OceanStor Dorado 6.1.x SmartMulti-Tenant Feature Guide For File
OceanStor Dorado 6.1.x SmartMulti-Tenant Feature Guide For File
6.1.x
Issue 07
Date 2023-10-31
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://e.huawei.com
Vulnerability
Huawei's regulations on product vulnerability management are subject to "Vul. Response Process". For
details about the policy, see the following website:https://www.huawei.com/en/psirt/vul-response-process
For enterprise customers who need to obtain vulnerability information, visit:https://
securitybulletin.huawei.com/enterprise/en/security-advisory
Purpose
This document describes the implementation principles and application scenarios
of the SmartMulti-Tenant feature and explains how to configure and manage this
feature.
NOTE
Intended Audience
This document is intended for:
● Technical support engineers
● Maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Change History
Changes between document issues are cumulative. The latest document issue
contains all the changes made in earlier issues.
Issue 07 (2023-10-31)
This issue is the seventh official release.
Issue 06 (2023-07-15)
This issue is the sixth official release.
Issue 05 (2023-04-20)
This issue is the fifth official release.
Issue 04 (2022-11-15)
This issue is the fourth official release.
Issue 03 (2022-08-25)
This issue is the third official release.
Issue 02 (2022-01-25)
This issue is the second official release.
Added the operations of vStore users.
Issue 01 (2021-09-30)
This issue is the first official release.
Contents
2 Configuring vStores.................................................................................................................8
2.1 Configuration Process.......................................................................................................................................................... 12
2.2 Logging In to DeviceManager.......................................................................................................................................... 12
2.2.1 Logging In to DeviceManager (System User)......................................................................................................... 12
2.2.2 Logging In to DeviceManager (vStore User, Applicable to 6.1.3 and Later)................................................ 13
2.3 Checking the License File................................................................................................................................................... 15
2.4 Configuring Basic Storage Resources............................................................................................................................. 16
2.5 Creating a vStore.................................................................................................................................................................. 16
2.6 Creating a vStore User........................................................................................................................................................ 21
2.7 Configuring the Network................................................................................................................................................... 25
2.7.1 (Optional) Creating a Bond Port..................................................................................................................................25
2.7.2 (Optional) Creating a VLAN.......................................................................................................................................... 26
2.7.3 (Optional) Creating a DNS Zone................................................................................................................................. 27
2.7.4 Creating a Logical Port.................................................................................................................................................... 28
2.7.5 (Optional) Configuring DNS Load Balancing.......................................................................................................... 34
2.7.6 (Optional) Managing the Routes of a Logical Port...............................................................................................36
2.8 Configuring Basic Storage Resources (System User)................................................................................................37
2.8.1 Creating a File System..................................................................................................................................................... 38
2.8.2 Creating a Dtree.................................................................................................................................................................57
2.8.3 Creating a Quota............................................................................................................................................................... 62
2.8.4 Sharing a File System....................................................................................................................................................... 66
2.8.4.1 Configuring an NFS Share...........................................................................................................................................67
2.8.4.1.1 Configuration Process............................................................................................................................................... 67
C Glossary................................................................................................................................. 243
1 Description
1.1 Overview
This section describes the background, definition, and benefits of SmartMulti-
Tenant.
Background
The requirements for XaaS in public and private clouds emerge with the soaring
development of cloud services. As the number of end users increases constantly,
one physical storage system may be used by multiple enterprises or individual
users. The following challenges arise:
● The logical resources of enterprises or individual users who use the same
storage system may interfere with each other or unauthorized access may
occur, impairing data security.
● IT service providers need to pay extra costs to manage users.
● Data migration without affecting services is required.
Developed to deal with these challenges, the multi-tenancy technology allows
storage resource sharing among tenants and at the same time simplifies
configuration and management, as well as enhances data security.
Definition
Huawei's SmartMulti-Tenant allows tenants to create multiple virtual storage
systems in one physical storage system. With SmartMulti-Tenant, tenants can
NOTE
Difference between multi-tenancy and multi-user technologies: They adopt similar user
permission designs that enable different users to share the same storage resources but have
different access permissions. However, in the multi-tenancy technology, tenants have
independent storage resources, networks, and user information.
Advantages of SmartMulti-Tenant
Solution 1
Solution 2
The example shows that multiple guests (tenants) can share the same hotel
(storage system) and they have different needs. Different hotel rooms (logical
areas, namely, vStores mentioned in the following sections) are provided. In this
way, guests can choose desired rooms. For example, there are 50 guests. Some
guests want large rooms (large storage capacities) and some need small rooms
due to limited budgets. Then, the landlord can divide the whole building into
rooms that can meet guest requirements, instead of building a hotel for each
guest.
Benefits
Table 1-1 lists the benefits of SmartMulti-Tenant.
Benefit Description
License Requirements
To use SmartMulti-Tenant, ensure that the license file imported to the system
includes the SmartMulti-Tenant license.
Specifications
The SmartMulti-Tenant specifications vary with the product model. For detailed
specifications, refer to Specifications Query (https://info.support.huawei.com/
storage/spec/#/home).
1.3.1 Concepts
SmartMulti-Tenant enables a storage system to allocate and manage resources for
multiple tenants, improving resource usage and tenant security.
Management Views
The storage system provides two management views:
System view: This is the default view. System administrators can create vStores in
this view and manage resources globally or for specific vStores. If the SmartMulti-
Tenant license is not activated, vStores cannot be created in this view and the
storage resources are globally allocated and managed. This is for customers who
do not need multi-tenancy. After activating the SmartMulti-Tenant license, system
administrators can create vStores and manage vStore resources.
vStore view: configures and manages vStore services. After activating the
SmartMulti-Tenant license, system administrators can create vStores and vStore
users in the system view, and then access the vStore view as vStore users to
configure and manage storage resources of the vStores.
Management Isolation
OceanStor Dorado allows each vStore to have its own administrators, separating
the management of different vStores. The resources that can be operated and
managed by different vStores are called views. vStore administrators can manage
resources only in their respective views and cannot access other vStores' views or
the system view. vStore administrators support role-based permission control.
Roles of specified permissions must be assigned to each vStore administrator
when it is created.
Network Isolation
vStores use logical interfaces (LIFs) to configure NAS services. A LIF belongs to
only one vStore, providing logical isolation of ports. A LIF can be created on bond
port, VLAN port, or Ethernet port.
Service Isolation
SmartMulti-Tenant isolates the service data, service access, and service
configurations (such as NAS protocol configuration) of different users.
● Service data isolation
The system administrator allocates different file systems to different vStores
for isolation. Similarly, the quotas of the file systems are also isolated.
● Service access isolation
Each vStore has independent NAS protocol instances, including NFS and
NDMP.
● Service configuration isolation
Each vStore has its own users, user groups, user mapping rule, security
policies, NFS shares, AD domain, DNS service, NIS service, and LDAP service.
VM VM VM VM VM VM
NFS/CIFS NFS/CIFS
vStore vStore
Physical storage
2 Configuring vStores
You can allocate and manage storage resources as required, ensuring the
performance of key applications and improving the service quality of the storage
system.
Context
Any user that has logged in to a storage system can operate the storage system.
Misoperations by a user can impair the storage system reliability and data
integrity. To prevent that, the storage system defines types of users and assigns
specific roles to them based on different service scenarios. Moreover, the storage
system allows self-defined roles.
System role: a system default or user-defined role that can create vStores and
allocate storage resources on a storage system. Table 2-1 describes the system
default roles and their permissions.
vStore role: a default or user-defined role that can complete vStore settings in the
vStore view. Table 2-2 lists the default vStore roles and their permissions in the
storage system.
You can create users with specific roles to manage the storage system.
