HP ProLiant ML350 G5 Storage Server administration guide This guide provides hardware and software information for using the HP ProLiant ML350 G5 Storage Server with Microsoft® Windows® Storage Server 2003 R2.
Legal and notice information © Copyright 2006 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Contents About this guide . . . . . . . . . . . . . . . . . . . . . . . . . Intended audience . . . . . . . . . Related documentation . . . . . . . Document conventions and symbols . Document conventions . . . . . Text symbols . . . . . . . . . Getting help . . . . . . . . . . . HP technical support . . . . . . HP Subscriber’s Choice . . . HP-authorized reseller . . . Helpful web sites . . . . . HP hardware support services Documentation feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Integrated Lights-Out 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setup completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Storage management overview . . . . . . . . . . . . . . . . . . Storage management elements . . . . . Storage management example . . . . Physical storage elements . . . . . . Arrays . . . . . . . . . . . . Fault tolerance . . . . . . . . Online Spares . . . . . . . . . Logical storage elements . . . . . .
Disabling shadow copies . . . . . . . . . . . . . . Managing shadow copies from the storage server desktop . . Shadow Copies for Shared Folders . . . . . . . . . . . . SMB shadow copies . . . . . . . . . . . . . . . . NFS shadow copies . . . . . . . . . . . . . . . . Recovery of files or folders . . . . . . . . . . . . . Recovering a deleted file or folder . . . . . . . . . . Recovering an overwritten or corrupted file . . . . . . Recovering a folder . . . . . . . . . . . . . . . .
7 Other network file and print services . . . . . . . . . . . . . . . . New or improved file or print services for other networks . . . . Microsoft Services for Network File System (MSNFS) . . . . UNIX Identity Management . . . . . . . . . . . . . . . Other network file and print services . . . . . . . . . . . . . Microsoft Services for Network File System . . . . . . . . . File services for MSNFS . . . . . . . . . . . . . . . MSNFS components . . . . . . . . . . . . . . . . Administering MSNFS . . . . . .
Automatic (Recommended) . TCP Connection . . . . . . Destination IP Address . . . Destination MAC Address . . Round Robin (Packet order not Additional references . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . guaranteed) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figures 1 Tiered storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Front panel components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Front panel controls and indicators . . . . . . . . . . . . . . . . . . . . . . . . 4 Rear panel components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Rear panel LEDs and buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 ML350 G5 hardware RAID . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tables 1 Document conventions . . . . . . . . . . . . . . . . . . 2 Component comparison between editions . . . . . . . . . 3 Front panel controls and indicators . . . . . . . . . . . . 4 Rear panel LEDs and buttons . . . . . . . . . . . . . . . 5 ML350 G5 storage server feature differences . . . . . . . . 6 Commonality between ML350 G5 storage server configurations 7 ML350 G5 six-HDD configuration . . . . . . . . . . . . . 8 Summary of RAID methods . . . . . . . . . . . . . . . .
About this guide This guide provides information for operating the following HP ProLiant Storage Server models: • HP ProLiant ML350 G5 960 GB Storage Server • HP ProLiant ML350 G5 1.5 TB Storage Server • HP ProLiant ML350 G5 3 TB Storage Server This guide is available on the HP web site and is also provided as a PDF printable document on the HP ProLiant Storage Server documentation CD.
Document conventions Table 1 Document conventions Convention Element Medium blue text Cross-reference links and e-mail addresses Medium blue, underlined text (http://www.hp.
NOTE: Known issues and workarounds for the storage server products and the service release are addressed in release notes. To view the latest version, go to http://www.hp.com/support/manuals. Under the storage section, click NAS and then select your product. HP technical support Telephone numbers for worldwide technical support are listed on the HP support web site: http://www.hp.com/support/.
c:\hpnas\components\ISEE folder. For more information, go to the HP web site: http://h20219.www2.hp.com/services/cache/10707-0-0-225-121.aspx. HP Services provides service tools that notify you when a significant system event has or will occur. These tools, WEBES System Event Analyzer (SEA) and OSEM, are used both as part of the ISEE remote service offering and as standalone tools to HP service customers.
1 The HP storage server solution This chapter describes some basic storage technologies along with the underlying software components that comprise an HP ProLiant Storage Server.
Fibre Channel technology Fibre Channel technology provides low latency and high throughput capabilities. It uses either a serial copper or fiber optic link to connect the server with storage devices. Fiber optic technology allows for storage to be located a maximum distance of up to 10 kilometers away from the attaching server. The significant advantage of Fibre Channel is its ability to connect redundant paths between storage and servers.
Primary storage Fibre Channel and SCSI disk storage Secondary storage Serial ATA disk storage Tertiary storage Tape Storage Optical archive gl0057 Figure 1 Tiered storage iSCSI technology The iSCSI protocol defines the rules and processes for transporting SCSI (block-level) data over a TCP/IP network. The iSCSI standard follows the SCSI architectural model, which is based on message exchange between an initiator and a target.
environments and standard management software, as well as the Active Directory service. Preconfigured Windows Storage Server 2003 R2 solutions are available from original equipment manufacturers (OEMs) in sizes ranging from a few hundred gigabytes (GBs) to several terabytes (TBs).
Table 2 Component comparison between editions Component Workgroup Standard Enterprise Software File server role X X X File Server Management (FSM) X X X Print Management Console X X X Microsoft Services for Network File System (NFS) X X X Microsoft .NET Framework 2.
