Sign In
Upload
Manuals
Brands
Acopia Networks Manuals
Storage
810-0044-00
Acopia Networks 810-0044-00 Manuals
Manuals and User Guides for Acopia Networks 810-0044-00. We have
1
Acopia Networks 810-0044-00 manual available for free PDF download: Manual
Acopia Networks 810-0044-00 Manual (492 pages)
CLI Storage-Management Guide
Brand:
Acopia Networks
| Category:
Storage
| Size: 6 MB
Table of Contents
Revision History
2
Table of Contents
3
Chapter 1 Introduction
21
The ARX
21
Back-End Storage and Servers
22
Front-End Services
22
Policy
22
Resilient Overlay Network (RON)
23
Audience for this Manual
23
Using this Manual
23
Document Conventions
24
CLI Overview
25
Exec Mode
25
Global Commands
25
Priv-Exec Mode
25
Cfg Mode
26
Gbl Mode
26
Exiting a Mode
26
Prompts
26
The no Convention
27
The Enable/No Enable Convention
27
Getting Started
28
Entering Cfg or Gbl Mode
28
Sample Network
30
Contacting Customer Service
31
Chapter 2
33
Product Overview
33
Solutions to Common Storage Problems
33
Today's File Storage
33
Optimizing Storage in a Namespace Volume
35
Configuration Instructions
37
Adapting Storage to User Demands
38
Migration for Capacity
39
Configuration Instructions
40
Migration for Class of Storage: File-Placement Policy
40
Configuration Instructions
43
Controlling Costs
43
Chapter 3 Preparing for CIFS Authentication
45
Concepts and Terminology
46
Adding a Proxy User
46
Specifying the Windows Domain
47
Removing the Windows Domain
47
Specifying the Username and Password
48
Removing the Username and Password
48
Listing All Proxy Users
49
Showing One Proxy User
49
Removing a Proxy User
49
Configuring the NTLM Authentication Server
50
Listing NTLM Authentication Servers
51
Displaying Detailed Server Status
52
Adding an Active-Directory Forest (Kerberos)
54
Identifying the Forest Root
54
Adding a Redundant Forest Root
55
Removing a DC for the Forest Root
55
Identifying a Dynamic-DNS Server
56
Removing a Name Server
57
Adding a Child Domain
58
Removing a Child Domain
60
Adding a Tree Domain
61
Removing a Tree Domain
62
Establishing Forest-To-Forest Trust
62
Dissolving a Forest-To-Forest Trust
63
Showing All Active-Directory Forests
63
Showing One Active-Directory Domain
65
Showing One Active-Directory Forest
65
Showing DC Status
66
Focusing on a Single Processor
70
Removing an Active-Directory Forest
71
Authorizing Windows-Management (MMC) Access
72
Adding a Windows User to the Group
72
Removing a User
73
Setting Management Permissions for the Group
73
Removing a Permission
74
Showing All Management-Authorization Groups
75
Focusing on One Group
76
Removing a Management-Authorization Group
77
Chapter 4 Preparing for NFS Authentication
79
Before You Begin
79
Adding a NIS Domain
79
Identifying a NIS Server for the NIS Domain
80
Removing a NIS Server
81
Listing All Configured NIS Domains
81
Listing Netgroups in a NIS Domain
82
Showing Details for a NIS Domain
82
Ip Address
83
Showing the Members of One Netgroup
83
Reading the Update Report
84
Updating the NIS Database
84
Scheduling Regular Updates
86
Removing the NIS Domain-Server Map
87
Adding an NFS Access List
87
Listing All NFS Access Lists
88
Showing One NFS Access List
89
Resolving All Netgroups in the Access List
90
Setting the NIS Domain
91
Removing the NIS Domain
91
Adding a Permit Rule
92
Permitting a Netgroup
93
Allowing Root Access
94
Rule Ordering
94
Removing a Permit Rule
95
Changing the Anonymous User ID
96
Changing the Anonymous Group ID
96
Reverting to the Default Group ID
96
Reverting to the Default User ID
97
Adding a Deny Rule
97
Removing a Deny Rule
98
Changing Rule Order
98
Adding a Description
100
Removing the Description
100
Removing an Access List
101
Chapter 5 Examining Filers
103
Examining CIFS Shares
106
Using Proxy-User Credentials
108
Showing the Physical Paths for CIFS Shares
110
Focusing on One Share
111
Showing Connectivity Only
112
Showing Capabilities Only
113
Showing Shares Only
114
Showing Time Settings
115
Showing CIFS Attributes
115
Probing for CIFS Security
116
Chapter 6 Adding an External Filer
119
Providing the Filer's IP Address
120
Providing a Secondary Address (UDP Only)
120
Removing a Secondary Address
121
Ignoring a Directory
121
Re-Instating a Directory
