Page 4
FOR USE OF SNAP APPLIANCE STORAGE SOLUTIONS SNAP IP, ASSIST, AND SNAP SERVER MANAGER (“INSTALLATION UTILITIES”); THE SYSTEM SOFTWARE EMBEDDED IN THE SNAP SERVER STORAGE SOLUTION (“EMBEDDED SOFTWARE”); SOFTWARE MARKETED BY SNAP APPLIANCE OR THAT IS EMBEDDED IN OR OTHERWISE CONSTITUTES A PART OF SNAP APPLIANCE COMPUTER HARDWARE PRODUCT(S) (SOMETIMES REFERRED TO COLLECTIVELY HEREIN, TOGETHER WITH THE INSTALLATION UTILITIES AND THE EMBEDDED SOFTWARE, AS THE “LICENSED SOFTWARE”), EXCEPT WHERE EXPRESSLY PROVIDED OTHERWISE, ARE PROPRIETARY COMPUTER SOFTWARE BELONGING TO SNAP APPLIANCE, INC.
Page 5
purposes, you may not copy any documentation pertaining to the Licensed Software. You agree that your use and possession of the Licensed Software is permitted only in accordance with the terms and conditions of this Agreement. Ownership of Restricted Software. You agree and acknowledge that, (i) Snap Appliance transfers no ownership interest in the Restricted Software, in the intellectual property in any Restricted Software or in any Restricted Software copy, to you under this Agreement or otherwise, (ii) Snap Appliance and its licensors reserve all rights not expressly granted to you hereunder, and (iii) the Restricted Software is protected by United States Copyright Law and international treaties relating to protection...
Page 6
COMPUTER ASSOCIATES INTERNATIONAL, INC. ("CA") END USER LIMITED LICENSE AGREEMENT (THE "AGREEMENT") CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS REGARDING YOUR USE OF ETRUST ANTIVIRUS, INCLUDING ITS CODE AND DOCUMENTATION (THE "PROGRAM") BEFORE USING THE PROGRAM. CA PROVIDES YOU WITH ONE COPY OF THE PROGRAM AND LICENSES THE PROGRAM TO YOU PURSUANT TO THE TERMS OF THIS AGREEMENT.
Preface ...xi Chapter 1 Administrative Overview ...1 GuardianOS Specifications ... 2 New Features in this Release ... 5 Snap Server Manager... 5 Connecting to the Server for the First Time ... 7 Using the Initial Setup Wizard ... 8 Configuring an APC-Brand UPS ... 9 SnapExtensions ...
Page 8
Local Users and Groups ...24 Windows Workgroup or Domain ...25 NIS Domain ...27 Chapter 4 Storage Configuration & Expansion... 29 Default Storage Configuration ...29 RAIDs ...30 Volumes ...33 Quotas...34 Expansion Arrays ...35 Status Devices...38 Chapter 5 iSCSI Disks ... 41 iSCSI Disk Management and Usage ...41 Chapter 6 Share and File Access ...
Page 9
Backing Up the NetVault for GuardianOS NVDB Directory ... 63 Recovering the NetVault Database ... 64 Disaster Recovery Procedural Overview... 66 Chapter 9 CA eTrust Antivirus Software ...69 Antivirus Dependencies... 70 Launching the CA eTrust Antivirus GUI ... 71 The Local Scanner View ... 72 Scan Job Configuration and Scheduling ...
Audience and Purpose This guide is intended for system and network administrators charged with installing and maintaining Snap Servers on their network. We assume the administrator is familiar with the basic concepts and tasks of multiplatform network administration. This guide provides information on the installation, configuration, security, and maintenance of Snap Servers.
Page 12
Tips and Cautions Conventions used to call out useful or important information are described next: A tip presents time-saving shortcuts related to the main topic. A caution alerts you to potential hardware or software issues or hazards in Caution the configuration or operation of Snap Servers. Consider cautions carefully before proceeding with any operation.
Page 13
Finding More Information Product documentation related toGuardianOS Snap Servers and Snap Disk expansion arrays are listed below. The current versions of all these documents are always available from the Snap Appliance documentation center at www.snapappliance.com/support Source and Location Quick Start Guide Product Packaging and Web Snap Server Administrator Guide User CD and Web...
Administrative Overview Snap Servers are designed as flexible, low-maintenance network file servers optimized for performance and efficiency. Snap Servers run the GuardianOS, built to maximize file I/O throughput across multinetwork protocols. To this end, all unnecessary system control and processing functions that are associated with a general-purpose server have been removed.This guide applies to the following Snap Servers and expansion arrays: Snap Unit...
GuardianOS Specifications GuardianOS Specifications These specifications apply to all Snap Servers and expansion arrays running the most recent version of the GuardianOS. Feature Network Transport Protocols Network Block Protocols Network File Protocols Network Client Types File Server Emulation Network Security Snap Server Administrator Guide Specification TCP/IP...
Page 17
Feature System Management RAID Options Specification Browser-based Administration Tool for remote system administration Snap Server Manager utility (platform independent) SNMP (MIB II and Host Resource MIB) User disk quotas for Windows, UNIX/Linux, Mac, FTP Group disk quotas for UNIX/Linux Environmental monitoring E-mail notification RAID 5 (drive striping with parity): For each array, the size of one drive is reserved for parity.
