reserved. No part of this document may be photocopied, reproduced or translated to another
language without the prior written consent of Hewlett-Packard Company.
Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential
damages (including lost profits) in connection with the furnishing, performance, or use of this
material whether based on warranty, contract, or other legal theory.
The HP NetStorage 6000 is a network attached storage (NAS) device used
to store data on your network. NAS devices provide a simpler, more
reliable, and cost-effective way to add storage to your network.
The HP NetStorage 6000:
n Requires minimal setup and is easily maintained
n Does not impact the productivity of existing general-purpose server
operations
n Frees up the general-purpose server so that applications operate more
efficiently
n Contains SCSI hard drives in a pre-configured RAID 5 array
n Provides SNMP notification of critical events
n Provides SMTP/E-mail for critical evens
Chapter 1
Overview
Getting Started
Before proceeding, make sure that you have installed and configured the
HP NetStorage 6000 device by entering the IP, gateway, subnet, and
broadcast addresses via the front panel of the HP NetStorage 6000. For
more information, refer to Installing the HP NetStorage 6000.
Once the front panel information has been entered, you must use the
HP NetStorage web interface to finish configuring your device:
1 Open the HP NetStorage web interface. (Once the web interface is open,
1-1
you can access help online.) See “The HP NetStorage 6000 Web
Interface” on page 1-9.
Overview
Getting Started
2 Go directly to the Configuration Tab and manually enter:
• System name, see “DNS Settings” on page 3-3
• Administrative password, see “Administrative Password Settings” on
page 3-12
• DNS domain name, see “DNS Settings” on page 3-3
• Primary and secondary DNS server IP addresses , see “DNS Settings”
on page 3-3
• NIC parameters, see “TCP/IP Settings” on page 3-2
• Address for event log data, see “System Log” on page 3-9
• UNIX settings, see “UNIX Settings” on page 3-4
• WINS settings, see “Windows Settings” on page 3-6
• SMTP server information, see “SMTP/Email” on page 3-7
• SNMP settings/Traps, see “SNMP/Network Management Settings”
on page 3-8
• Contact and asset information, see “Informational Settings” on
page 3-10
• System time and date, see “Date and Time Settings” on page 3-11
• User mapping information, see “Mapping Strategy” on page 3-14
3 Go to the Storage Tab and manually:
• Group your physical drives into logical drives (RAID sets) if
required, see “Create a Logical Drive” on page 4-4
• Create volumes for data storage, see “Create a New File Volume” on
page 4-9
• Create directories and sub-directories beneath your volumes, see
“Create a Directory” on page 4-12
• Make volumes or directories available to users by sharing or
exporting them, see “Create or Edit Windows Shares” on page 4-14
1-2
Overview
HP NetStorage 6000 Hardware
HP NetStorage 6000 Hard ware
Physical Drives
The HP NetStorage 6000 contains between four and ten physical hard
drives, depending on your company’s storage needs. Each physical drive
can have up to 73GB of storage capacity.
Figure 1.1 P hysical Driv es
1-3
NoteUse only HP Hard Drives approved for your NetStorage 6000. For an up-
to-date list of approved hard disk drives, please visit our web site at
www.hp.com/support /ns6000. Drives on the appr oved list have custom
firmware for use in your NetStorage 6000. Do not attempt to install any
hard disk drives other than the approved drives listed at this web site as
doing so may resu lt i n system failure or loss of dat a. U s i ng non -s upported
hard drives may also void your warrant y.
NoteAll drives in the HP NetStorage 6000 must have the same capacity. Any
other configuration is not supported.
Logical Drives
Figure 1.2 Logical Drives
Overview
HP NetStorage 6000 Hardware
Physical drives are grouped together to form one or more logical drives,
which are also known as RAID sets. Physical drives are also used
individually as hot spares. Logical drives and hot spares are configured at
the factory. The illustration in figure 1.2 shows a typical configuration.
NoteThe HP NetStorage 6000 supports only RAID level 5 for the creation of
logical drives. Because RAID level 5 requires a minimum of 3 physical
drives for a RAID set, the HP NetStorage 6000 requires at least 3 drives to
be grouped together to create a logical drive, though you can create a
logical drive that uses as many as eight physical drives.
1-4
Overview
HP NetStorage 6000 Hardware
Partitions and File Volumes
Logical drives are further broken down into as many as four partitions with
each partition consisting of 256GB of drive space or less. Once you have
partitioned your logical drive, you can create file volumes for storing your
data.
File volumes are the basic unit of logical stora ge for a file system on the HP
NetStorage 6000. When you create a file volume, it uses one partition on
one logical drive. Because you are limited to fou r partitions, the max imum
number of file volumes that can be created on a logical drive is four.
NoteThe HP NetStorage 6000 has a limit of 256GB (262144 MB) per partition.
The user interface does not warn you of this limitation. If you attempt to
create a partition greater than 256GB, the operation fails.
Initially, each partition is assigned to a file volume. However , file volumes
can expand to span several partitions if extra storage space becomes
necessary.
Figure 1.3 File Volume and Partition Example
1-5
The illustration in figure 1.3 on page 1-5 shows a logical drive that consists
of three physical drives. This logi cal drive has b een broken down i nto four
partitions (the maximum number). Typically , you create partitions such that
each one becomes a file volume. However, at some point you may r e quire
more storage space for a file volume.
Increasing Storage Capacity
An important aspect of ma naging file vo lumes is the con cept of expan ding
volumes. If, at a later date, a file volume becomes full of data, you can
expand the file volume, thus alleviating the lack of space on the volume.
Just like creating new file volumes, expanding file volumes need storage
space from a logical drive, and a free partition. However, this free space
and free partition do not have to be on the same logical drive as the file
volume that is being expanded. Thus, it is possible to create file volumes
that span across logical drives. This gives you the option of expanding
existing volumes by installing another logical drive on the system.
The example shown in figure 1.4 on page 1-7 expands on the previous
example by adding a new logical drive consisting of five newly added
physical drives. This logical drive has had one partition defined. File
volume 3 has then been expanded to include this newly available space.
Overview
HP NetStorage 6000 Hardware
1-6
Overview
HP NetStorage 6000 Hardware
Figure 1.4 Expanding File Volumes
1-7
Hot Spare Drives
Hot spare drives are reserved drives that are used only when a physical
drive that is part of a logical drive fails. When this happens, the system
automatically selects the first available hot spare drive to take the place of
the failed drive as shown in figure 1.5. The logical drive is rebuilt using the
hot spare, and the hot spare drive becomes a member of the logical drive.
Figure 1.5 Hot Spare Drive
Overview
HP NetStorage 6000 Hardware
It is important to note that a hot spare must have the same or larger capacity
of the physical drive it is to replace. The system will not select a hot spare
to replace a failed drive if the capacity of the hot spare is less than the dr ive
it is to replace.
Once a hot spare is used to repair a logical drive, its assignment changes
from Hot Spare to Online. If you replace the failed drive, it automatically
receives an assignment of Unassigned. You must manually assign the new
drive to Hot Spare if the new drive is to serve as a hot spare.
Redundant Power Supply Modules
A redundant power supply module is installed in the back of the HP
NetStorage 6000. Three power -suppl y modules are acti ve but only t wo are
necessary to power a fully loaded unit. If a power supply module fails, the
redundant supply provides power to t he unit.
1-8
Overview
The HP NetStorage 6000 Web Interface
Redundant Power Supply Cords
The HP NetStorage 6000 lets you attach more than one power source into
the back of the unit. This redundancy protects against a power failure. The
primary power cord needs to be connected when power is turned on.
The HP NetStorage 6000 Web Interface
The HP NetStorage 6000 is managed via a web browser as shown in
figure 1.6 on page 1-10 (Internet Explorer 5.0 or later or Netscape 4.61 or
later). To access the web interface, enter the IP address of the HP
NetStorage 6000 in the address field of your browser.
NoteThe first time you open this interface, a security warning appears. The
NetStorage web interface uses Java an d Javascript co mponents to prop erly
display system information. Your browser detects that such programs are
running and asks for your permission to accept these software
components. You must accept content from or grant privileges to HewlettPackard Company. To prevent further security warnings from appearing,
check the box at the bottom of the window to always trust content from
Hewlett-Packard Company.
1-9
Figure 1.6 HP NetStorage 6000 Web Interface
The web interface’s six tabs are:
n Identity Tab — V iew general system information . See Chapter 2, “The
Identity Tab.”
n Status Tab — View system activity and monitor hardware information.
See Chapter 6, “Monitoring the System.”
n Storage Tab — Create and delete file volumes and directories; create
shares and mount points; modify permissions; view file volume
information; view physical drive specifications. See Chapter 4,
“Managing Storage.”
n Configuration Tab — Initialize, view, and modify network, alert, and
system settings for your device. See Chapter 3, “Configuring Your
System and Network.”
n Backup/Restore T ab — Check the current tape drive status; cr eate disk
checkpoints; schedule a backup; restore volumes, files, and directories;
check settings and features. See Chapter 5, “Backin g Up and Restoring
Files.”
n Support Tab — Request information about the HP NetStorage 6000,
and register and upgrade your operating system. See Chapter 9,
“Contacting Support and Upgrading.”
n Reports Tab — Provides information on hardware and software, file
system configuration, NIC configuration, and environmental status to
up to three email addresses.
Overview
The HP NetStorage 6000 Web Interface
1-10
Overview
Integrating with Network Managem en t Appli ca tion s
Integrating with Network Management Applications
Network management applications let you view and manage devices on
your network. The HP NetStorage 6000 works with the following
management applications:
n HP TopTools versions 4.5 and 5.0
n HP OpenView Network Node Manager version 6.0
n Computer Associates Unicenter TNG Framework version 2.2
n HP OpenView ManageX version 4.21
The integration lets each network management application:
n Identify the HP NetStorage 6000 when it is attached to the network
n Display the HP NetStorage 6000 icon in the platform’s network
topology map
n Launch the HP NetStorage 6000 web-based user interface from a pop-
up menu
n Receive and process event notifications from the HP NetStorage 6000
For more information, see Chapter 10, “Integrating with Management
Applications.”
1-11
Backing up the HP NetS tora ge 600 0
Backing up the HP NetStorage 6000
Local Backup
Y ou can use the backup app lication in the NetStorage web interface plus an
optional HP SureStore DLT Autoloader 818 or 1/9 to perform a local
backup. In a local backup session the data is transferred to the locally
attached Autoloader using a tape format that is unique to the HP NetStorage
6000. The data transfer does not interfere with your LAN traffic.
Remote Backup
You can use third-party backup applications on any computer on the
network with a tape drive attached to perform a remote backup. When you
run a remote backup, data from the HP NetStorag e 6000 tran sfers over the
network to the remote server running the backup application, and then to
the server-attached tape device.
T ape backup is intended to replace the data of an entire drive. It is possible
to restore individual files, but only if you know the exact location of a file.
For a list of remote backup applications the HP NetStorage 6000 integrates
with, see Chapter 11, “Integrating with Remote Backup Applications.”
Overview
1-12
Overview
Locating Information
Locating Information
The online User’s Guide works with HP TopTool s version 5.0. If you do n ot
have TopTools on your system, you can use a web browser to view the
user’s guide (Internet Explorer 5.0 or later or Netscape 4.61 or later). The
context-sensitive, online User’s Guide is pre-loaded on your HP NetStorage
6000.
The guide is organized into main level and sub-level topics.
The left-hand tabs in this help system are:
n Contents — The Contents tab disp lays folders and page s that represent
the categories of information in the online user's guide. When you click
a closed folder, it opens to display its content (subfolders and pages).
When you click an open folder, it closes. When you click pages, you
select topics to view in the right-hand pane.
n Index — The Index tab displays a list of keywords and keyword
phrases. These terms are associated with topics in the help system. To
open a topic in the right-hand pane associated with a keyword, doubleclick the keyword.
A PDF version of the user's guide is also located on the HP NetStorage
6000 CD.
1-13
NoteViewing the PDF-format HP SureStore NetStorage 6000 User’s Guide
requires Adobe Acrobat Reader.
To view this version:
1 Insert the HP NetStorage 6000 CD into your CD-ROM drive.
2 Open a Windows Explorer window.
3 Click on your CD-ROM drive and locate the directory /Doc.
4 Double-click on the file UserGuid.pdf to view it.
Using Help While You Work
You can obtain information about the tabs in the NetStorage web interface
by using context-sensitive help.
1 Click the help icon in the upper right corner of the web interface
window. A help window displays the topic pertai ning to the screen you
are viewing.