122
Adding a Description (Optional)
123
Removing the Description
123
Setting the CIFS Port (Optional)
124
Reverting to the CIFS-Port Default
124
Listing External Filers
124
Showing External-Filer Details
125
Showing Details for All External Filers
126
Samples - Adding Two Filers
126
Removing an External Filer
127
Next
127
Chapter 7 Configuring a Namespace
129
Concepts and Terminology
130
Listing All Namespaces
131
Showing Namespace Details
131
Showing Details for All Namespaces
135
Showing Filer Shares Behind the Namespace
135
Showing Shares Behind One Namespace
137
Setting the Namespace Protocol(S)
137
Removing a Protocol
138
Creating a Multi-Protocol (NFS and CIFS) Namespace
138
Changing Protocols after Import
139
Setting NFS Character Encoding
139
Setting CIFS Character Encoding
141
Returning to Default Character Encoding
141
Configuring Windows Authentication (CIFS)
142
Using Kerberos for Client Authentication
143
Disabling Kerberos
143
Identifying the NTLM Authentication Server
144
Multi-Domain Support
145
Removing an NTLM-Authentication Server
146
Opening Windows-Management Access (Optional, MMC)
146
Removing a Management-Authorization Group
147
Selecting a SAM-Reference Filer
148
Adding a Volume
149
Enabling the Namespace (Optional)
150
Enabling All Shares in the Namespace
151
Taking Ownership of All Managed Shares (Optional)
151
Disabling All Shares
152
Disabling the Namespace
152
Showing Namespace Configuration
153
Removing a Namespace
155
Chapter 8 Adding a Direct Volume
157
Declaring the Volume "Direct
158
Reverting to a Managed Volume
159
Manually Setting the Volume's Free Space (Optional)
159
Freespace Calculation Manual
159
Using Automatic Free-Space Calculation
160
Setting CIFS Options
160
Disabling CIFS Oplocks (Optional)
162
Allowing the Volume to Automatically Disable Oplocks
162
Reinstating Oplock Support
163
Adding a Share
163
Listing Filer Shares
164
Showing Supported Protocols at the Filer
165
Identifying the Filer and Share
166
Disconnecting from the Filer
167
Identifying a Multi-Protocol Share
167
Using a Managed Volume as a Filer
168
Disconnecting from the Managed Volume
168
Attaching a Virtual Directory to the Back-End Share
169
Removing an Attach Point
170
Designating the Share as Critical (Optional)
171
Removing Critical-Share Status
171
Ignoring the Share's Free Space (Optional)
172
Freespace Ignore
172
Including the Share in the Free-Space Calculation
172
Adjusting the Free-Space Calculation
173
Erasing the Free-Space Adjustment
173
Enabling the Share
174
Disabling the Share
174
Removing a Direct Share
175
Selecting a VPU (Optional)
175
Default-VPU Assignment
176
Assigning the Volume to a VPU
178
Splitting Namespace Processing Within a VPU
179
Reverting to Default-VPU Assignment
180
VPU Limits for Direct Volumes and Shares
180
Showing All Vpus on the Current Switch
181
Showing One VPU
182
Enabling the Volume
183
Enabling All Shares in the Volume
184
Disabling All Shares
184
Disabling the Volume
185
Showing the Volume
185
Showing One Share
188
Showing Filer Shares Behind One Volume
190
Showing the Volume's Configuration
191
Sample - Configuring a Direct Volume
192
Removing a Direct Volume
193
Chapter 9 Adding a Managed Volume
195
Storing Volume Metadata on a Dedicated Share
196
Using Multiple Metadata Shares
197
Removing a Metadata Share
198
Designating the Metadata Share as Critical (Optional)
199
Removing Critical-Resource Status
199
Migrating Metadata to a New Share after Import
200
Dividing the Import into Multiple Scans
200
Protecting Metadata During Import
201
Import Multi-Scan
201
Import Protection
201
Reverting to Unprotected Metadata and Faster Import
202
Reverting Back to the Faster, Single-Scan Import
202
Safe Modes for Share Imports into Pre-Enabled Volumes
203
Allowing the Volume to Modify on Import
203
Conditions for Running the Modify Command
204
Running a No-Modify Import
205
Allowing the Volume to Modify on Re-Import
205
Preventing Modification on or after Re-Import
206
Preventing Modifications
206
Automatically Synchronizing Metadata (CIFS)
207
Auto-Sync Jobs and Reports
207
Allowing Renames on Collision
208
Disabling File Auto-Synchronization
209
Disallowing Renames
209