Page 18
GuardianOS Specifications Feature Data Protection DHCP Support Snap Server Administrator Guide Specification Snapshots for immediate or scheduled point-in-time images of the file system. Local Backup with BakBone Netvault Workgroup Edition. Network Backup with VERITAS NetBackup/Backup Exec, CA BrightStor ARCserve/Enterprise, Legato NetWorker, BakBone Netvault, Microsoft Backup Software for Windows 95/98/NT/2000/Me/XP, or Dantz Retrospect (Macintosh).
New Features in this Release The major enhancements listed in the following table have been included in the latest release. Feature iSCSI Multi-initiator Support BakBone NetVault 7.1.1 Snap Server Manager Snap Server Manager (SSM) is a Java-based, platform-independent, multiserver administrative application that runs on all major platforms. SSM provides a single interface from which administrators can discover, configure, and monitor all Snap Servers on their network.
Page 20
Snap Server Manager • Java Requirements — JRE 1.4.0 or higher must be installed. • MacOS requirements — If you plan to run Snap Server Manager on a Macintosh client, you must upgrade the client to MacOS 10.2 or higher. (Required for JRE 1.4.0 or higher support.) Launching Snap Server Manager Launch Snap Server Manager using one of the methods described in the following table:...
Connecting to the Server for the First Time Snap Servers are preset to acquire an IP address from a DHCP server. If no DHCP server is found on the network, the Snap Server defaults to an IP address of 10.10.10.10, and you may not be able to see the server on your network. You can discover a Snap Server using either the default server name or the Snap Server Manager (SSM) utility.
Using the Initial Setup Wizard Using the Initial Setup Wizard The first time you connect to a Snap Server via the browser-based Administration Tool, the Initial Setup Wizard runs. The Initial Setup Wizard consists of several screens that allow you to change the server name, set the date and time, set the administrator password, configure TCP/IP settings for the primary Ethernet port (Ethernet1), and register the server.
Configuring an APC-Brand UPS Server Registration You must register your server to activate your warranty, to receive Snap Care service and support, to create and track service requests, to download software updates, and to receive exclusive promotional offers. You can register multiple Snap Servers in one operation using Snap Server Manager.
SnapExtensions SnapExtensions A SnapExtension is a Java application that extends a Snap Server's functionality. The SnapExtension start screen shows the current state of the components of a SnapExtension. Currently, Server to Server Synchronization is the only SnapExtension on offer. Server to Server Synchronization (S2S) Server-to-Server Synchronization is a SnapExtension that moves, copies, or replicates the contents of a share from one Snap Server to another share on one or more different Snap Servers.
Add-On Features Add-on features are software applications, agents, and utilities that extend the capabilities of a Snap Server. Some add-on features are fully functional out-of-the- box; others may require a download and/or the purchase of a license for full operation. For up-to-date information on feature availability, contact Snap Appliance.
Finding More Information Finding More Information Product documentation related toGuardianOS Snap Servers and Snap Disk expansion arrays are listed below. The current versions of all these documents are always available from the Snap Appliance documentation center at www.snapappliance.com/support Source and Location Quick Start Guide Product Packaging and Web Snap Server Administrator Guide...
Network Access to the Server Snap Servers are preconfigured to use DHCP, autonegotiate network settings, and allow access to the server for Windows, NFS, Macintosh, FTP, and HTTP/HTTPS clients. Discussed next are the options for configuring TCP/IP addressing, network bonding, and access protocols. Network bonding options allow you to configure the Snap Server for load balancing and failover.
TCP/IP Options TCP/IP Options GuardianOS Snap Servers ship with Dual Gigabit Ethernet ports. The following table describes TCP/IP options; default settings appear in boldface. Default TCP/IP Settings and Options Option Setting TCP/IP DHCP Addressing Static Network Standalone The default Standalone setting treats each port as a separate bonding Load Balancing...
Configuring TCP/IP Settings TCP/IP settings are configured on the Administration Tool. This screen defaults to the current settings for the primary Ethernet port (Ethernet1). Issues in TCP/IP Configuration Consider the following guidelines when connecting a Snap Server to the network. Cabling for Single-Subnet, Multihomed, or Network Bonding Configurations All GuardianOS Snap Servers ship with two Ethernet cables for connecting the server to the network.
Page 30
Configuring TCP/IP Settings Make Sure the Switch is Set to Autonegotiate Speed/Duplex Settings When the server is shipped from the factory, both ports are set to autonegotiate. This setting allows the Snap Server to base speed and duplex settings on the physical port connection to a switch.
Default Protocol Access Settings Snap Servers are preconfigured to allow multiplatform access in heterogeneous Windows, UNIX/Linux, and Macintosh environments. The following table summarizes the Snap Server’s default network protocol access configuration. Protocol Windows (CIFS/SMB) Apple (AFP) HTTP/HTTPS (Internet/Intranet) DHCP Server As a security measure, disable any network protocols not required in your network environment.
Page 32
Windows SMB Access Support for Windows (SMB) Consider the following information when configuring access for your Windows clients. Windows File and Folder Name Support In Windows, most file and directory names are transmitted as a 2-byte (16 bit) UCS- 2 character set. However, this is not true in every case. Some are still sent via a single byte character set.
NFS Access NFS access to the server is enabled on the Administration Tool. By default, NFS access is enabled and any NFS client can access the Snap Server through the guest account. NFS client access to shares can be specified by navigating to the and then clicking the Support for NFS Consider the following technical information when configuring access for your NFS...
