage server model. This document can be obtained at http://www.hp.com/support/manuals. Under the servers section, select ProLiant and tc series servers, and then select your product.
10 System recovery This chapter describes how to use the System Recovery DVD that is provided with your storage server. The System Recovery DVD The HP ProLiant Storage Server System Recovery DVD that is provided with your storage server allows you to install an image or recover from a catastrophic failure. At any later time, you may boot from the DVD and restore the server to the factory condition. This allows you to recover the system if all other means to boot the server fail.
System recovery
A Server components This appendix provides illustrations of the storage server hardware components. ML310 G4 hardware components The following figures show components, controls, and indicators located on the front and rear panels of the ML310 G4 storage server.
12 1 11 2 10 3 4 9 5 8 6 7 HP ProLiant ML310 5081 Figure 29 ML310 G4 front panel Table 12 ML310 G4 front panel components Item Description Status 1 DVD-RW drive ejector button N/A 2 Media bays (bezel blanks) N/A 3 Power On/Standby button N/A 4 System power LED Amber = System has AC power and is in standby mode Green = System has AC power and is functioning Off = System has no AC power 5 Hard drive activity LED Green = Hard drives are properly connected and functioning Off = No har
1 2 8 3 4 9 5 6 11 7 10 5082 Figure 30 ML310 G4 rear panel Table 13 ML310 G4 rear panel components Item Description 1 Power supply connector 2 Mouse connector 3 Keyboard connector 4 Serial connector 5 Video connector 6 USB connectors (2) 7 RJ-45 Ethernet connector 8 NIC activity LED (Flashing = Activity, Off = No activity) 9 NIC link LED (On = Link, Off = No link) 10 RJ-45 connector (iLO 2) 11 Parallel connector NOTE: Connecting the power cord illuminates the LEDs on the fron
DL320s hardware components The following figures show components, controls, and indicators located on the front and rear panels of the DL320s storage server.
1 2 3 4 5 6 7 Figure 31 DL320s front panel Table 14 DL320s front panel components Item Description Status 1 UID button/LED Blue = Identification is activated. Flashing blue = System is being remotely managed. Off = Identification is deactivated. Internal health LED Green = System health is normal. Amber = System is degraded. To identify the component in a degraded state, see the system board LEDs. Red = System critical. To identify the component in a critical state, see system board LEDs.
Table 15 DL320s SAS and SATA hard drive LED combinations Status Online/activity LED (green) Fault/UID LED (amber/blue) On, off, or flashing Alternating amber and blue The drive has failed, or a predictive failure alert has been received for this drive; it also has been selected by a management application. On, off, or flashing Steadily blue The drive is operating normally, and it has been selected by a management application.
1 2 3 4 5 6 7 8 9 10 11 12 13 1 Figure 32 DL320s rear panel Table 16 DL320s rear panel components Item Description 1 Power supply 2 USB connectors (2) 3 PCI Express x4 expansion slot 2 (full-length) 4 Serial connector 5 Mouse connector 6 Keyboard connector 7 Video connector 8 10/100/1000 NIC 2 connector 9 PCI Express expansion slot 1 (low-profile, half-length) 10 10/100/1000 NIC 1 connector 11 iLO 2 connector 12 UID button/LED 13 DVD-RW drive DL380 G5 hardware compo
1 2 3 4 5 6 8 7 10 11 12 13 14 15 9 15681 Figure 33 DL380 G5 front panel Table 17 DL380 G5 front panel components Item Description Status 1 Quick release lever N/A 2 DVD-RW drive N/A 3 Video connector N/A 4 USB connectors (2) N/A 5 Systems Insight Display LEDs off = Normal LEDs amber = Failure (See below for online spare and mirror LED status) Online spare LED Off = No protection Green = Protection enabled Amber = Memory failure occurred Flashing amber = Memory configuration e
Item Description Status NIC 1 link/activity LED Green = Network link Flashing = Network link and activity Off = No link to network. If power is off, view the rear panel RJ-45 LEDs for status. 14 NIC 2 link/activity LED Green = Network link Flashing = Network link and activity Off = No link to network. If power is off, view the rear panel RJ-45 LEDs for status.