Manually Setting the Volume's Free Space (Optional)
210
Using Automatic Free-Space Calculation
210
Setting CIFS Options
211
Supporting Filers with Local Groups
212
Disabling CIFS Oplocks (Optional)
212
Allowing the Volume to Automatically Disable Oplocks
213
Reinstating Oplock Support
213
Supporting Subshares and Their Acls
214
Required Windows Permissions
216
Showing a Filer's Shares and Subshares
216
Replicating Subshares at All of the Volume's Filers
217
Disabling Filer Subshares
219
Adding a Share
219
Showing Available Filer Shares
220
Identifying the Filer and Share
221
Identifying a Multi-Protocol Share
221
Disconnecting from the Filer after the Share Is Enabled
222
Disconnecting from the Filer before the Share Is Enabled
222
Setting Share-Import Options
222
Speeding up Import by Skipping a Directory Test
222
Reinstating the Directory Test
223
Synchronizing Directory Attributes on Import
223
Disabling Directory-Attribute Synchronization on Import
224
Import Sync-Attributes
224
Preventing Directory Renames During Import
225
Allowing Directory Renames on Import
226
Import Rename-Directories
226
Renaming Directories with Non-Mappable Characters (Multi-Protocol)9-32
226
Preventing File Renames During Import
227
Allowing File Renames in Import
228
Enabling SID Translation for a Share (CIFS)
228
Disabling SID Translation
229
Finding SID Translations at All Filers
229
Ignoring SID Errors from the Filer (CIFS)
230
Acknowledging SID Errors
231
Designating the Share as Critical (Optional)
232
Removing Critical-Share Status
232
Ignoring the Share's Free Space (Optional)
233
Including the Share in the Free-Space Calculation
233
Adjusting the Free-Space Calculation
234
Erasing the Free-Space Adjustment
234
Enabling the Share
234
Taking Ownership of the Share (Optional)
235
Examining the Shareenablesubshareinc Report (CIFS)
236
Disabling the Share
238
Removing a Managed-Volume Share
238
Removing the Share after It Is Enabled
238
Selecting a VPU (Optional)
239
Assigning the Volume to a VPU
239
Splitting Namespace Processing Within a VPU
240
Reverting to Default-VPU Assignment
241
VPU Limits for Managed Volumes and Shares
242
Changing the Number of Reserved Files
243
Reverting to the Default Number of Reserved Files
244
Showing All Vpus on the Current Switch
244
Enabling the Volume
246
Enabling All Shares in the Volume
247
Taking Ownership of All Shares (Optional)
247
Disabling All Shares
248
Disabling the Volume
249
Monitoring the Import
249
Import Errors
250
Canceling a Share Import
251
Reviewing the Import Report for a Multi-Protocol Volume
251
Showing the Volume
255
Showing One Share
258
Showing Filer Shares Behind One Volume
261
Showing the Volume's Configuration
261
Sample - Configuring a Managed Volume
263
Removing a Managed Volume
265
Chapter 10 Configuring a Global Server
267
Concepts and Terminology
268
Adding a Global Server
268
Setting the Windows Domain (CIFS Only)
269
Setting the Pre-Windows2000 Name
269
Removing the Windows Domain
270
Adding a Virtual Server
270
Registering with a WINS Server (CIFS)
271
Removing the WINS-Server Setting
272
Setting the Netbios Name (Optional, CIFS)
273
Adding a Netbios Alias
274
Removing Netbios Aliases
274
Enabling a Virtual Server
275
Reverting to the Default Netbios Name
275
Disabling a Virtual Server
276
Removing a Virtual Server
276
Enabling the Global Server
277
Disabling the Global Server
277
Showing All Global Servers
277
Showing One Global-Server
279
Removing a Global Server
280
Sample - Configuring a Global Server
281
Next
281
Chapter 11 Configuring Front-End Services
283
Before You Begin
284
Configuring NFS
284
Exporting a Namespace Volume
285
Stopping an NFS Export
286
Disabling NLM (Optional)
287
Enabling Nlm
288
Enabling NFS Service
288
Disabling NFS
288
Notifications to NLM Clients
289
Listing All NFS Services
289
Showing Details for All NFS Services
290
Showing One NFS Service
290
Sample - Configuring an NFS Front-End Service
291
Removing an NFS Service
292
Changing the NFS/TCP Timeout Behavior
292
Reverting to the Default Timeout and Behavior
293
Showing the NFS/TCP Timeout
293
Configuring CIFS
294
Sharing a Namespace Volume
294
Exporting a Filer Subshare (and Using Its ACL)
297