Storage server roles There are two primary roles that a ProLiant Storage Server can perform in your environment. • File server • Print server File server A file server is a NAS solution that provides easy-to-use, rapidly deployable network storage with multi-protocol file sharing and print serving services. The file server comes pre-installed with the Microsoft Windows Storage Server 2003 R2 operating system and storage-specific management tools.
Edition supports local printers in addition to network printers. Therefore, if you are planning to use a local printer directly attached to a print server, then a Windows Storage Server 2003-based NAS device may not be suitable. Environment scenarios The storage server is deployed in one of two security modes: • Workgroup • Domain (Windows NT® Domain or Active Directory Domain) The storage server uses standard Windows user and group administration methods in each of these environments.
The HP storage server solution
2 Storage server features and specifications This chapter identifies features of the ML350 G5, and lists specifications for the models available. Front panel Figure 2 and Figure 3 show components, controls, and indicators, located at the front of the ML350 G5.
1 2 3 4 5 6 7 gl0064 Figure 3 Front panel controls and indicators Table 3 Front panel controls and indicators Item Description Status 1 Power On/Standby button N/A 2 Power On/Standby LED Green = Power on Amber = System shut down, but power still applied Off = No power 3 Internal health LED Green = Normal Amber = System health is degraded.
Rear panel Figure 4 and Figure 5 show components, controls, and indicators, located at the rear of the ML350 G5.
1 2 3 4 5 6 gl0066 Figure 5 Rear panel LEDs and buttons Table 4 Rear panel LEDs and buttons Item Description Status 1 Power supply LED Green = Power supply is on and functioning Off = No power or inadequate power supply 2 UID LED and button Blue = Activated Flashing blue = Remote inquiry Off = Deactivated 3 iLO 2/data activity LED Green or flashing = Network activity Off = No network activity 4 iLO 2/data link LED Green = Linked to network Off = Not linked to network 5 10/100/1000 NIC act
Storage server configurations Table 5 shows feature differences between models of the ML350 G5. Table 5 ML350 G5 storage server feature differences 960 GB storage server Part number AE418A (Americas) AE419A (Asia Pacific) AE420A (Europe) AE421A (Australia) AE422A (China) Hard drives Six (HP 160 GB SATA, 1.5 Gb, 7.2 K) 1.5 TB storage server Part number AE423A AE424A AE425A AE426A AE427A (Americas) (Asia Pacific) (Europe) (Australia) (China) Hard drives Six (HP 250 GB SATA, 1.5 Gb, 7.
Table 6 shows hardware commonality between ML350 G5 models. Table 6 Commonality between ML350 G5 storage server configurations Feature Item Server family ProLiant ML350 G5 Processor 2.
Logical Disk 1 Operating System Volume RAID 5 Logical Disk 2 DON’T ERASE Volume RAID 5 Logical Disk 3 Data Volume RAID 5 Physical Drive 1 Physical Drive 0 Physical Drive 2 Physical Drive 3 Physical Drive 4 Physical Drive 5 gl0079 Figure 6 ML350 G5 hardware RAID Table 7 shows additional information about the drive configuration.
• If the system experiences a drive failure, the drive displays an amber disk failure LED. • If a single drive failure occurs, it is transparent to the OS. The hardware RAID controller on four-HDD storage server configurations sounds an audible alarm to indicate a drive failure.
3 Remote access, monitoring, and set up completion This chapter describes basic administrative procedures related to remote access and monitoring and completes the setup procedures that were started in the HP ProLiant Storage Server installation guide that comes with your server. Remote Browser This method of remote access allows you to place a DHCP-enabled storage server on a DHCP-enabled network and browse to the server.
Logging off and disconnecting Remote Desktop provides two options when closing a client: you can either disconnect or log off the system. Disconnecting leaves the session running on the server. You can reconnect to the server and resume the session. If you are performing a task on the server, you can start the task and disconnect from the session. Later, you can log back on the server, re-enter the session, and either resume the task or check results.
• For the Telnet service to start up automatically on every reboot, in the Startup Type drop-down box, click Automatic, and then click OK. • For the Telnet service to be started manually on every reboot, in the Startup Type drop-down box, click Manual, and then click OK.
• Activating iLO 2 Advanced features using a license key— The Remote Console feature of iLO 2 requires a license key. The key is included with the storage server inside the Country Kit. Refer to the iLO 2 Advanced License Pack for activation instructions. • Installing third-party software applications—For example, these might include an antivirus application that you install.
4 Storage management overview This chapter provides an overview of some of the components that make up the storage structure of the HP ProLiant Storage Server. Storage management elements Storage is divided into four major divisions: • • • • Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level’s elements.
Physical Disks Single Server Cluster Implementation RAID Arrays Storage Elements Logical Drives Selective Storage Presentaion Visible Disks Logical Storage Elements Partitioning NTFS Volumes Q: File System Elements Shadow Copy Elements File Folders Shadow Copies (Snapshots) \Engineering \Marketing \Users \Sales \Engineering \Marketing from 02/10/03 09:30 \snapshot.0 R: from 02/10/03 09:30 \snapshot.0 from 02/10/03 11:30 \snapshot.1 R: from 02/10/03 11:30 \snapshot.
Arrays See Figure 9. With an array controller installed in the system, the capacity of several physical drives (P1–P3) can be logically combined into one or more logical units (L1) called arrays. When this is done, the read/write heads of all the constituent physical drives are active simultaneously, dramatically reducing the overall time required for data transfer. NOTE: Depending on the storage server model, array configuration may not be possible or necessary.
