HP ProLiant ML310 Storage Server user guide This guide provides installation, configuration, and administration information for the HP ProLiant ML310 Storage Server with Microsoft® Windows® Storage Server 2003 R2.
Legal and notice information © Copyright 2006 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. The information contained herein is subject to change without notice.
Contents About this guide . . . . . . . . . . . . . . . . . . . . . . . . . Intended audience . . . . . . . . . . Getting help . . . . . . . . . . . . Related documentation . . . . . . . . Conventions . . . . . . . . . . . . Document conventions and symbols Text symbols . . . . . . . . . . HP technical support . . . . . . . . . HP subscriber's choice . . . . . . HP-authorized reseller . . . . . . Other helpful web sites . . . . . . HP hardware support services . . . . . . . . . . . . . . . . . . . . . .
File sharing elements . . . . Volume Shadow Copy Service Using storage elements . . . Clustered server elements . . Network adapter teaming . . . . 3 File server management . . . . overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Defining Access Control Lists . . . . . . . . . . . . Integrating local file system security into Windows domain Comparing administrative (hidden) and standard shares . Managing shares . . . . . . . . . . . . . . . . . File Server Resource Manager . . . . . . . . . . . . . . . . Quota management . . . . . . . . . . . . . . . . . . File screening management . . . . . . . . . . . . . . . Storage reports . . . . . . . . . . . . . . . . . . . . Other Windows disk and data management tools . . . . . . .
Managing File and Print Services for NetWare . . . . . Creating and managing NetWare users . . . . . . . . Adding local NetWare users . . . . . . . . . . Enabling local NetWare user accounts . . . . . . Managing NCP volumes (shares) . . . . . . . . . . Creating a new NCP share . . . . . . . . . . . Modifying NCP share properties . . . . . . . . . Print Services for NetWare . . . . . . . . . . . . . Point and Print from Novell to Windows Server 2003 Additional resources . . . . . . . . . . . . . .
Class B equipment . . . . . . . . . . . . . . Safety . . . . . . . . . . . . . . . . . . . . . . . Battery replacement notice . . . . . . . . . . . . Taiwan battery recycling notice . . . . . . . . . . Power cords . . . . . . . . . . . . . . . . . . . Japanese power cord notice . . . . . . . . . . . . Electrostatic discharge . . . . . . . . . . . . . . Preventing electrostatic discharge . . . . . . . Grounding methods . . . . . . . . . . . . .
Figures 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 8 ..ML310 hardware RAID . . . . . . . . . . . . . . . . . . ..Internet options screen . . . . . . . . . . . . . . . . . . . ..HP Storage Server Management console . . . . . . . . . . . ..Storage management process example . . . . . . . . . . . ..Configuring arrays from physical drives . . . . . . . . . . . ..RAID 0 (data striping) (S1-S4) of data blocks (B1-B12) . . . . . ..
Tables 1 2 3 4 5 6 7 8 9 10 ..Document conventions . . . . . . . . . . . . . . . . ..Network access methods . . . . . . . . . . . . . . ..Installation and Configuration checklist . . . . . . . . ..Server configuration worksheet . . . . . . . . . . . . ..Summary of RAID methods . . . . . . . . . . . . . . ..Tasks and utilities needed for storage server configuration ..Authentication table . . . . . . . . . . . . . . . . . ..MSNFS command-line administration tools . . . . . . . ..Front panel components . . .
About this guide This guide provides information for setting up, configuring, and administering the HP ProLiant ML310 Storage Server. This guide is available on the HP web site and is also provided as a PDF document on the HP ProLiant Storage Server documentation CD.
Document conventions and symbols Table 1 Document conventions Convention Element Blue text Cross-reference links and e-mail addresses Medium blue, underlined text (http://www.hp.
Collect the following information before calling: • • • • • • Technical support registration number (if applicable) Product serial numbers Product model names and numbers Applicable error messages Operating system type and revision level Detailed, specific questions For continuous quality improvement, calls may be recorded or monitored. HP subscriber's choice HP strongly recommends that customers sign up online using the Subscriber's choice web site: http://www.hp.com/go/e-updates.
About this guide
1 Installing and configuring the server Setup overview Your HP ProLiant storage server comes pre-installed with the Windows® Storage Server™ 2003 R2 operating system. Windows Storage Server 2003 R2 extends the Windows Storage Server 2003 operating system, providing a more efficient way to manage and control access to local and remote resources.
Planning a network configuration You use the Rapid Startup Wizard to configure your storage server. This wizard is displayed automatically when you first start your system.
The HP ProLiant storage server's serial number is located in three places: • Top of the storage server • Back of the storage server • Inside the storage server shipping box Checking kit contents Remove the contents, making sure you have all the components listed below. If components are missing, contact HP technical support.