2 Review the information, then close the window, or leave help running
in the background by minimizing the screen.
When viewing help, you can maximize the window or resize it with the
buttons in the upper-right corner.
NoteClicking the help icon in the upper right corner does not automatically
bring the on-line help browser window to the top; it may be hidden by
another window. You must raise the window manually by clicking in the
window, clicking the title bar of the window, or selecting it from a task list
Printing Documents
Overview
Using Help While You Work
While using the online user’s guide, you can print topics and information
directly from the viewer . The available print options are determined by the
version of TopTools or your browser.
Select File > Print and click the options you w ant for the screen(s) you are
printing.
1-14
The Identity Tab
Chapter 2
The Identity Tab
The Identity tab displays the following general system information:
n Name—The system or host name for your HP NetStorage 6000
n Description—HP NetStorage 6000
n Manufacturer—Hewlett-Packard Company
n Product Name—The product number corresponding to the original
configuration of the HP NetStorage 6000
n Location—The physical location of the HP NetStorage 6000
n Contact Name—The person to be notified in case of trouble or
questions about the HP NetStorage 6000 (usually the system
administrator)
n Contact Phone—Usually the phone number of the contact name
n Serial #—The factory-set serial number of the unit
n Asset #—A user-assigned number to track company assets
n Net Address—The IP network address of the Network Interface Card
(NIC) in port 1 (although the HP NetStorage 6000 supports multiple
ports, only the first one is displayed)
n MAC Address—The unique Machine Address Code for the NIC in
port 1
n OS Version—The current version of the operating system running on
the HP NetStorage 6000
n Up Time—The cumulative up-time of the HP NetStorage 6000 since
the last reboot
You can change the Name, Location, Contact Name, Contact Phone and
Asset # using the NetStorage 6000 web interface. See“Informational
Settings” on page 3-10 for more information.
2-1
The Identity Tab
2-2
Configuring Your System and Network
The Configuration Tab
Configuring Your System and Network
The Configuration Tab
When you initially set up your HP NetStorage 6000, you must:
n Enter your TCP/IP settings.
n Configure your Network Interface Card parameters.
n Set up your UNIX and/or Windows environments.
If your network configuration changes, you need to alter these settings.
The Configuration tab lets you access:
n Network settings — TCP/IP, Windows and UNIX settings that allow
the NetStorage 6000 to connect with your network and work in
Windows, UNIX or bot h operating systems.
n Alert settings — Optional settings you can enter if you want to receive
e-mail or server notification in case of a hardware failure or system
alerts. You also can specify a remote server to which you can redirect a
copy of the event log.
n System settings — Optional informational settings. Y ou can specify the
date and time as well as password-protect the administration of your
NetStorage web interface.
n User mapping — Configuration and management tools for operating
the HP NetStorage 6000 in a heterogeneous environment with userlevel security for NT clients.
n Shutdown/Restart — Y ou can sh ut down or restar t the HP NetS torage
device from the Configuration tab.
Chapter 3
3-1
Network Settings
TCP/IP Settings
The HP NetStorage 6000 has two Network I nterface Card (NIC) slo ts and
supports the following NICs:
n Single-port 10/100 Base- T
n Dual-port 10/100 Base-T
n Gigabit 1000 Base SX
This support gives the system betw een one and four NIC por ts. When you
initially set up your HP NetStorage 6000, you need to configure your IP
address for the NIC using the front panel display. If you have Dynamic
Host Configuration P rotocol (DHCP) on y our system and it is enabled, NIC
configuration occurs automatically.
If you add a new card or change your IP address, you need to reconfigure
the NIC parameters by filling in each of the individual fields on the TCP/IP Settings screen.
To set the NIC parameters:
1 Select one of the following two options:
Configuring Your System and Network
Network Settings
• Obtain an IP address from the DHCP Server sets the parameters
automatically if DHCP is enabled. Because the parameters are under
DHCP control, you can not enter or change the IP Address or subnet
mask. If you disable DHCP and then later decide to enable it, you will
need to restart your device.
• Depending on your configuration, the D HCP server provides any or
all of the following parameters: System Name, Gateway IP Address,
DNS Domain Name, NIS parameters, and Windows parameters. You
must manually configur e any parameter that D HCP does not set. You
need to reboot your system to configure the DHCP parameters.
2 Specify an IP Address lets you enter the I P Address and subnet mask.
The text fields show the current value which can be changed by entering
a static IP Address and/o r subnet mask. (If you do not have optional NIC
ports, Not Installed displays beneath the NIC port fields.)
3-2
Configuring Your System and Network
Network Settings
3 Click Apply. A dialog box informs you that:
• You are about to change the system’s NIC parameters. You (a nd other
users) will lose the connection to the device while the changes take
place.
• The NetStorage web interface in the current browser cache becomes
invalid. You should close the browser and reconnect to the system
using the new NIC parameters.
• Any invalid entries in the NIC parameters may result in an inability
to access the NetStorage web interface.
4 Click OK. You do not need to restart the system.
NIC parameter fields are provided for up to three optional NIC ports. They
behave identically to the fields for the primary NIC.
DNS Settings
To define the DNS settings:
1 Using the NetStorage web interface, click the Configuration tab, then
select Network Settings > DNS Settings.
2 Enter the:
3-3
• System Name (Host or Computer Name)
• DNS Domain Name (Name of the domain on which the HP
NetStorage 6000 device resides such as, alpha.corp.com)
• Primary and Secondary DNS server IP addresses
3 Click Apply. You do not need to restart the system.
UNIX Settings
During initial setup, you must specify how to manage and maintain the
Hosts and Trusted Hosts files. Hosts file management lets you map a
machine name to its IP address. Trusted Hosts file management lets you
configure hosts on your network so that they have a trusted relationship
with the HP NetStorage 6000. A trusted re lationship lets the host perform
administrative func tio ns , s uch as f ile ch anges and remote network backup
(on the HP NetStorage 6000).
To add a Hos ts file:
1 Using the NetStorage web interface, click the Configuration tab, then
select Network Settings > UNIX Settings.
2 Click Add next to the Hosts File M anagement field. The Add Host
File Entry screen appears.
3 Enter a Host Name and a Host IP Address.
4 If you are adding:
• multiple hosts, you need to click Apply after each addition, then click
OK when you finish.
• only one host, you can simply click OK.
Configuring Your System and Network
Network Settings
To modify or delete an existing Hosts file:
1 Using the NetStorage web interface, click the Configuration tab, then
select Network Settings > UNIX Settings.
2 Select a host from the Hosts drop-down list.
3 Click either:
• Edit. Modify the Host Name and Host IP Address, then click
Apply.
• Remove. Click OK to confirm your selection.
3-4
Configuring Your System and Network
Network Settings
To set up a Trusted Host, you must first specify it in the Hosts file:
NoteMaking a host trusted may compromise network security and should only
be done for administrative purposes.
1 Using the NetStorage web interface, click the Configuration tab, then
select Network Set t i ngs > UNIX Settings .
2 Click Add next to the Trusted Hosts File Management field. The Add
Trusted Host Entry screen appears.
3 Enter the host name.
4 If you are adding:
• multiple trusted hosts, you need to click Apply after each addition,
then click OK when you fini sh.
• only one trusted host, you can simply click OK.
To change or delete an existing trusted host:
1 Using the NetStorage web interface, click the Configuration tab, then
select Network Set t i ngs > UNIX Settings .
2 Select a host from the Hosts drop-down list.
3-5
3 Click either:
• Edit. Modify the Trusted Host Name, then click Apply.
• Remove. Click OK to confirm your selection.
Windows Settings
If you support Windows users, you must specify the Windows settings
during initial setup.
To specify the Windows settings:
1 Using the NetStorage web interface, click the Configuration tab, then
select Network Settings > Windows Settings.
2 Enter the:
• Primary and S eco ndary WINS IP Addresses
• Network Neighborhood System Comment (optional)
3 Click either User Level Security or Share Level Security for the
security mode. See “User-Level Security” on page 8-6 or “Share-Level
Security” on page 8-5 for more information.
a If you select User Level Security, enter the:
— Domain Name
— Domain Login Name (the login name speci fied must have
sufficient permission to allow machines to be added to the
domain)
— Domain Passwor d
Configuring Your System and Network
Network Settings
b If you select Share Level Security, enter the name of the
Workgroup where the HP NetStorage 6000 is a member.
4 Click Apply. You do not need to restart the system unless you changed
your security mode.
3-6
Configuring Your System and Network
Alert Settings
Alert Settings
SMTP/Email
The HP NetStorage 6000 lets you automatically notify individuals via email if there is a hardware failure or a critical system alert.
To set up automatic notification:
1 Using the NetStorage web interface, click the Configuration tab, then
select Alert Settings > SMTP/email.
2 Enter the name of the e-mail server. The e-mail server must be an IP
address or a fully qualified name (such as, alpha.corp.com).
NoteIf you change the e-mail server, it automatically changes the e-mail server
specified in the Reports tab. See “The Report Tab” on page 7-1.
3 Enter the e-mail addresses of as many as four individuals. You must
specify an e-mail server if one or more e-mail recipients are defined.
4 Click either:
• Send Test email to send a test message to the recipients and save
your settings.
3-7
• Apply to only save your settings.
NoteThe information on this screen is optional. Blank fields do not affect the
functionality of the device. In the event of a hardware failure or system
alert, messages are sent through the network management tool or they are
logged in the event log. See “View Event Log” on page 6-3.
Configuring Your System and Network
SNMP/Network Management Settings
If you are using a Simple Network Management Protocol (SNMP) tool,
you can define the names of the servers to receiv e notification in case of a
failure.
To define the servers to receive notification:
1 Using the NetStorage web interface, click the Configuration tab, then
select Alert Settings > SNMP/Network Management.
By default, the Community String field is set to public and the Trap Destination fields are blank.
2 In the Trap Destination fields, enter the IP addresses or names of the
servers you want the system to notify (up to five).
3 Enter a value in the Volume Capacity Threshold field to receive a
warning message if your volume gets to a certain capacity. By default,
the field is set to 95 percent
4 Click either:
• Send SNMP Test Trap to send a cold boot test trap to the destination
addresses and save your changes.
• Apply to only save your settings.
Alert Settings
NoteThe information on this screen is optional. Blank fields do not affect the
functionality of the device.
3-8
Configuring Your System and Network
Alert Settings
System Log
You can define a remote server to which you can redirect a copy of the
event log. For more information, see “View Event Log” on page 6-3. The
Syslog function lets you manage a central location for the event log instead
of working with different interfaces or systems. The Syslog function allows
the event log to be redirected to systems with a Syslog daemon.
NoteRed Hat Linux 6.1 requires that you set the -r option in the syslog daemon
to enable the device to receive messages from the network. This action,
along with defining the remote server on the SYSLOG page, allows the
HP NetStorage 6000 event log messages to appear in the Red Hat Linux
6.1 system log file.
To define a remote server to receive a copy of the event log:
1 Using the NetStorage web interface, click the Configuration tab, then
select Alert Settings > Syslog.
2 Enter the name or IP address of a remote server to redirect the event log
to. (If the field blank, this feature is disabled.)
3 Click Apply.
3-9
NoteSystem log information is optional. A blank field does not affect the
functionality of the device.
System Settings
Informational Settings
The Informational Settings appear on the Identity screen of the
NetStorage web interface. Network management tools may also function
according to the contents of these fields.
To change the informational settings:
1 Using the NetStorage web interface, click the Configuration tab, then
select System Settings > Informational Settings.
2 Enter the:
• Name of the person primarily responsible for the HP NetStorage
6000 in the Contact Name field.
• Phone number of the person primarily responsible for the HP
NetStorage 6000 in the Contact Phone Number field.
• Description of the phys ical location of the HP NetS torage 6000 in the
System Location field.
• Number that your company might use to identify and track the HP
NetStorage 6000 in the Asset Number field.
Configuring Your System and Network
System Settings
3 Click Apply.
NoteBlank fields do not affect the functionality of the device. However,
entering your system location lets you easily determine which device has
issued an alert when you receive notification of an error. (The e-mail
message contains the system name.) If you provide your system location
information, you can easily troubleshoot or repair the problem.
3-10
Configuring Your System and Network
System Settings
Date and Time Settings
Although not required, you should set the date and time on the HP
NetStorage 6000. The system uses the information on this screen to keep
track of the date and time for operations such as:
n Backup
n Time stamps for file generation and modification
n Log file re ports
Failure to set the proper date and time may lead to confusing behavior or
misleading time stamping of files and log messages.
