beautypg.com

5 using nfs, 7 using cifs – HP StoreAll Storage User Manual

Page 4

background image

Deleting segments, volume groups, and physical volumes........................................................42
Deleting file serving nodes and X9000 clients.......................................................................42

Checking and repairing file systems..........................................................................................42

Analyzing the integrity of a file system on all segments...........................................................43
Clearing the INFSCK flag on a file system.............................................................................44

Troubleshooting file systems......................................................................................................44

ibrix_pv -a discovers too many or too few devices..................................................................44
Cannot mount on an X9000 client.......................................................................................44
NFS clients cannot access an exported file system..................................................................44
User quota usage data is not being updated.........................................................................44
File system alert is displayed after a segment is evacuated.......................................................45
SegmentNotAvailable is reported.........................................................................................45
SegmentRejected is reported...............................................................................................45
ibrix_fs -c failed with "Bad magic number in super-block"........................................................47

5 Using NFS...............................................................................................48

Exporting a file system............................................................................................................48

Unexporting a file system....................................................................................................51

Using case-insensitive file systems ............................................................................................51

Setting case insensitivity for all users (NFS/Linux/Windows)....................................................51
Viewing the current setting for case insensitivity......................................................................52
Clearing case insensitivity (setting to case sensitive) for all users (NFS/Linux/Windows)..............52
Log files............................................................................................................................52
Case insensitivity and operations affecting directories.............................................................53

6 Configuring authentication for CIFS, FTP, and HTTP.......................................54

Using Active Directory with LDAP ID mapping............................................................................54
Using LDAP as the primary authentication method.......................................................................55

Requirements for LDAP users and groups...............................................................................55
Configuring LDAP for X9000 software..................................................................................55

Configuring authentication from the GUI....................................................................................56
Viewing or changing authentication settings...............................................................................64
Configuring authentication from the CLI.....................................................................................65

Configuring Active Directory ...............................................................................................65
Configuring LDAP..............................................................................................................65
Configuring LDAP ID mapping.............................................................................................66
Configuring Local Users and Groups authentication................................................................67

7 Using CIFS..............................................................................................69

Configuring file serving nodes for CIFS......................................................................................69
Starting or stopping the CIFS service and viewing CIFS statistics....................................................69
Monitoring CIFS services.........................................................................................................70
CIFS shares............................................................................................................................71

Configuring CIFS shares with the GUI...................................................................................71
Configuring SMB signing ...................................................................................................75
Managing CIFS shares with the GUI.....................................................................................76
Configuring and managing CIFS shares with the CLI...............................................................77
Managing CIFS shares with Microsoft Management Console...................................................78

Linux static user mapping with Active Directory...........................................................................83

Configuring Active Directory................................................................................................83
Assigning attributes............................................................................................................85

Consolidating SMB servers with common share names................................................................86
CIFS clients............................................................................................................................87

Viewing quota information..................................................................................................87
Differences in locking behavior............................................................................................88
CIFS shadow copy.............................................................................................................88

4

Contents