Logical Disk 1 Operating System Volume RAID 5 Logical Disk 2 DON’T ERASE Volume RAID 5 Logical Disk 3 Data Volume RAID 5 Physical Drive 0 Physical Drive 1 Physical Drive 2 Physical Drive 3 5083 Figure 1 ML310 hardware RAID NOTE: In the HP Array Configuration Utility (ACU), logical drives are labeled 1 and 2. In Microsoft Disk Manager, logical drives are displayed as 0 and 1. For HP Smart Array configuration information, see http://h18004.www1.hp.com/products/servers/proliantstorage/arraycontrollers/.
Direct attach To connect directly to the storage server without using the network. Remote browser To establish a browser-based connection to the HP ProLiant Storage Server Management console from a remote client running Internet Explorer 5.5 (or later). Remote desktop To establish a connection from a remote client without using a browser. This method requires the client to have Windows remote desktop capability.
To connect the server to a network using the remote browser method, you must first ensure that the client is configured to download signed ActiveX controls. To enable ActiveX controls 1. On the remote client machine, open the Internet Explorer web browser and select Tools > Internet Options > Security. Figure 2 Internet options screen 2. On the Security screen, select Internet or Local intranet web content zone, then click Custom Level. 3. Scroll down to locate the ActiveX Controls and plug-ins settings.
NOTE: If you are able to determine the IP address from your DHCP server, you can substitute the IP address for the serial number and hyphen (-). For example: 192.100.0.1:3202. 2. Click OK on the Security Alert prompt. 3. Log in to the HP ProLiant Storage Server Management console with the default user name administrator and the password hpinvent. NOTE: You can change the administrator name and password when you configure the server using the "Rapid Startup Wizard" on page 26. 4.
Figure 3 HP Storage Server Management console Using the Remote desktop method Remote Desktop provides the ability for you to log onto and remotely administer your server, giving you a method of managing it from any client. Installed for remote administration, Remote Desktop allows only two concurrent sessions. Leaving a session running takes up one license and can affect other users. If two sessions are running, additional users will be denied access.
Logging off and disconnecting Remote Desktop provides two options when closing a client: you can either disconnect or log off the system. Disconnecting leaves the session running on the server. You can reconnect to the server and resume the session. If you are performing a task on the server, you can start the task and disconnect from the session. Later, you can log back on the server, re-enter the session, and either resume the task or check results.
The Integrated Lights-Out port on the storage server can be configured through the Rapid Startup Wizard or through the iLO 2 ROM-Based Setup Utility (RBSU). SNMP is enabled and the Insight Management Agents are preinstalled. The HP iLO 2 management processor provides multiple ways to configure, update, operate, and manage servers remotely. The HP ProLiant Storage Server comes preconfigured with iLO 2 default factory settings, including a default user account and password.
Configuring the server on the network Before you begin When first powering on the storage server you need to have some configuration data readily available to complete the Rapid Startup Wizard. Complete the Server configuration worksheet and use the data collected to initialize the storage server. NOTE: Ensure you are logged into the HP ProLiant Storage Server as a local or domain administrator.
Configuration Worksheet Local area connection 2 Any additional local area connections can be renamed to prevent confusion. IP address Same as above. Subnet mask Same as above. Default gateway Same as above. iLO 2 settings Change the host name, IP settings, and administrator settings. DNS server A Domain Name System (DNS) server name is required to provide for domain name to IP address resolution.
• • • • groups, which are stored and managed on the storage server. For information on managing users and groups on a domain, refer to the domain documentation available on the Microsoft web site. Using Ethernet NIC teaming (optional) — Select models are equipped with an HP or Broadcom NIC Teaming utility. The utility allows administrators to configure and monitor Ethernet network interface controller (NIC) teams in a Windows-based operating system.
Installing and configuring the server
2 Storage management overview This chapter provides an overview of some of the components that make up the storage structure of the HP ProLiant Storage Server. Storage management elements Storage is divided into four major divisions: • • • • Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level's elements.
Physical Disks Single Server Cluster Implementation RAID Arrays Storage Elements Logical Drives Selective Storage Presentaion Visible Disks Logical Storage Elements Partitioning NTFS Volumes Q: File System Elements Shadow Copy Elements File Folders Shadow Copies (Snapshots) \Engineering \Marketing \Users \Sales \Engineering \Marketing from 02/10/03 09:30 \snapshot.0 R: from 02/10/03 09:30 \snapshot.0 from 02/10/03 11:30 \snapshot.1 R: from 02/10/03 11:30 \snapshot.