In addition to the default user roles, the storage system supports user-defined
roles. For details about the permissions of user-defined roles, see "Permission
Matrix for User-defined Roles" in the Administrator Guide specific to your product
version.
2.1 Configuration Process
2.2 Logging In to DeviceManager
2.3 Checking the License File
2.4 Configuring Basic Storage Resources
2.5 Creating a vStore
2.6 Creating a vStore User
2.7 Configuring the Network
Start
Log in to
DeviceManager.
Create a vStore.
Configure the
network.
End End
Optional Mandatory
Prerequisites
Verify that the maintenance terminal meets the following requirements before you
use DeviceManager:
Context
● DeviceManager supports only TLS 1.0, 1.1, and 1.2.
● By default, DeviceManager allows a maximum of 32 users to log in
concurrently.
● This section uses the Windows as an example to describe how to log in to
DeviceManager. Adjust the procedures based on actual situations.
Procedure
Step 1 Open the browser on the maintenance terminal.
NOTE
● XX.XXX.XXX.XXX is the IP address of the logical port created by the super administrator
in the vStore. The role of the logical port is Management or Management + service.
● If a firewall is configured, you must enable port 8088 for the system to provide web
services.
● The web browser may prompt that the website has a security certificate issue. If the IP
address is correct, you can neglect the prompt and continue accessing the storage
system.
● If you have an available security certificate, run the import certificate ip=? user=?
password=? type=? command to import the security certificate to improve system
security. For details about this command, visit Command/Event/Error Code Query.
● The GUI may vary slightly depending on the product version and model.
NOTE
● The GUI may vary slightly depending on the product version and model. The actual GUI
prevails.
● To learn details about each step and operation, click and select Online Help to
view online help.
● To log out of DeviceManager, click in the upper right corner of the page and
choose Log Out.
----End
Procedure
Step 1 Log in to DeviceManager.
Step 2 Choose Settings > License Management.
Step 3 In the middle function pane, verify that NAS Foundation and SmartMulti-Tenant
are displayed in the feature list.
NOTE
● If no license file has been imported, import a license file by referring to the Initialization
Guide.
● If NAS Foundation is not displayed in the feature list, contact technical support
engineers.
----End
Prerequisites
Only the super administrator and administrators can create vStores.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click Create.
The Create vStore page is displayed on the right.
Parameter Description
NAS Capacity Capacity quota of the vStore. The total file system capacity
Quota of the vStore cannot exceed the quota.
NOTE
● In 6.1.5 and later versions, NAS capacity quotas can be set on
the CLI by using the create vstore general command. For details
about this command, see Command/Event/Error Code Query.
● In 6.1.6 and later versions, NAS capacity quotas can be set on
DeviceManager.
SAN Capacity Capacity quota of the vStore. The total LUN capacity of the
Quota vStore cannot exceed the quota.
NOTE
In 6.1.7 and later versions, SAN capacity quotas can be set on
DeviceManager.
Associate with Select the storage pool associated with the vStore. The
Storage Pool options are as follows:
● Unlimited: The current vStore can use all storage pools.
● Custom: The vStore can only use the selected storage
pool. Click Selected: X. On the Associate with Storage
Pool page that is displayed, select a storage pool.
Associate with FC FC port associated with the vStore. The options are as
Port follows:
● Unlimited: The current vStore can use all FC ports.
● Custom: The current vStore can only use the selected FC
port. Click Selected: X. On the Associate with FC Port
page that is displayed, select an FC port.
NOTE
Only 6.1.3 and later versions support setting Associate with Storage Pool and Associate
with FC Port.
Step 4 Configure a management logical port for the vStore and a data logical port for
communicating with the host.
1. Click Add.
The Create Logical Port page is displayed.
2. Configure parameters for the logical port. Table 2-4 describes the parameters.
IP Address IP address type of the logical port. Possible options are IPv4
Type and IPv6.
Parameter Description
Port Type Type of the port to which the logical port belongs. Possible
options are Ethernet port, Bond port, and VLAN.
NOTE
This parameter is available only when Data Protocol is set to NFS,
CIFS, NFS + CIFS, or iSCSI.
Home Port Ethernet port, bond port, or VLAN to which the logical port
belongs.
3. Select Advanced in the upper right corner to set the advanced attributes of
the logical port.
Table 2-5 describes the parameters.
Parameter Description
Failback Mode After the fault of the home port is rectified, services
fail back to the home port. Possible values are
Automatic and Manual.
NOTE
– If Failback Mode is Manual, ensure that the link to the
home port is normal before the failback. You can manually
switch services back to the home port only when the link
to the home port keeps normal for over five minutes.
– If Failback Mode is Automatic, ensure that the link to the
home port is normal before the failback. Services will
automatically fail back to the home port only when the
link to the home port keeps normal for over five minutes.
4. Click OK.
NOTE
Select one or more logical ports and click Remove or click on the right of a logical
port to remove logical ports.
● After a vStore is created, you can select Configure LDAP Domain, Configure File
Service NIS Domain, Configure File Service AD Domain, or Create HyperMetro
vStore Pair as required on the operation success page.
● After a vStore is created, you can select it on other pages to manage its storage
resources.
----End
Prerequisites
A vStore has been created.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click Create on the User Management tab page.
The Create User page is displayed.
Parameter Description
Role Role of the new user. The preset vStore roles in a storage
system are as follows:
– vStore administrator: has all management permissions
of a vStore.
– vStore protocol administrator: has vStore protocol
management permissions, including authentication user
management and share management.
– vStore data protection administrator: has data
protection management permissions of a vStore,
including LUN management, local data protection
management, remote data protection management,
HyperMetro management, and background
configuration task management.
– vStore WORM administrator: has the WORM
management permissions of a vStore, including global
security regulation clock management, WORM file
system management, vStore litigation hold
management, and file fingerprint management.
– vStore NDMP backup administrator: has NDMP
backup management permissions of a vStore, including
LUN management, local data protection management,
remote data protection management, HyperMetro
management, and performance tuning management.
NOTE
In addition to the preset user roles, the storage system supports
user-defined roles.
● Set Type to LDAP user or LDAP user group and configure the LDAP user or
LDAP user group information. Table 2-7 describes the parameters.
Role Role of the new user. The preset vStore roles in a storage
system are as follows:
– vStore administrator: has all management permissions
of a vStore.
– vStore protocol administrator: has vStore protocol
management permissions, including authentication
user management and share management.
– vStore data protection administrator: has data
protection management permissions of a vStore,
including LUN management, local data protection
management, remote data protection management,
HyperMetro management, and background
configuration task management.
– vStore WORM administrator: has the WORM
management permissions of a vStore, including global
security regulation clock management, WORM file
system management, vStore litigation hold
management, and file fingerprint management.
– vStore NDMP backup administrator: has NDMP
backup management permissions of a vStore, including
LUN management, local data protection management,
remote data protection management, HyperMetro
management, and performance tuning management.
NOTE
In addition to the preset user roles, the storage system supports
user-defined roles.
----End
Prerequisites
The IP addresses of the Ethernet ports you want to bond have been cleared.
Ethernet ports that have IP addresses cannot be bonded.
Context
Port bonding provides more bandwidth and higher redundancy for links. Although
ports are bonded, each session still transmits data through a single port and the
total bandwidth can be increased only when there are multiple sessions.
Determine whether to bond ports based on site requirements.
NOTICE
The link aggregation modes vary with switch manufacturers. If a switch from
another vendor is used, contact technical support of the switch manufacturer
for specific link aggregation configurations.
If the TOE function is enabled on the storage system and the host port connecting
to the switch must be bonded, the bonding mode must be set to 4.
NOTE
If the preceding restriction cannot be met, disable the TOE function of the port.
Procedure
Step 1 Choose Services > Network > Ethernet Network > Bond Ports.