Apple File Protocol Access Apple File Protocol Access Apple (AFP) settings are configured on the Administration Tool. The default settings provide access to AFP clients over an AppleTalk or TCP/IP network. Macintosh clients can access the server using the local guest user account. For more granular control over Macintosh client access, create local user accounts for Macintosh users.
FTP Access Macintosh Access via a Browser When Only HTTPS Is Enabled If HTTP access is disabled, the Snap Server cannot be accessed using Internet Explorer 5.x for Macintosh. To resolve this issue, either use an alternate browser, or re-enable HTTP access on the screen.
HTTP/HTTPS Access HTTP/HTTPS Access Web View is the screen that opens when users access a Snap Server using their Web browsers. This screen displays a list of all shares to which the user has access. Users can navigate the share structure to locate and view or download files, but they cannot modify or upload files.
User & Group Management Authentication validates a user’s identity by requiring the user to provide a registered login name and corresponding password. Snap Servers ship with predefined local users and groups that allow administrative and guest user access to the server via all protocols. Administrators may choose to join the Snap Server to a Windows NT, Windows 2000, or Active Directory domain, and Windows clients can then authenticate to the server using their domain credentials.
Local Users and Groups guidelines: (1) the Snap Server does not recognize users or groups whose identification numbers are less than 100 or greater than 17999; and (2) each UID or GID must be unique. Local Users and Groups Local users or groups are created using the screens in the Administration Tool.
Local Account Management Tools The Snap Server offers several tools for creating, modifying, and editing local user and group accounts. Function Local User Management Local Group Management Windows Workgroup or Domain Windows workgroup or domain authentication is configured on the screen of the Administration Tool.
Page 40
Windows Workgroup or Domain Windows Networking Options Windows networks use a domain controller to store user credentials. The domain controller can validate all authentication requests on behalf of other systems in the domain. Option Workgroup Domain (NT or ADS) Kerberos Authentication Kerberos is a secure method for authenticating a request for a service in a network.
NIS Domain Directory domains as member servers. References to the Snap Server's shares can be added to organizational units (OU) as shared folder objects. Guest Account Access to the Snap Server screen contains an option that allows unknown users to Security >...
Page 42
NIS Domain Snap Server Administrator Guide...
Storage Configuration & Expansion Snap Servers are preconfigured as a single RAID 5, with a single volume encompassing 80 percent of RAID capacity, and a single share pointing to the volume. The default storage configuration reserves 20 percent of the data space for snapshots.
RAIDs space is preconfigured to allocate eighty percent of the RAID for the file system and the remaining twenty percent for snapshots. Snap Server 18000 Snap Server 15000 Snap Server 4500 Snap Server 4200 Snap Server 14000 Snap Disk 10 Snap Disk 30/32SA Volume Snapshot Pool...
Page 45
would configure one of the drives as a hot spare. The following table summarizes the advantages and disadvantages of each type of RAID: Comparative Advantages of RAID Types Features Data Loss Risk Write Access Speeds Usable Capacity Disks Required Supports Hot Spares RAID Groups Two RAIDs can be grouped together to neatly resolve a number of capacity issues.
Page 46
RAIDs automatically uses the hot spare to rebuild itself without administrator intervention. Snap Servers offer two kinds of hot spares: local and global. Item Description Definitions Local hot spare — A local (or dedicated) hot spare is associated with and is available only to a single RAID. Administrators typically create a local hot spare for RAIDs containing mission-critical data that must always be available.
Volumes Volumes are created, viewed, edited, and deleted from the screen of the Administration Tool. The default volume organizes the Snap Server’s storage capacity into a single volume with a single file system. If you need separate file systems on the same server, you can delete the default volume and create two or more smaller volumes in its place.
Quotas • Adding Unallocated Capacity — If there is unallocated capacity remaining on the RAID, you can add this capacity to the volume simply by editing the size field and clicking Save • Creating a New RAID — If all capacity on the RAID is allocated, and either: (1) a sufficient number of drives to create a new RAID exists, or (2) a RAID of the same type with excess capacity exists, the button to create an additional RAID and automatically add its entire capacity to...
how much space each user or group is currently consuming on the volume, allowing for precise tracking of usage patterns. You can set individual quotas for any local, Windows domain, or NIS user known to the Snap Server. Group quotas are available only for NIS groups.
Page 50
Expansion Arrays The Snap Disk 10 The Snap Disk 10 expansion array allows you to expand the capacity of a Snap Server 4500 (only) without increasing administrative tasks. You can attach up to two Snap Disk 10s via a Serial ATA cable to a Snap Server 4500. Each expansion array holds four disk drives.
Page 51
Expansion Arrays further preparation (other than preparing rack space) is necessary; the Snap Disk 30SA comes with the necessary cables. Otherwise, you will need to purchase and install the Snap Appliance fibre channel card, available from an authorized Snap Appliance reseller. The Snap Disk 32SA The Snap Disk 32SA expansion array works with a Snap Server 15000 or 18000.
Status Devices On the Storage > Devices from those of the host server by the label EXTN. The following graphic shows the Devices screen of a host Snap Server 4500. The disk drives of the expansion array connected to Port 1 of the host server’s Serial ATA card display with the label EXTN1;...
Page 53
Deleteing Unassigned Global Hot Spares Label Description Location The bay in which the drive is seated Model Device specifications Size Actual available capacity Status Current condition of the device: • Member Of — The RAID to which the drive is assigned. •...