Arrays See Figure 5. With an array controller installed in the system, the capacity of several physical drives (P1–P3) can be logically combined into one or more logical units (L1) called arrays. When this is done, the read/write heads of all the constituent physical drives are active simultaneously, dramatically reducing the overall time required for data transfer. NOTE: Depending on the storage server model, array configuration may not be possible or necessary.
To protect against data loss from hard drive failure, storage servers should be configured with fault tolerance. HP recommends adhering to RAID 5 configurations. The table below summarizes the important features of the different kinds of RAID supported by the Smart Array controllers. The decision chart in the following table can help determine which option is best for different situations.
A1 A2 L3 L1 L4 L2 L5 gl0045 Figure 7 Two arrays (A1, A2) and five logical drives (L1 through L5) spread over five physical drives NOTE: This type of configuration may not apply to all storage servers and serves only as an example. Through the use of basic disks, primary partitions or extended partitions can be created. Partitions can only encompass one LUN. Through the use of dynamic disks, volumes can be created that span multiple LUNs.
NOTE: Dynamic disks cannot be used for clustering configurations because Microsoft Cluster only supports basic disks. File system elements File system elements are composed of the folders and subfolders that are created under each logical storage element (partitions, logical disks, and volumes). Folders are used to further subdivide the available file system, providing another level of granularity for management of the information space.
CAUTION: AppleTalk shares should not be created on clustered resources as this is not supported by Microsoft Clustering, and data loss may occur. Network names and IP address resources for the clustered file share resource can also be established for access across a network to a variety of clients. Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols.
Storage management overview
3 File server management This chapter begins by identifying new or improved file services in Windows Storage Server 2003 R2. The remainder of the chapter describes the many tasks and utilities that play a role in file server management. New or improved file services features in Windows Storage Server 2003 R2 Storage Manager for SANs The Storage Manager for SANs (also called Simple SAN) snap-in enables you to create and manage the LUNs that are used to allocate space on storage arrays.
Manager, administrators can place quotas on volumes, actively screen files and folders, and generate comprehensive storage reports. By using Storage Resource Manager, you can perform the following tasks: • Create quotas to limit the space allowed for a volume or folder and to generate notifications when the quota limits are approached and exceeded. • Create file screens to screen the files that users can save on volumes and in folders and to send notifications when users attempt to save blocked files.
Configuring additional storage involves creating arrays, logical disks, and volumes. Table 6 shows the general task areas to be performed as well as the utilities needed to configure storage for an HP Smart Array-based storage server.
NOTE: The ACU is used to configure and manage array-based storage. Software RAID-based storage servers use Microsoft Disk Manager to manage storage. You need administrator or root privileges to run the ACU. Array Configuration Utility The HP ACU supports the Smart Array controllers and SCSI hard drives installed on the storage server. To open the ACU from the storage server desktop: NOTE: If this is the first time that the ACU is being run, you will be prompted to select the Execution Mode for ACU.
changes take effect immediately. A complete online help facility is provided with the Disk Management utility for assistance in using the product. NOTE: • When the Disk Management utility is accessed through a Remote Desktop connection this connection can only be used to manage disks and volumes on the server. Using the Remote Desktop connection for other operations during an open session closes the session.
If defragmenting volumes on which shadow copies are enabled, use a cluster (or allocation unit) size of 16 KB or larger during the format. Otherwise defragmentation registers as a change by the Shadow Copy process. This increase in the number of changes forces Shadow Copy to delete snapshots as the limit for the cache file is reached. CAUTION: Allocation unit size cannot be altered without reformatting the drive. Data on a reformatted drive cannot be recovered.
• Add new LUNs to the system. The additional space is then extended through a variety of means, depending on which type of disk structure is in use. NOTE: This section addresses only single storage server node configurations. If your server has Windows Storage Server 2003 R2 Enterprise Edition, see the Cluster Administration chapter for expanding and extending storage in a cluster environment. Expanding storage Expansion is the process of adding physical disks to an array that has already been configured.
Expanding storage for EVA arrays using Command View EVA Presenting a virtual disk offers its storage to a host. To make a virtual disk available to a host, you must present it. You can present a virtual disk to a host during or after virtual disk creation. The virtual disk must be completely created before the host presentation can occur. If you choose host presentation during virtual disk creation, the management agent cannot complete any other task until that virtual disk is created and presented.
of snapshots is the ability to instantly recover data from shadow copies, reducing the number of times needed to restore data from tape.