Step 2 Click Create.
The Create Bond Port page is displayed on the right.
Step 3 Set a bond name and select ports you want to bond.
1. Specify a name for the bond port in Name.
NOTE
----End
Prerequisites
VLANs cannot be created on the Ethernet ports that are configured with IP
addresses or used for networking.
Procedure
Step 1 Choose Services > Network > Ethernet Network > VLANs.
Step 2 Click Create.
The Create VLAN page is displayed on the right.
Step 3 In the Port Type drop-down list, select the type of the ports used to create VLANs.
Possible values are Ethernet Port and Bond Port.
Step 4 In the Home Port list, select a home port.
Step 5 In ID, specify the ID of a VLAN, and then click Add.
NOTE
● The VLAN ID ranges from 1 to 4094. You can specify multiple VLAN IDs one by one or in
a batch. When creating multiple VLANs and specifying VLAN IDs in a batch, the VLAN
IDs are in the following format: Start VLAN ID-End VLAN ID.
● To delete a VLAN ID, click next to it.
----End
Follow-up Procedure
When creating a logical port based on a VLAN, ensure that the port type is VLAN
and the home port is the VLAN's home port.
Context
It is recommended that a DNS zone be associated with only logical ports with the
same IP address type (IPv4 or IPv6).
If the host interface card supports both IPv4 and IPv6 protocols, the DNS client
initiates IPv4 and IPv6 resolution requests. If the storage system is associated with
both IPv4 and IPv6 logical ports in the same DNS zone and the host interface card
is configured with only IPv4 addresses, the host may fail to access the domain
name.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the details page that is displayed on the
right, click the File Service tab and click Configure in the DNS Zone area.
The Configure DNS Zone page is displayed on the right.
Step 3 Configure a DNS zone.
● Add a DNS zone.
a. Click Add.
b. In Name, enter the name of the DNS zone to be added.
NOTE
c. If a HyperMetro vStore pair has been created for the vStore and Working
Mode of the selected HyperMetro domain is HyperMetro in active-
active mode, you need to set the owning site of the DNS zone. In normal
cases, the host can access the logical port that belongs to the local site
through the domain name of the local site. DNS zones with owning sites
are mainly used when the active-active sites are far away from each
other. In this case, hosts can access the nearest site to ensure access
performance.
● Modify a DNS zone.
In Name, modify the name of the desired DNS zone.
NOTE
----End
Context
When configuring an NFS share, set Role to Service or Management + service
for the logical port, and set Data Protocol to NFS or NFS + CIFS or NFS over
RDMA for the logical port.
NOTE
Precautions
● It is recommended that you create no more than 64 logical ports for each
controller. If more than 64 logical ports are created for one controller, the
logical ports will fail over to a few available physical ports in the event that a
large number of physical ports fail, decreasing service performance.
● In the case of file access across network segments, if a Remote Authentication
Dial-In User Service (RADIUS) server is used for network device
authentication in the data center and IP address failover occurs on a logical
port, the IP address of the logical port will be re-registered on the RADIUS
server. In this process, the IP address is not available. File services will be
restored after the IP address becomes available.
Procedure
Step 1 Choose Services > Network > Logical Ports.
Step 2 Click Create.
The Create Logical Port page is displayed on the right.
Step 3 Set the parameters listed in Table 2-8.
Parameter Description
Data Protocol Data protocol of a logical port, including NFS, CIFS, NFS +
CIFS, iSCSI, NVMe over RoCE, and NFS over RDMA.
NOTE
● NFS, CIFS, NFS + CIFS, and NFS over RDMA are applicable to
file service configuration. iSCSI and NVMe over RoCE are
applicable to block service configuration.
● This parameter is displayed only when Role is set to Service,
Management + service, or Health check. The data protocol
for a logic port with a role of Health check is NFS + CIFS.
● Only ports on 25 Gbit/s and 100 Gbit/s RoCE interface modules
support NFS over RDMA.
● Only 6.1.7 and later versions support NFS over RDMA.
Parameter Description
IP Address Type IP address type of the logical port, which can be IPv4 or
IPv6.
NOTE
If Role is VTEP or Health check, the IP address type is IPv4.
Port Type Type of the port to which the logical port belongs. Possible
values are Ethernet port, Bond port, VLAN, and RoCE
port.
NOTE
● When Data Protocol is NFS, CIFS, NFS + CIFS, or iSCSI, or
Role is Client, you can select Ethernet port, Bond port, or
VLAN for Port Type.
● When Data Protocol is NVMe over RoCE or NFS over RDMA,
you can select a VLAN or RoCE port.
● If Role is VTEP, Port Type is VLAN.
● If Role is Health check, Port Type is SIP.
● Only 6.1.5 and later versions support RoCE ports.
Parameter Description
Home Port Ethernet port, bond port, VLAN, or RoCE port to which the
logical port belongs.
NOTE
If Port Type is set to RoCE port, you can only select the RoCE port
whose Trust Mode is DSCP.
Step 4 When Role is set to Management, select Advanced in the upper right corner and
set the advanced attributes of the logical port.
NOTE
In the case that Role is set to Service or Management + service, you can set advanced
attributes only when Data Protocol is NFS, CIFS, NFS + CIFS, or NFS over RDMA.
Parameter Description
Failback Mode After the fault of the home port is rectified, services fail
back to the home port. Possible values are Automatic and
Manual.
NOTE
● This parameter is available only when Data Protocol is set to
NFS, CIFS, NFS + CIFS, or NFS over RDMA, or Role is set to
Client.
● If Failback Mode is Manual, ensure that the link to the home
port is normal before the failback. You can manually switch
services back to the home port only when the link to the
home port keeps normal for over five minutes.
● If Failback Mode is Automatic, ensure that the link to the
home port is normal before the failback. Services will
automatically fail back to the home port only when the link to
the home port keeps normal for over five minutes.
Listen for DNS With this function enabled, external NEs can access the
Query DNS service provided by the storage system by using the
IP address of this logical port.
NOTE
This parameter is available only when Data Protocol is set to
NFS, CIFS, NFS + CIFS, or NFS over RDMA
Parameter Description
----End
Prerequisites
● If the storage system connects to an external DNS server, the external DNS
server has been configured and is running properly.
● If the storage system directly connects to a host, DNS client configurations
have been set on the host.
● Port 53 for the TCP/UDP protocol between the storage system and the DNS
server or host is enabled.
Context
● DNS load balancing applies to scenarios where a large number of NAS service
IP addresses or NAS clients are involved. If only a small number of (for
example, less than 20) NAS service IP addresses or NAS clients are involved,
you are advised to directly use service IP addresses to mount shares.
● Working principle:
a. When a host accesses the NAS service of a storage system using a
domain name, the host first sends a DNS request to the built-in DNS
server and the DNS server obtains the IP address according to the domain
name.
b. If the domain name contains multiple IP addresses, the storage system
selects the IP address with a light load as the DNS response based on the
configured load balancing policy and returns the DNS response to the
host.
c. After receiving the DNS response, the host sends a service request to the
target IP address.
● When DNS load balancing resolves a domain name, a specific domain name
resolution record is added. The following records are supported:
– A record: added if a domain name points to an IPv4 address (for example,
192.168.20.10).
– AAAA record: added if a host name (or domain name) points to an IPv6
address (for example, ff03:0:0:0:0:0:0:c1).
– PTR record: reverse of an A or AAAA record for implementing reverse
DNS lookups.
● DNS load balancing supports only the UDP protocol for domain name
resolution.
Procedure
Step 1 Choose Settings > Basic Information > DNS Service.
– Weighted round robin applies to scenarios where the load of storage devices is
light or unknown, for example, in the scenario where shares are initially mounted
to a large number of NAS clients.