To set the date and time:
1 Using the NetStorage web interface, click the Configuration tab, then
select System Settings > Date an d Time.
2 Enter the:
• current date using the format mm/dd/yyyy.
• current time using military format hh:mm.
3 Select a Time Zone for your area from the pull-down menu.
3-11
4 If desired, check Automatically Adjust Clock for Daylight Savings
Changes.
5 Click Apply.
Configuring Your System and Network
System Settings
Administrative Password Settings
You can set a password for the HP NetStorage 6000. This prevents
unauthorized access to the storage device’s web interface. The HP
NetStorage 6000 ships without password protection, and the fields are
initially blank.
NoteIf you set a password for the HP Net Storage 6000, protect it as you wou l d
any other password. If you forget or lose this password, you will not be
able to access your device. Call HP Support for assistance. See “HP
NetStorage 6000 Service and Support” on page 9-1.
If you specify a password, you mu st know the pas sword to view or modify
the information in the other tabs. You can not access the NetStorage web
interface without the password.
To initially specify a password:
1 Using the NetStorage web interface, click the Configuration tab, then
select System Settings > Administrative Password.
2 Leave the Old Password field blank. Enter a password in the New
Password field. Use any combination of letters and numbers, and
uppercase and lowercase characters.
3 Confirm your password by typing it again in the Confirm New
Password field.
4 Click Apply.
5 A dialog box informs you that your password is set. Click OK.
NoteIf you did not correctly confir m you r pas swo rd, a di al og box p romp t s yo u
to re-enter your password
3-12
Configuring Your System and Network
System Settings
To change your password:
1 Using the NetStorage web interface, click the Configuration tab, then
select Systems Settings > Administrative Password.
2 Enter your password in the Old Password field.
3 Enter a new password in the New Password field. You can use any
combination of letters and numbers, and uppercase and lowercase
characters.
4 Confirm your password by typing it again in the Confirm New
Password field.
5 Click Apply.
6 A dialog box informs you that your new password is set. Click OK.
To remove a password:
1 Using the NetStorage web interface, click the Configuration tab, then
select Systems Settings > Administrative Password.
2 Enter your password in the Old Password field.
3 Leave the New Password and Confirm New Password fields blank.
4 Click Apply.
3-13
5 A dialog box informs you that your new password is set. Click OK.
NoteA dialog box prompts you to re-enter your password if you did not type
your old password, you typed an incorrect password in the Old Password
field, or you did not correctly confirm your password.
Hardware Settings
The HP NetStorage 6000 may be attached to an uninterruptible power
supply (UPS).
To enable or disable HP NetStorage 6000 support for the UPS:
1 Using the NetStorage web interface, click the Configuration tab, then
2 Check External power supply (UPS) attached if you are going to
3 Click Apply. In order for the changes to take effect, you need to restart
NoteFor a list of supported UPS devices, see Appendix , “System
Specifications.”
User Mapping
Configuring Your System and Network
User Mapping
select System Settings > Hardware Settings.
attach a UPS to the HP NetStorage 6000. Clear this setting if you are
going to use the HP NetStorage 6000 without a UPS.
your system.
Mapping Strategy
The HP NetStorage 6000 server is a general purpose file server with
capabilities to serve files to Windows clients and UNIX/Linux clients using
the native file serving protocol of each client. In order to allow clients to
access the same files, with the same access privileges , it is necessary to map
the equivalency of the UNIX and Windows accounts. The mapping occur s
on both a user and Windows primary group level. In order to create this
mapping or association, it is necessary to specify an overall strategy and
then manage the mapping files as needed.
For more information, see “Mapping NT and UNIX Users” on page 8-12.
3-14
Configuring Your System and Network
User Mapping
To select a mapping strategy:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > Mapping Strategy.
2 Select a User Mapping strategy. The possible choices are:
• No Mapping — No automatic mapping between UNIX NIS
accounts and Windows accounts occurs. Any mapping between
accounts must be done by editing the user map file for each account.
• User Name Mapping — If the Windows and UNIX username s from
the NIS files are identical, then a mapping association is
automatically created in the user map file.
• Full Name Mapping — If the Windows full name field and the
UNIX comment field in the NIS file, are identical then a mapping
association is automatically created in the user map file.
3 Select a Group Mapping strategy. The possible choices are:
• No Mapping — No automatic mapping between a UNIX NIS gr oup
file and Windows primary group account occurs. Any mapping
between group accounts must be done by editing the group map file
for each account.
3-15
• Group Name Mapping — If the primary Windows group account
and the UNIX NIS group account names are identical then a mapping
association is automatically created in the group map file.
4 Click Apply when you are satisfied with your mapping choices.
Configuring Your System and Network
User Mapping
NIS User Accounts
NoteThe HP NetStorage 6000 supports NIS service, but not NIS+ service.
The HP NetStorage 6000 allows you read-only access to portions of the
user NIS file generated by the Network Information Service (NIS) when
NIS is enabled. This information is provided for assistance if you find that
you need to make modifications to the user map file. The user map file
associates an NT or Windows user with a UNIX user account. NT or
Windows client information is automatically captured by the NetStorage
6000. Depending upon the user mapping strategy that you have selected,
you may find that you wish to create an association between a specific
Windows or NT clien t and a UNIX account. In order to make this custom
association you need the UNIX user name and UID. Y ou can scroll thro ugh
the user NIS file to find the UNIX account name and UID that are needed
to complete the custom mapping.
Once you have identified the UNIX user name and UID value, you can
modify the user map file using the NetStorage web interface. Fill in the
appropriate fields with the UNIX user account information.
For more information, see “Mapping Strategy” on page 3-14 and
“Modifying the User Map File” on page 3-19.
NoteIn order to see the user NIS file, the NIS service must first be enabled.
To enable or disable NIS (disabled is the default) for User Accounts:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > NIS User Accounts.
2 Click on NIS Service.
3 Check or clear Enable NIS. If you are enabling NIS, enter the:
• master server’s IP address in the NIS Server field.
• appropriate NIS domain name in the NIS Domain field.
4 Click Apply. You do not need to restart the system.
The NIS files are automatically updated every 5 minutes when the NIS
service is enabled. If the service is d isabled, y ou see either stale data or an
informational message indicating that the file is empty.
NoteThe NIS service can be enabled from either the NIS User Account page or
the NIS Group Account page.
3-16
Configuring Your System and Network
User Mapping
NIS Group Accounts
NoteThe HP NetStorage 6000 supports NIS service, but not NIS+ service.
The HP NetStorage 6000 allows you read-only access to portions of the
user NIS file generated by the Network Information Service (NIS) when
NIS is enabled. This inf ormation i s pr ovide d for ass istance if you fi nd th at
you need to make modifications to the group map file . The group map fil e
associates an NT or Wi nd ows primar y group with a UNIX group account.
NT or Windows primary group account information is automatically
captured by the NetStorage 6000. Depending upon the group mapping
strategy that you have selected, you may find that you wish to create an
association between a specific Windo ws or NT client and a UNIX account.
In order to make this custom association, you need the group name and
GID. You can scroll through the group NIS file and find the UNIX group
name and GID that are needed to complete the custom mapping.
Once you have identified the UNIX group name and GID value, you can
modify the group map file using the NetStorage web interface. Fill in the
appropriate fields with the UNIX group account information.
For more information, see “Mapping Strat egy” on page 3-14 and
“Modifying the Group Ma p File” on page 3-20.
3-17
NoteIn order to see the group NIS file, the NIS service must first be enabled.
To enable or disable NIS (disabled is the default) for Group Accounts:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > NIS Group Accounts.
2 Click on NIS Service.
3 Check or clear Enable NIS. If you are enabling NIS, enter the:
• master server’s IP address in the NIS Server field.
• appropriate NIS domain name in the NIS Domain field.
4 Click Apply. You do not need to restart the system.
The NIS files are automatically updated every 5 minutes when the NIS
service is enabled. If the service is disabled, y ou see either s tale data or an
informational message indicating that the file is empty.
NoteThe NIS service can be enabled from either the NIS User Accou nt page or
the NIS Group Account page.
Configuring Your System and Network
User Mapping
NIS Service
NoteThe HP NetStorage 6000 supports NIS service, but not NIS+ service.
The HP NetStorage 6000 allows you read-only, online access to the user
NIS file generated by the Network Information Services (NIS) service. In
order to see this file the NIS service must first be enabled.
To enable or disable NIS (disabled is the default) for User Accounts:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > NIS User Accounts or User Mapping > NIS
Group Accounts.
2 Click on NIS Service.
3 Check or clear Enable NIS. If you are enabling NIS, enter the:
• master server’s IP address in the NIS Server field.
• appropriate NIS domain name in the NIS Domain field.
4 Click Apply. You do not need to restart the system.
The NIS files are automatically updated every 5 minutes when the NIS
service is enabled. If the service is disabled you see either stale data or an
informational message indicating that the file is empty.
3-18
Configuring Your System and Network
User Mapping
Modifying the User Map File
The user map file contains an entry for each unique Windows client that
attaches to the HP NetStorage 6000 while the device is configured to use
user-level security. The format of the file entry is:
The UID value that is assigned to the Windows client is one number lar ger
than the largest UID value in the users map or users NIS file starting with
number 65537. The defau lt UNIX username is t he UID value prefixed wit h
a lower case u.
When a new Windows client attaches to the HP NetStorage 6000 this file
is consulted along with the mapping strategy that you have select ed. Fo r
example, if you have selected User Name mapping, when a UNIX client
attaches with the an identical UNIX and Windows username the UNIX
client information is used instead of the default information discussed
above.
By reviewing the user map file you see that the UNIX us ernames, UIDs and
Window client information is associated with the file security for each
protocol.
To add or modify an entry in the user map file:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > User Map File. The current user map file is
displayed.
3-19
2 Click Modify Map. The UNIX Logon Name and UNIX UID values are
displayed and can be edited. The Windows Logon Name, Windows
Domain, and Windows RID values are displayed for informational
purposes only and cannot be edited.
3 Once you have completed your modifi cat ion s, click Apply to re turn to
the User Map File page. You do not need to restart the system.
To delete an existing map file entry:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > User Map File. The current user map file is
displayed.
2 Click Delete M ap. You receive confirmation that the selected us er h as
been deleted.
Modifying the Group Map File
The group map file contains an entry for each unique Windows primary
group that is associated with the Windows users that access the NetS torage
6000 when it is configured to use user-level security. The format for the
group map file is:
The GID value that is assigned to the Windows clients’ primary group is
one number larger than the largest group map or group NIS file starting
with number 65537. The default UNIX groupname is the GID value
prefixed with a lower case u.
When a Windows client attaches to the NetStorage 6000 for the first time
this group map file is consulted alon g with the gro up mapping st rategy that
has been selected. For example, if you have selected group mapping by
name, when a UNIX client attaches with an identical UNIX and Windows
group name, the UNIX group information is used instead of the default
group infor mation discussed above.
To modify an entry in the group map file:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > Group Map File. The current group map file is
displayed.
2 Click Modify Map. The UNIX gro up name and UNIX GID values are
displayed and can be edited. The Windows Group Name, Windows
Domain, and Windows RID values are displayed for informational
purposes only and cannot be changed.
Configuring Your System and Network
User Mapping
3 Once you have completed your modifi cati on s, cli ck Apply to return to
the User Map File page. You do not need to restart the system.
To delete an existing map file entry:
1 Using the NetStorage web interface, click the Configuration tab, then
select User Mapping > Group Map File. The current group map file is
displayed.
2 Click Delete Map. You receive co nfirmation that the selected group has
been deleted.
3-20
Configuring Your System and Network
Shutting Down and Restarti ng
Shutting Down and Restarting
Shutting Down the HP NetStorage 6000
Shut down the device if you:
n move the device to a new location
n anticipate a power outage in your building and you do not have an
uninterruptible power supply for the device
To shut down the device:
1 Using the NetStorage web interface, click the Configuration tab, then
select Shutdown/Restart.
2 Click the Shutdown button. A dialog box informs you that:
• You and any other connected users will lose the connection to the
device.
• The NetStorage web interface in the current browser cache becomes
invalid. The browser closes and you must re-connect to the system
after it reboots.
3 Click OK.
3-21
4 When the LCD display on the unit is blank, turn off the device by
pushing the power switch in the back.