NOTE: Regardless of the volume space that is allocated for shadow copies, there is a maximum of 64 shadow copies for any volume. When the 65th shadow copy is taken, the oldest shadow copy is purged. The minimum amount of storage space that can be specified is 350 megabytes (MB). The default storage size is 10 percent of the source volume (the volume being copied).
snapshot. Otherwise, the number of changes caused by the defragmentation process can cause shadow copies to be deleted faster than expected. Note, however, that NTFS compression is supported only if the cluster size is 4 KB or smaller. NOTE: To check the cluster size of a volume, use the fsutil fsinfo ntfsinfo command. To change the cluster size on a volume that contains data, back up the data on the volume, reformat it using the new cluster size, and then restore the data.
Figure 8 System administrator view of Shadow Copies for Shared Folders The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied (with a minimum of 350 MB), and store the shadow copies on the same volume as the original volume. (See Figure 9). The cache file is located in a hidden protected directory titled “System Volume Information” off of the root of each volume for which shadow copy is enabled.
F: G: H: L: cache file cache file cache file Figure 10 Shadow copies stored on a separate volume The main advantage to storing shadow copies on a separate volume is ease of management and performance. Shadow copies on a source volume must be continually monitored and can consume space designated for file sharing. Setting the limit too high takes up valuable storage space. Setting the limit too low can cause shadow copies to be purged too soon, or not created at all.
Viewing a list of shadow copies To view a list of shadow copies on a volume: 1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select Shadow Copies tab. All shadow copies are listed, sorted by the date and time they were created. NOTE: It is also possible to create new shadow copies or delete shadow copies from this page. Set schedules Shadow copy schedules control how frequently shadow copies of a volume are made.
1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select the Shadow Copies tab. 5. Select the volume that you want to redirect shadow copies from and ensure that shadow copies are disabled on that volume; if enabled, click Disable. 6. Click Settings. 7. In the Located on this volume field, select an available alternate volume from the list. NOTE: To change the default shadow copy schedule settings, click Schedule. 8. Click OK. 9.
Figure 11 Accessing shadow copies from My Computer Shadow Copies for Shared Folders Shadow copies are accessed over the network by supported clients and protocols. There are two sets of supported protocols, SMB and NFS. All other protocols are not supported; this would include HTTP, FTP, AppleTalk, and NetWare Shares. For SMB support, a client-side application denoted as Shadow Copies for Shared Folders is required.
Shadow Copies for Shared Folders preserves the permissions set in the access control list (ACL) of the original folders and files. Consequently, users can only access shadow copies for shares to which they have access. In other words, if a user does not have access to a share, he also does not have access to the share's shadow copies. The Shadow Copies for Shared Folders client pack installs a Previous Versions tab in the Properties window of files and folders on network shares.
The following example shows an NFS share named “NFSShare” with three shadow copies, taken on April 27, 28, and 29 of 2003 at 4 a.m. NFSShare .@GMT-2003.04.27-04:00:00 .@GMT-2003.04.28-04:00:00 .@GMT-2003.04.29-04:00:00 Access to NFS shadow copy pseudo-subdirectories is governed by normal access-control mechanisms using the permissions stored in the file system. Users can access only those shadow copies to which they have read access at the time the shadow copy is taken.
Figure 13 Recovering a deleted file or folder Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file: 1. Right-click the overwritten or corrupted file, and then click Properties. 2. Click Previous Versions. 3. To view the old version, click View. To copy the old version to another location, click Copy...
will not work to back up the previous versions of the file system. To answer this particular issue, shadow copies are available for back up in two situations. If the backup software in question supports the use of shadow copies and can communicate with underlying block device, it is supported, and the previous version of the file system will be listed in the backup application as a complete file system snapshot.
NOTE: Select servers can be deployed in a clustered or non-clustered configuration. This section discusses share setup for a non-clustered deployment. Folder management Volumes and folders on any system are used to organize data. Regardless of system size, systematic structuring and naming conventions of volumes and folders eases the administrative burden.
Figure 14 Properties dialog box, Security tab Several options are available on the Security tab: • To add users and groups to the permissions list, click Add. Follow the dialog box instructions. • To remove users and groups from the permissions list, highlight the desired user or group, and then click Remove. • The center section of the Security tab lists permission levels. When new users or groups are added to the permissions list, select the appropriate boxes to configure the common file-access levels. 3.
Figure 15 Advanced Security settings dialog box, Permissions tab Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure 15 and includes: • Add a new user or group—Click Add, and then follow the dialog box instructions. • Remove a user or group— Click Remove. • Replace permission entries on all child objects with entries shown here that apply to child objects—This allows all child folders and files to inherit the current folder permissions by default.
Figure 16 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab. Auditing allows you to set rules for the auditing of access, or attempted access, to files or folders. Users or groups can be added, deleted, viewed, or modified through the Advanced Security Settings Auditing tab.
Figure 17 Advanced Security Settings dialog box, Auditing tab 5. Click Add to display the Select User or Group dialog box. Figure 18 Select User or Group dialog box NOTE: Click Advanced to search for users or groups. 6. Select the user or group. 7. Click OK. The Auditing Entry dialog box is displayed.