– Other policies apply to scenarios where users want to balance loads based on a
certain indicator (such as CPU usage, port bandwidth, number of connections, and
overall loads) of running services, for example, in the scenario where shares are
mounted to NAS clients in batches during capacity expansion of client applications.
– Weighted round robin: IP addresses that process loads under the same
domain name are selected in round robin mode for processing.
– CPU usage: The CPU usage of each controller determines the weight. The
storage system uses the weight to select a controller to process client
services.
– Port bandwidth usage: The total bandwidth usage of each controller
determines the weight. The storage system uses the weight to select a
controller to process client services.
– Connections: The NAS connections of each controller determine the
weight. The storage system uses the weight to select a controller to
process client services.
– Overall loads: The overall load of CPU usage, bandwidth usage, and
number of NAS connections determines controller selection. Less loaded
controllers are more likely to be selected.
2. Click Save.
----End
Follow-up Procedure
On the storage system, associate logical ports with DNS zones, configure DNS
request listening on logical ports, set DNS load balancing policies, and enable DNS
load balancing. Then configure the DNS server address on the client.
Prerequisites
A logical port has been configured with an IP address.
Procedure
Step 1 Choose Services > Network > Logical Ports.
Step 2 Select the desired vStore from the vStore drop-down list in the upper left corner.
Step 3 Select the desired logical port and click Manage Route.
The Manage Route dialog box is displayed.
NOTE
Alternatively, perform either of the following operations to go to the Manage Route page:
● Click More on the right of the desired logical port and choose Manage Route.
● Click the name of the desired logical port. In the upper right corner of the page that is
displayed, select Manage Route from the Operation drop-down list.
Subnet Subnet mask of the IPv4 address or prefix of the IPv6 address
Mask/ for the destination service network port on the application
Prefix server or destination logical port on another storage system.
----End
Context
● File systems created in the storage system are thin file systems. That is, the
storage system will not allocate all of the configured capacity to file systems
at a time. Within the configured capacity, the storage system allocates storage
resources to file systems based on the actual capacity used by hosts.
● Before creating a file system, you are advised to handle the alarms indicating
that the storage pool capacity is about to be used up.
Precautions
In a storage pool, if the total capacity of all thin file systems exceeds that of the
storage pool, data cannot be written if the capacity of the storage pool is used up.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 In the vStore drop-down list in the upper left corner, select the vStore for which
you want to create a file system.
Step 3 Click Create.
The Create File System page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets parameters based on recommendations when you create a file system. You can click
Modify in the upper right corner to modify the parameters or directly click OK to create a
file system.
Parameter Description
Parameter Description
NOTE
– If Native is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– You are advised to configure a default UNIX user for the CIFS
service in Services > File Service > Authentication Users >
User Mappings > Set Mapping Parameter. The UNIX user
must be an existing local authentication user, NIS domain
user, or LDAP domain user.
– You are advised to configure a default Windows user for the
NFS service in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter. The
Windows user must be an existing local authentication user
or AD domain user.
– Only 6.1.5 and later versions support the Native security
style.
● NTFS
Controls CIFS users' permissions with Windows NT ACLs.
NOTE
– If NTFS is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default Windows
user for the NFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default Windows user must be an existing
local authentication user or AD domain user.
● UNIX
Controls NFS users' permissions with UNIX mode bits or
NFSv4 ACLs.
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The UNIX user must be an existing local
authentication user, NIS domain user, or LDAP domain user.
– In this mode, the default UNIX permission of the file system
root directory is 755. To change the value, run the change
file_system general file_system_id=? unix_permissions=?
command. For details about the command, visit Command/
Event/Error Code Query.
Parameter Description
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file or
directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
– This parameter is available only when Security Style is set to
Native.
– Only 6.1.5 and later versions support this parameter.
Step 5 Set the capacity and tuning information of the file system.
Table 2-12 describes the parameters.
Parameter Description
Capacity Alarm Alarm threshold of the file system capacity. An alarm will be
Threshold (%) generated when the threshold is reached.
NOTE
● Capacity Alarm Threshold (%) is hidden. To display hidden
parameters, select Advanced.
● Capacity threshold = File system capacity x (1 - Reserved
snapshot space ratio (%)) x Capacity alarm threshold (%)
● The alarm is cleared only when the used capacity of the file
system is smaller than Max {90% of the threshold capacity,
threshold capacity - 1 GB}.
Parameter Description
Auto Expansion When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is greater than this threshold, the storage
(%) system automatically triggers file system capacity
expansion.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion or Auto
expansion/reduction.
● The value of Auto Expansion Trigger Threshold (%) must be
greater than that of Auto Reduction Trigger Threshold (%).
● Only 6.1.5 and later versions support this parameter.
Auto Reduction When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is smaller than this threshold, the storage
(%) system automatically triggers space reclamation to reduce
the file system capacity.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion/reduction.
● Only 6.1.5 and later versions support this parameter.
Parameter Description
Application Type Application type of the file system. Preset application types
are provided for typical applications. In file service scenarios,
possible options are NAS_Default, NAS_Virtual_Machine,
NAS_Database, NAS_Large_File, Office_Automation,
NAS_Others, and NAS_EDA.
NOTE
● The Application Request Size and File System Distribution
Algorithm parameters are set for preset application types. The
value of Application Request Size is 16 KB for NAS_Default,
NAS_Virtual_Machine, Office_Automation, NAS_Others, and
NAS_EDA, 8 KB for NAS_Database, and 32 KB for
NAS_Large_File. If Application Type is set to NAS_Default,
NAS_Large_File, Office_Automation, NAS_Others, or
NAS_EDA, File System Distribution Algorithm is Directory
balance mode. In this mode, directories are evenly allocated to
each controller by quantity. If Application Type is set to
NAS_Virtual_Machine or NAS_Database, File System
Distribution Algorithm is Performance mode. In this mode,
directories are preferentially allocated to the controller to which
the shared IP address belongs, improving access performance of
directories and files.
● When SmartCompression and SmartDedupe licenses are
imported to the system, the preset application types also display
whether SmartCompression and SmartDedupe are enabled.
For details, see SmartDedupe and SmartCompression Feature
Guide for File of the desired product model and version.
● Application Type cannot be changed once being configured.
You are advised to set the value based on the service I/O model.
● To create an application type, run the create workload_type
general name=? io_size=? command. For details, visit
Command/Event/Error Code Query.
● You can also run the create file_system general or change
file_system general command to create or modify a file system
respectively. For details, visit Command/Event/Error Code
Query.
Parameter Description
Step 6 If a HyperMetro vStore pair has been created for the selected vStore, you need to
configure HyperMetro for the newly created file system.
Specify Remote Storage Pool for creating a remote file system. The system will
create a remote file system on the remote device of the HyperMetro vStore pair
and add the local and remote file systems to a HyperMetro pair.
For details about HyperMetro, see the HyperMetro Feature Guide for File of the
desired version.
Step 7 Configure shares for the file system.
● Set NFS shares for the file system.
a. Enable NFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The read/write permission of all clients is preset in the system, and
the default root permission of clients is root_squash. You can click
Modify on the right of Share to modify the share information.
● Set CIFS shares for the file system.
a. Enable CIFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The system presets the full control permission for everyone. You can
click Modify on the right of Share to modify the share information.
1. Enable Quota.
NOTE
The directory quota of a file system takes effect only for dtrees whose quota
function is enabled. In addition, the quota of each dtree is limited separately.
– User quota
User quota: limits the space usage or file quantity used by a single user.
i. Click Select.
The Select User page is displayed.
ii. Select the users for which you want to create a quota.
○ If you select All users, the quota limits the space usage or file
quantity of each user in the system.