Configuring Your System and Network
Restarting the HP NetStorage 6000
Restart the device if you:
n Download a new version of the NetStorage web interface as described
in “Upgrading From the Web” on page 9-4.
n Install a new operating system
n Change your security mode as described in “Windows Settings” on
page 3-6.
n Enable DHCP as described in “TCP/IP Settings” on page 3-2.
To restart the device:
1 Using the NetStorage web interface, click the Configuration tab, then
select Shutdown/Restart.
2 Click the Restart button. A dialog box informs you that:
• You and any other connected users will lose the connection to the
device.
• The NetStorage web interface in the current browser cache becomes
invalid. The browser closes and you must re-connect to the system
after it reboots.
3 Click OK.
Shutting Down and Restarting
3-22
Managing Storage
The Storage Tab
The Storage Tab
The storage tab in the HP NetStorage 6000 lets you:
n View file volumes and share information
n Manage file volumes (create, expand, rename, and delete)
n Manage directories in file volumes (create, rename, and delete)
n Manage Windows shares in directories (create or edit)
n Manage mount points (UNIX only)
n View physical drive information
n View logical drive information
n Manage logical drives (create, delete, and rebuild)
n Assign hot spare drives
Chapter 4
Managing Storage
4-1
Managing Physical and Logical Drives
Managing Physical and Logical Drives
View Physical Drive Information
The HP NetStorage 6000 contains ten drive bays to host as many as ten
physical disk drives. Physical drives are used in groups of three to eight to
create RAID sets (logical drives). Physical dr ives are also used individually
as hot spares. A drive assigned as a hot spare automatically repairs a RAID
set when one of the drives in the set becomes damaged or is removed.
To examine and manage physical drives:
Using the NetStorage web interface, click the Storage tab, then select
Physical Drives.
A table displays the following drive information.
n Slot assignment of each drive
n Vendor or manufacturer of the drives
n Product drive name
n Revision level of the drive
n Serial number of the drive
n Drive capacity in Megabytes
n Mapping of the Logical Drive associated with the physical drive
The table also shows the current status of each drive:
n Empty
n Rebuilding
n Online
n Unassigned
n Hot Spare
n Dead
Managing Storage
NoteThe Actions button in the upper left corner lets you create logical drives
and assign hot spares.
4-2
Managing Storage
Managing Physical and Logical Drives
View Logical Drive Information
Logical drives on the HP NetStorage 6000 are roughly equivalent to what
is commonly referred to as a RAID set. Y ou may par tition the storage space
on logical drives to create up to four file volumes. You may want to view
logical drive information to see how much free space is available in the
individual partitions, and where you might want to save your data.
To manage and view logical drive information:
Using the NetStorage web interface, click the Storage tab, then select
Logical Drives.
A table displays partition information for each logical drive in the system.
To the left of the table, the following drive information displays:
n Drive name
n Drive capacity
n RAID level
n Drive status
The table contains partition information for the logical drive. Each logical
drive contains a maximum of four partitions. Partitions are allocated to
create file volumes. The table displays the current allocation of partitions
to the file volumes on the system, and contains the following information:
4-3
n Partition number (1 through 4)
n File volume name
n Raw capacity (unformatted capacity dedicated to the file volume)
n Percent of total space used by the partition
Partitions that are available for the creation of new file volumes display
<FREE SPACE> in the File Volume Name column, and show the
maximum available free space in the Raw Capacity column.
NoteThe Actions button in the upper left corner lets you create, rename,
expand, and delete file volumes.
Create a Logical Drive
You create logical drives by grouping a set of phys ical drives into a sing le
RAID set. Currently, the HP NetStorage 6000 supports only RAID level 5
for the creation of logical drives. Because RAID level 5 requires a
minimum of three physical drives for a RAID set, the HP NetStorage 6000
requires at least three drives to be grouped together to create a logical drive.
To create a new logical drive:
1 Using the NetStorage web interface, click the Storage tab, then select
Physical Drives.
2 Click Actions, then select Create Logical Drive. All of the physical
drives in the system are displayed. Each drive is represented by a
graphic of a drive bay:
• Drive bays containing unassigned drives are selectable.
• Drive bays that are empty, or that contain assigned drives are not
selectable.
3 Click on the graphics of the drives that are to be used to make the new
logical drive.
4 Click OK.
Managing Storage
Managing Physical and Logical Drives
A status message is displa yed along with a pro gress bar and a Close button.
Y o u do not need to monitor the creation process, and you may return to the
Physical Drives screen at any time by pressing the Close button. T o return
to the progress screen, select Actions > View Create Status.
The drive is prepared in three stages:
1 The command is issued to the RAID controller.
2 The RAID controller activates the new logical drive.
3 The logical drive is initialized.
The first two steps execute quickly and are typically completed within a
minute. After these two steps are complete, the new Logical Drive is ready
to use. At this point, you may create volumes and place data on those
volumes. You do not need to wait for the third step to run to completion.
4-4
Managing Storage
Managing Physical and Logical Drives
Drive Initialization, the third and final step of Logical Drive creation, takes
place in the background and may be time-consuming. Th is process shou ld
run to completion before t he system is re-booted or powered down. In order
for the system to track the process, other RAID-related operations, such as
Hot Spare assignment, are not allowed until this process is complete.
NoteA logical drive may contain a maximum of eight physical drives.
Delete a Logical Drive
When you delete a logical drive, the physical drives it used are set to the
unassigned state. It is i mportant to note thoug h, that you can onl y delete the
last logical drive in the list. For example, if two logical drives exist on the
system, in order to delete the first logical drive, you must first delete the
second logical drive.
To delete a logical drive:
1 Using the NetStorage web interface, click the Storage tab, then select
Physical Drives.
2 Click Actions, then select Delete Logical Drive.
4-5
3 The logical drive available for deletion displays.
4 If it is the drive you want to delete, click Yes. Otherwise, click No.
5 If you click Yes, a second page appears to confirm your selection.
Caution: Verify that this is the drive you want to delete. Deleting a
logical drive destroys all the data on that logical drive, and the
procedure cannot be reversed.
6 Enter Yes.
7 Click OK.
NoteWhile the HP NetStorage 6000 deletes a drive, the LEDs flash and the
user interface freezes. Do not perform any tasks with the keyboard or
mouse while this activity takes place.
Managing Storage
Managing Physical and Logical Drives
Rebuild a Logical Drive (RAID set)
If a physical drive in a logical drive fails and a hot spare is not available to
automatically replace it, the logical drive goes into a critical state. In this
state, the logical drive does not protect the data with redundancy. All data
on the logical drive is lost if another drive fails.
NoteIf you replace a failed drive with a new drive, you must use the same slot
that the failed drive used.
To recover the logical drive from critical state, replace the failed hard
drive with a new one and rebuild the logic al drive:
1 Replace the failed drive. (Follow the instructions that come with the
drive.)
2 Using the NetStorage web interface, click the Storage tab, then select
Physical Drives.
3 Verify that the drive is recognized by the system. Click Actions, then
select Refresh to update the table. If the drive is not recognized (as
unassigned), reboot the system.
4 Once the drive is recognized and is in an unassigned state, click
Actions, then select Rebuild Logical Drive.
5 You are prompted to select a logical driv e to rebuild. Normally, ther e is
only one drive to select. Select the desired logical drive to rebuild.
6 Click OK.
The rebuilding process may t ake o ne or more hours. To monitor the status
of the drive on the Physical Drives page, click Actions, then select
Refresh to update the table. When the drive is rebuilt, its status changes
from Rebuilding to Online.
4-6
Managing Storage
Managing Physical and Logical Drives
Assign a Hot Spare
The HP NetStorage 6000 l ets you as sign ph ysical drives to fu nction as hot
spares. Hot spare drives are reserved drives that are used only when a
physical drive that is part of a logical drive fails. When this happens, the
system automatically selects the first available hot spare drive to take the
place of the failed drive. The logical drive is rebuilt using the hot spare, and
the hot spare drive becomes a member of the logical drive.
Once a hot spare is used to repair a logical drive, its assignment changes
from Hot Spare to Online. If you replace the failed drive, it automatically
receives an assignment of Unassigned. Y ou must manually assign the new
drive to Hot Spare if the new drive is to serve as a hot spare.
Most systems only use one physical drive to serv e as a hot spare. However ,
there is no restriction on the number of hot spares in the system, though
every additional hot spare uses another physical drive and lessens storage
capacity. Any and all drives may serve as hot spares. There is no
requirement to have a hot spare on the system at all.
To assign a hot spare:
1 Click the Storage tab, then select Physical Drives.
4-7
2 Click Actions, then select Assign Hot Spares.
3 A picture representing all of the physical drives in the system appears.
Each drive is represented by a graphic of a drive bay. Drive bays
containing unassigned drives or hot spare drives are selectable. All other
drive bays are not selectable.
4 Select the drives to be used as hot spares by clicking on them.
5 Click OK.
NoteRefer to the HP support web page for more information on upgrading
storage capacity or replacing a failed hard drive.
Managing File Volumes and Directories
Managing File Volumes and Directories
View File Volume Information
File Volumes are the basic unit of logical storage for a file system on the
HP NetStorage 6000. The v olume contains a directory hierar chy that stores
files within the directories of that hierarchy. You can manage directories
and files from a remote UNI X or Windows system us i ng Explorer on
Microsoft Windows, or by mounting the file volume from a UNIX shell.
The HP NetStorag e 6000 also of fers a simpl e browsing tool that allows you
to examine the hierarchy of each file volume o n the system, and to perform
basic management functions.
To view file volume information:
1 Using the NetStorage web interface, click the Storage tab, then select
File Volumes. A tree list appears on the left. On the right, a file volume
summary screen appears. This summary screen displays the following
general information for each volume on the system:
• File volume name
• Total capacity in MB
• Free space in MB
• Free space in percent
• Used space
2 Navigate the tree list to display more detailed information for each file
volume, and each subdirectory within the file volume. The root of the
tree is an image of a computer, and is called Summary. Select this to
display the summary page .
File volumes are displayed in the second level of the tree hierarchy.
Select a file volume to display a page that contains the following
information:
Managing Storage
• File volume name
• Total capacity in MB
• Used space in MB
• Used space in percent
• Unused space in MB
• Unused space in percent
• Windows share status of the volume root, and lets you change the
share status. You can use the Actions button to manage directories.
4-8
Managing Storage
Managing File Volumes and Directories
3 To view subdirectory information, select a subdirectory (d esignated by
a file folder graphic). The following information displays:
• Name of subdirectory
• Absolute path from the root
• Windows share status
Create a New File Volume
You create file volumes by allocating space from a logical drive. Logical
drives on the HP NetStorage 6000 are divided into a maximum of four
partitions. Whenever you create a file volume, it uses one partition on one
logical drive.
To create a new file volume:
1 Using the NetStorage web interface, click the Storage tab, then select
Logical Drives.
2 Click Actions, then select Create File Volume.
3 Enter a new file volume name in the space provided.
4 Select a partition to use from the pull down menu.
4-9
5 Enter desired file volume size (MB) in the space provided.
6 Click OK.
A progress bar displays while the new volume is formatted.
Expand a File Volume
To expand a file volume, there must be free storage space and a free
partition on a logical drive. This free space and free partition do not need
to be on the same logical drive as the file volume to be expanded—you can
create file volumes that span across logical drives. This gives you the
option of expanding existing volumes b y installing another logical drive on
the system.
To expand an existing file volume:
1 Using the NetStorage web interface, click the Storage tab, then select
Logical Drives.
2 Click Actions, then select Expand File Volume.
3 Select the volume to be expanded.
4 Select a partition to use from the pull down menu.
5 Enter desired file volume size in the space provided.
6 Click OK.
A progress bar displays while the file volume is expanded.
Managing Storage
Managing File Volumes and Directories
Rename a File V olume
To rename a file volume:
1 Using the NetStorage web interface, click the Storage tab, then select
Logical Drives.
2 Click Actions, then select Rename File Volume.
3 Select the volume you want to rename.
4 Enter a new name in the text field.
5 Click OK.
NoteYou can not rename file volumes that have been expanded.
4-10
Managing Storage
Managing File Volumes and Directories
Delete a File V olume
When you delete a file volume, the space it u sed is reclaimed by the logical
drive. However, if you delete a file volume that uses a partition number
lower than a partition currently in use by another file volume, the freed
space is not combined with the other free space on the logical drive.
For example, if partition 1 is deleted, and partition 2 contains a file volume,
then the space freed up by partition 1 must remain as the fixed space of that
partition. Partition 1 can still be used for a file volume, but the volume must
allocate no more space than the volume that was deleted.