The table below summarizes the important features of the different kinds of RAID supported by the Smart Array controllers. The decision chart in the following table can help determine which option is best for different situations.
NOTE: This type of configuration may not apply to all storage servers and serves only as an example. Through the use of basic disks, primary partitions or extended partitions can be created. Partitions can only encompass one LUN. Through the use of dynamic disks, volumes can be created that span multiple LUNs. The Windows Disk Management utility can be used to convert disks to dynamic and back to basic, and manage the volumes residing on dynamic disks.
Each of these folders can contain separate permissions and share names that can be used for network access. Folders can be created for individual users, groups, projects, and so on. File sharing elements The storage server supports several file sharing protocols, including Distributed File System (DFS), Network File System (NFS), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), and Microsoft Server Message Block (SMB).
5 File server management This chapter begins by identifying new or improved file services in Windows Storage Server 2003 R2. The remainder of the chapter describes the many tasks and utilities that play a role in file server management. New or improved file services features in Windows Storage Server 2003 R2 Distributed File System The Distributed File System (DFS) solution in Windows Storage Server R2 provides simplified, fault-tolerant access to files and WAN-friendly replication.
Figure 12 HP Storage Server Management Console, DFS Management For more information on DFS, refer to the online help. A Microsoft document titled Overview of the Distributed File System Solution in Microsoft Windows Server 2003 R2 is available for download at http://www.microsoft.com/downloads/details.aspx?familyid=5E547C69-D224-4423-8EAC18D5883E7BC2&displaylang=en. This document describes the benefits, features, and requirements of the Distributed File System solution in Windows Server 2003 R2.
engine needed to “walk through” all the files within the scope of the search on the server. With the performance tuning in R2, the Indexing service no longer needs to be entirely up-to-date. File Server Resource Manager File Server Resource Manager is a suite of tools that allows administrators to understand, control, and manage the quantity and type of data stored on their servers.
Configuring additional storage involves creating arrays, logical disks, and volumes. Table 9 shows the general task areas to be performed as well as the utilities needed to configure storage for an HP Smart Array-based storage server.
NOTE: The ACU is used to configure and manage array-based storage. Software RAID-based storage servers use Microsoft Disk Manager to manage storage. You need administrator or root privileges to run the ACU. Array Configuration Utility The HP ACU supports the Smart Array controllers and SCSI hard drives installed on the storage server. To open the ACU from the storage server desktop: NOTE: If this is the first time that the ACU is being run, you will be prompted to select the Execution Mode for ACU.
2. Log in to the HP System Management Homepage. The default user name is administrator and the default password is hpinvent. 3. Click Array Configuration Utility on the left side of the window. The ACU opens and identifies the controllers that are connected to the system. Some ACU guidelines to consider: • Do not modify Array A off of the Smart Array controller, because it contains the storage server operating system. • Spanning more than 14 disks with a RAID 5 volume is not recommended.
• It may take a few moments for the Remote Desktop connection session to log off when closing Disk Management. Guidelines for managing disks and volumes Storage servers with configurable storage When managing disks and volumes: • Do not alter the operating system disk labeled Local Disk C:. • Do not alter the disk labeled “DON’T ERASE.” • The use of software RAID-based dynamic volumes is not recommended. Use the array controller instead; it is more efficient.
• Only basic disks can be formatted as FAT or FAT32. Scheduling defragmentation The following information applies to all models of the HP ProLiant storage server. Defragmentation is the process of analyzing local volumes and consolidating fragmented files and folders so that each occupies a single, contiguous space on the volume. This improves file system performance. Because defragmentation consolidates files and folders, it also consolidates the free space on a volume.
When enabling disk quotas for a volume, volume usage is automatically tracked from that point forward, but existing volume users have no disk quotas applied to them. Apply disk quotas to existing volume users by adding new quota entries on the Quota Entries page. NOTE: When enabling disk quotas on a volume, any users with write access to the volume who have not exceeded their quota limit can store data on the volume.
2. On the storage server, open Device Manager, right-click on the EVA LUN and select Scan for hardware changes. 3. Open a command prompt and run DiskPart.exe. 4. List the current volumes of the system (List Volumes). 5. Select the volume to be extended (select volume X). 6. Extend the volume (extend [size=n]). Size is optional.
Adding storage scenarios (Smart Array storage arrays only): • Add an unassigned physical disk to the array. • Add a new disk to the appropriate storage device. For more information, use the ACU online help, or the procedures to “Expand Array” in the Array Configuration Utility User Guide. Expand logical drive This option in the ACU increases the storage capacity of a logical drive by adding unused space on an array to the logical drive on the same array.
• • • • Use the DiskPart utility. To extend a basic volume, it must be formatted NTFS. You can only extend a basic volume onto the same disk. You can only extend a basic volume if it is followed by contiguous unallocated space. Complete help is available from the Windows Storage Server 2003 desktop by selecting Start > Help and Support. To extend a volume using DiskPart, follow these steps: 1. Connect to the server through Remote Desktop, login, and bring up the command window. 2.
• Recover from accidentally overwriting a file. A previous version of that file can be accessed. • Compare several versions of a file while working. Use previous versions to compare changes between two versions of a file. Shadow copies cannot replace the current backup, archive, or business recovery system, but they can help to simplify restore procedures. Because a snapshot only contains a portion of the original data blocks, shadow copies can not protect against data loss due to media failures.
Administrators should also consider user expectations of how many versions they will want to have available. End users might expect only a single shadow copy to be available, or they might expect three days or three weeks worth of shadow copies. The more shadow copies users expect, the more storage space administrators must allocate for storing them.