○ If you select Specified users, click Add. On the Add User page
that is displayed, select the UNIX Users or Windows Users tab,
and select one or more desired users. Then click OK.
NOTE
If you set User Type to Local authentication user, select the desired
users in the list below.
If you set User Type to LDAP domain user, NIS domain user, or AD
domain user, enter the user names in the Name text box.
To remove added users, click Remove on the right of a desired user, or
select one or more desired users and click Remove.
○ If you select Specified user groups, the quota limits the space
usage or file quantity of each specified user group. To add a user
group, click Add. On the Add User Group page that is displayed,
select a user group type and select the desired user groups. Then
click OK.
NOTE
Parameter Description
Hard Quota Space hard quota. If the quota is reached, the system
immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be larger than that of Soft Quota.
Parameter Description
Soft Quota Space soft quota. If the quota is reached, the system
generates an alarm but still allows writes. After the hard
quota is reached, the system immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be smaller than that of Hard Quota.
Parameter Description
Hard Quota File quantity hard quota. If the quota is reached, new
files cannot be added. Operations on existing files are
not affected.
[Value range]
1 to 2 billion
The value must be larger than that of Soft Quota.
Soft Quota File quantity soft quota. If the quota is reached, the
system generates an alarm but new files can still be
added. After the hard quota is reached, new files cannot
be added.
[Value range]
1 to 2 billion
The value must be smaller than that of Hard Quota.
NOTE
– If you do not set the space quota or file quantity quota, the storage system only
collects statistics on but does not control the space usage or file quantity. To view
the statistics about used space quota and used file quantity quota, choose Services
> File Service > Quotas > Quota Reports, and select the desired file system.
– To modify a quota, click More on the right of the quota and choose Modify.
– To delete a quota, select the quota and click Delete above the list or click More on
the right of the quota.
– The parameters for creating a quota are preset. A quota is created for a file system
only after the file system has been created.
NOTE
Step 10 (Applicable to 6.1.6 and later versions) If an antivirus server has been configured
for the vStore you selected, you can configure the antivirus service for the file
system.
NOTE
You can choose Settings > File Service > Antivirus Service to check whether the antivirus
server has been configured. If you need to configure the antivirus server, see section
"Configuring Antivirus Servers" in the Security Configuration Guide specific to your product
model and version.
The antivirus server scans the file system based on the preset scan policy. After a
scan policy is configured for the file system, the system automatically creates a
scan task for the file system. You can choose Settings > File Service > Antivirus
Service to manage the task.
1. Enable On-Demand Scan and select an on-demand scan policy.
Select or deselect Scan Now as required. After Scan Now is selected, the
system immediately scans the file system based on the selected on-demand
scan policy. You must set the scan duration.
NOTE
Step 11 Select Advanced in the upper right corner and set the audit log items of the file
system. The system records audit logs of operations on the file system. The audit
log items include Create, Delete, Read, Write, Open, Close, Rename, List
folders, Obtain properties, Set properties, Obtain security properties, Set
security properties, Obtain extension properties, and Set extension properties.
NOTE
● To ensure that the selected audit log items take effect, choose Settings > File Service >
Audit Log to enable the audit log function.
● If too many audit logs are generated and the audit log collection speed is lower than
the audit log writing speed, the temporary buffer space may be insufficient, causing
service interruption risks. You are advised to properly configure the items to be audited.
For example, configure only Create, Delete, and Write for a file system.
Atime Update Indicates the Atime update frequency. The options can be
Frequency Hourly and Daily.
Step 13 Set the WORM (Write Once Read Many) properties of the file system. The WORM
file system ensures that a file enters the protected state after being written. In this
case, the file cannot be modified, moved, or deleted, but can be read for multiple
times.
NOTE
The WORM properties are hidden. To display hidden parameters, select Advanced.
Parameter Description
Parameter Description
Lockout Wait Indicates the wait time before a file automatically enters the
Time locked state. This parameter is displayed only when
Automatic Lockout is enabled.
[Value range]
1 minute to 10 years.
[Default value]
If Automatic Lockout is enabled, the default value is 2
hours.
WORM Audit Log After WORM Audit Log File System is enabled, the system
File System records operation logs of the WORM file system, including
Add a litigation, Remove a litigation, and privileged
deletion of Enterprise WORM file systems.
NOTE
This parameter is available only when Mode is set to Compliance.
[Default value]
Disabled
Parameter Description
Global WORM Before creating a WORM file system for the first time, you
Regulatory Clock need to initialize the WORM regulatory clock. After this
parameter is enabled, the global security regulatory clock is
initialized to the current system time and time zone.
The WORM regulatory clock prevents modification to file
protection periods caused by system time tampering
attacks. The WORM regulatory clock includes a global
WORM regulatory clock and a file system WORM regulatory
clock. To initialize the WORM regulatory clock, you only
need to initialize the global WORM regulatory clock. The file
system WORM regulatory clock will be automatically
initialized using the global WORM regulatory clock when a
WORM file system is created.
NOTICE
● The global WORM regulatory clock cannot be modified after
being initialized. Before the setting, ensure that the system time
and time zone are correct.
● Only super administrators can initialize the global WORM
regulatory clock.
NOTE
After the task is created successfully, the Execution Result page is displayed. You can view
details about the current task on this page.
----End
Prerequisites
You have created a file system.
Procedure
Step 1 Choose Services > File Service > Dtrees.
Step 2 Select a vStore to which the desired file system belongs from the vStore drop-
down list in the upper left corner.
NOTE
The screenshot is for reference only and the actual GUI may vary.
Parameter Description
Parameter Description
Parameter Description
NOTE
– If Native is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– You are advised to configure a default UNIX user for the CIFS
service in Services > File Service > Authentication Users >
User Mappings > Set Mapping Parameter. The UNIX user
must be an existing local authentication user, NIS domain
user, or LDAP domain user.
– You are advised to configure a default Windows user for the
NFS service in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter. The
Windows user must be an existing local authentication user
or AD domain user.
– Only 6.1.5 and later versions support the Native security
style.
● NTFS
Controls CIFS users' permissions with Windows NT ACLs.
NOTE
– If NTFS is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default Windows
user for the NFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default Windows user must be an existing
local authentication user or AD domain user.
● UNIX
Controls NFS users' permissions with UNIX mode bits or
NFSv4 ACLs.
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The UNIX user must be an existing local
authentication user, NIS domain user, or LDAP domain user.
Parameter Description
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file or
directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
● This parameter is available only when Security Style is set to
Native.
● Only 6.1.5 and later versions support this parameter.
----End
Prerequisites
● You have created a dtree in a file system.
● When creating a quota for a specified user or user group, the user or user
group has been created.
● (Applicable to 6.1.2 and earlier versions) When creating a quota for a file
system (that is, the Dtree parameter is blank), the file system is empty and
no dtree is created in the file system.
● (Applicable to 6.1.2 and earlier versions) When creating a quota for a dtree,
the dtree is empty.
Procedure
Step 1 Choose Services > File Service > Quotas > Custom Quotas.
Step 2 Select the vStore to which the desired file system belongs from the vStore drop-
down list in the upper left corner.
Step 3 Click Create.
The Create Quota page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
Step 4 Select the file system and dtree for which you want to create a quota.
NOTE
When the Dtree parameter is blank, the created user or user group quota takes effect for
the file system and the directory quota takes effect for all dtrees in the file system.
Step 5 Select a quota type. Possible options are Directory quota, User quota, and User
group quota.
● Directory quota
● User quota
a. Click Select.
The Select User page is displayed.
b. Select the users for which you want to create a quota.
▪ If you select All users, the quota controls the space usage or file
quantity of each user in the system.
▪ If you select Specified users, click Add. On the Add User page that
is displayed, select the UNIX Users or Windows Users tab, and
select one or more desired users. Then, click OK.