Page 54
Status Devices Understanding the Disk Drive Detail table This screen displays summary information on each enclosure in the system as follows: Label Snap Unit Model Server Number Drives Status To view detailed disk drive information Do one of the following: •...
iSCSI Disks Internet SCSI (iSCSI) is a standard that defines the encapsulation of SCSI packets in TCP and their transmission via IP. On Snap Servers, an iSCSI Disk is based on an expandable, RAID-protected volume but appears to a client machine as a local SCSI drive.
Page 56
iSCSI Disk Management and Usage Isolate iSCSI Disks from Other Resources for Backup Purposes It is important to isolate iSCSI Disks from other resources on the Snap Server for two reasons: (1) the file system of an iSCSI Disk differs fundamentally from the Snap Server’s native file system;...
Page 57
iSCSI Disk Management and Usage without some risk. If the Snap Server were to suddenly lose power, for example, data still in cache would be lost. This risk can be minimized by following industry-standard security precautions such as keeping servers in a secured location and connecting power supplies to the mains using a network-based UPS.
Page 58
iSCSI Disk Management and Usage To Configure iSNS Label iSCSI Disk Name Volume Device Authentication Size Status Click the Configure iSCSI screen, from which you can configure iSNS. > iSCSI To Edit an iSCSI Disk Click an iSCSI Disk name. You can increase (but not decrease) its size. To Delete an iSCSI Disk The system will not allow the deletion of an iSCSI Disk when clients are connected.
Share and File Access Snap Appliance has implemented features to accommodate the disparate methods used by the SMB and NFS protocols for sharing data. At the share level, administrators can assign read-write or read-only share access to individual Windows (and local) users and groups. Administrators can also edit the NFS exports file to control how shares are exported to NFS client machines.
Components and Options Components and Options Shares are created and share access is granted using the Administration Tool. File- level permissions are configured from a Windows or UNIX/Linux workstation. The following table summarizes the components, options, and tools available for setting up share and file security on Snap Servers.
SnapTrees & Security Models Directories created at the root of a Snap Server volume are assigned one of two security models: Windows or UNIX. The security model determines the file-level security scheme that will apply to files, folders, and subdirectories within the top- level directory.
Creating Shares Creating Shares Shares are created, viewed, edited, and deleted from the the Administration Tool. The default share (SHARE1) maps to the root of the volume and grants access to all users and groups over all protocols. As a security measure, disable any protocols not required for your network environment.
Security Models, SnapTrees, and Shares In the course of creating a share that points to a volume or to a directory on the root of the volume (aka SnapTree directory), you must assign a security model to the volume or SnapTree directory. Thereafter, security models for these entities are managed on the Security >...
Setting File and Folder Permissions (Windows) • Interaction between share-level and file-level access permissions — When both share-level and file-level permissions apply to a user action, the more restrictive of the two applies. Consider the following examples: Example A: More restrictive file-level access trumps more permissive share-level access.
Page 65
the parent directory. The example displayed in the graphic shows the default settings for a file created by the local user admin. File/Directory-Level Access Permissions User owner Initially, the user who created the file or directory Group owner The primary group of the user who created the file or directory Everyone Includes users to whom no other permission applies •...
Page 66
Setting File and Folder Permissions (Windows) in Windows security are available on the Snap Server. The GuardianOS supports the following file and directory permissions. File- and Directory-Level Access Permissions Read Grants complete read access. It is a combination of List Folder/ Read Data, Read Attributes, Read Extended Attributes, Read Permissions.
Page 67
To Set File and Directory Permissions and Inheritance (Windows) Using a Windows NT 4.0, 2000, or XP client, map a drive to the Snap Server, logging in as a user with change permissions for the target file or directory. Do one of the following: •...
Page 68
Setting File and Folder Permissions (Windows) Snap Server Administrator Guide...
Snapshots A snapshot is a consistent, stable, point-in-time image of a volume used for backup purposes. Snapshots can satisfy short-term backup situations such as recovering a file deleted in error, or even restoring an entire file system, without resorting to tape. Perhaps more importantly, snapshots can be incorporated as a central component of your backup strategy to ensure that all data in every backup operation is internally consistent and that no data is overlooked or skipped.
Page 70
Snapshot Management and Usage snapshot and clicking the the volume will be inaccessible to clients. (1) Rolling back a volume cannot be undone and should only be used as a last Cautions resort after attempts to restore selected directories or files have failed; (2) Performing a rollback on a volume may invalidate the NetVault for GuardianOS nvdb directory for the volume, and may also disable the antivirus software.
Estimating Snapshot Pool Requirements Snapshot data grows dynamically for as long as a snapshot is active and as long as there is enough space available in the snapshot pool to store them. When the snapshot pool approaches its capacity (at about 95 percent), the Snap Server deletes the oldest snapshot’s data to create space for more recent snapshot data.
Accessing Snapshots • Creating a RAID Group — When two RAIDS are grouped, their snapshot pools are added together. For example, if RAID A with a snapshot pool of 50 MB is grouped with RAID B with a snapshot pool of 25 MB, the resulting RAID Group will have a snapshot pool or 75 MB.
Accessing Snapshots Within the Snapshot Share A snapshot share contains a series of directories. Each directory inside the snapshot share represents a different snapshot. The directory names reflect the date and time the snapshot was created. For example, assume the snapshot share named Sales_SNAP contains the following four directories: latest 2003-12-25.120000...