This restriction does not apply to deleted file volumes that are located in
partitions adjacent to the remaining free space on the logical drive.
CautionDeleting a file volume destroys all the data on that volume. The p rocedure
cannot be reversed.
To delete a file volume:
1 Using the NetStorage web interface, click the Storage tab, then select
Logical Drives.
2 Click Actions, then select Delete File Volume.
4-11
3 Select the volume you want to delete.
4 Click OK.
5 Enter Yes when asked to confirm your selection.
6 Click OK.
Managing Storage
Managing File Volumes and Directories
Create a Directory
You can create subdirectories under the root level of the file volume, or
under any directory in the hierarchy. Subdirectories let you organize your
data into easily accessible folders.
To create a directory:
1 Using the NetStorage web interface, click the Storage tab, then select
File Volumes.
2 Navigate the tree list to highlight the desired file volume or directory.
3 Click Actions, then select Create Directory.
4 Enter the directory name in the text field.
5 Click OK. The new directory is created immediately.
NoteBefore a network user can see this directory, you must either share it or
create a mount point. For more information, see “Create or Edit Windows
Shares” on page 4-14.
Rename a Directory
To rename a directory:
1 Using the NetStorage web interface, click the Storage tab, then select
File Volumes.
2 Navigate the tree list to highlight the desired directory.
3 Click Actions, then select Rename.
4 Enter a new name in the text field.
5 Click OK.
4-12
Managing Storage
Managing File Volumes and Directories
Delete a Directory
Y ou can delete director ies to free up disk space or to remov e unwanted data
on the HP NetStorage 6000.
CautionDeleting a directory destroys all the data in that directory and all of its
subdirectories. The procedure cannot be reversed.
To delete a directory:
1 Using the NetStorage web interface, click the Storage tab, then select
File Volumes.
2 Navigate the tree list to the desired directory item and select it.
3 Click Actions, then select Delete.
4 When prompted, confirm your selection.
4-13
Allowing Access to Data
Create or Edit Windows Shares
Shares are permissions that let you control Microsoft Windows users’
access to data. You can create shares in any directory within a file volume,
including the root. Once a share is created, users may attach to the share via
the network neighborhood in Windows and store and retrieve files and
directories.
Security for network shares is handled in one of two ways:
n Secure share level security is the simplest security method available.
Access to the share may be restricted on a share by share basis. The
administrator can set Read Onl y pas swo rds and Read / Write passwords
for each share on the system. Users wishing to gain acces s to a share are
asked to supply the correct password. Only users with the correct
password are given access to the share. Passwords are encrypted for
transmission over the network lines.
n User level security is more advanced and offers more flexibility for
both the administrator and the user:
• Users are authenticated via the NT domain controller using pass
through authentication.
Managing Storage
Allowing Access to Data
• Users accessing the resources of the system must be logged onto an
NT domain and must have specific rights to access the given
resource. The resource is not only the share, but the directories and
files within the share as well.
• Administrators and users may r estrict acces s to any file, directory or
groups of files and directories to any user or group of users in the
domain.
To create or edit shares in Windows:
1 Using the NetStorage web interface, click the Storage tab, then select
File Volumes.
2 Select the item to be shared in the tree list (the file volume root or a
subdirectory).
3 In the Windows Networking box, select Share As.
4 A default name appears in the Share Name field. You can change this
name to any name desired.
4-14
Managing Storage
Allowing Access to Data
NoteWindows shares are indicated in the tree list with a graphic of a hand
Edit Host Access
5 Enter a Comment (optional).
6 Enter a password in the R/O and R/W fields. (Thes e appear onl y if you
are using Share Level Security. See “Share-Level Security” on
page 8-5.)
7 Click Apply.
holding the shared object.
The HP NetStorage 6000 automatically generates a UNIX mount point at
the root of the file volume when you create the volume. Mount points allow
access to the system via the NFS protocol. By default, the mount point
allows no access from any UNIX host when the volume is created. You
must specifically grant access before UNIX host systems can mount the
volume. Host access rights to resources via the NFS protocol are managed
through the approve file.
The /etc/approve File
4-15
In traditional UNIX implementations, the exports file is used to restrict
host access to the defined mount points. On the HP NetStorage 6000, this
function is handled by the /etc/approve file. The administrator may
edit this file:
n Directly from a text editor via an NFS (UNIX) mount or a Windows
share. The file is named approve, and is located in the /etc directory
in the first file volume created on the system. The /etc direct ory is an
administrative file directory. The files may be edited (with the correct
permissions), but they cannot be deleted.
n From the HP NetStorage web interface, as explained in this section.
Entries in the approve file have four fields:
Managing Storage
Allowing Access to Data
FieldRestrictions
class
This field specifies the class of object to protect. In all
cases, the object is files.
specifier
This field specifies the resources on the NetStorage 6 00 0
server to protect. For example, /engineering, a pplies to all
files and directories in the /engineering file system.
host pattern
This field has the name of a host or group of hosts that
have access rights. Host names must be resolvable
through the local /etc/hosts file, the NIS hosts file,
or through DNS. Groups of hosts are specified in the /etc/hostgrps file. If the host pattern is the name of a
group, then it must be preceded by the @ symbol. The
wildcard character ( * ) may be used to specify all hosts.
Note that the @general group is a pre-defined group
that specifies all hosts.
rights
This field specifies the access limits to apply. The entry
in this field can be:
access=rw Allow read and write access to the resources
access=ro Allow read only access to the resources
access=none Deny all access to the resource
The fields must be separated by one or more spaces or tabs. If a specifier
contains space characters (such as a directory name that contains spaces),
then the entire specifier must be enclosed in double quotes.
Whenever a host attempts to mount a volume, the approve file is searched
to determine the appropriate access to grant the host. The file is searched
sequentially from top to bottom. Wh en a match is found to the h ost patter n
and the volume specifier, then the associated access rights are applied. All
entries in the file after the matched entry are ignored. Therefore, it is
important to order the entries in the file so that the more specific entries are
listed first, and the more general entries are listed last.
4-16
Managing Storage
Allowing Access to Data
Here is a list of sample entries in the host access file:
These five entries define the access to the /acct volume. In particular , the
first two entries define access to the /acct/usr directory. Read only
access is granted to the guest group (defined in the /etc/hostgrps
file). The next two entries allow read/write access to the machines it1 and
it2 to all files and directories in the /acct/etc directory. The last entry
is a catch-all, indicating that all other hosts have no access to the /acct
volume.
The following list demonstrates the use of wildcards and DNS domains:
The first three entries define the access allowed to the /engineering
volume. The wildcard (*) character was used to s pecify all the machine s in
a DNS domain. The last two lines in the examples are catch-alls, indi cating
that all other hosts have no access to the /engineering volume or any
other volume. These entries are optional sin ce access is always de nied if it
is not specifically granted.
4-17
To view and edit the host access file using the NetStorage web interface:
1 Using the NetStorage web interface, click the Storage tab, then select
Host Access.
2 Modify the file as you would in any text editor.
3 Click Save Changes when you are done editing.
NoteIf there is no entry in the approve file to define access to a volume, then
access is denied to all hosts. The root user, mounting fr om a Trusted Host,
always has full read/write access to all volumes, regardless of the access
rights specified in the approve file.
Managing Storage
Allowing Access to Data
The /etc/hostgrps File
In most cases, you want to specify a gr oup of co mpu ters when iden tifying
Host Access to the NetStorage 6000. In many of these situations, the
wildcard character (*) serves this purpose. However, in some cases it is not
sufficient. You can get around this problem by simply generating a Host
Access entry for each computer, or you can define a group of host
computers that may then be referenced by name (preceded by the @
symbol). A group of host computers may be defined by creating an entry
in the /etc/hostgrps file. The file must be edited manually, using a
text editor via the NFS protocol, or th e CIFS protocol (assuming that you
have the proper rights).
Groups may be created by adding an en try into the /etc/hostgrps file.
Each entry starts with the name of the group, followed by a sequence of
host names to associate with the group. Every name is delimited by a space
character. For example:
# Hostgrps file (group hosts under a name for access control)
general *
mygroup eng6284.stor.hp.com eng6a2c.stor.hp.com
eng8106.stor.hp.co
mygroup 10.58.159.245 hpcust6da6
NoteThe host names may appear as fully qualified domain names, IP
addresses, or host names as they appear in DNS or a hosts file. Entries for
a group may span more than one line by entering the group name again at
the beginning of the next line.
The host names must be resolvable through the hosts file, the NIS hosts
file, or DNS.
4-18
Backing Up and Restoring Files
The Backup and Restore Tab
Backing Up and Restoring Files
The Backup and Restore Tab
The Backup and Restore tab lets you:
n Create disk checkpoints
n Modify checkpoint schedules
n Manage disk checkpoints
n View the tape backup job status
n View the tape restore job status
n View the tape magazine
n View the tape log
n Create and execute backup jobs
n Choose your backup options
n Back up checkpoints
n Restore volumes
n Restore files and directories
n Check your tape settings
Chapter 5
NoteLabeling your tapes and keeping track of schedules is a crucial component
in the backup and restore process.
Using the HP SureStore 818 or 1/9 DLT Autoloader
HP designs the HP NetStorage 6000 to work with the HP SureStore 818
(part number C6284NB) or Autoloader 1/9 (part number C7146NB) DLT
backup devices. See the installation poster for directions on attaching the
Autoloader to the HP NetStorage 6000.
Contact your local HP Authorized Reseller for information about ordering
either the 818 or 1/9 HP SureStore DLT Autoloader. If you already own
either Autoloader, purchase a SCSI cable (part number D6020A) to
connect your Autoloader to the HP NetSto rage 60 00. If yo u do not hav e a
reseller, lo g on to the HP web site www.hp.com or call 1-800-8 26-4111 t o
locate the one nearest you.
5-1
Backing Up and Restoring Files
Using the HP SureStore 818 or 1/9 DLT Autoloader
You should refer to your User’ s Guide that came with your Autoloader fo r
information about setup and maintenance. The information in this chapter
is for the Autoloader 818. If you have the 1/9 Autoloader and you are
unable to find your user documentation, refer to the HP web site.
The 818 Autoloader has eight sl ots: Slo ts 1-6 ar e in the fr ont of th e unit and
Slots 7 and 8 are inside.
NoteThe Autoloader cannot detect the difference between a cleaning tape and a
tape cartridge, so use caution when loading tapes into the magazine.
Loading Tapes into the Magazine
With the tape’s writeprotect switch facing
out and the smooth
edge facing the top of
the magazine, insert
the tape until it cl icks. A
metal tab releases to
lock the tape into place.
When you load tapes to perform a backup, the Autoloader does not care
about previous tape contents; it treats every tape in the magazine as
blank. Be sure to sequentially label your tapes after a backup.
If you are restorin g a s pecific file or your entire system, y ou mus t lo ad th e
tapes in the correct order into the magazine.
5-2
Backing Up and Restoring Files
Using the HP SureStore 818 or 1/9 DLT Autoloader
Loading Tapes into the Internal Slots
To load internal tapes, remove
the magazine from the
Autoloader. With the tape’ s w riteprotect switch facing out of the
Autoloader and the s mooth edge
facing the top of the slot, insert
the tape until it clicks into place.
Loading the Magazine into the Autoloader
5-3
With the handle facing out of
the Autoloader, insert the
magazine into the
Autoloader. Slide the
magazine in until it clicks
into place. Slide the handle
all the way to th e left to store
the magazine.
Cleaning the Autoloader Tape Drive
The drive mechanism should only be cleaned if CLEAN DRIVE displays
on the front panel. For directions on how to clean your tape drive, see the
HP SureStore DLT Autoloader User’s Guide.
Ordering Tapes
You can order a full range of supplies through a Hewlett-Packard
authorized dealer, an HP sales office, or HP Direct. To contact HP Direct,
call 1-800-227-8164. See the list below for product names and part
numbers.
n Data cartridge (C5141-85701)
n Cleaning cartridge (C5142-85700)
Local and Remote Backups
Backup Overview
Backing Up and Restoring Files
Local and Remote Backups
Although the HP NetStorage 6000 provides RAID 5 hardware protection
for your data, a backup strategy can prevent data loss in cases of inadvertent
deletion or system disasters such as theft and fire. Using features built-in to
your HP NetStorage 6000, a backup strategy can provide:
n Daily checkpoints for rapid recovery of individual files or directories,
plus. See “Creating Checkpoints” on page 5-9.
n Full backups on a weekly schedule for long-term storage and disaster
recovery. See “Creating and Executing Backup Jobs” on page 5-14.