Figure 19 Auditing Entry dialog box for folder name NTFS Test 8. Select the desired Successful and Failed audits for the user or group. 9. Click OK. NOTE: Auditing must be enabled to configure this information. Use the local Computer Policy Editor to configure the audit policy on the storage server. The Owner tab allows taking ownership of files. Typically, administrators use this area to take ownership of files when the file ACL is incomplete or corrupt.
Figure 20 Advanced Security Settings dialog box, Owner tab The current owner of the file or folder is listed at the top of the screen. To take ownership: 1. Click the appropriate user or group in the Change owner to list. 2. If it is also necessary to take ownership of subfolders and files, enable the Replace owner on subcontainers and objects box. 3. Click OK. Share management There are several ways to set up and manage shares.
creating too many shares also has its drawbacks. For example, if it is sufficient to create a single share for user home directories, create a “homes” share rather than creating separate shares for each user. By keeping the number of shares and other resources low, the performance of the storage server is optimized. For example, instead of sharing out each individual user's home directory as its own share, share out the top-level directory and let the users map personal drives to their own subdirectory.
• Modifying share properties • Publishing in DFS NOTE: These functions can operate in a cluster on select servers, but should only be used for non-cluster-aware shares. Use Cluster Administrator to manage shares for a cluster. The page will display cluster share resources. CAUTION: Before deleting a share, warn all users to exit that share and confirm that no one is using that share.
• Monitor attempts to save unauthorized files for all users or a selected group of users. • Generate storage reports instantly. Other Windows disk and data management tools When you install certain tools, such as Windows Support Tools or Windows Resource Kit Tools, information about these tools might appear in Help and Support Center. To see the tools that are available to you, look in the Help and Support Center under Support Tasks, click Tools, and then click Tools by Category.
• Microsoft Windows Storage Server 2003 http://www.microsoft.com/windowsserversystem/wss2003/default.mspx • Performance Tuning Guidelines for Windows Server 2003 http://www.microsoft.com/windowsserver2003/evaluation/performance/tuning.mspx • Windows SharePoint Services http://www.microsoft.com/windowsserver2003/technologies/sharepoint/default.
File server management
4 Print services Microsoft Print Management Console Print Management in the Microsoft Windows Server 2003 R2 operating system is a Microsoft Management Console (MMC) snap-on that system administrators can use to perform common print management tasks in a large enterprise. It provides a single interface that administrators can use to perform printer and print server management tasks efficiently with detailed control.
Print services management Print services information to plan, set up, manage, administer, and troubleshoot print servers and print devices are available online using the Help and Support Center feature. To access the Help and Support Center, select Start > Help and Support, then Printers and Faxes under Help Contents.
the printer. Enabling this role on the print server allows the automatic distribution of these drivers to the clients. Additionally, the set of client operating systems determines which of these drivers need to be installed on the server during the print server role installation. 2. At the printer, print a configuration or test page that includes manufacturer, model, language, and installed options. This information is needed to choose the correct printer driver.
Driver updates Print drivers The latest print drivers for many HP network printers are supplied on the Service Release DVD. If selected as part of the service release installation process, updated print drivers are copied to the print drivers folder C:\hpnas\PRINTERS on the storage server or File Print Appliance. Print drivers are also available for download on the HP Support web site for individual network printers. User-mode vs.
For more information about the Print Migrator utility, visit http://www.microsoft.com/ WindowsServer2003/techinfo/overview/printmigrator3.1.mspx. Best practices The following is practical advice for managing print devices: • • • • • • • • • • Printers and print servers should be published in Active Directory. Locate printers in common areas, such as near conference rooms. Protect print servers using antivirus software. Ensure the print server is included in the backup configuration.
Print services
5 Microsoft Services for Network File System (MSNFS) This chapter discusses networking features in Microsoft Services for Network File System (MSNFS). MSNFS Features MSNFS is an update to the NFS components that were previously available in Services for UNIX 3.5.
1. Access Add/Remove Programs. 2. Select Add/Remove Windows Components > Active Directory Services > Details. 3. Install Identity Management for Windows. MSNFS use scenarios The following use scenarios are supported by MSNFS file services: • Allow UNIX clients to access resources on computers running Windows Server 2003 R2. Your company may have UNIX clients accessing resources, such as files, on UNIX file servers.
3. Install Client for NFS. Administering MSNFS To access Microsoft Services for Network File System from the Start menu: 1. Select Start > Programs > Administrative Tools. 2. Click Microsoft Services for Network File System. To access Microsoft Services for Network File System from the HP Storage Server Management console: 1. Access the HP Storage Server Management console by clicking on the shortcut icon on the desktop. 2. In the left pane of the console, select the Share Folder Management listing. 3.