By keeping the shadow copy on the same volume, there is a potential gain in ease of setup and maintenance; however, there may be a reduction in performance and reliability. CAUTION: If shadow copies are stored on the same volume as the user files, note that a burst of disk input/output (I/O) can cause all shadow copies to be deleted. If the sudden deletion of shadow copies is unacceptable to administrators or end users, it is best to use a separate volume on separate disks to store shadow copies.
Figure 15 System administrator view of Shadow Copies for Shared Folders The shadow copy cache file The default shadow copy settings allocate 10 percent of the source volume being copied (with a minimum of 350 MB), and store the shadow copies on the same volume as the original volume. (See Figure 16). The cache file is located in a hidden protected directory titled “System Volume Information” off of the root of each volume for which shadow copy is enabled.
F: G: H: L: cache file cache file cache file Figure 17 Shadow copies stored on a separate volume The main advantage to storing shadow copies on a separate volume is ease of management and performance. Shadow copies on a source volume must be continually monitored and can consume space designated for file sharing. Setting the limit too high takes up valuable storage space. Setting the limit too low can cause shadow copies to be purged too soon, or not created at all.
Viewing a list of shadow copies To view a list of shadow copies on a volume: 1. Access Disk Management. 2. Select the volume or logical drive, then right-click on it. 3. Select Properties. 4. Select Shadow Copies tab. All shadow copies are listed, sorted by the date and time they were created. NOTE: It is also possible to create new shadow copies or delete shadow copies from this page. Set schedules Shadow copy schedules control how frequently shadow copies of a volume are made.
Managing shadow copies from the storage server desktop The storage server desktop can be accessed by using Remote Desktop to manage shadow copies. To access shadow copies from the storage server desktop: 1. From the primary navigation bar, select Maintenance > Remote Desktop. 2. Click My Computer. 3. Right-click the volume name, and select Properties. 4. Click the Shadow Copies tab. See Figure 18.
NOTE: Shadow Copies for Shared Folders clients are not available for HTTP, FTP, AppleTalk, or NetWare shares. Consequently, users of these protocols cannot use Shadow Copies for Shared Folders to independently retrieve previous versions of their files. However, administrators can take advantage of Shadow Copies for Shared Folders to restore files for these users.
or folder presents users with the folder or file history—a list of read-only, point-in-time copies of the file or folder contents that users can then open and explore like any other file or folder. Users can view files in the folder history, copy files from the folder history, and so on. NFS shadow copies UNIX users can independently access previous versions of files stored on NFS shares via the NFS client; no additional software is required.
Figure 20 Recovering a deleted file or folder Recovering an overwritten or corrupted file Recovering an overwritten or corrupted file is easier than recovering a deleted file because the file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file: 1. Right-click the overwritten or corrupted file, and then click Properties. 2. Click Previous Versions. 3. To view the old version, click View. To copy the old version to another location, click Copy...
will not work to back up the previous versions of the file system. To answer this particular issue, shadow copies are available for back up in two situations. If the backup software in question supports the use of shadow copies and can communicate with underlying block device, it is supported, and the previous version of the file system will be listed in the backup application as a complete file system snapshot.
NOTE: Select servers can be deployed in a clustered or non-clustered configuration. This section discusses share setup for a non-clustered deployment. Folder management Volumes and folders on any system are used to organize data. Regardless of system size, systematic structuring and naming conventions of volumes and folders eases the administrative burden.
Figure 21 Properties dialog box, Security tab Several options are available on the Security tab: • To add users and groups to the permissions list, click Add. Follow the dialog box instructions. • To remove users and groups from the permissions list, highlight the desired user or group, and then click Remove. • The center section of the Security tab lists permission levels. When new users or groups are added to the permissions list, select the appropriate boxes to configure the common file-access levels. 3.
Figure 22 Advanced Security settings dialog box, Permissions tab Other functionality available in the Advanced Security Settings dialog box is illustrated in Figure 22 and includes: • Add a new user or group—Click Add, and then follow the dialog box instructions. • Remove a user or group— Click Remove. • Replace permission entries on all child objects with entries shown here that apply to child objects—This allows all child folders and files to inherit the current folder permissions by default.
Figure 23 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab. Auditing allows you to set rules for the auditing of access, or attempted access, to files or folders. Users or groups can be added, deleted, viewed, or modified through the Advanced Security Settings Auditing tab. Figure 24 Advanced Security Settings dialog box, Auditing tab 5. Click Add to display the Select User or Group dialog box.
Figure 25 Select User or Group dialog box NOTE: Click Advanced to search for users or groups. 6. Select the user or group. 7. Click OK. The Auditing Entry dialog box is displayed. Figure 26 Auditing Entry dialog box for folder name NTFS Test 8. Select the desired Successful and Failed audits for the user or group.
9. Click OK. NOTE: Auditing must be enabled to configure this information. Use the local Computer Policy Editor to configure the audit policy on the storage server. The Owner tab allows taking ownership of files. Typically, administrators use this area to take ownership of files when the file ACL is incomplete or corrupt. By taking ownership, you gain access to the files, and then manually apply the appropriate security configurations.
Share considerations Planning the content, size, and distribution of shares on the storage server can improve performance, manageability, and ease of use. The content of shares should be carefully chosen to avoid two common pitfalls: either having too many shares of a very specific nature, or of having very few shares of a generic nature. For example, shares for general use are easier to set up in the beginning, but can cause problems later.