T o perform backups, you need to attach ei ther an 8 18 or 1/9 HP SureStore
DL T Autoloader to your HP NetStorage 6000 (see the installation poster for
instructions). You can set up the tape device to perform two types of
backups:
n A local backup: Use the backup application in the NetStorage web
interface plus an optional 818 or 1/9 HP SureStore DL T Autoloader . See
“Performing a Local Backup” on page 5-5.
n A remote backup: Use one of several popular network remote backup
applications on a networked computer. See “Performing a Remote
Backup” on page 5-6.
5-4
Backing Up and Restoring Files
Local and Remote Backups
NoteYou do not need to format tapes for a backup. However, before you load
tapes in the Autoloader, make sure they are not write-protected.
The length of time required to perform a backup depends on the size of the
volume and the local area network (LAN). As a general rule:
n For a local backup, the Autoloader backs up 25 gigabytes per hour.
n For a remote backup on a 10Base-T network, the Autoloader backs up
3 gigabytes per hour.
n For a remote backup on a 100Base -T network, the Autoloade r backs up
10 gigabytes per hour.
During a backup, the Autoloader’s control panel displa ys Writing and
the green activity light flashes.
Performing a Local Backup
Use the backup application in the NetStorage web interface plus an
optional 818 or 1/9 HP SureStore DLT Autoloader to perform a local
backup. See the installation poster for directions on attaching the
Autoloader to the HP NetStorage 6000 and see “Using the HP SureStore
818 or 1/9 DLT Autoloader” on page 5-1 for information on using the
Autoloader.
5-5
NoteYou can only access Tape Status, T ape Backup, Tape Restore, and Tape
Settings in the Backup/Restore tab after you attach an Autoloader to
your HP NetStorage 6000
In a local backup session, a special checkpoint of yo ur data is first created
on disk, then the data is transferred to the locally attached Autoloader. The
checkpoint uses only a small amount of disk space and the data transfer
does not interfere with your LAN traffic.
To run a local backup:
1 From your workstation, o pen a web brows er and enter the IP addres s of
the HP NetStorage 6000.
2 Click the Backup/Restore tab, then select Tape Backup (see “Creating
and Executing Backup Jobs” on page 5-14 for more information).
The local backup feature provides simple scheduling capability and can be
configured to back up individual files or combinations of volumes.
Performing a Local Restore
From a local backup tape, a restore operation can select an individual
volume, directory , or file. Make sure you carefull y label and date your local
backup tapes because a database of local backup operations is not
maintained.
To run a local restore:
1 From your workstation, o pen a web br owser and ent er the IP addr ess of
the HP NetStorage 6000.
2 Select the Backup/Restore tab, then click Tape Restore (see
“Restoring Volumes” o n page 5-18 or “Restor ing Files and Directorie s”
on page 5-20 for more information).
Performing a Remote Backup
Use third-party backup app lica tio ns on any computer on the network with
a tape drive attached to perform a remote backup.
When you run a remote backup, data from the HP NetStorage 6000
transfers over the network to the remote server running the backup
application, and then to the server-attached tape device. The remo te backup
application cannot control the Autoloader connected to the HP NetStorage
6000.
Backing Up and Restoring Files
Local and Remote Backups
If the backup application is running under NT, the restore operation
recovers both the NT and UNIX security settings for each file. If the backup
application is running under UNIX, the restored NT files revert to the
default user security setting, while UNIX files retain their full security
settings.
See “Remote Backup Applications Overview” on page 11-1 for a list of
remote backup applications the HP NetStorage 6000 integrates with.
5-6
Backing Up and Restoring Files
Disk Checkpoints
Disk Checkpoints
What Are Disk Checkpoints?
You can use the disk checkpoint feature to create a read-only virtual copy
of your volume. This copy does not consume the equivalent disk space that
an actual copy consumes. Because they are not real copies, checkpoints
appear as a collection of directories in a virtual volume. Thi s volu me has
the same name as the original volume but with a .chkpnt extension. Y ou
can retrieve data from the checkpoint by browsing to the data you need and
copying it to the desired location. You can also back up checkpoints to tape.
For more information, see “Backing Up Checkpoints” on page 5-17.
You can create checkpoints manually (by checking Immediate) or have
them created automatically at scheduled times by checking the appropriate
boxes. The following table lists the checkpoints you can schedule and their
deletion dates.
CheckpointCreation TimeDeletion
ImmediateNowDelete manually
WeeklyEvery Sunday at 1 amAutomatically deletes
NightlyEvery weekday at 1 amAutomatically deletes
DailyEvery weekday at 1 pmAutomatically deletes
Every three hoursEvery weekday from 9 am
to 6 pm
in 14 days
in 7 days
in 3 days
Automatically deletes
in 6 hours
5-7
You name immediate checkpoints. The system names scheduled
checkpoints based on the creation date and time and their deletion date.
For example, if you created a three-hour scheduled checkpo int on January
19, 2000 at 9 am, the system names that checkpoint 20000119-090001,6h. The date of this checkpoint is year 2000 , month 01, day 19,
and the time you created it was 09 am, 00 min, 01 seconds. The checkpoint
deletes in 6 hours.
If you do not want the system to delete the checkpoint on its deletion time,
rename the checkpoint (see “Renaming or Deleting Checkpoints” on
page 5-10). The name of the checkpoint is also th e name of its directory on
the virtual volume.
Backing Up and Restoring Files
Disk Checkpoints
NoteWhen checkpoints are created, they do not use much disk space. As you
make changes to the disk volume, checkpoints use increasing amounts of
space. Checkpoints may be deleted automatically if the system begins to
run out of disk space. To save disk space, delete old checkpoints
periodically.
Checkpoints appear as a directory in the virtual volume. For example, if
you have two checkpoints for volume X (one you created named ABC and
a scheduled checkpoint named 20000119-090001,6h), you would
find the following on the virtual volume:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Disk Checkpoints > Create/Schedule New Checkpoints.
2 Select a volume from the drop-down list.
To create a checkpoint now:
1 Click the box next to Immediate.
2 Type a name for the checkpoint.
3 Click Save Settings and respond to the confirmation dialog box. The
checkpoint is saved to the volume.
To schedule automatic creation of checkpoints:
1 Click the box or boxes next to all desired schedules.
2 Click Save Settings, then click OK to save your changes.
NoteYou name the immediate checkpoints. The system names the scheduled
checkpoints based on the creation date and time and their deletion date.
5-9
Modifying Checkpoint Schedules
To modify the checkpoint schedule:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Disk Checkpoints > Create/Schedule New Checkpoints.
2 From the drop-down lis t, select the volume whose sc hedule you want to
modify.
3 Click the box or boxes to change the schedule of the checkpoint(s).
NoteYou can select any schedule you desire (for example, one, several, or all
the scheduled settings).
4 Click Save Settings. A dialog box asks you if you want to save your
changes. Click OK.
Backing Up and Restoring Files
Managing Checkpoints
NoteTo save disk space, delete old checkpoints periodically.
To access the data in a checkpoint:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Disk Checkpoints > Manage Exist ing Checkpoints.
2 Select a volume from the drop-down list.
3 Choose a checkpoint to retrieve the checkpoint name and directory.
4 Locate the directory where the checkpoint resides and give yourself
permission to access the directory.
Renaming or Deleting Checkpoints
Checkpoints that are created at a scheduled time are autom atically deleted
based on their creation date. The system parses the filename to determine
when to delete the checkpoint. If you do not want the system to delete the
checkpoint on its deletion date, rename the checkpoint.
Disk Checkpoints
To rename or delete a checkpoint:
NoteRenamed checkpoints may still be deleted if the file system star ts to run
out of disk space.
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Disk Checkpoints > Manage Exist ing Checkpoints.
2 Select a volume from the drop-down list.
3 Choose the checkpoint you want to rename or delete.
4 Check either:
• Rename checkpoint, enter a new name, then click Apply.
• Delete Checkpoint, and respond to the confirmation dialog box.
5-10
Backing Up and Restoring Files
Checking the Current Tape Drive Status
Checking the Current Tape Drive Status
Tape Backup Job Status
The Tape Backup Job Status screen displays t he status of you r curren t or
last backup job.
To view this screen using the NetStorage web interface:
1 Click the Backup/Restore tab.
2 Select Tape Status > Backup Job St atus.
Job NameName you have given the backup job.
Job StatusIn progress or complete.
ErrorsNumber of errors that occurred during the job. To
view the error log for this tape, click Tape Log.
Job Start TimeDate and time the job began.
Job End TimeDate and time the job finished.
Job Length in
Minutes
Files ProcessedNumber of files processed.
Bytes Processed Number of bytes processed.
Tapes UsedNumber of tapes the job required.
Time it took to complete the job.
5-11
NoteMake sure you view the tape log when the job completes to determine
which tapes were written to. This procedure is the only way to know
which tapes were used. Remove those tapes from the Autoloader and label
them. For more information, see “Tape Log” on page 5-14.
The screen refreshes every 10 seconds.
Tape Restore Job Status
The Tape Restore Job S t atus screen display s the status of your cur rent or
last restore job.
To view this screen using the NetStorage web interface:
1 Click the Backup/Restore tab.
2 Select Tape Status > Restore Job Status.
Job StatusIn progress or complete.
ErrorsNumber of errors that occurred during the job. To
view the error log for this tape, click Tape Log.
Job Start Tim eDate and time the job began.
Job End TimeDate and time the job finished.
Job Length in
Minutes
Files ProcessedNumber of f iles processed.
Bytes Processed Number of bytes processed.
Tapes UsedNumber of tapes the job required.
Time it took to complete the job.
Backing Up and Restoring Files
Checking the Current Tape Drive Status
The screen refreshes every 10 seconds.
5-12
Backing Up and Restoring Files
Checking the Current Tape Drive Status
Tape Magazine
The View Tape Magazine screen displays information about the tape
device attached to your HP NetStorage 6000. You can not retrieve
information on a tape if:
n the device is busy
n you do not have a tape device attached
n an error has occurred on your system
Before performing a backup or a restore, make sure you:
n (Restore only) Write-protect all restore tapes before loading them into
the magazine. Slide the write-protect switch until it clicks and an orange
tab appears.
n V erify information about the tapes you loaded in the slots by clicking on
the tape icon below the tape’s slot number.
n T e st t h e sl ot containing the first tape of the se t from w hic h y ou wa n t to
restore.
NoteLoading and reading a tape takes at least three minutes.
To obtain information about a tape:
5-13
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Status > Tape Magazine.
2 To read the tape information, click on a tape icon below the tape’s slot
number. If a backup, restore or other activity is taking place, the tape
icons are inaccessible.
3 A dialog box informs you that the d evice is testing the slot you selected.
Click OK.
4 The following information about the tape appears on the screen if the
tape contains a backup:
• slot number being tested
• job on the tape
• serial number of the tape
• order of the tape within the job
• type of backup performed (if you are testing the first tape of a job)
• date and time you created the tape
• volumes on the tape (if you are testing the first tape of a job)
5 Review the information on the s creen. If yo u want, you can test anot her
slot.
Tape Log
Backing Up
Creating and Executing Backup Jobs
Backing Up and Restoring Files
Backing Up
The tape log tells you which tapes were written to during a backup, as well
as the date, time, and description of events that occurred.
To display the tape log for your tape drive:
1 Using the NetStorage web interface, click on the Backup/Restore tab,
then select Tape Status > Tape Log.
2 A screen displays the events on the backup tape. If a backup is in
progress, click Bottom to see the most recent information in the tape
log.
You can get more information from the t ape log b y clicki ng on the but tons
labeled Top, PgUp, PgDn, and Bottom.
You can only back up volumes to your backup device, not individual files
or directories. You can store only one backup job on a tape, regardless of
how much data you are backing u p. The backup tape does not allow you to
access directory information.
Y ou do not need to format tapes for a backup . However, b efore you perform
a backup, make sure:
n your tapes are not write-protected
n you have enough tapes for the backup
n you loaded the tapes in the correct order
NoteYou may need to maximize your browser window to see the entire Tape
Backup screen.
To create a new backup job:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Backup.
2 Click Create a new job and enter a name for the job.
3 Select the volume(s) you want to back up.
5-14
Backing Up and Restoring Files
Backing Up
4 Select a backup type. Click
• Full Backup to back up all the files in the selected volume(s).
• Differential Backup to back up only those files that have changed
since the last full backup.
