Freenas® User Guide

Freenas® User Guide

FreeNAS® User Guide January 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 9.10.2-U1 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 What IS NeW IN 9.10.2-U1........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................4 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................5 1.2.4 Network INTERFACES.......................................6 1.3 Getting Started WITH ZFS........................................7 2 INSTALLING AND UpgrADING 8 2.1 Getting FreeNAS® ............................................8 2.2 PrEPARING THE Media..........................................9 2.2.1 On FreeBSD OR Linux......................................9 2.2.2 On WindoWS.......................................... 10 2.2.3 On OS X............................................. 10 2.3 Performing THE INSTALLATION....................................... 11 2.4 INSTALLATION TROUBLESHOOTING...................................... 17 2.5 UpgrADING................................................ 18 2.5.1 Caveats:............................................. 18 2.5.2 INITIAL PrEPARATION....................................... 19 2.5.3 UpgrADING Using THE ISO.................................... 19 2.5.4 UpgrADING FrOM THE GUI .................................... 22 2.5.5 IF Something Goes WRONG................................... 22 2.5.6 UpgrADING A ZFS Pool..................................... 23 2.6 Virtualization............................................... 24 2.6.1 VirtualBoX............................................ 25 2.6.2 VMwarE ESXi.......................................... 34 3 Booting 41 3.1 Obtaining AN IP AddrESS........................................ 43 3.2 Logging IN................................................ 43 3.3 INITIAL ConfiGURATION........................................... 45 4 Account 46 4.1 GrOUPS.................................................. 46 4.2 Users................................................... 49 5 System 53 5.1 INFORMATION............................................... 53 I 5.2 GenerAL.................................................. 54 5.3 Boot.................................................... 57 5.3.1 MirrORING THE Boot DeVICE................................... 60 5.4 Advanced................................................. 61 5.4.1 Autotune............................................ 65 5.5 Email................................................... 65 5.6 System Dataset............................................. 67 5.7 TUNABLES................................................. 68 5.8 Update.................................................. 70 5.8.1 PrEPARING FOR Updates..................................... 70 5.8.2 Updates AND TRAINS....................................... 70 5.8.3 Checking FOR Updates..................................... 72 5.8.4 Applying Updates........................................ 72 5.8.5 Manual Updates........................................ 73 5.9 CAs.................................................... 73 5.10 CertifiCATES................................................ 76 5.11 Support.................................................. 80 6 TASKS 82 6.1 CrON Jobs................................................. 82 6.2 Init/ShutdoWN Scripts.......................................... 84 6.3 Rsync TASKS............................................... 84 6.3.1 Rsync Module Mode...................................... 87 6.3.2 Rsync OVER SSH Mode..................................... 88 6.4 S.M.A.R.T. TESTS............................................. 90 7 Network 93 7.1 Global ConfiGURATION.......................................... 93 7.2 INTERFACES................................................ 94 7.3 IPMI .................................................... 96 7.4 Link AggrEGATIONS............................................ 98 7.4.1 LACP, MPIO, NFS, AND ESXi................................... 99 7.4.2 CrEATING A Link AggrEGATION.................................. 99 7.5 Network Summary........................................... 103 7.6 Static Routes............................................... 103 7.7 VLANs................................................... 104 8 StorAGE 106 8.1 VOLUMES................................................. 106 8.1.1 VOLUME Manager........................................ 106 Encryption............................................ 108 Manual Setup........................................... 109 Extending A ZFS VOLUME..................................... 110 8.1.2 Change Permissions...................................... 111 8.1.3 CrEATE Dataset......................................... 113 Deduplication.......................................... 115 ComprESSION........................................... 116 8.1.4 CrEATE ZVOL........................................... 116 8.1.5 IMPORT Disk........................................... 118 8.1.6 IMPORT VOLUME......................................... 118 IMPORTING AN Encrypted Pool.................................. 119 8.1.7 VieW Disks............................................ 120 8.1.8 VieW VOLUMES.......................................... 122 Managing Encrypted VOLUMES................................. 125 II 8.1.9 VieW Multipaths......................................... 127 8.1.10 Replacing A Failed Drive.................................... 127 Replacing AN Encrypted Drive.................................. 129 RemoVING A Log OR Cache DeVICE................................ 129 8.1.11 Replacing Drives TO GrOW A ZFS Pool............................. 130 8.2 Periodic Snapshot TASKS........................................ 130 8.3 Replication TASKS............................................ 132 8.3.1 Examples: Common ConfiGURATION.............................. 132 Alpha (Source).......................................... 132 Beta (Destination)........................................ 133 8.3.2 Example: FreeNAS® TO FreeNAS® Semi-Automatic Setup................. 133 8.3.3 Example: FreeNAS® TO FreeNAS® OR Other Systems, Manual Setup........... 135 Encryption KeYS......................................... 135 8.3.4 Replication Options...................................... 139 8.3.5 Replication Encryption..................................... 140 8.3.6 Limiting Replication Times................................... 140 8.3.7 TROUBLESHOOTING Replication................................. 140 8.4 Scrubs.................................................. 141 8.5 Snapshots................................................ 143 8.6 VMware-Snapshot............................................ 144 9 DirECTORY Services 146 9.1 Active DirECTORY............................................. 146 9.1.1 TROUBLESHOOTING Tips...................................... 150 9.1.2 IF THE System Will NOT Join THE Domain............................ 151 9.2 LDAP................................................... 152 9.3 NIS.................................................... 154 9.4 NT4.................................................... 155 9.5 KerberOS Realms............................................ 156 9.6 KerberOS KeYTABS............................................ 157 9.7 KerberOS Settings............................................ 158 10 Sharing 159 10.1 Apple (AFP) SharES........................................... 160 10.1.1 CrEATING AFP Guest SharES.................................. 162 10.1.2 CrEATING Authenticated AND Time Machine SharES..................... 164 10.2 Unix (NFS) SharES............................................ 168 10.2.1 Example ConfiGURATION..................................... 172 10.2.2 Connecting TO THE SharE.................................... 172 FrOM BSD OR Linux........................................ 172 FrOM MicrOSOFT.......................................... 173 FrOM Mac OS X.......................................... 173 10.2.3 TROUBLESHOOTING NFS...................................... 175 10.3 WebDAV SharES............................................. 176 10.4 WindoWS (SMB) SharES......................................... 177 10.4.1 ConfiGURING Unauthenticated Access............................. 182 10.4.2 ConfiGURING Authenticated Access Without A Domain ContrOLLER............. 183 10.4.3 ConfiGURING ShadoW Copies.................................. 186 10.5 Block (iSCSI)............................................... 188 10.5.1 TARGET Global ConfiGURATION.................................. 190 10.5.2 Portals.............................................. 191 10.5.3 INITIATORS............................................. 192 10.5.4 Authorized Accesses...................................... 194 10.5.5 TARGETS.............................................. 196 III 10.5.6 Extents.............................................. 197 10.5.7 TARget/Extents......................................... 199 10.5.8 Connecting TO iSCSI ....................................... 200 10.5.9 GrOWING LUNs.......................................... 201 Zvol Based LUN........................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    322 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us