The storage server supports both administrative and standard CIFS shares. To create an administrative share, end the share name with the $ character when setting up the share. Do not type a $ character at the end of the share name when creating a standard share. Managing shares Shares can be managed using the HP Storage Server Management Console.
Quota management On the Quota Management node of the File Server Resource Manager snap-in, you can perform the following tasks: • Create quotas to limit the space allowed for a volume or folder and generate notifications when the quota limits are approached or exceeded. • Generate auto quotas that apply to all existing folders in a volume or folder, as well as to any new subfolders created in the future.
Backup Protects data from accidental loss if your system experiences hardware or storage media failure. Chkdsk Creates and displays a status report for a disk based on the file system. Chkntfs Displays or specifies whether automatic system checking is scheduled to be run on a FAT, FAT32 or NTFS volume when the computer is started. Convert Converts FAT and FAT32 volumes to NTFS leaving existing files and folders intact.
Additional information and references for file services Backup HP recommends that you back up the print server configuration whenever a new printer is added to the network and the print server configuration is modified. For details on implementing the backup solution, refer to the Medium Business Guide for Backup and Recovery. The guide can be viewed or downloaded from Microsoft at http://www.microsoft.com/technet/itsolutions/smbiz/mits/br/mit_br.mspx.
6 Print services This chapter describes the print server role that is a part of the storage server running Windows Storage Server 2003 R2. NOTE: The storage server only supports network attached printers and does not support directly connected printers via USB or a parallel port. Print servers and appliances are best suited where multiple network printers are scattered all over locations and where high availability is not a major concern, but cost is.
New or improved HP print server features HP Web Jetadmin Integrating the HP Web Jetadmin (WJA) print management application to the HP Storage Server or File Print Appliance Management Console is new. WJA is a web-based tool for remotely installing, configuring, and managing a wide variety of HP and non-HP network peripherals using only a web browser. It supports a modular design, whereby plug-ins can be installed to provide additional device, language, and application functionality.
Figure 30 Help and Support Center page Microsoft Print Management Console The Print Management Console (PMC) can be started from the HP Storage Server Management Console, or the PMC snap-in can be added to the Microsoft Management Console. Figure 31 Microsoft Print Management Console HP recommends that you use the Microsoft Print Management Step-by-Step Guide on the Documentation CD for print concepts, use of the PMC, and management of network printers. The guide can also be downloaded from http://www.
sharing ports (TCP 139 and 445, and UDP 137 and 138). If this does not fix the problem, or if these ports are already open, you may need to turn off the Windows Firewall to display printers. To open the file and print sharing ports: 1. Click Start, point to Control Panel, and click Windows Firewall. 2. On the Exceptions tab, ensure that the File and Printer Sharing check box is selected and click OK. To turn off Windows Firewall: 1. Click Start, point to Control Panel, and click Windows Firewall. 2.
NOTE: If running Web Jetadmin, do not use the Install Network Printer Wizard or Download Manager for Jetdirect utilities. Web Jetadmin and both utilities use TCP/IP port 427. Both utilities do not need to be installed on the storage server or File Print Appliance platform if the platform is hosting Web Jetadmin. Web-based printer management and Internet printing Internet printing is enabled by default on the print server and File Print Appliance.
print Prints a text file or display the contents of a print queue. net print Displays control print jobs and printer queues. net start spooler Starts the spooler service. lpr Prints a file to a computer running LPD server. lpq Obtains status of a print queue on a computer running the LPD server. fnprinters.exe Automatically add network printers application; located at C:\Windows\PMCSnap. pushprinterconnections.
6. Enable management features for Active Directory and Workgroup Environments. If the print server is part of an Active Directory domain rather than Workgroup, the print server enables the following management features: • Restrict access to printer-based domain user accounts. • Publish shared printers to Active Directory to aid in search for the resource. 7. Deploy printers using group policy.
• Installing new printer drivers. • Recording information about the printer’s name, share names, printer features, and the location where the printers are physically installed. This information should be kept in an easily accessible place. For process suggestions for recurring tasks, see the Microsoft Print Service Product Operations Guide at http://www.microsoft.com/technet/itsolutions/cits/mo/winsrvmg/pspog/pspog3/mspx.
To allow kernal-mode drivers to be installed, perform the following steps: 1. Open Group Policy on the File Print Appliance, click Start > Run, then type gpedit.msc, and press Enter. 2. Under Local Computer Policy, double-click Computer Configuration. 3. Right-click Disallow installation of printers using kernel-mode drivers and then click Properties. 4. On the Setting tab, click either Not Configured or Disabled, and then click OK.
Figure 35 Microsoft Printer Migrator screen For more information about the Print Migrator utility, visit http://www.microsoft.com/ WindowsServer2003/techinfo/overview/printmigrator3.1.mspx. Antivirus The server should be secured by installing an appropriate antivirus software. For details on implementing antivirus, refer to the Medium Business Guide for Antivirus. The guide can be viewed or downloaded from Microsoft at http://www.microsoft.com/technet/itsolutions/smbiz/mits/av/mit_av.mspx.
• Start Printer and Faxes. • On the File menu, click Server Properties, and then click the Advanced tab. • In the Spool folder window, enter the path and the name of the new default spool folder for the print server or File Print Appliance, and then click Apply or OK. • Stop and restart the spooler service, or restart the print server or File Print Appliance. Troubleshooting The online help or Help and Support Center feature should be used to troubleshoot general and common print-related problems.