5 If you want to schedule the j ob, select the days you wa nt to r un the j ob.
On the Tape Settings screen (see “Tape Settings” on page 5-21), you
can change the scheduled start time. You can schedule only one job per
day; however, several jobs can be configured to back up the same
volume(s).
NoteIf you exit this screen without saving yo ur changes, the modif ications you
made will be lost.
You can now:
n Save the job by clicking Save.
n Delete the job by clicking Delete.
n Modify th e backup job.
n Run the backup job now.
For more information, see “Choosing Backup Options.”
5-15
Choosing Backup Options
NoteYou may need to maximize your browser window to see the entire Tape
Backup screen.
To run a backup job now:
1 Insert a tape or tapes into your Autoload er (make sure they are not write-
protected). To verify that yo u loaded the tapes in th e correct order, view
the tape magazine (see “Tape Magazine” on page 5-13).
2 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Backup.
3 Select an existing job from the drop-down list.
4 Select either Run now, observe Tape Protection to prevent tapes with
recent data on them from being overwritten or Run now, ignore Tape
Protection to disregard that setting.
5 Click Run Job Now. If you changed the backup schedule, a dialog box
informs you that the job will be saved before the backup occurs. If you
start a job using Run Job Now and a job is schedu led to run whi le your
backup or restore is still in progress, the schedule job will not run. Click
OK or Cancel.
6 The Tape Backup Job Status screen appears and displays the:
• Device Status
• Job Name
• Job Start Ti me
• Running Time
• Files and Bytes Processed
• Number of Tapes Accessed
• Bytes on Last Tape
NoteYou can also cancel the backup job.
7 When the job completes, view the tape log (see “Tape Log” on
page 5-14) to determine which tapes were written to. This procedure is
the only way to know w hich tapes w ere used (prot ected tapes may have
been skipped). Remove those tapes from the Autoloader and label them.
Backing Up and Restoring Files
Backing Up
To modify an existing backup job:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Backup.
2 Select an existing job from the drop-down list.
3 Modify the settings for the job.
4 Click Save.
To cancel a backup:
1 While a backup is in progress, click Abort Running Job.
2 Remove from the magazine any tapes that contain data you do not want
to overwrite.
NoteIf you want to back up the same data from the canceled backup job,
rename the checkpoint backup.failed to backup.
5-16
Backing Up and Restoring Files
Backing Up
To delete a job:
1 Click the Backup/Restore tab, then select Tape Backup.
2 Select an existing job from the drop-down list.
3 Click Delete.
Backing Up Checkpoints
When a tape backup begins, it creates a checkpoint named backup. The
information in the checkpoint backup is backed up to tape. If a checkpoint
named backup already exists, that checkpoint is backed up instead.
Keep in mind:
n If the disk you are backing up is almost full, the attempt to create a
backup checkpoint fails.
n If the backup completes successfully, the backup checkpoint is
deleted.
n If the backup fails, the backup checkpoint is renamed
backup.failed and is not deleted.
NoteTo control when data is frozen before being written to tape, you can
rename any checkpoint (includi ng backup.failed) to backup. Keep in
mind that the renamed checkpoint is deleted when the backup completes.
5-17
Backing Up and Restoring Files
Restoring Volumes, Files, and Directories
Restoring Volumes, Files, and Directories
Restoring Overview
T o restor e a volume, file , or directory, you need to know which tape(s) the
volume, file, or directory resides on and which tape drive slots the tape is
loaded in. (Remember to always label your tapes.) In restoring files and
directories, you must also know the full path of the file/directory that you
are retrieving, starting with the volume name.
CautionIf you start a restore and have a backup scheduled to occur after your
restore finishes, the restore tape in the drive may be overwritten by the
backup. To prevent this, remove the tape before the backup begins or
write-protect the tape by sliding the write-protect switch until it clicks and
an orange tab appears
The following information is retrieved from tapes that contain data:
n slot number being tested
n job on the tape
n position within the job
n date and time you last wrote data to the tape
If you are testing the first tape of the backup set, the following additional
information is retrieved:
n a list of volumes on the tape
n type of backup on the tape (differential or full)
The first tape of a backup set must be selected to begin a restore.
NoteIf you changed the job since the backup, current information abou t the job
may not reflect what is on the tape.
Restoring Volumes
Before you begin a whole-volume restore on disk:
n You might want to clear the volumes of current data because you will
overwrite entire volumes.
n Make sure you restore from the full backup before restoring from a
differential backup.
5-18
Backing Up and Restoring Files
Restoring Volumes, Files, and Directories
To restore a volume:
1 Insert the tapes containing the volume you want to restore in the
Autoloader. Make sure you write-protect the tapes and load them in the
correct order.
2 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Restore.
3 To read the tape information, click on a tape icon below the tape’s slot
number. The following information about the tape appears on the screen
for tapes that contain a backup:
• slot number being tested
• job on the tape
• serial number of the tape
• order of the tape within the job
• type of backup performed (if it is the first tape of the backup)
• date and time you last wrote data to the tape
• volumes on the tape (if it is the first tape of the backup)
NoteLoading and reading a tape takes at least three minutes.
5-19
4 Click Restore Whole Volumes.
5 A screen appears, listing the volumes on the tape. Select the volumes
you want to restore.
6 Click Start Restore. A dialog box warning may inform you that if a
backup is scheduled after you run a restore, the backup may overwrite
your restore tapes. You should also write-protect your tapes or use the
tape protection features on the Settings screen (see “Tape Settings” on
page 5-21). Click OK or Cancel.
7 The Drive an d Job Status screen displays the status of the r estore. The
screen refreshes every 10 seconds. To cancel the restore, click Abort
Running Job.
8 When the restore is complete, view the tape log.
NoteIf the restore fails, make sure you view the tape log to determine what
went wrong. For more information, see “Tape Log” on page 5-14.
Restoring Files and Directories
To restore a file or directory:
1 Insert the tapes you want to restore from in the Autoloader. Make sure
you write-protect the tapes and load them in the correct order.
2 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Restore.
3 To read the tape information, click on a tape icon below the tape’s slot
number. The following information about the tape appears on the screen
for tapes that contain a backup:
• slot number being tested
• job on the tape
• serial number of the tape
• order of the tape within the job
• type of backup performed (if it is the first tape of the backup)
• date and time you last wrote data to the tape
• volumes on the tape (if it is the first tape of the backup)
Backing Up and Restoring Files
Restoring Volumes, Files, and Directories
NoteLoading and reading a tape takes at least three minutes.
4 Click Restore Single File/Directory.
5 A screen prompts you for the full path of the file(s) or directories you
wish to restore. Make sure you use correct spelling and capitalization.
Use forward slashes (/) between directories.
6 Select either:
• Restore to original location
• Restore to directory on NetStorage 6000. You must enter the
destination path on the disk.
7 Click Start Restore. A dialog box warning may inform you that if a
backup is scheduled after you run a restore, the backup may overwrite
your restore tapes. You should write-protect your tapes or use the tape
protection features on the Settings screen (see “Tape Settings” on
page 5-21). Click OK or Cancel.
8 Before beginning a restore, the HP NetStorage 6000 searches the tape
for the files. The Drive and Job Status screen displays the status of the
restore. Check this screen periodically to see if the scan is successful.
5-20
Backing Up and Restoring Files
Checking Settings and Features
The screen refreshes every 10 seconds. Even if you’re restoring only a
single file, the restore process might need to read through much of the
backup set. To cancel the restore, click Abort Running Job.
9 When the restore is complete, view the tape log.
NoteIf the restore fails, make sure you view the tape log to determine what
went wrong. For more information, see “Tape Log” on page 5-14.
Checking Settings and Features
Tape Settings
The Settings and Features screen lets you:
n Change the start time for scheduled jobs.
n Change the number of days tapes are protected after backup.
n Tell the device which slot contains a cleaning tape.
Changing the Backup Schedule
5-21
NoteScheduled jobs can have only one start time.
To change the scheduled start time for all backup jobs:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Settings.
2 Select the Start time for scheduled jobs field and enter a new start time
using military format.
3 Click Submit. A dialog b ox informs you that you have changed the time
for scheduled jobs. Click OK.
Backing Up and Restoring Files
Checking Settings and Features
Changing the Tape Protection Window
The tape protection window is a logical write-protection mechanism that
the server enforces. The window requires that you set the correct date and
time on the server. You accomplish physical tape-protection with the writeprotect tab on the tape cartridge. The tape protection window attempts to
prevent accidental overwrite of tapes that are not physically writeprotected.
The Autoloader tests each tape’s protection setting before writing data to it.
The default tape protection window is 7 days. For example, if a tape
contains 5-day-old data and tap e protection is 7 days, the Aut oloader skips
that tape and tests the next one. The Auto loader also s kips write-p rotected
tapes and cleaning tapes.
To change the protection setting for tapes:
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Settings.
2 Select the Backup tapes are protected from overwrite for field and
enter a new value.
3 Click Submit. A dialog box informs you that you have changed the
number of days your tapes are protected. Click OK.
Skipping the Cleaning Tape
You can specify which slot contains a cleaning tape by skipping that slot
during a backup or restore.
1 Using the NetStorage web interface, click the Backup/Restore tab, then
select Tape Settings.
2 Click either:
• Use all tape magazine slots for backup and restore.
• Slot (specify slot) contains a cleaning tape and will not be used for
backup or restore.
3 Click Submit.
5-22
Monitoring the System
The Status Tab
The Status Tab
The Status tab lets you:
n View status summary
n View event log
n Vi ew environmental p arameters (tempe rature, voltages and cooling fan
n View CPU utilization (both current and peak CPU values)
n View network transmission information (summary information on all
n View client activity on the network
Chapter 6
Monitoring the System
operation)
Network Interface Cards in the system)
Monitoring Hardware Information
Status Summary
Hardware status summary lets you view environmental and activity status.
If an environmental item is running:
n out of specification, it is noted in the comment field and a hyperlink lets
you access the corresponding page.
n within specification, a green light and an ok message are displayed.
To view hardware status summary:
Using the NetStorage web interface, click the Status tab, then select
Summary.
The following information displays:
n Temperature problems link to Environmental Monitoring > Air
Temperature.
n Power supplies. The five system voltages scanned and verified.
6-1
Monitoring Hardware Information
n Power modules. Informational messages about the power supply
module status. If there are any err or conditions, they are rep orted in the
event log and any device notification systems that have been enabled.
n Cooling fans (o n or of f). P robl ems li nk to Environmental Monitoring
> Cooling Fans.
n Network Transmission - NIC Port 1. The cumu lative amount of packets
in and out for the first or primary port since the machine was last reset
or rebooted.
n Client Activity. Current number of clients attached to the HP
NetStorage 6000.
NoteThe following symbols are used in the table:
— OK
— an item is critical
— the status information could not be obtained
— informational status only
Monitoring the System
6-2
Monitoring the System
Monitoring Hardware Information
View Event Log
You can view system messages two ways:
n View Errors Only displays only the error messages that have occurred
in the system.
n View All Messages displays all messages that have occurred in the
system. Refresh updates the view with the most recent event logging
information.
To view the event log:
1 Using the NetStorage web interface, click the Status tab, then select
Event Log. The following event information displays:
• Date - mm/dd format
• Time - 24 hour clock
• Severity - (I = informational messages, E = error messages)
• Description of event or error
2 Click:
• View Errors Only to view error messages only.
• View All Messages to return to the event log.
6-3
3 Click Refresh to update the log files.
You can use your browser’s print command to print a copy of the log.
NoteYou can send a copy of the event log to a remote server. For more
information, see “System Log” on page -9. Otherwise, the event log
contains a fixed number of entries with the oldest item dropping off the
log page. When the system is shutdown or rebooted the event log
information is reset.
View Environmental Parameters
You can view hardware status graphically and numerically. The
information is updated every 60 seconds. The following environmental
systems are monitored and required for normal operation of the HP
NetStorage 6000: temperature, power supply voltages, and cooling fans.
See “Hardware Specifications” on page C-3 for more information.
To view environmental parameters:
1 Using the NetStorage web interface, click the Status tab, then select
Environmental Monitoring.
2 Click on any of the three environmental systems to view its status.
• Air Temperature: Two temperature gauges indicate the current air
temperature in the HP NetStorage 6000 box. The temperature is
displayed in degrees Celsius.
A temperature error or failure is in dicated in the status summary table
if the temperature rises 15° C above the max imum ambient operating
temperature of 40° C for more than 15 seconds.