NOTE
○ If you set User Type to Local authentication user, select the users to be
added in the list below.
○ If you set User Type to LDAP domain user, NIS domain user, or AD
domain user, enter the user names in the Name text box.
○ If you set User Type to LDAP domain user, the system automatically
detects whether the LDAP domain has been configured. If no LDAP
domain is configured, the system prompts you to configure an LDAP
domain first.
○ If you set User Type to NIS domain user, the system automatically
detects whether the NIS domain has been configured. If no NIS domain
is configured, the system prompts you to configure an NIS domain first.
○ If you set User Type to AD domain user, the system automatically
detects whether the AD domain has been configured. If no AD domain is
configured, the system prompts you to configure an AD domain first.
○ To remove added users, click Remove on the right of a desired user, or
select one or more desired users and click Remove.
▪ If you select Specified user groups, the quota controls the space
usage or file quantity of each user in specified user groups. Click
Add. On the Add User Group page that is displayed, select a user
group type and select the desired user groups. Then, click OK.
NOTE
○ If you set User Group Type to Local authentication user group, select
the user groups to be added in the list below.
○ If you set User Group Type to LDAP domain user group or NIS domain
user group, enter the user group names in the Name text box.
○ If you set User Group Type to LDAP domain user group, the system
automatically detects whether the LDAP domain has been configured. If
no LDAP domain is configured, the system prompts you to configure an
LDAP domain first.
○ If you set User Group Type to NIS domain user group, the system
automatically detects whether the NIS domain has been configured. If
no NIS domain is configured, the system prompts you to configure an
NIS domain first.
○ To remove added user groups, click Remove on the right of a desired
user group, or select one or more desired user groups and click Remove.
c. Click OK.
● User group quota
a. Click Select.
The Select User Group page is displayed.
b. Select the user groups for which you want to create a quota.
▪ If you select All user groups, the quota controls the space usage or
file quantity of all user groups in the system.
▪ If you select Specified user groups, the quota controls the space
usage or file quantity of each specified user group. Click Add. On the
Add User Group page that is displayed, select a user group type and
select the desired user groups. Then, click OK.
NOTE
○ If you set User Group Type to Local authentication user group, select
the user groups to be added in the list below.
○ If you set User Group Type to LDAP domain user group or NIS domain
user group, enter the user group names in the Name text box.
○ If you set User Group Type to LDAP domain user group, the system
automatically detects whether the LDAP domain has been configured. If
no LDAP domain is configured, the system prompts you to configure an
LDAP domain first.
○ If you set User Group Type to NIS domain user group, the system
automatically detects whether the NIS domain has been configured. If
no NIS domain is configured, the system prompts you to configure an
NIS domain first.
○ To remove added user groups, click Remove on the right of a desired
user group, or select one or more desired user groups and click Remove.
c. Click OK.
Step 6 Set space quotas.
Table 2-18 describes the parameters.
Hard Quota Space hard quota. If the quota is reached, the system
immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be larger than that of Soft Quota.
Soft Quota Space soft quota. If the quota is reached, the system
generates an alarm but still allows writes. After the hard
quota is reached, the system immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be smaller than that of Hard Quota.
NOTE
When the used capacity exceeds the soft quota or hard quota, the system generates an
alarm. The alarm is cleared only when the used capacity is smaller than 90% of the soft
quota or hard quota.
Parameter Description
Hard Quota File quantity hard quota. If the quota is reached, new files
cannot be added. However, operations on existing files are
not affected.
[Value range]
1 to 2 billion
The value must be larger than that of Soft Quota.
Soft Quota File quantity soft quota. If the quota is reached, the system
generates an alarm but new files can still be added. After
the hard quota is reached, new files cannot be added.
[Value range]
1 to 2 billion
The value must be smaller than that of Hard Quota.
NOTE
If you do not set the space quota or file quantity quota, the storage system only collects
statistics on but does not control the space usage or file quantity. To view the statistics
about used space quota and used file quantity quota, choose Services > File Service >
Quotas > Quota Reports, and select the desired file system.
----End
NFS
Network File System (NFS) is a file sharing protocol developed by Sun and now
hosted by Internet Engineering Task Force (IETF). It applies to file system sharing
in Linux, Unix, Mac OS, and VMware operating systems.
CIFS
Common Internet File System (CIFS) is a file sharing protocol developed by
Microsoft and primarily used in Windows environments. The shares using CIFS
include CIFS shares and Homedir shares.
● A CIFS share is to share a file system or its quota tree among authentication
users, including local and domain authentication users. The users have the
permissions granted by the storage system on the CIFS share.
● Homedir shares are a type of CIFS shares. A Homedir share is to share a file
system to a specific user as an exclusive directory. The user can only access
the exclusive directory named after its user name.
Start
Prepare data.
Prepare data.
Enable NFSv4.
Configure NFSv4 to be
Add the storage Add the storage compatible with non-
system to an LDAP system to an NIS domain environments.
domain. domain.
End
Optional Mandator
y
● Logical IP address
Logical IP address used by a storage system to provide shared space for
clients.
● File system
File system shared through the NFS share.
● LDAP or NIS domain information
● Permission
The permissions include read-only and read-write.
– Read-only: Clients have the read-only permission for the NFS share.
– Read-write: Clients have the read and write permissions for the NFS
share.
NOTE
Context
● The storage system supports NFSv3, NFSv4.0, and NFSv4.1.
NOTE
Only 6.1.6 and later versions support settings of the NFSv3 service on DeviceManager
or on the CLI.
NOTE
The screenshot is for reference only and the actual GUI may vary.
Step 4 Select Enable after NFSv3 Service, NFSv4.0 Service, or NFSv4.1 Service as
required.
Step 5 In Domain Name, enter the storage domain name.
NOTE
● NFSv4.0 and NFSv4.1 use a user name + domain name mapping mechanism, enhancing
the security of clients' access to shared resources.
● In a non-domain or LDAP environment, retain the default domain name localdomain.
● In an NIS environment, the entered information must be the same as the domain name
in the /etc/idmapd.conf file on the Linux client that accesses the share. (You are
advised to set both of them to the NIS domain name.)
● The domain name must contain 1 to 64 characters.
● Only 6.1.5 and later versions support domain name setting.
Step 6 Specify whether to enable NFS over RDMA. After NFS over RDMA is enabled, you
can use NFS over RDMA to access shares. NFS over RDMA relies on the RDMA
technology to implement data communication between clients and storage
systems. This effectively reduces network latency, relieves CPU loads of clients and
storage systems, and improves NFS access performance.
NOTE
NOTICE
If a host is accessing the shares of the storage system, enabling or disabling the
NFS service may interrupt services. Exercise caution when performing this
operation.
Step 8 Confirm the information in the dialog box and select I have read and understand
the consequences associated with performing this operation.
Step 9 Click OK.
----End
Step 2 Optional: To configure the NFS service for a vStore, run the change vstore view
id=? command to enter the vStore view.
You can run the show vstore command to query the value of id.
Step 4 Run the show service nfs_config command to check the running status of the
NFS service.
● The Nfsv4.0 Service Status field in the command output indicates the
running status of the NFSv4.0 service of the current vStore.
● The Nfsv41 Service Status field in the command output indicates the running
status of the NFSv4.1 service of the current vStore.
● The Nfsv3 Service Status field in the command output indicates the running
status of the NFSv3 service of the current vStore.
----End
o Organization
ou Organization unit
c Country name
dc Domain component
sn Surname
cn Common name
What Is OpenLDAP?
OpenLDAP is an open implementation of LDAP that is now widely used in various
popular Linux releases.