Exposing Hidden Subshares
299
Exporting All Filer Subshares at Once
300
Exposing All Hidden Subshares
302
Adding New Subshares
303
Stopping a CIFS Share
303
Allowing Clients to Use Windows Management (MMC)
304
Client Experience: Using MMC to Manage a Namespace
305
Disallowing Windows-Management Access
306
Setting a Server Description (Optional)
307
Removing the Description
307
Enabling CIFS Service
308
Disabling CIFS
308
Configuring Kerberos (Optional)
308
Support for both NTLM and Kerberos
310
Using Dynamic DNS (Kerberos)
310
Replacing Back-End Services
311
Update Schedule for DNS "A" Records
312
Removing a Host Name
313
Showing Dynamic-DNS Status
313
Clearing Records of Failed Deletes
314
Supporting Aliases with Kerberos
316
Listing CIFS Services
317
Focusing on One CIFS Service
317
Showing Details for a CIFS Service
318
Showing All CIFS Services
320
Sample - Configuring a CIFS Front-End Service
321
Removing a CIFS Service
322
Removing All of a Volume's Front-End Exports
323
Showing All Front-End Services
324
Showing Front-End Services for One Global-Server
324
Showing Front-End Services Per Virtual-Server
325
Showing the Services at the Redundant Peer
326
Showing Server Maps
327
With Filer IP Addresses
329
Showing the Servers Behind One Virtual Server
330
Showing the Servers Behind One Namespace
331
Showing Server Status
332
Chapter 12 Policy for Balancing Capacity
335
Before You Begin
336
Concepts and Terminology
336
Showing All Policy Rules
336
Showing Details
337
Focusing on One Namespace
343
Showing Details for the Namespace
344
Focusing on One Volume
345
Showing Details for the Volume
346
Focusing on One Share Farm or Rule
346
Adding a Share Farm
349
Adding a Share to the Farm
350
Setting a Placement Weight for a Share
350
Removing a Share from a Share Farm
351
Auto Migrating Existing Files
352
Disabling Auto Migration
352
Balancing New Files Based on Free Space
353
Based on Administrative Weights
354
Based on Latency (Bandwidth)
354
Maintaining Minimum Free Space
355
Disabling the Free-Space Threshold
356
New-File Placement When All Shares Reach the Free Space Threshold12
356
Constraining New Files
356
Constraining New Directories
357
Distributing New Files
357
Constraining Directories below a Certain Depth
358
Distributing When a Share Is Unavailable
359
Not Constraining Directories
359
Enabling All Share-Farm Rules
359
Stopping All Share-Farm Rules
360
Removing a Share Farm
360
Creating a Schedule
361
Setting the Interval
361
Setting the Duration (Optional)
362
Removing the Duration
362
Setting the Start Time (Optional)
363
Starting Now
363
Showing All Schedules
364
Showing One Schedule
365
Removing a Schedule
365
Pausing All Rules in a Volume
366
Resuming All Policies in a Volume
367
Pausing on a Schedule
368
Removing the Policy-Pause Schedule
368
Draining One or more Shares
369
Identifying the Source Share(S)
370
Choosing the Target Storage
371
Balancing Capacity in a Target Share Farm
371
Applying a Schedule (Optional)
372
Removing the Schedule
372
Limiting each Migration (Optional)
373
Removing the Limit
374
Configuring a Progress Report (Optional)
374
Deleting Empty Reports
375
Generating a Verbose Report
375
Disabling Reports
376
Retaining Copies of Files on the Share (Optional)
376
Disabling File Retention
377
Enabling the Placement Rule
377
Disabling the Rule
378
Tentatively Enabling the Rule
378
Verifying that All Files Are Removed
379
Removing the Placement Rule
380
Removing All Policy Objects from a Namespace
381
Removing All Policy Objects from a Volume
382
Migrations in a Multi-Protocol Namespace
382
File-Attribute Migrations
383
From a Netapp Filer, NTFS Qtree
384
From a Netapp Filer, UNIX Qtree
384
From a Unix Filer with SMB
386
From an EMC Filer
386
From a UNIX/SMB Filer with Acls
387
Some CIFS Applications Block out Migrations
388
Chapter 13 Grouping Files into Filesets
389
Grouping Files by Filename
389
Setting a Directory Path (Optional)
390
Enabling Recursive Matches (Optional)
390
Disabling Recursive Matches
391
Matching against a Wildcard String
391
Using a Complex Regular Expression
392
Character Groups
393
Regular Expression Syntax
393
Adding Complexity
394
Creating Bounds for the Match
394