Item Description Status / Definition 11 Video connector (Blue) N/A 12 USB connectors (2) (Black) N/A 13 Serial connector N/A 14 Mouse connector (Green) N/A 15 Keyboard connector (Purple) N/A Expansion slot 1 (32–bit models) x4, bus 6 (populated with HP Smart Array P400 RAID controller) Expansion slot 1 (64–bit models) x4, bus 6 Expansion slot 2 (32–bit models) x4, bus 11 Expansion slot 2 (64–bit models) x4, bus 11 Expansion slot 3 (32–bit models) x8, bus 23 Expansion slot 3 (64–b
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Figure 35 DL585 G2 front panel Table 19 DL585 G2 front panel components Item Description Status 1 Hard drive bay 1 N/A 2 Hard drive bay 2 N/A 3 Hard drive bay 3 N/A 4 Hard drive bay 4 N/A 5 Hard drive bay 5 N/A 6 Hard drive bay 6 N/A 7 Hard drive bay 7 N/A 8 Hard drive bay 8 N/A 9 Video connector N/A 10 USB connectors (two) N/A 11 Media drive blank or optional media drive N/A 12 DVD drive N/A 13 UID switch
Item Description Status 16 NIC 1 link/ activity LED Green = Linked to network Flashing green = Linked with activity on the network Off = No network connection 17 NIC 2 link/ activity LED Green = Linked to network Flashing green = Linked with activity on the network Off = No network connection 18 Power on/Standby button and LED Amber = System has AC power and is in standby mode Green = System has AC power and is turned on Off = System has no AC power 19 Processor memory module N/A 1 14 2 3
Item Description Status 10 Mouse connector N/A 11 Keyboard connector N/A 12 Video connector N/A 13 Rear UID button and LED Blue = Activated Flashing blue = Server remotely managed Off = Deactivated 14 Fail LED (amber) 15 Power LED (green) 16 Activity LED Green or flashing green = network activity Off = No network activity 17 Link LED Green = Linked to network Off = Not linked to network Both off = No AC power to any power supply Fail LED flashing amber, Power LED off = Power supply
Server components
B Configuring storage server for Web access (optional) Setting up an Internet connection Before running Windows 2003 R2 operating system updates, you must set up an Internet connection for the storage server. There are two methods for configuring an Internet connection: • Internet Explorer to use automatic configuration • Internet Explorer to use a proxy server To configure Internet Explorer to use automatic configuration 1.
5. Click the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network. 6. Click OK to close the LAN Settings dialog box. 7. Click OK again to close the Internet Options dialog box.
C Regulatory compliance and safety Federal Communications Commission notice Part 15 of the Federal Communications Commission (FCC) Rules and Regulations has established Radio Frequency (RF) emission limits to provide an interference-free radio frequency spectrum. Many electronic devices, including computers, generate RF energy incidental to their intended function and are, therefore, covered by these rules.
For questions regarding your product, contact: Hewlett-Packard Company P. O. Box 692000, Mail Stop 530113 Houston, Texas 77269-2000 Or, call 1-800- 652-6672 For questions regarding this FCC declaration, contact: Hewlett-Packard Company P. O. Box 692000, Mail Stop 510101 Houston, Texas 77269-2000 Or, call (281) 514-3333 To identify this product, see the Part, Series, or Model number found on the product.
International notices and statements Canadian notice (Avis Canadien) Class A equipment This Class A digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numérique de la classe A respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.
Japanese notice Korean notice A&B Class A equipment Class B equipment Safety Battery replacement notice WARNING! The computer contains an internal lithium manganese dioxide, a vanadium pentoxide, or an alkaline battery pack. A risk of fire and burns exists if the battery pack is not properly handled. To reduce the risk of personal injury: • Do not attempt to recharge the battery. • Do not expose the battery to temperatures higher than 60˚C (140˚F).
For more information about battery replacement or proper disposal, contact an authorized reseller or an authorized service provider. Taiwan battery recycling notice The Taiwan EPA requires dry battery manufacturing or importing firms in accordance with Article 15 of the Waste Disposal Act to indicate the recovery marks on the batteries used in sales, giveaway or promotion. Contact a qualified Taiwanese recycler for proper battery disposal.