Therefore, the administrator needs to install the Server for NFS Authentication DLL on Windows 2000 domain controllers when: • The NFS file serving environment uses previous NFS releases (NAS, SFU, and so on). • The Windows domain environment uses pre-2003 domain controllers. Refer to Table 7 for guidance as to when to use NFS Authentication DLL instead of S4U legacy NFS and R2 MSNFS.
6. Click Custom Installation, and then click Next. 7. In the Components pane, click the down arrow next to Windows Services for UNIX, and then click Entire component will not be available. 8. Click the plus sign (+) next to Authentication Tools. 9. In the Components pane, click the plus sign (+) next to Authentication Tools. 10. Click Server for NFS Authentication, click Will be installed on local hard drive, and then click Next. 11. Follow the remaining instructions in the Wizard.
the Windows user and group names to grant file access. If the UNIX UID and GID information is not mapped, then Server for NFS will deny file access. There are two ways to specify how Server for NFS on the storage server obtains Windows user and group information: • Using the Windows interface • Using a command line (nfsadmin.
When allowing anonymous access to an NFS Share, the following must be performed by a user with administrative privileges due to Windows Storage Server 2003 security with anonymous users and the Everyone group. 1. Click Remote Desktop. Log on to the storage server. 2. Click Start >Control Panel > Administrative Tools, and then click Local Security Policy. 3. In Security Settings, double-click Local Policies, and then click Security Options. 4.
You can use simple maps, which map Windows and UNIX accounts with identical names. You can also create advanced maps to associate Windows and UNIX accounts with different names, which you can use in conjunction with simple maps. User Name Mapping can obtain UNIX user, password, and group information from one or more Network Information Service (NIS) servers or from password and group files located on a local hard drive. The password and group files can be copied from a UNIX host or from a NIS server.
Microsoft Services for NFS troubleshooting The following information on how to troubleshoot issues with Microsoft Services for NFS is available using the online help: • General issues • Troubleshooting Server for NFS • Troubleshooting User Name Mapping For further details, see the online help for Microsoft Services for Network File System. Microsoft Services for NFS command-line tools Table 8 provides a listing of Windows command-line administration tools.
3. Click Add/Remove Windows Components. 4. In the Components list, click Other Network File and Print Services (but do not select or clear the check box), and then click Details. 5. In the Subcomponents of Other Network File and Print Services list, select Print Services for UNIX, if appropriate to the print services that you want to install: Print Services for UNIX: This option permits UNIX clients to print to any printer that is available to the print server.
6 Other network file and print services This chapter discusses file and print services for NetWare and Macintosh. File and Print Services for NetWare (FPNW) File and Print Services for NetWare (FPNW) is one part of the Microsoft software package called Services for NetWare. The most common use of the NetWare network operating system is as a file and print server.
5. Select the NETSFNTSRV file, and then click OK. File and Print Services for NetWare should now be displayed as an option to install. 6. Select File and Print Services for NetWare, and then click OK. Managing File and Print Services for NetWare FPNW resources are managed through Server Manager. Server Manager can be used to modify FPNW properties and manager shared volumes.
Figure 22 File and Print Services for NetWare dialog box 3. Enter an FPNW Server Name and Description. This server name must be different from the server name used by Windows or LAN Manager-based clients. If changing an existing name, the new name is not effective until stopping and restarting FPNW. For example, in Figure 22 the Windows server name is Alamo and the FPNW server name is Alamo_FPNW. 4. Indicate a Home directory root path. This path is relative to where the Sysvol volume is installed.
2. Right-click the Users folder, and then click New User. Figure 23 New User dialog box 3. Enter the user information, including the user's User name, Full name, Description, and Password. 4. Click Create. 5. Repeat these steps until all NetWare users have been entered. Enabling local NetWare user accounts 1. In the Users folder (MC, Core Operating System, Local Users and Groups), right-click an NCP client listed in the right pane of the screen, and then click Properties. 2.
Figure 24 NetWare Services tab 3. Select Maintain NetWare compatible login. 4. Set other NetWare options for the user, and then click OK. NOTE: The installation of File and Print Services for NetWare also creates a supervisor account, which is used to manage FPNW. The supervisor account is required if the storage server was added as a bindery object into NDS. Managing NCP volumes (shares) NCP file shares are created the same way as other file shares; however, there are some unique settings.