Shorthand for Character Groups
394
For more Information
395
Negating the Match
395
Regular-Expression Samples
395
Reverting to the Root Path
396
Matching Filenames (Optional)
397
Excluding Files
398
Removing the Fileset
398
Grouping Files by Size
399
Selecting Files Based on Their Sizes
400
Removing a File Selection
400
Removing the Fileset
401
Grouping Files by Age
401
Selecting Files Based on Their Ages
402
Removing a File Selection
403
Choosing Last-Accessed or Last-Modified
403
Identifying a Source Fileset (Optional)
404
Removing the Source Fileset
404
Setting the Age-Evaluation Interval (Optional)
405
Reverting to the Default Evaluation Interval
406
Setting the File-Selection Start Time (Optional)
406
Reverting to the Default Start Time
407
Removing the Fileset
407
Joining Filesets
408
Identifying a Source Fileset
408
Removing a Source Fileset
409
Removing All Source Filesets
409
Removing the Fileset
410
Intersecting Filesets
410
Identifying a Source Fileset
411
Removing a Source Fileset
411
Removing All Source Filesets
412
Removing the Fileset
412
Listing All Filesets
412
Showing One Global Fileset
415
Showing Filesets in a Managed Volume
416
Sample - Configuring Age-Based Filesets
416
Chapter 14 Migrating Filesets
419
Before You Begin
419
Concepts and Terminology
419
Directing File Placement
420
Identifying the Source Fileset
421
Matching Directories Only
423
Matching and Promoting Directories
425
Avoid Promoting CIFS Directories Based on Last-Accessed Time
428
Promoting Directories on a Target Share Farm
428
Matching Directory Trees (Directories and Files)
429
Limiting the Selection to Particular Source Share(S) (Optional)
431
Removing All Source-Share Restrictions
431
Choosing the Target Storage
432
Balancing Capacity in a Target Share Farm
433
Limiting each Migration (Optional)
433
Removing the Limit
434
Applying a Schedule (Optional)
434
Removing the Schedule
435
Disabling Inline Notifications (Optional)
436
Re-Enabling Inline Notifications
436
Configuring Progress Reports
437
Deleting Empty Reports
438
Disabling Reports
438
Generating Verbose Reports
438
Enabling the Placement Rule
439
Tentatively Enabling the Rule
439
Disabling the Rule
440
Showing the Effects of File Placement
440
Removing the Placement Rule
441
Changing Rule Order
441
Moving the Rule to the Beginning or End
443
Chapter 15 Shadowing a Volume
445
Before You Begin
447
Adding a Shadow Volume (Target Switch)
447
Compatible Software Releases
448
Allowing Modifications
449
Adding a Share
449
Turning off Shadowing
450
Specifying a Fileset to Copy (Source Switch)
451
Shadow Copies Are Not Cumulative
451
Configuring a Shadow-Copy Rule (Source Switch)
452
Identifying the Source Fileset
452
Choosing a Shadow-Volume Target
453
Using a Path in the Shadow Volume
454
Removing the Shadow-Volume Target
455
Applying a Schedule
456
Configuring Progress Reports
456
Generating Verbose Reports
457
Deleting Empty Reports
458
Disabling Reports
458
Including Identical Files in Reports
458
Supporting Local Groups (CIFS)
459
Failing on SID-Translation Errors
460
Translating Local Sids
460
Disabling SID Translation
461
Copying Files Opened through CIFS
461
Allowing Only Reads During the Shadow Copy
462
Support for Multi-Protocol Volumes
463
File-Attribute Translations
463
Disabling Target Pruning (Optional)
463
Enabling Pruning
464
Copying Only Directories with Changed Files (Optional)
464
Copying All Directories
465
Publishing All Files as a Group (Optional)
465
Publishing Individual Files
466
Setting a Bandwidth Limit
466
Removing any Bandwidth Limit
467
Changing the Threshold for Delta Transfers (Optional)
467
Reverting to the Default
468
Enabling the Shadow-Copy Rule
469
Disabling the Rule
469
Showing Shadow-Copy Status
469
Focusing on One Namespace
472
Focusing on One Volume
472
Focusing on One Rule
473
Monitoring the Progress of a Shadow Copy
473
Report Format
475
Reformatting the Report
478
Truncating the Report
479
Copying the Source Volume to Multiple Targets
480
Removing the Shadow-Copy Rule
480
Advertisement
Advertisement
Related Products
Acopia Networks Categories
Network Router
Storage
Network Hardware
More Acopia Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL