CIFS/NFS) Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Hitachi Data Ingestor File System Protocols (CIFS/NFS) Administrator's Guide Product Version Getting Help Contents MK-90HDI035-13 © 2013- 2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assume no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. he use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd., in the United States and other countries. Archivas, Essential NAS Platform, HiCommand, Hi-Track, ShadowImage, Tagmaserve, Tagmasoft, Tagmasolve, Tagmastore, TrueCopy, Universal Star Network, and Universal Storage Platform are registered trademarks of Hitachi Data Systems Corporation. AIX, AIX 5L, AS/400, DB2, Domino, DS8000, Enterprise Storage Server, ESCON, FICON, FlashCopy, IBM, Lotus, OS/2, OS/390, RS6000, S/390, System z9, System z10, Tivoli, VM/ESA, z/OS, z9, zSeries, z/VM, z/VSE are registered trademarks and DS6000, MVS, and z10 are trademarks of International Business Machines Corporation. All other trademarks, service marks, and company names in this document or website are properties of their respective owners. Microsoft product screen shots are reprinted with permission from Microsoft Corporation. ii Hitachi Data Ingestor File System Protocols (CIFS/NFS) Administrator's Guide Contents Preface.................................................................................................xiii Intended audience................................................................................................... xv Product version........................................................................................................ xv Release notes.......................................................................................................... xv Organization of HDI manuals.................................................................................... xv Abbreviation conventions......................................................................................... xvi Document conventions.............................................................................................xix Convention for storage capacity values...................................................................... xx Getting help............................................................................................................ xxi Comments.............................................................................................................. xxi 1 Overview of the CIFS Service.................................................................1-1 Overview of how to use the CIFS service.................................................................. 1-2 2 System Configuration When the CIFS Service Is Used............................. 2-1 Products supported by the CIFS service....................................................................2-2 CIFS clients......................................................................................................2-2 Active Directory domain controllers....................................................................2-4 Network configuration.............................................................................................2-6 Configuration in which the CIFS client and the HDI node are connected to the same subnetwork......................................................................................................2-7 Configuration in which the CIFS client and the HDI node are connected to different subnetworks.....................................................................................................2-7 When the CIFS service is used on multiple ports................................................. 2-7 When the DNS is used...................................................................................... 2-8 When DHCP is used.......................................................................................... 2-8 3 Using File Services Manager To Run the CIFS Service..............................3-1 Procedure for File Services Manager setup................................................................3-2 Setting network information and system information................................................. 3-2 Editing system files directly............................................................................... 3-3 Service configuration definition................................................................................ 3-3 Changing the CIFS service configuration definition.............................................. 3-3 Changing the CIFS service configuration definition.....................................3-3 iii Hitachi Data Ingestor File System Protocols (CIFS/NFS) Administrator's Guide Setting an authentication mode................................................................3-4 Setting up user mapping..........................................................................3-6 Setting SMB 2.0...................................................................................... 3-6 Managing a CIFS file share...................................................................................... 3-7 Creating a CIFS file share..................................................................................3-7 Editing CIFS file share attributes........................................................................3-8 Setting up quota information................................................................................... 3-9 Using CIFS access logs............................................................................................3-9 What to check before collecting CIFS access logs................................................3-9 Estimating log file size.....................................................................................3-10 Information written to the CIFS access log....................................................... 3-12 Backing up the most recent CIFS access logs....................................................3-14 4 Managing CIFS Client Users...................................................................4-1 Procedure for managing users................................................................................. 4-2 Local user management.......................................................................................... 4-2 Registering information in an NIS server or an LDAP server (for user authentication) .......................................................................................................................4-2 Overview of functionality......................................................................... 4-3 CSV file formats...................................................................................... 4-4 Script for registering, deleting, or listing users...........................................4-5 Script for CIFS group mapping................................................................. 4-6 Note on users managed by an NIS server or an LDAP server (for user authentication)........................................................................................4-8 Notes on user registration................................................................................. 4-8 User management in a domain................................................................................ 4-8 Setting up an LDAP server for user mapping.............................................................4-8 Precautions when setting up an LDAP server...................................................... 4-9 Precautions when using OpenLDAP to set up an LDAP server...............................4-9 Precautions when using ADAM to set up an LDAP server..................................... 4-9 Precautions when using Sun Java System Directory Server to set up an LDAP server ..................................................................................................................... 4-10 Examples settings for when using OpenLDAP to set up an LDAP server.............. 4-11 Creating a schema file........................................................................... 4-11 Setting the index directive......................................................................4-12 Example settings for when using ADAM to set up an LDAP server.......................4-12 Creating a schema file........................................................................... 4-12 Setting index.........................................................................................4-15