Print services
7 Other network file and print services This chapter discusses newer networking features in Microsoft Windows Storage Server 2003 and three other network file and print services for UNIX, NetWare, and the Macintosh. New or improved file or print services for other networks Microsoft Services for Network File System (MSNFS) MSNFS is an update to the NFS components that were previously available in Services for UNIX 3.5.
The UNIX Identity Management component is not enabled by default on the storage server. To install this component: 1. Access Add/Remove Programs. 2. Select Add/Remove Windows Components > Active Directory Services > Details. 3. Install Identity Management for Windows.
must provide a different set of credentials to access files and other resources, depending on whether they are stored on a Windows or UNIX file server. To address this issue, Username Mapping Server maps the Windows and UNIX user names so that users can log on with either their Windows or UNIX credentials and access resources regardless of whether they are stored on a Windows or UNIX file server. • Server for NFS Normally, a UNIX computer cannot access files on a Windows-based computer.
Figure 37 Accessing MSNFS from HP Storage Server Management console Server for NFS With Server for NFS, a computer running the Microsoft Windows Server 2003 R2 operating system can act as a Network File System (NFS) server. Users can then share files in a mixed environment of computers, operating systems, and networks. Users on computers running NFS client software can gain access to directories (called shares) on the NFS server by connecting (mounting) those directories to their computers.
Table 10 Authentication table Domain controller type Legacy NFS (pre-WSS2003 R2) MSNFS (WSS2003 R2) Legacy domain controller (pre-WSS2003) Requires NFS Authentication DLL on domain controller Requires NFS Authentication DLL on domain controller Recent domain controllers (WSS2003 and later) Requires NFS Authentication DLL on domain controller Uses the built-in S4U (on the domain controller). It is unaffected by the NFS Authentication DLL on the domain controller.
11. Follow the remaining instructions in the Wizard. NOTE: NFS users can be authenticated using either Windows domain accounts or local accounts on the Windows server. Server for NFS Authentication must be installed on all domain controllers in the domain if NFS users will be authenticated using domain accounts. Server for NFS Authentication is always installed on the computer running Server for NFS.
IMPORTANT: • Before using Active Directory Lookup, administrators must install and populate the Identity Management for UNIX Active Directory schema extension, included in Windows Server 2003 R2, or have an equivalent schema which includes UNIX UID and GID fields. • The IP address of the User Name Mapping server can be specified instead of the name of the server. • Before using User Name Mapping, the computer running Server for NFS must be listed in the .
4. Right-click Network access: Let Everyone permissions apply to anonymous users, and then click Properties. 5. To allow permissions applied to the Everyone group to apply to anonymous users, click Enabled. The default is Disabled. 6. Restart the NFS server service. From a command prompt, enter net stop nfssvc. Then enter net start nfssvc. Notify users before restarting the NFS service. 7. Assign the Everyone group the appropriate permissions on the NFS Share. 8. Enable anonymous access to the share.
You can back up and restore User Name Mapping data at any time. Because the database is backed up to a file, you can use that file to copy the mapping database to another server. This provides redundancy for the sake of fault tolerance. NOTE: If you obtain information from multiple NIS domains, it is assumed that each domain has unique users and user identifiers (UIDs). User Name Mapping does not perform any checks.
4. Map a user. 5. Verify NTFS permissions are correct on the NFS share. 6. Verify the mappings exist. 7. From a Linux/UNIX client, mount the NFS share and create a file or directory. 8. Verify the same permissions are set up for the user on both the UNIX and Windows sides.
Request for Comments (RFC) 1179. The combination of the LPR and LPD are included in print services for UNIX. Print services for UNIX is not pre-installed on the print server or the File Print Appliance. To install print services for UNIX: 1. Log on as administrator or as a member of the Administrators group. 2. Select Start > Control Panel, and then click Add or Remove Programs. 3. Click Add/Remove Windows Components. 4.
NOTE: FPNW is not a clusterable protocol. With FPNW on both nodes of a cluster, the shares do not fail over because the protocol is not cluster-aware. NOTE: IPX/SPX protocol is required on the Novell servers. Installing Services for NetWare The installation of FPNW on the storage server allows for a smooth integration with existing Novell servers. FPNW allows a Windows Storage Server 2003 based server to emulate a NetWare file and print server to users, clients, and administrators.
Figure 39 Installing File and Print Services for NetWare Managing File and Print Services for NetWare FPNW resources are managed through Server Manager. Server Manager can be used to modify FPNW properties and manager shared volumes. Use File and Print Services for NetWare to: • Access files, modify file settings and permissions from Computer Management, and use third party tools that can be used with NetWare servers. • Create and manage user accounts by using Active Directory Users and Computers.
Figure 40 File and Print Services for NetWare dialog box 3. Enter an FPNW Server Name and Description. This server name must be different from the server name used by Windows or LAN Manager-based clients. If changing an existing name, the new name is not effective until stopping and restarting FPNW. For example, in Figure 40 the Windows server name is Alamo and the FPNW server name is Alamo_FPNW. 4. Indicate a Home directory root path. This path is relative to where the Sysvol volume is installed.
Figure 41 New User dialog box 3. Enter the user information, including the user’s User name, Full name, Description, and Password. 4. Click Create. 5. Repeat these steps until all NetWare users have been entered. Enabling local NetWare user accounts 1. In the Users folder (MC, Core Operating System, Local Users and Groups), right-click an NCP client listed in the right pane of the screen, and then click Properties. 2. Click the NetWare Services tab.