• Use heel straps, toe straps, or boot straps at standing workstations. Wear the straps on both feet when standing on conductive floors or dissipating floor mats. • Use conductive field service tools. • Use a portable field service kit with a folding static-dissipating work mat. If you do not have any of the suggested equipment for proper grounding, have an authorized reseller install the part.
de winkel waar u het product hebt gekocht voor meer informatie over inzamelingspunten waar u oude apparatuur kunt aanbieden voor recycling. English notice Disposal of waste equipment by users in private household in the European Union This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste.
locales de votre région, les services de collecte des ordures ménagères ou le magasin dans lequel vous avez acheté ce produit. German notice Entsorgung von Altgeräten aus privaten Haushalten in der EU Das Symbol auf dem Produkt oder seiner Verpackung weist darauf hin, dass das Produkt nicht über den normalen Hausmüll entsorgt werden darf. Benutzer sind verpflichtet, die Altgeräte an einer Rücknahmestelle für Elektro- und Elektronik-Altgeräte abzugeben.
elettriche ed elettroniche. La raccolta differenziata e il corretto riciclo delle apparecchiature da smaltire permette di proteggere la salute degli individui e l'ecosistema. Per ulteriori informazioni relative ai punti di raccolta delle apparecchiature, contattare l'ente locale per lo smaltimento dei rifiuti, oppure il negozio presso il quale è stato acquistato il prodotto.
elétrico), encaminhando-o para um ponto de coleta para reciclagem. A coleta e a reciclagem seletivas desse tipo de lixo ajudarão a conservar as reservas naturais; sendo assim, a reciclagem será feita de uma forma segura, protegendo o ambiente e a saúde das pessoas. Para obter mais informações sobre locais que reciclam esse tipo de material, entre em contato com o escritório da HP em sua cidade, com o serviço de coleta de lixo ou com a loja em que o produto foi adquirido.
produkter. Separat insamling och återvinning av avfallet hjälper till att spara på våra naturresurser och gör att avfallet återvinns på ett sätt som skyddar människors hälsa och miljön. Kontakta ditt lokala kommunkontor, din närmsta återvinningsstation för hushållsavfall eller affären där du köpte produkten för att få mer information om var du kan lämna ditt avfall för återvinning.
Regulatory compliance and safety
Index A access rights, managing, 114 accessing HP Storage Server Management console, 21 ACL, defining, 66 Active Directory Lookup, 77 ActiveX enabling, 22 AppleTalk, 37 Array Configuration Utility, 41 array controller, purpose, 33 arrays, defined, 33 audience, 13 B backup, printer, 74 backup, with shadow copies, 58 basic disks, 35, 35, 36 battery replacement notice, 144 boot sequence, 21 C cables, 142 cache file, shadow copies, 50 CIFS, share support, 66 Class A equipment, 141 Class B equipment, 141 c
document conventions, 13 related documentation, 13 documentation HP website, 13 providing feedback, 15 domain membership, verifying, 111 dual data paths, 107 dynamic disks clustering, 36 spanning multiple LUNs, 35 E electrostatic discharge, 145 European Union notice, 143 expanding storage Array Configuration Utility, 46 Command View EVA, 46 extending volumes Disk Management, 45 F factory image, 20 failover automatic, 118 defined, 103 resources, 103 fault tolerance, 33 FCC notice, 141 File and Print Serv
Microsoft Services for NFS uninstalling and reinstalling, 108 mount points creating, 35 not supported with NFS, 35 mounted drives and shadow copies, 49 N NCP, creating new share, 91, 92 NetWare adding local users, 89 enabling user accounts, 90 installing services for, 87 supervisor account, 91 network name resource, 105 network planning, 106 network requirements, cluster, 109 NFS share resource, 116 node, server, 102 O online spares, 34 P partitions extended, 35 primary, 35 permissions file level, 59
shadow copies, 36 backups, 58 cache file, 50 defragmentation, 48 described, 46 disabling, 53 file or folder recovery, 56 in a cluster, 116 managing, 49 mounted drives, 49 on NFS shares, 55 on SMB shares, 54 planning, 47 redirecting, 52 scheduling, 52 uses, 46 viewing list, 52 Shadow Copies for Shared Folders, 54 share management, 65 shared disks, configuring, 111 shares administrative, 66 creating new NCP, 91, 92 managing, 65 NCP, 91 standard, 66 Single Instance Storage, 39 startup collecting information, 2