Page 74
Coordinating Snapshot and Backup Operations depending on the number of files in the volume.) For example, assuming you schedule nightly backups for a heavily used volume at 3:00 a.m., you might schedule the snapshot of the volume to run every day at 2:30 a.m., allowing half an hour for the snapshot to run to completion.
Disaster Recovery This chapter explains how to create the files you need to recover a Snap Server’s configuration information, such as network and RAID configurations, as well as volume-specific information, such as ACLs and quota settings. It also discusses what to do if all access to the data on a Snap Server is cut off due to a hardware or software failure.
Page 76
Backing Up Server and Volume Settings • SnapDRImage — The Snap Server disaster recovery image saves server-specific settings such as server name, network, RAID, volume and share configuration, local user and group lists, and snapshot schedules. There is one SnapDRImage file per server, residing on the root directory of the first volume at the following path: \\server_name\volume_name.
Take no action regarding the volume-specific files. These files will be copied to tape as part of your regular volume backup procedures. Backing Up the NetVault for GuardianOS NVDB Directory This section details the use of the NetVault Database plug-in and offers various tips for its use.
Recovering the NetVault Database Enter a suitable name for the job in the Job Title box and start the backup job by clicking the Submit button on the command toolbar. Only clients successfully added via the NetVault Client Management window will display. Recovering the NetVault Database This section summarizes the procedure necessary for recovering the NetVault Database from tape.
Page 79
• Do Not Monitor Job Progress During a Recovery — It is strongly recommended that all NetVault windows be closed, and the NetVault GUI be closed during the recovery of the NetVault Database, as this may interfere with the process. Restore Procedure Access the Restore window from the NetVault GUI by clicking the button in the command toolbar.
Disaster Recovery Procedural Overview Disaster Recovery Procedural Overview The procedures described in this section for responding to a catastrophic event are general in nature and may result in the loss of data. Should such an event actually occur, the exact procedure to follow will vary according to environmental conditions.
Page 81
Select the Fresh Install option, and click This operation may take a few minutes. As the operation progresses, the screen reports the progress of the operation. When the operation is finished, scroll to the bottom of the screen, and click screen opens.
Page 82
Disaster Recovery Procedural Overview Restore data using a fully qualified path to a share. When entering the path to the restore directory, use the following format: /share_name/path_to_directory /Finance/Sales If you install to an invalid share or path the software will restore to the Caution root file system.
CA eTrust Antivirus Software The CA eTrust Antivirus software is preinstalled on all GuardianOS Snap Servers. By default, the software is enabled, but no scan jobs or signature updates have been scheduled. (The server will, however, check for signature updates whenever the server is powered on). These and other antivirus configuration and management tasks are performed using the CA eTrust Antivirus GUI, accessed from the the Administration Tool.
Antivirus Dependencies Antivirus Dependencies The Snap Server implementation of CA eTrust Antivirus software includes the following features: HTTP Access and Antivirus Configuration To access the CA eTrust Antivirus configuration interface, HTTP must be enabled on the Network > Web Re-enabling the Antivirus Software The antivirus software is enabled by default.
Launching the CA eTrust Antivirus GUI The CA eTrust Antivirus software is enabled by default. Some situations, such as deleting a volume or performing an upgrade procedure, may require you to re- enable the software. To learn how the antivirus software interacts with other GuardianOS software components, see “Antivirus Dependencies”...
The Local Scanner View The Local Scanner View Use the Local Scanner view to scan a Snap Server for infected drives, folders, files, or disks on demand. Local Scanner View of the CA eTrust Antivirus GUI Left-pane Components of the Local Scanner View Component Root Directory Move Folder...
Scan Job Configuration and Scheduling You can run scan jobs on demand or you can configure scan jobs to run periodically. This section outlines the process of configuring and running manual and scheduled scans. For detailed descriptions of all scanning options, see the CA eTrust Antivirus online Help.
Page 88
Scan Job Configuration and Scheduling Setting the type of files to scan (Selections tab) Use the Selections tab options to choose the types of objects to scan, the types of file extensions to include or exclude from a scan, and the types of compressed files to scan.
Schedule the scan. The Schedule tab allows you to set a start date and a repeat interval for the scan. Select the directories to scan. The Directories tab lists all paths that currently exist on the server. You can remove or add new paths as desired. You can also use the Exclude Directories tab to achieve the same result.
Page 90
Signature Updates Methods of Downloading and Distributing Signature Updates Method Description Use UNC to distribute signature updates from one Snap Server to another (or from any arbitrary SMB or Windows server). Note that for UNC to work, you must have the Enable Guest Account option set to on the Snap Server on which the signature updates reside.
Page 91
Updating a Snap Server That Does Not Have Internet Access If you have Snap Servers that do not have Internet access, use the following procedures to download the signature files to a machine with Internet access and then copy them to the Snap Server. When retrieving signature updates, the antivirus software attempts to connect to all the sites in the site list in the order they are listed.
Page 92
Signature Updates To Distribute Files via UNC If you have more than one Snap Server with no Internet access, you can perform the previous procedure on just one of them (or any Windows/SMB server), and then configure your other Snap Servers to get the update from that server automatically via UNC.
Click . The path you entered appears in Download Sources list box. Click Download Now Verifying Download Events Use the following procedure to verify download and distribution events. Select View > Log Viewer In the left-hand pane, select the upper right-hand pane in chronological order. Select a distribution event.