1. From the storage server desktop, select Start > Settings > Control Panel > Administrative Tools > Server Manager. 2. Select File and Print Service for NetWare> Shared Volumes. 3. Click Create Volume. 4. Specify the volume name and path. 5. Click Permissions to set permissions. 6. Click Add to add additional users and groups, and to set their permissions. 7. Highlight the desired user or group, and then click Add. 8. Select the Type of Access in the drop down list.
AppleTalk and file services for Macintosh The AppleTalk network integration allows the storage server to share files and printers between your server and any Apple Macintosh clients that are connected to your network. After installing Microsoft Windows Services for Macintosh, the administrator can use the AppleTalk protocol to configure the storage server to act as an AppleTalk server. The AppleTalk protocol is the communications protocol used by clients running a Macintosh operating system.
Print services for Macintosh Macintosh clients can send print jobs to a print server or File Print Appliance (FPA) when Print Server for Macintosh is installed on the server. To the Macintosh-based client, the print server or FPA appears to be an AppleTalk printer on the network, and no reconfiguration of the client is necessary.
7 Troubleshooting, servicing, and maintenance Troubleshooting the storage server The “Support and troubleshooting” task at the HP Support & Drivers web site (http://www.hp.com/go/ support) can be used to troubleshoot problems with the storage server.
Maintenance and service documentation For specific documentation for the maintenance and servicing of HP ProLiant storage servers, refer to the HP ProLiant Server Maintenance and Service Guide for your storage server model. This document can be obtained at http://www.hp.com/support/manuals. Under the servers section, select ProLiant and tc series servers, and then select your product.
keep the server performing optimally. HP recommends checking for a firmware update before sending a part back to HP for replacement. Certificate of Authenticity The Certificate of Authenticity (COA) label is used to: • Upgrade the factory-installed operating system using the Microsoft Upgrade program for license validation. • Reinstall the operating system because of a failure that has permanently disabled it. The COA label location varies by server model.
Troubleshooting, servicing, and maintenance
8 System installation and recovery This chapter describes how to use the Installation and Recovery DVD that is provided with your storage server. The Installation and Recovery DVD The HP ProLiant Storage Server System Installation and Recovery DVD that is provided with your storage server allows you to install an image or recover from a catastrophic failure. The DVD is used initially to install and configure the operating system and applications provided with your storage server.
System installation and recovery
A Server components This appendix provides illustrations of the storage server hardware components. ML310 hardware components The following figures show components, controls, and indicators located on the front and rear panels of the ML310 storage server.
12 1 11 2 10 3 4 9 5 8 6 7 HP ProLiant ML310 5081 Figure 25 Front panel Table 9 Front panel components Item Description Status 1 DVD-RW drive ejector button N/A 2 Media bays (bezel blanks) N/A 3 Power On/Standby button N/A 4 System power LED Amber = System has AC power and is in standby mode Green = System has AC power and is functioning Off = System has no AC power 5 Hard drive activity LED Green = Hard drives are properly connected and functioning Off = No hard drive activity 6
1 2 8 3 4 9 5 6 11 7 10 5082 Figure 26 Rear panel Table 10 Rear panel components Item Description 1 Power supply connector 2 Mouse connector 3 Keyboard connector 4 Serial connector 5 Video connector 6 USB connectors (2) 7 RJ-45 Ethernet connector 8 NIC activity LED (Flashing = Activity, Off = No activity) 9 NIC link LED (On = Link, Off = No link) 10 RJ-45 connector (iLO 2) 11 Parallel connector NOTE: Connecting the power cord illuminates the LEDs on the front of the bezel, th
Server components
B Configuring storage server for Web access (optional) Setting up an Internet connection Before running Windows 2003 R2 operating system updates, you must set up an Internet connection for the storage server. There are two methods for configuring an Internet connection: • Internet Explorer to use automatic configuration • Internet Explorer to use a proxy server To configure Internet Explorer to use automatic configuration 1.
5. Click the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network. 6. Click OK to close the LAN Settings dialog box. 7. Click OK again to close the Internet Options dialog box.
C Regulatory compliance and safety Federal Communications Commission notice Part 15 of the Federal Communications Commission (FCC) Rules and Regulations has established Radio Frequency (RF) emission limits to provide an interference-free radio frequency spectrum. Many electronic devices, including computers, generate RF energy incidental to their intended function and are, therefore, covered by these rules.
For questions regarding your product, contact: Hewlett-Packard Company P. O. Box 692000, Mail Stop 530113 Houston, Texas 77269-2000 Or, call 1-800- 652-6672 For questions regarding this FCC declaration, contact: Hewlett-Packard Company P. O. Box 692000, Mail Stop 510101 Houston, Texas 77269-2000 Or, call (281) 514-3333 To identify this product, refer to the Part, Series, or Model number found on the product.
International notices and statements Canadian notice (Avis Canadien) Class A equipment This Class A digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numérique de la classe A respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.
