beautypg.com

HP Surestore NAS User Manual

Page 5

background image

5

Viewing HP Support Documentation on the Web ...........................................................................................60

HP NAS VA Service and Support....................................................................................................................60

HP NAS VA Support Web Site...................................................................................................................60

Contacting Customer Support by Phone......................................................................................................60

SECURITY.......................................................................................................................61

About HP NAS VA Security............................................................................................................................61

HP NAS VA Security in a UNIX-only Environment.......................................................................................61

UNIX File Security......................................................................................................................................61

HP NAS VA Security in an NT-only Environment .........................................................................................62

Share-Level Security ...................................................................................................................................62

User Level (Domain) Security.....................................................................................................................62

Permissions..................................................................................................................................................63

Sharing Files Across Multiple Platforms .........................................................................................................63

Accessing Files Created by UNIX Clients..................................................................................................63

Accessing Files Created by NT Clients.......................................................................................................65

CIFS file locking..............................................................................................................................................65

Virus Prevention and Detection .......................................................................................................................66

BACKUP...........................................................................................................................68

Backup Overview .............................................................................................................................................68

HIGH AVAILABILITY..................................................................................................69

Clustering Overview.........................................................................................................................................69

OTHER FEATURES .......................................................................................................70

Using Snapshots ...............................................................................................................................................70

NAS Windows 2000 Overview ........................................................................................................................70

Overview......................................................................................................................................................70

Domain Mode Effect Upon Feature Set ......................................................................................................71

Groups..........................................................................................................................................................72

Other Features..............................................................................................................................................72

Resizing of File Systems and Volumes ............................................................................................................73

The fsadm Command

..................................................................................................................................73

The vxresize Command

..............................................................................................................................73

Managing User Quotas.....................................................................................................................................73

SNMP...............................................................................................................................................................74

SNMP Daemon............................................................................................................................................74

Traps ............................................................................................................................................................74

Turning SNMP Functionality On or Off.....................................................................................................74

VIRTUAL ARRAY..........................................................................................................75

Virtual Array ....................................................................................................................................................75

Figure 1: Host visibility of storage pool.....................................................................................................75

RAID Levels ................................................................................................................................................75

RAID 1+0................................................................................................................................................75

Figure 2: RAID 1+0 ........................................................................................................................................76

RAID 5DP...............................................................................................................................................76