Figure 42 NetWare Services tab 3. Select Maintain NetWare compatible login. 4. Set other NetWare options for the user, and then click OK. NOTE: The installation of File and Print Services for NetWare also creates a supervisor account, which is used to manage FPNW. The supervisor account is required if the storage server was added as a bindery object into NDS. Managing NCP volumes (shares) NCP file shares are created the same way as other file shares; however, there are some unique settings.
2. Select File and Print Service for NetWare> Shared Volumes. 3. Click Create Volume. Figure 43 Create Volume dialog box 4. Specify the volume name and path. 5. Click Permissions to set permissions. Figure 44 Access Through Share Permissions dialog box 6. Click Add to add additional users and groups, and to set their permissions.
Figure 45 Add Users and Groups dialog box 7. Highlight the desired user or group, and then click Add. 8. Select the Type of Access in the drop down list. Type of Access can also be set from the Access Through Share Permissions dialog box. 9. Click OK when all users and groups have been added. 10. Click OK in the Create Volume dialog box. 11. Click Close. Modifying NCP share properties To modify a file share: 1.
Installing Print Services for NetWare Refer to the previous section “Installing Services for Netware” for information on installing Print Services for NetWare. Point and Print from Novell to Windows Server 2003 Point-and-Print behavior from Novell clients to Windows Server 2003 and Windows Storage Server 2003 is similar to the behavior for Windows 95, Windows 98, and Windows Millennium Edition clients, because all these clients create SMB connections.
Installing File Services for Macintosh To install File Services for Macintosh, perform the following steps: 1. Access the desktop on the storage server. 2. Open Add or Remove Programs from the Control Panel. 3. Click Add or Remove Windows Components. 4. Double-click Other Network File and Print Services. 5. Select File Services for Macintosh, and then click OK. 6. Click Next. 7. Click Finish.
8 Troubleshooting, servicing, and maintenance Troubleshooting the storage server The “Support and troubleshooting” task at the HP Support & Drivers web site (http://www.hp.com/go/ support) can be used to troubleshoot problems with the storage server.
Maintenance and service documentation For specific documentation for the maintenance and servicing of the ML350 storage server, refer to the HP ProLiant ML350 Generation 5 Server Maintenance and Service Guide. This document can be obtained at http://www.hp.com/support/manuals. Under the servers section, select ProLiant and tc series servers, and then select your product. Customer self repair HP’s customer self-repair program offers you the fastest service under either warranty or contract.
9 System installation and recovery This chapter describes how to use the Installation and Recovery DVD that is provided with your storage server. The Installation and Recovery DVD The HP ProLiant Storage Server System Installation and Recovery DVD that is provided with your storage server allows you to install an image or recover from a catastrophic failure. The DVD is used initially to install and configure the operating system and applications provided with your storage server.
CAUTION: In order for user data to be retained on two-drive systems, the data volume must be a single, mirrored volume as initially configured by the factory. If you choose to restore only the operating system on two-drive systems, you need to manually recreate mirrors of your operating system and data volumes after the system is recovered and Windows boots. Instructions are provided when you log in.
A Network adapter teaming Network adapter teaming is software-based technology used to increase a server’s network availability and performance. Teaming enables the logical grouping of physical adapters in the same server (regardless of whether they are embedded devices or Peripheral Component Interconnect (PCI) adapters) into a virtual adapter. This virtual adapter is seen by the network and server-resident network-aware applications as a single network connection.
Figure 48 HP Network Configuration Utility Properties dialog box, before teaming 2. Highlight the NICs to team. 3. Click Team. Figure 49 HP Network Configuration Utility Properties dialog box, after teaming 4. Configure the team by clicking the Properties tab. The teaming options are discussed in the following sections.
5. Click OK to accept the team properties. 6. Click OK in the HP Network Configuration Utility Properties dialog box to apply the changes. Team Properties page The Team Properties page is displayed (see Figure 50) when the Properties tab is selected on the HP Network Configuration Utility Properties dialog box. The Team Properties page is used to manage and monitor all team-specific settings and consists of the following individual tabs.
Team type selection In the Team Settings section of the Team Properties page, you have the option of selecting several team types from a drop-down list box (see Figure 51). These team types allow flexibility in your networking environment. The sections below describe these team types. Figure 51 Team Properties page, Team Type Selection drop-down list box Automatic (Recommended) The Automatic team type is not really an individual team type.
Switch-assisted Load Balancing with Fault Tolerance (SLB) Switch-assisted Load Balancing with Fault Tolerance (SLB) is a team type that allows full transmit and receive load balancing. SLB requires the use of a switch that supports some form of Port Trunking (for example, EtherChannel, MultiLink Trunking, and so on). SLB does not support switch redundancy since all ports in a team must be connected to the same switch. SLB is similar to the 802.3ad Dynamic team type discussed later.
teamed port. In other words, if frame order preservation is desired, outbound load balancing by the team should be performed on a conversation-by-conversation basis rather than on a frame-by-frame basis. To accomplish this, the load-balancing device (either a team or a switch) needs information to identify conversations. Destination MAC address, Destination IP address, and TCP Connection are used to identify conversations (see Figure 52).
TCP Connection TCP Connection is also a load-balancing method that is designed to preserve frame ordering. This method will load balance outbound traffic based on the TCP port information in the frame’s TCP header. This load-balancing method combines the TCP source and destination ports to identify the TCP conversation. Combining these values, the algorithm can identify individual TCP conversations (even multiple conversations between the team and one other network device).