• System Voltages: The HP NetStorage 6000 has five system vo ltages
that are monitored and maintained with three power supply modules
(one is redundant ). Five gau ges displa y the curr ent system v oltage of
each. If any voltage fluctuates by mor e than +/- 1 0% for more than 2
seconds it will be detected as an error and the appropriate notification
and event log messages are sent.
Monitoring the System
Monitoring Hardware Information
• Cooling Fans: Cooling fans maintain the necessary ambient
temperature for maximum performance. The status of each fan is
shown either as a:
— black, spinning fan: fan is working normally
— red fan: fan has failed.
NoteThe RPM's of each fan are displayed be neath. Fans n ormally op erate at or
above 3750 RPM. A notif ication is pos ted on the status summary page and
the event log if a fan has stopped or is not spinning at a high enough rate.
CautionYou must operate the HP NetStorage 6000 with the cover on. Otherwise,
the fans will not cool the unit properly and it may overheat.
6-4
Monitoring the System
Monitoring Hardware Information
View CPU Utilization
CPU utilization lets you view the current load on the CPU of the HP
NetStorage 6000. The information updates every 60 second s. Y ou can view
the current load on the processor or the peak usage (the maximum load
within the last five minutes).
To view the CPU Utilization:
Using the NetStorage web interface, click the Status tab, then select CPU
Utilization. A CPU Usage chart appears displaying the current usage and
the peak usage for the last five minutes.
6-5
Viewing System Activity
View Network Transmission Information
You can view network transmission information to see how much data is
flowing across the network NIC ports in the HP NetStorage 6000. This
information is used to determine if your network is running as efficiently
as possible. If one of the NIC ports has too much traffic, you may want to
move clients to another available NIC port. You can also view errors and
collisions to spot potential hardware problems. The table is updated every
five seconds.
To view network transmission information:
Using the NetStorage web interface, click the Status tab, then select
Network Transmission. The following network transmission information
displays:
n NIC name (Network Interface Card): This is automatically assigned by
the HP NetStorage 6000.
n Network address (the network IP add ress): This is either assigned by the
user or assigned using DHCP. If the port has not been configured, then
<Not Configured> is displayed.
n Packets in: the cumulative total for this port
n Packets out: the cumulative total for this port
n Errors
n Collisions
Monitoring the System
Viewing Sy stem Activity
NoteThis information is displayed separately for each NIC port even if you
have taken advantage of port aggregation. When the HP NetStorage 6000
is reset or restarted, all of the numbers reset to zero.
6-6
Monitoring the System
Viewing System Activity
View Client Activity
NoteThe client’s fully qualified name or their IP address displays depending
Y ou can view client activity to see how man y clients are curr ently attached
to the HP NetStorage 6000 and the activity of the 20 most active clients.
The most active client is listed at the top. The activity is defined as the total
number of packets in and out for each client in the previous ten seconds.
The client activity page updates every five seconds.
To view client activity:
1 Using the NetStorage web interface, click the Status tab, then select
Client Activity.
2 The following information displays:
• Client name - either an IP address or the system name
• Total activity (packets in and out)
upon the system’s DNS configuration in settings.
6-7
Monitoring the System
Viewing Sy stem Activity
6-8
Reporting
The Report Tab
The Report Tab
From the Report Tab you can send an HP NetStor age 6000 system
information report to up to three e-mail addresses. This report provides
information on hardware and software, file system configuration, NIC
configuration, and environmental status. This report is helpful for checking
configuration information as well as software and firmware versions.
Several attachments are sent along with this report such as the event log,
the group and users map files, the group.nis file, the password.nis
file, the /etc/hosts file, and the /etc/approve file.
To send a copy of this file and its attachments via e-mail:
1 Using the NetStorage web interface, click the Reports tab.
2 Enter the name of the e-mail server. The e-mail server must be an IP
address or a fully qualified name (such as, alpha.corp.com).
Chapter 7
Reporting
7-1
NoteIf you change the e-mail server, it automatically changes the e-mail server
specified on the SMTP/Email page. See “SMTP/Email” on page 3-7.
3 Enter the e-mail addresses of as many as three individuals. You must
specify an e-mail server if one or more e-mail recipients are defined.
4 Click either:
• Send System Report Email to send a report to the recipients and
save your settings.
• Apply to save your settings without sending a report.
Reporting
The Report Tab
7-2
Securing Data
About HP NetStorage 6000 Security
Securing Data
About HP NetStorage 6000 Security
This section explains the details of security as it applies to the user data
stored on the HP NetStorage 6000. The Ne tStorage 6000 utilizes mos t of
the security features found on Microsoft Windows, as well as all of the
security features found on UNIX platforms. It is not the intent of this
section to review the specifics of those security arch itectures. Instead , th is
section highlights the special features and differences that distinguish the
security on the HP NetStorage 6000 from the security on traditional
Windows or UNIX file servers.
Since the HP NetSto rage 6000 is designed to serve files o ver both NF S and
CIFS/SMB protocols, it is necessary to establish a mapping of the security
architectures from one platform to the other. “Mapping NT and UNIX
Users” on page 8-12 explains how that mapping is accomplished.
Chapter 8
HP NetS torage 6000 Secu rity in a UNIX-only Environment
The NetStorage 6000 utilizes an internal file system that is native to UNIX
environments. As such, it has UNIX security mechanisms bu ilt-in that are
leveraged when serving files over the NFS protocol. All resources stored
on the file system contain the security metadata commonly found in UNIX
systems.
The NetStorage 6000 does not support the co ncept of the /etc/exports
file for managing mount points. Instead, the ser ver automatically creates a
single mount point at the root of all volumes created on the system. Since
the server is specifically designed to share files, the exporting of mount
points has been automated.
The root directory of the mount points on the NetStorage 6000 is given
special permissions to facilitate appropriate access to users. The owner and
group of this directory are root (UID = 0, GID = 0), and the permissions are
read, write, and execute to owner, group and other (rwxrwxrwx). One
8-1
consequence of this setting is that all users can delete any file in the root of
the mount point. Therefore, administrators are encour aged to avoid storing
files in the root of the mount point.
The group assignment to files created in a file volume on UNIX can be
performed in a variety of wa ys. O n the Ne tStorage 6000, when a new file
is created, the group assignment is inherited from the directory where the
file is created. For example, if the group owner for directory /acct/usr
is accountants (GID = 501), then all files created in that directory will be
assigned a group owner of accountants (GID = 501).
Trusted Hosts
All UNIX clients that mount to file systems on the NetStorage 6000 use the
UID and GID of their account when accessing files. A special case is the
root user (UID = 0). In UNIX, the root user is a Super User , with full access
to all files and directories in the file system. Due to the extensive rights
provided to the root user, and the extensive damage that can be done by a
malicious root user, the NetStorage 6000 does not trust them by default.
Clients that attach with root privilege are given access as user nobody
(UID = 60001), with no special rights or privileges.
The administrator can override this default behavior by declaring a
particular client to be a Trusted Host. A root user mounting a NetStorage
6000 file system from a cl ient t hat is a Trusted Host is given root privileg e
(UID = 0) to the file system. This feature allows administration of the file
system by a root user, while at the same time, protecting the file system
from other root users that should not have privileged access to the
NetStorage 6000 file systems.
Securing Data
HP NetStorage 6000 Security in a UNIX-only Environment
The administrator may declare Trusted Hosts using the web based
administration tool, or the telnet administration tool of the NetStorage
6000.
8-2
Securing Data
HP NetStorage 6000 Security in a UNIX-only Environment
The /etc Directory
It is necessary to maintain a number of system files on the NetSto rage 6000
in an accessible place for administrative purposes. Some of the more
common files found in this directory are:
FilenameDescription
hostsResolves host names
hostgrpsDefines groups of host computers
approveRestricts host access
users.mapMaps Windows user accounts to UNIX user accounts
group.mapMaps Windows group accounts to UNIX group accounts
All of these files are stored in the /etc directory on the first volume
created on the system. The files in the /etc directory are for system
management purposes and cannot b e del et ed. I f t he v olume that stores the
/etc directory is ever deleted, then the system moves the contents of this
directory to another available volume.
Most of the files in the /etc directory may be edited through the web
based user interface, or the telnet interface of the HP NetStorage 6000. In
some cases, it is necessary to edit these files directly using a text editor. By
default, all files in the /etc directory are owned by the root user , and may
only be edited by the root user. Therefore, the only way to edit these files
directly (using a text editor) is to mount the file system as the root user from
a Trusted Host. See “Trusted Hosts” on page 8-2.
8-3
The /etc/approve File
Since the NetStorage 6000 does not support the /etc/exports file,
support has been added for a file named /etc/approve. This file can
be used to restrict NFS access to particular clients on the network.
In order to restrict individual clients and groups of clients to specific
resources on the NetStorage server, the /etc/approve file must be
edited. The file may be edited manually, or from the web based user
interface, under the Host Access section of the Storage tab. Entries in the
/etc/approve file have four fields. These fields are defined as follows:
Securing Data
HP NetStorage 6000 Security in an NT-only Environment
FieldDescription
classThis fiel d specifies the class of object to protect. In all cases
the object is files.
specifierThis field specifies the resources on the NetStorage 6000
server to protect. For example, /engineering, ap pl ies to a ll
files and directories in the /engineering file system.
host
pattern
rightsThis fie ld s pe cif ies the acc es s li mi t s to app ly. The entry in this
This field has the name of a host or group of hosts that have
access rights. Host names must be resolvable through the
local /etc/hosts file, the NIS hosts file, or through DNS.
Groups of hosts are specified in the /etc/hostgrps file. If
the host pattern is the name of a group, then it must be
preceded by the @ symbol. The wildcard character ( * ) may
be used to specify all hosts.
field can be one of the following:
• access=rw allows read and write access to the resources
• access=ro allows read only access to the resources
• access=none denies all access to the resource
Additional information about the format of this file, as well as detailed
examples may be found in “Edit Host Access” on page 4-15.
The file is searched sequentially for a match. Once an entry is found that
matches the host and the resource to restrict, all other entries are ignored.
HP NetStorage 6000 Security in an NT-only Environment
On Microsoft Wind ows, the protocol used to transfer files over the network
between a server and a client is known as Server Message Block (SMB), or
Common Internet File System (CIFS). Many variations of the protocol
exist which reflect the myriad flavors of W indows on the Market; Wi ndows
95/98, Windows NT, and Windows 2000.
Given all these variations, there are two distinct mechanisms used in CIFS
to provide security for resou rces. They are known as Share-Lev el Security
and User-Level Security. The HP NetStorage 6000 supports both of these
security modes. The next two sections briefly explain the architecture of
these security modes, and highlight any special considerations that should
be noted for the HP NetStorage 6000.
8-4
Securing Data
HP NetStorage 6000 Security in an NT-only Environment
Share-Level Security
Share-level security is the simplest CIFS security mode to use, but offers
the least security. In this mode, each share is protected by a password.
When the server administrator defines a new shar e, a password is specified
to protect the share from unauthorized access. When a user first accesses
the share they are prompted for the password. Once the passwor d is entered
and verified, then the user has full access to all files on the share. ShareLevel security is the default security mode for Windows for Workgroups
and Windows 95.
Share-Level security may be implemented to allow both Read/Write
access, as well as Read Only access to shares. Each share may be protected
by a Read/Write password and a Read Only pass word. The access allowed
on the share (Read/W rite or Read Only) is dictated by the password entered
by the user.
By default, the NetStorage 6000 accepts encrypted passwords for
verification. In these cases, Windows NT (also known as NT LM 0.12)
password encryption is used. The NetStorage 6000 also accepts plaintext
passwords from older clients, for backward compatibility.
Since the native file system on the NetStorage 6000 is UNIX based, all files
must have a UID and GID associated with them. However, since ShareLevel security does not s upport the concept of users or groups, a single UI D
and GID is assigned to each share, such that all files created in the share
from Windows clients are assigned the UID and GID of the share. When
shares are managed through the web based administration tool, shares are
automatically assigned a UID and GID of zero (UID = 0, GID = 0). For
administrators with special needs, the default UID and GID of zero may b e
changed for a given share. The telnet interface of the NetStorage 6000
allows the user to specify the UID and the GID to be used for a particular
share. In this case, ALL directories and files created in the share are
assigned the UID and GID specified by the administrator.
8-5
Since Share-Level security allows the user full access to all files regardless
of the UNIX permission settings, it is up to the administrator to ensure that
the Windows shares are created in such places so as not to expo se sensitive
system files, or the resources of other UNIX users.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.