OpenLDAP consists of the following components:
● slapd: an independent LDAP daemon
● slurpd: an independent LDAP update and replication daemon
● Libraries implementing LDAP
● Tool software and illustration client
The OpenLDAP website does not provide OpenLDAP installation packages for
Windows. You can obtain OpenLDAP installation packages for the following
Windows operating systems from the Userbooster website: Windows XP, Windows
Server 2003, Windows Server 2008, Windows Vista, Windows 7, Windows 8, and
Windows Server 2012.
rootpw XXXXXXXXXXXX
LDAP Interchange Format (LDIF) is one of the most common file formats for LDAP
applications. It is a standard mechanism that represents directories in the text format.
It allows users to import data to and export data from the directory server. LDIF files
store LDAP configurations and directory contents, and therefore can provide you with
related information.
5. Use text editing software to open the configuration file and find the DNs of a
user and a user group that correspond to User Directory and Group
Directory respectively on the storage system configuration page.
#root on the top
dn: dc=example,dc=com
dc: example
objectClass: domain
objectClass: top
#First organization unit name: user
dn: ou=user,dc=example,dc=com
ou: user
objectClass: organizationalUnit
objectClass: top
#Second organization unit name: groups
dn: ou=group,dc=example,dc=com
ou: group
objectClass: organizationalUnit
objectClass: top
#The first user represents user1 that belongs to organization unit user in the organizational structure
topology.
dn: cn=user1,ou=user,dc=example,dc=com
cn: user1
objectClass: posixAccount
objectClass: shadowAccount
objectClass: inetOrgPerson
sn: user1
uid: user1
uidNumber: 2882
gidNumber: 888
homeDirectory: /export/home/ldapuser
loginShell: /bin/bash
userPassword: {ssha}eoWxtWNl8YbqsulnwFwKMw90Cx5BSU9DRA==xxxxxx
#The second user represents user2 that belongs to organization unit user in the organizational
structure topology.
dn: cn=user2,ou=user,dc=example,dc=com
cn: user2
objectClass: posixAccount
objectClass: shadowAccount
objectClass: inetOrgPerson
sn: client
uid: client
uidNumber: 2883
gidNumber: 888
homeDirectory: /export/home/client
loginShell: /bin/bash
userPassword: {ssha}eoWxtWNl8YbqsulnwFwKMw90Cx5BSU9DRA==xxxxxx
#The first user group represents group1 that belongs to organization unit group in the organizational
structure topology. The group contains user1 and user2.
dn: cn=group1,ou=group,dc=example,dc=com
cn: group1
gidNumber: 888
memberUid: user1#Belongs to the group.
memberUid: user2#Belongs to the group.
objectClass: posixGroup
3. Run the ls command to view the system configuration file slapd.conf and the
configuration files (.ldif files) of the users and user groups who want to
access the storage system.
linux-ldap:/etc/openldap #ls
example.ldif ldap.conf schema slap.conf slap.con slapd.conf
4. Run the cat command to open the system configuration file slapd.conf where
you can view related parameters.
linux-ldap:/etc/openldap #cat slapd.conf
suffix "dc=example,dc=com"
rootdn "cn=Manager,dc=example,dc=com"
rootpw XXXXXXXXXXXX
Prerequisites
● An LDAP domain has been set up.
● You have prepared the data required for configuring an NFS share.
NOTE
● The storage systems can connect to an LDAP server through management network
ports or service network ports (logical ports). If a storage system connects to an
LDAP server through management network ports, ensure that the management
network ports on at least two controllers can properly communicate with the LDAP
server. If a storage system connects to an LDAP server through service network
ports, it is recommended that the service network ports on at least two controllers
can properly communicate with the LDAP server. It is recommended that storage
systems connect to LDAP servers through service network ports.
● A storage system can connect to only one LDAP server.
● An LDAP server with high performance is recommended. This prevents issues such
as I/O latency increase when the storage system sends a large number of
concurrent query requests to the LDAP server.
Precautions
● You are advised to use physical isolation and end-to-end encryption to ensure
security of data transfer between the LDAP domain server and clients.
● You are advised to configure a static IP address for the LDAP server. If a
dynamic IP address is configured, security risks may exist.
● In the following scenario (the three situations occurred in sequence), use
clear nfs nfsv4_idmap_cache controller=? to clear the IDMAP cache of all
controllers:
a. The storage system had not been added to an LDAP domain or had not
been correctly added to an LDAP domain.
b. An LDAP domain user of the host accessed the shared space of the
storage system through the NFSv4.0 or NFSv4.1 protocol.
c. The storage system has been correctly added to an LDAP domain.
Procedure
Step 1 Choose Settings > User and Security > Domain Authentication > File Service
LDAP Domain.
Step 2 Select the desired vStore from the vStore drop-down list in the upper left corner.
Step 3 View LDAP domain parameters of the file service. Table 2-21 describes the
parameters.
NOTE
● On the file service LDAP domain management page, click to refresh file service
LDAP domain information.
● On the file service LDAP domain management page, click and select the file service
LDAP domain information you want to view.
NOTE
You can click the LDAP information bar of the file service to view and manage the LDAP
information.
Step 4 You can also configure and restore the file service LDAP domain to initial
configuration.
● Configure
a. Select the LDAP domain to be configured and click Configure.
The Configure File Service LDAP Domain page is displayed on the right.
NOTE
Alternatively, choose Services > vStore Service > vStores and click the name of a
vStore. On the details page that is displayed on the right, select the File Service
tab and click Configure in the LDAP Domain area.
b. Select Advanced in the upper right corner and set server information.
Table 2-22 describes the parameters.
Parameter Description
c. Set the binding information about the file service LDAP domain. Table
2-23 describes the parameters.
Table 2-23 Binding information about the file service LDAP domain
Parameter Description
Parameter Description
d. Set the query information about the file service LDAP domain. Table 2-24
describes the parameters.
Table 2-24 Query information about the file service LDAP domain
Parameter Description
Parameter Description
User Group Indicates the search scope for user group queries.
Search Scope Subtree: searches the named DN and subnodes under
the DN.
One-level: searches the subnodes under the DN.
Base: searches just the named DN.
Search Indicates the timeout duration that the client waits for
Timeout the LDAP domain server to return the query result. The
Duration (s) default value is 3 seconds.
Idle Timeout Indicates the timeout duration that the client has no
Duration (s) communication with the LDAP domain server. The
default value is 30 seconds.
e. Set the LDAP template information. Table 2-25 describes the parameters.
Parameter Description
LDAP Schema Last Indicates the LDAP template type selected last
Selected time.
Parameter Description
Reset LDAP You can select a type for the LDAP schema
Schema template. You can select a template for which
relevant parameters are entered automatically.
You can also customize relevant parameters
instead of selecting a template.
Parameter Description
Parameter Description
f. Click OK.
● Restore to Initial
Select File Service LDAP Domain and click Restore to Initial.
----End
Working Principles
When NIS is configured, the ASCII files in the NIS domain are converted to NIS
database files (or mapping table files). Hosts in the NIS domain query and parse
the NIS database files to perform operations such as authorized access and
updates. For example, common password file /etc/passwd of a UNIX host is
converted to the following NIS database files:
Data Preparation
Collect Domain Name, Primary Server Address, Standby Server Address 1
(Optional), and Standby Server Address 2 (Optional). For details about how to
obtain the data, see 2.8.4.1.7 (Optional) Configuring NIS Domain
Authentication Parameters.
Prerequisites
● An NIS domain has been set up.
● You have prepared the data required for configuring an NFS share.
NOTE
● The storage systems can connect to an NIS server through management network
ports or service network ports (logical ports). If a storage system connects to an
NIS server through management network ports, ensure that the management
network ports on at least two controllers can properly communicate with the NIS
server. If a storage system connects to an NIS server through service network ports,
it is recommended that the service network ports on at least two controllers can
properly communicate with the NIS server. It is recommended that storage systems
connect to NIS servers through service network ports.