Network adapter teaming
B Regulatory compliance and safety Federal Communications Commission notice Part 15 of the Federal Communications Commission (FCC) Rules and Regulations has established Radio Frequency (RF) emission limits to provide an interference-free radio frequency spectrum. Many electronic devices, including computers, generate RF energy incidental to their intended function and are, therefore, covered by these rules.
For questions regarding your product, contact: Hewlett-Packard Company P. O. Box 692000, Mail Stop 530113 Houston, Texas 77269-2000 Or, call 1-800- 652-6672 For questions regarding this FCC declaration, contact: Hewlett-Packard Company P. O. Box 692000, Mail Stop 510101 Houston, Texas 77269-2000 Or, call (281) 514-3333 To identify this product, refer to the Part, Series, or Model number found on the product.
International notices and statements Canadian notice (Avis Canadien) Class A equipment This Class A digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numérique de la classe A respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Class B equipment This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.
Japanese notice Korean notice A&B Class A equipment Class B equipment Safety Battery replacement notice WARNING! The computer contains an internal lithium manganese dioxide, a vanadium pentoxide, or an alkaline battery pack. A risk of fire and burns exists if the battery pack is not properly handled. To reduce the risk of personal injury: • Do not attempt to recharge the battery. • Do not expose the battery to temperatures higher than 60˚C (140˚F).
For more information about battery replacement or proper disposal, contact an authorized reseller or an authorized service provider. Taiwan battery recycling notice The Taiwan EPA requires dry battery manufacturing or importing firms in accordance with Article 15 of the Waste Disposal Act to indicate the recovery marks on the batteries used in sales, giveaway or promotion. Contact a qualified Taiwanese recycler for proper battery disposal.
• Use heel straps, toe straps, or boot straps at standing workstations. Wear the straps on both feet when standing on conductive floors or dissipating floor mats. • Use conductive field service tools. • Use a portable field service kit with a folding static-dissipating work mat. If you do not have any of the suggested equipment for proper grounding, have an authorized reseller install the part.
de winkel waar u het product hebt gekocht voor meer informatie over inzamelingspunten waar u oude apparatuur kunt aanbieden voor recycling. English notice Disposal of waste equipment by users in private household in the European Union This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste.
locales de votre région, les services de collecte des ordures ménagères ou le magasin dans lequel vous avez acheté ce produit. German notice Entsorgung von Altgeräten aus privaten Haushalten in der EU Das Symbol auf dem Produkt oder seiner Verpackung weist darauf hin, dass das Produkt nicht über den normalen Hausmüll entsorgt werden darf. Benutzer sind verpflichtet, die Altgeräte an einer Rücknahmestelle für Elektro- und Elektronik-Altgeräte abzugeben.
elettriche ed elettroniche. La raccolta differenziata e il corretto riciclo delle apparecchiature da smaltire permette di proteggere la salute degli individui e l’ecosistema. Per ulteriori informazioni relative ai punti di raccolta delle apparecchiature, contattare l’ente locale per lo smaltimento dei rifiuti, oppure il negozio presso il quale è stato acquistato il prodotto.
elétrico), encaminhando-o para um ponto de coleta para reciclagem. A coleta e a reciclagem seletivas desse tipo de lixo ajudarão a conservar as reservas naturais; sendo assim, a reciclagem será feita de uma forma segura, protegendo o ambiente e a saúde das pessoas. Para obter mais informações sobre locais que reciclam esse tipo de material, entre em contato com o escritório da HP em sua cidade, com o serviço de coleta de lixo ou com a loja em que o produto foi adquirido.
produkter. Separat insamling och återvinning av avfallet hjälper till att spara på våra naturresurser och gör att avfallet återvinns på ett sätt som skyddar människors hälsa och miljön. Kontakta ditt lokala kommunkontor, din närmsta återvinningsstation för hushållsavfall eller affären där du köpte produkten för att få mer information om var du kan lämna ditt avfall för återvinning.
Regulatory compliance and safety
Index A ACL, defining, 70 Active Directory Lookup, 87 adapter teaming, 111 AppleTalk, 40 Array Configuration Utility, 45 array controller, purpose, 37 arrays, defined, 37 audience, 11 authorized reseller HP, 13 dynamic disks clustering, 39 converting from basic storage disks, 54 spanning multiple LUNs, 39 E B backup, printer, 83 backup, with shadow copies, 63 basic disks, 39, 39, 39 battery replacement notice, 122 boot sequence, 29 electrostatic discharge, 123 Ethernet NIC teams adding, 111 configurin
groups, adding to permissions list, 65 H hardware support services, 13 help, obtaining, 12, 13 HP Array Configuration Utility, 44 authorized reseller, 13 hardware support services, 13 Network Configuration Utility, 111 Storage Manager, 45 Storage Server Management Console, 31, 41, 43, 71, 89 storage web site, 13 Subscriber’s choice web site, 13 technical support, 13 Web Jetadmin, 78 I iLO 2 See Integrated Lights-Out 2 Integrated Lights-Out 2, described, 33 international notices and statements, 121 iSCSI
SAN Connection and Management white paper, 43 SAN environment, 43 SATA technology, 16 Search enhancements, 42 security auditing, 67 file level permissions, 64 ownership of files, 69 server identification, 15 server configurations, 27 Server for NFS Authentication DLL, 90 described, 90 Service for User for Active Domain controllers, 90 services for AppleTalk, installing, 105 Services for UNIX, 39, 40 setup completion, 33 shadow copies, 40 backups, 63 cache file, 56 defragmentation, 55 described, 52 disabling