Japanese notice Korean notice A&B Class A equipment Class B equipment Safety Battery replacement notice WARNING! The computer contains an internal lithium manganese dioxide, a vanadium pentoxide, or an alkaline battery pack. A risk of fire and burns exists if the battery pack is not properly handled. To reduce the risk of personal injury: • Do not attempt to recharge the battery. • Do not expose the battery to temperatures higher than 60˚C (140˚F).
For more information about battery replacement or proper disposal, contact an authorized reseller or an authorized service provider. Taiwan battery recycling notice The Taiwan EPA requires dry battery manufacturing or importing firms in accordance with Article 15 of the Waste Disposal Act to indicate the recovery marks on the batteries used in sales, giveaway or promotion. Contact a qualified Taiwanese recycler for proper battery disposal.
• Use heel straps, toe straps, or boot straps at standing workstations. Wear the straps on both feet when standing on conductive floors or dissipating floor mats. • Use conductive field service tools. • Use a portable field service kit with a folding static-dissipating work mat. If you do not have any of the suggested equipment for proper grounding, have an authorized reseller install the part.
de winkel waar u het product hebt gekocht voor meer informatie over inzamelingspunten waar u oude apparatuur kunt aanbieden voor recycling. English notice Disposal of waste equipment by users in private household in the European Union This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste.
locales de votre région, les services de collecte des ordures ménagères ou le magasin dans lequel vous avez acheté ce produit. German notice Entsorgung von Altgeräten aus privaten Haushalten in der EU Das Symbol auf dem Produkt oder seiner Verpackung weist darauf hin, dass das Produkt nicht über den normalen Hausmüll entsorgt werden darf. Benutzer sind verpflichtet, die Altgeräte an einer Rücknahmestelle für Elektro- und Elektronik-Altgeräte abzugeben.
elettriche ed elettroniche. La raccolta differenziata e il corretto riciclo delle apparecchiature da smaltire permette di proteggere la salute degli individui e l'ecosistema. Per ulteriori informazioni relative ai punti di raccolta delle apparecchiature, contattare l'ente locale per lo smaltimento dei rifiuti, oppure il negozio presso il quale è stato acquistato il prodotto.
elétrico), encaminhando-o para um ponto de coleta para reciclagem. A coleta e a reciclagem seletivas desse tipo de lixo ajudarão a conservar as reservas naturais; sendo assim, a reciclagem será feita de uma forma segura, protegendo o ambiente e a saúde das pessoas. Para obter mais informações sobre locais que reciclam esse tipo de material, entre em contato com o escritório da HP em sua cidade, com o serviço de coleta de lixo ou com a loja em que o produto foi adquirido.
produkter. Separat insamling och återvinning av avfallet hjälper till att spara på våra naturresurser och gör att avfallet återvinns på ett sätt som skyddar människors hälsa och miljön. Kontakta ditt lokala kommunkontor, din närmsta återvinningsstation för hushållsavfall eller affären där du köpte produkten för att få mer information om var du kan lämna ditt avfall för återvinning.
Regulatory compliance and safety
A accessing HP Storage Server Management console, 18 ACL, defining, 64 Active Directory Lookup, 75 ActiveX enabling, 20 AppleTalk, 35 Array Configuration Utility, 40 array controller, purpose, 31 arrays, defined, 31 audience, 11 authorized reseller HP, 13 B backup, printer, 72 backup, with shadow copies, 56 basic disks, 33, 33, 34 battery replacement notice, 108 boot sequence, 18 C cables, 106 cache file, shadow copies, 48 CIFS, share support, 64 Class A equipment, 105 Class B equipment, 105 clustered
HP Array Configuration Utility, 39 authorized reseller, 13 hardware support services, 13 Storage Manager, 40 Storage Server Management Console, 38, 65, 77 storage web site, 13 Subscriber's choice web site, 13 technical support, 12 Web Jetadmin, 70 HP Storage Server Management console iLO 2 method, 24 direct attach method, 19 remote browser method, 24 remote desktop method, 24 remote server access, 18 I iLO 2 See Integrated Lights-Out 2 iLO 2 method connecting to network, 24 installation planning, 15 serve
SAN Connection and Management white paper, 38 SAN environment, 38 Search enhancements, 37 security auditing, 60 file level permissions, 57 ownership of files, 62 serial number, 16 server installation, 16 ML310 hardware components, 99 power on, 17 Server for NFS Authentication DLL, 77 described, 77 Service for User for Active Domain controllers, 77 services for AppleTalk, installing, 91 Services for UNIX, 33, 34 set up Internet, 103 setting up overview, 15 setup completion, 26 shadow copies, 34 backups, 56 c