The Move Directory The Move Directory You can configure scans to move infected files to the move folder ( Options). To view infected files, click the Scanner pane of the Local Scanner View. To manage a moved file, right-click the file and select from the following options: The Right-Click Menu Options for Infected Files Option...
Log View The Log View provides easy access to detailed information on scan, distribution, and other events. To access this view select Log View with Local Scanner selected Option Local Scanner RealTime Scanner Scheduled Scanner General Events Distribution Events from the View menu. Log View Description Displays summary information about scan jobs that have run...
Page 96
Log View Snap Server Administrator Guide...
Troubleshooting Snap Servers This chapter describes basic techniques for identifying and resolving common hardware and networking issues. Topics in Troubleshooting Snap Servers • The Meaning of LED Indicators • System Reset Options • Networking Issues • Miscellaneous Issues • Phone Home Support Additional Resources Resource Description...
The Meaning of LED Indicators The Meaning of LED Indicators LED indicators provide information on the status of basic connectivity, disk drives, fan modules, and power supply modules. Snap Server 4200/4500/15000 Status & Drive Light Behavior The server has two status lights, two network lights, and two lights for each of the four disk drives, as shown in the following illustration: Snap Appliance recommends that you become familiar with the operation of these lights.
Page 99
System LED Solid amber The server has encountered a system error. Blinking green then The server has booted to maintenance mode. For more amber information, see “Using Maintenance Modes to Perform System Resets” on page 93. LAN 1 and LAN 2 LEDs Solid green The server is active and connected to the network on the network port.
Page 100
The Meaning of LED Indicators Power Supply Module Indicator LEDs If a power supply fails on a Snap Server 14000, a failure message appears on the front LCD display. On the back of the server, there is a status light on each of the power modules, and below the power supply enclosure two activity lights.
Page 101
Snap Server18000 Status & Drive Light Behavior The server has two status lights, two network lights, and two lights for each of the eight disk drives, as shown in the following illustration: Power, System, and LAN LEDs Looking at the server from the front, the lights appear in the following order, from left to right: power LED, system LED, LAN 1 (Ethernet1) LED, and LAN 2 (Ethernet2) LED.
Page 102
The Meaning of LED Indicators Disk Drive LEDs Disk drive LEDs on the Snap Server 18000 are located on the bezel to the right of the LED display. The left light indicates drive health. The right light indicates drive activity. They operate as follows: Health LED (left) Solid green Solid amber...
Page 103
The Meaning of LED Indicators Fan Module LED Indicator Lights The Snap Server has no external LEDs that indicate the status of a fan module. The screen of the Administration Tool indicates when a fan has Monitoring > Status failed. When the cover of the chassis is removed, the Fault LED on the failed module will be lit.
Page 104
The Meaning of LED Indicators Snap Disk 10 Disk Drive and Power Supply Module LEDs This section describes the LED indicators on the Snap Disk 10’s disk drives and power module. Disk Drive LEDs The Snap Disk 10 has two lights below each disk drive. The Status light (left) indicates power.
Page 105
Snap Disk 30SA and Snap Disk 32SA Disk Drive & Power/Fan Module Behavior This section describes the LED indicators on the Snap Disk 30SA and Snap Disk 32SA’s disk drives and power /fan modules. Snap Disk 30SA and Snap Disk 32SA Disk Drive LEDs The Snap Disk 30SA and Snap Disk 32SA have two LEDs at the edge of each disk drive as shown in the following illustration.
System Reset Options Snap Disk 30SA and Snap Disk 32SA Power/Fan Module LEDs The Power/Fan module has four LED indicators as shown in the following illustration. To remove the module, squeeze the two latches on the handle together and then withdraw the module by pulling the handle towards you. Fan Fault Power The LEDs operate as described in the following table:...
Page 107
Resetting the Snap Server to Factory Defaults The GuardianOS allows you to reset different components of the system. Default settings can be found in the default configuration sections of Chapters 2, 3, and 4 of the Administrator Guide. Each reset option requires a reboot of the server. To prevent possible data Caution corruption or loss, make sure all users are disconnected from the Snap Server before proceeding.
Page 108
System Reset Options Mode Description As in mode 1, clears the IP address stored on the network, resets the server to use DHCP, and resets speed/duplex settings to autonegotiate. Mode 3 additionally, resets network bonding to standalone and resets all network protocols to factory defaults.
Networking Issues The Server Cannot Be Accessed over the Network Inaccessibility may be caused by a number of reasons. To resolve this issue, use one of the following methods: • Verify that you have the correct IP address of the server, and try to connect again. •...
Page 110
Networking Issues The Snap Server Does Not Operate Properly on a Network Running Gigabit- Full-Duplex For Gigabit Ethernet to operate properly, both the switch and the Snap Server’s primary Ethernet port (Ethernet1) must be set to Auto (autonegotiate). Any other setting will result in unexpected behavior and reduced performance.
Page 111
Networking Issues mismatch between the switch/hub and the Ethernet port on the Snap Server. To resolve this problem, verify that both settings (if using both of the server's Ethernet ports) on the switch/hub match the setting on the server. When the server is shipped from the factory, both ports are set to autonegotiate.
Page 112
Networking Issues You Cannot Log in as root to the Snap Server The root account password is tied to the admin accout password. If you cannot log in as root, change the password for the admin account on the System > General Settings screen.
You Are Unable to See Your Domain Users When Trying to Set Up Windows Security Permissions on File Folders The Snap Server (GuardianOS) has joined the Active Directory domain properly, and you can see the domain users when you set Share permissions from the browser-based Administration Tool.
Phone Home Support The Server Is Not Responding to File Requests or Configuration Commands Call your Snap Appliance technical support representative. Problems with Cable Arm on the 18000 with a SCSI Cable Attached The size of the connector on an attached SCSI cable may prevent the 18000 from fully withdrawing into a rack when the cable management arm is attached.
Page 115
Complete the following fields as appropriate and click Text Field Description Subject: (Required) Enter a concise description that identifies the issue. Case: (Required) Select New Case if you are e-mailing technical support for the first time. Select Existing Case if you have previously contacted technical support concerning the issue.
Page 116
Phone Home Support Snap Server Administrator Guide...
Third-Party Backup Applications This appendix describes how to install the following backup agents on the Snap Server from a Linux or a Windows backup host system: • CA BrightStor ARCServe 2000 v7.0 • CA BrightStor ARCServe Backup v9.0 • CA BrightStor Enterprise Backup v10.0 •...
Preparing to Install a Third-Party Backup Agent Preparing to Install a Third-Party Backup Agent Before performing one of the backup agent installation procedures described in this appendix, make sure you have the following information and tools: • Backup and media server IP addresses — Most backup agents need to know the IP addresses of the backup and media servers you plan to use with the Snap Server.
Pre-installation Tasks Perform the following tasks prior to installing any agents. Identify backup and media servers to the Snap Server. In the Administration Tool, navigate to the and click . In the screen that opens, do the following: (a) enter the IP address of the backup or media server;...
Installing Third-Party Agent Software Installing Third-Party Agent Software For purposes of illustration, the procedures in this section assume that (1) you are using the default Snap Server configuration; and (2) you have created a directory called agent (to which to copy your agent/client files) on the default share (SHARE1), such that the path to the directory is /shares/SHARE1/agent.
Page 121
To change to the agent directory, enter one of the following commands and press Enter cd /opt/uagent (for ARCserve 2000 v7 only) cd /opt/CA/uagent (for ARCserve v9 and Enterprise v10) To start the agent, enter the following command and press ./uagentsetup The BrightStorARCserve agent is now installed.
Page 122
Installing Third-Party Agent Software To run the Backup Exec agent installation, type the following command: ./INSTALL Then press and follow the prompts, using the default install locations and Enter default options. You must respond to “yes” or “no” prompts in lowercase ( Caution uppercase will cause an error and abort the procedure.
Page 123
Installing a VERITAS NetBackup 3.4.1 Client This section describes how to install the UNIX/Linux agent from VERITAS NetBackup. Copy the NetBackup NBClients directory and the Linux directory from the root of the NetBackup CD to the agent directory on the Snap Server. Connect to the Snap Server via SSH, and login as admin using your admin user password.
Page 124
Installing Third-Party Agent Software Installing the VERITAS NetBackup 4.5 FP6 Client This section describes how to install the Veritas NetBackup 4.5 FP agent on a Snap Server to enable interoperability with NetBackup 4.5 Feature Pack 6 for Windows. Procedures for installing from the following media are given: •...
Page 125
You will be prompted for the NetBackup server name and for the NetBackup client name. • Specify the hostname of the already existing NetBackup Server on your network for the NetBackup server. • Specify the name of the Snap Server to which you are installing as the NetBackup client.
Page 126
Installing Third-Party Agent Software Installing from a CD Copy the NetBackup NBClients directory and the Linux directory from the root of the NetBackup CD to the agent directory on the Snap Server. Connect to the Snap Server via SSH, and login as admin using your admin user password.
Page 127
You will be prompted for the NetBackup server name and for the NetBackup client name. • Specify the hostname of the already existing NetBackup Server on your network for the NetBackup server. • Specify the name of the Snap Server to which you are installing as the NetBackup client.
Page 128
Installing Third-Party Agent Software Installing a Legato NetWorker Client This section describes how to install the Legato NetWorker UNIX/Linux client as well as special procedures Legato NetWorker users must use in order to perform backup and restore operations on the Snap Server. To Install the Legato Networker Client Connect to the Snap Server via SSH, and login as admin using your admin user password.
Page 129
Backup and Restore Operations with a Legato NetWorker Client This section describes special procedures Legato NetWorker users must use in order to perform backup and restore operations on the Snap Server. To Add the Snap Server as a Root User For backup operations, NetWorker requires that the Snap Server be configured as a root user.
Page 130
Installing Third-Party Agent Software Enter one of the following commands, and press • To recover data to its original location: recover -s backupservername -c snapservername -f -i “/shares/ SHARE1/data/” -a where /shares/SHARE1/data • To recover data to a different location recover -s backupservername -c snapservername -f -i -a R -d “/shares/SHARE1/relocated_data/”...
Term access permissions ACL (access control list) Administration Tool ADS (Active Directory Service) AFP (AppleTalk Filing Protocol) agent algorithm AllLocalUsers group AllUsers group array Definition A rule associated with a share, a file, or a directory to regulate which users can have access to the share and in what manner.
Page 132
Term authentication autonegotiation autosensing bonding CA eTrust Antivirus chaining channel CHAP Authentication checksum CIFS (Common Internet File System) A specification for an Internet file access protocol that daemon default gateway degraded DHCP (Dynamic Host Configuration Protocol) directory Snap Server Administrator Guide Definition The validation of a user’s identity by requiring the user to provide a registered login name and corresponding...
Page 133
Term disaster recovery disk DNS server (Domain Name System server) domain domain name Ethernet Ethernet address Ethernet port event failover Definition A strategy that allows a company to return to normal activities after a catastrophic interruption. Through failover to a parallel system or by restoration of the failed system, disaster recovery restores the system to its normal operating mode.
Page 134
Term FTP (File Transfer Protocol) full-duplex gateway GID (group IDs) GuardianOSImage.gsu half-duplex hidden share host name hot spare (local or global) hot swapping HTTP (Hypertext Transfer Protocol) HTTPS (Hypertext Transfer Protocol Secure) Snap Server Administrator Guide Definition A standard Internet protocol that provides a way to exchange files between computers on the Internet.
Page 135
Term I/O (input/output) Inheritance iSCSI IP (Internet Protocol) address Jukebox JVM (Java Virtual Machine) Kerberos LCD (liquid crystal display) LED (light-emitting diode) Definition The operation of transferring data to or from a device, typically through an interface protocol like CIFS, NFS, or HTTP.
Page 136
Term Linux load balancing local group/local user MAC (Media Access Control) maintenance mode MIB (Management Information Base) mirroring mounted multihomed Snap Server Administrator Guide Definition A UNIX-like OS that was designed to provide personal computer users a free or very low-cost operating system comparable to traditional and usually more expensive UNIX systems.
Page 137
Term NAS (network attached storage) NetVault for GuardianOS NFS (Network File System) NIS (Network Information Service) node nvdb directory orphan parity Permissions PoP (Proof of Purchase) Definition Hard disk storage that is set up with its own network address as opposed to being attached to the department computer that is serving applications to a network's workstation users.
Page 138
Term POSIX (Portable Operating System Interface) protocol public access share quota RAID (redundant array of independent disks) RAID 0 (Striped) RAID 1 (Mirrored) RAID 5 (Striping with Parity) recurring snapshot Snap Server Administrator Guide Definition A set of standard operating system interfaces based on the UNIX operating system.
Page 139
Term restrict anonymous resynchronization rollback S2S (Server-to-Server Synchronization) SCSI (Small Computer System Interface) serial number server number share share access SMB (Server Message Block) Snap Server Manager Definition A Windows feature in which anonymous users cannot list domain user names and enumerate share names. Microsoft has provided a mechanism in the Registry called restrict anonymous for administrators to restrict the ability for anonymous logon users (also known as NULL session...
Page 140
Term SnapDRImage SnapExtension snapshot snapshot pool snapshot share SnapTree Directory SNMP (Simple Network Management Protocol) SSH (secure shell) SSL (Secure Sockets Layer) standalone Snap Server Administrator Guide Definition The Snap Server disaster recovery image that saves server- specific settings such as server name, network, RAID, volume and share configuration, local user and group lists, and snapshot schedules.
Page 141
Term static IP address striping subnet mask TCP/IP (Transmission Control Protocol/Internet Protocol) trap UID (user IDs) unassigned UNC (Universal Naming Convention) UPS (uninterruptable power supply) A device that allows a computer to keep running for a short URL (Uniform Resource Locator) volume Web View Definition...
Page 142
Term Windows domain authentication WINS (Windows Internet Naming Service) workgroup Snap Server Administrator Guide Definition Windows-based networks use a domain controller to store user credentials. The domain controller can validate all authentication requests on behalf of other systems in the domain.
Chapter 12Symbols Symbols .os_private 62 Access file and folder permissions 50 network access to the server 13 problems with 95 users and groups 23 See also Share access Access Denied Message 95 ACLs defined 117 backing up 62 resetting to defaults 93 setting file-level permissions (Windows) Active Directory defined 117...
Page 144
CA BrightStor ARCserve, installing agent CA eTrust Antivirus, see Antivirus Cable management arm 100 Chooser, see MacintoshOS Client access, configuring Apple (AFP) 20 FTP 21 HTTPS/HTTP 22 NFS 19 Windows (SMB) 17 Code page support 18 Connecting to Snap Servers 7 Defaults admin password 23 file-level access permissions 51...
Page 145
Hardware Components, purchasing new Hidden Shares 48 Host File Editor 105 Hot spares 31 HTTPS/HTTP configuring 22 HTTPS incompatibility with MSIE 5.x on Mac 21 Initial Setup Wizard 8 IP address setting 15 using SSM to discover 7 iSCSI Disks 41 management and usage 41 JRE, see Java Kerberos 26...
Page 146
Operating system, see GuardianOS Paths for backing up snapshots 60 for distributing antivirus updates 77 for restoring a "cured" file 80 to SnapDRImage 62 to volume disaster recovery files 62 Permissions share- and file-level interaction 50 file-level default behavior 50 GuardianOS processing of 53 setting folder inheritance 52 share-level...
Page 147
SnapDRImage 62 Snapshot shares 58 Snapshots autobackup of volume settings 62 coordinating with backup jobs 59 estimating storage requirements for 57 excluding from antivirus scans 73 excluding iSCSI Disks from 42 ways to adjust pool size 57 SnapTree 47 Specifications, GuardianOS 2 Speed/duplex options 14 SSH 105 Standalone 15...