● A storage system can connect to only one NIS server.
Precautions
● You are advised to use physical isolation and end-to-end encryption to ensure
security of data transfer between the NIS domain server and clients.
● In the following scenario (the three situations occurred in sequence), use
clear nfs nfsv4_idmap_cache controller=? to clear the IDMAP cache of all
controllers:
a. First, the storage system had not been added to an NIS domain or had
not been correctly added to an NIS domain.
b. Then, an NIS domain user of the host accessed the shared space of the
storage system through the NFSv4.0 or NFSv4.1 protocol.
c. Finally, the storage system has been correctly added to an NIS domain.
Procedure
Step 1 Choose Settings > User and Security > Domain Authentication > File Service
NIS Domain.
Step 2 Select the desired vStore from the vStore drop-down list in the upper left corner.
Step 3 View NIS domain parameters of the file service. Table 2-26 describes the
parameters.
NOTE
● On the file service NIS domain management page, click to refresh file service NIS
domain information.
● On the file service NIS domain management page, click and select the file service NIS
domain information you want to view.
Domain Name Indicates the domain name of the NIS domain server.
Step 4 You can also configure and restore the file service NIS domain to initial
configuration.
● Configure
a. Select the NIS domain to be configured and click Configure.
The Configure File Service NIS Domain page is displayed on the right.
NOTE
Alternatively, choose Services > vStore Service > vStores and click the name of a
vStore. On the details page that is displayed on the right, select the File Service
tab and click Configure in the NIS Domain area.
b. Configure basic information. Table 2-27 describes the parameters.
Table 2-27 Basic information about the file service NIS domain
Parameter Description
Parameter Description
c. Click OK.
● Restore to Initial
Select File Service NIS Domain and click Restore to Initial.
----End
Background
According to the NFSv4 standard protocol, the NFSv4 service can be used only in a
domain environment to ensure proper running. To use the NFSv4 service in a non-
domain environment, configure the user name@domain name mapping
mechanism used by the NFSv4 service on your client. Then, the NFSv4 service will
use UIDs and GIDs to transfer owner and group information about files during
service transactions between your storage system and client.
The storage system supports NFSv4.1 in 6.1.2 and later versions, and NFSv4.0 in
6.1.3 and later versions.
Risks
● In scenarios where the NFSv4 service is used in a non-domain environment,
the user authentication method of the NFSv4 service is the same as that of
the NFSv3 service. The method cannot meet the theoretical security
requirements of the NFSv4 standard protocol.
● Users mapped by each client depend on the configuration files of client users
and user groups. The configuration file of each user and user group must be
independently maintained for proper mapping.
● UIDs and GIDs must be used when ACLs are configured for non-root users
and non-root user groups. Otherwise, the configuration will fail.
● The NFSv4 service is not recommended in a non-domain environment. If
operations in Configuration on Clients are not performed, executing the
chown command may fail.
Configuration on Clients
Step 1 Run the echo 1 > /sys/module/nfs/parameters/nfs4_disable_idmapping
command.
Step 2 Run the cat /sys/module/nfs/parameters/nfs4_disable_idmapping command. If
Y is displayed in the command output, the NFSv4 service is successfully
configured.
NOTICE
If you have used the NFSv4 service to mount NFS shares before configuring the
NFSv4 service for a non-domain environment, mount the NFS shares again after
configuring the NFSv4 service.
----End
Procedure
NOTE
If NFSv3 mount on Windows clients is enabled, you are advised to set the data protocol of
the logical port to NFS + CIFS.
NOTE
----End
NOTE
Only 6.1.6 and later versions allow Windows clients to access NFS shares.
Prerequisites
You have obtained required data for configuring an NFS share.
Procedure
Step 1 Choose Services > File Service > Shares > NFS Shares.
Step 2 Select the desired vStore from the vStore drop-down list in the upper left corner.
Step 3 On the NFS Shares tab page, click Create.
The Create NFS Share page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets the File System and Permission parameters based on recommendations when you
create an NFS share. You can directly use the parameters or modify them as required.
File System File system for which you want to create an NFS share.
NOTE
When the global root directory / is selected for File System, you can
create an NFS global namespace (GNS) share.
● Each vStore can only create one GNS.
● You must add an independent share for a file system. After the
share is added, this file system will not be displayed if a host is
only authorized to access / but not the file system.
● GNS root directory / is read-only. You cannot create, modify, and
delete directories or files under / and you cannot modify
directory attributes of /. Once the directory of a file system is
entered, the permission will change to the share permission of
the file system.
● If no GNS is created, root directory / cannot be mounted to an
NFSv3 client. Only shared file systems can be viewed when / is
mounted to an NFSv4 directory.
● When creating an NFS GNS share, you can only set the
description for the share.
● If you want to create a HyperMetro or HyperReplication vStore
pair and a GNS has been created for the primary vStore, the
version of the secondary storage system must be the same as
that of the primary storage system. If a vStore pair has been
created, you can create a GNS share only when the versions of
the primary and secondary storage systems are the same and
support GNSs.
[Example]
FileSystem001
NOTICE
If the selected file system is the secondary storage system in a
remote replication pair or remote storage system in a HyperMetro
pair, data in the file system is probably being modified when it is
accessed. Before performing this operation, confirm that the
application allows possible data inconsistency.
Dtree Dtree for which you want to create an NFS share. If you do
not select a dtree, the NFS share is created for the entire file
system.
[Example]
Dtree_test
Parameter Description
Share Name Share name of the file system, which is used by users to
access shared resources.
NOTE
● When creating a GNS, you cannot set the share name.
● Only 6.1.6 and later versions support this parameter.
[Value range]
● The name must start with a slash (/).
● The name supports only letters, digits, special characters !
\"#&%$'()*+-,.:;<=>?@[]^_`{|}~, and spaces.
● The name contains 1 to 255 characters.
Share Path Share path of the file system, which is generated based on
the File System and Dtree parameters.
[Example]
/Filesystem001/Dtree_test
Parameter Description
Parameter Description
● HR
Croatian character set, in compliance with ISO 8859-2
● HU
Hungarian character set, in compliance with ISO 8859-2
● NO
Norwegian character set, in compliance with ISO 8859-1
● NL
Dutch character set, in compliance with ISO 8859-1
● PL
Polish character set, in compliance with ISO 8859-2
● RO
Romanian character set, in compliance with ISO 8859-2
● RU
Russian character set, in compliance with ISO 8859-5
● SK
Slovak character set, in compliance with ISO 8859-2
● SL
Slovenian character set, in compliance with ISO 8859-2
● SV
Swedish character set, in compliance with ISO 8859-1
● TR
Turkish character set, in compliance with ISO 8859-9
● EN-US
English character set, in compliance with ISO 8859-1
● EUC-KR
Korean character set, in compliance with KS X 2901
NOTE
● Method of querying character encoding on clients (for example,
in Linux): Run the locale command to view character encoding
of the current system.
● NFSv4 supports only UTF-8. If NFSv4 is used, ensure that the
host uses UTF-8 character encoding.
Show Snapshot This function allows clients to show and traverse snapshot
directories.
NOTE
Description, Character Encoding, and Show Snapshot are hidden parameters. To display
hidden parameters, click Advanced.
NOTE
● When Type is set to Host, the system automatically detects whether the LDAP domain,
NIS domain, or DNS has been configured. To add a client by specifying the host name,
configure at least one of them.
● When Type is set to Network group, the system automatically detects whether the
LDAP domain or NIS domain has been configured. You must configure at least one of
them.
● You can click More on the right of a client and choose Modify to modify its information.
● You can select one or more clients and click Remove, or click More on the right of a
client and select Remove, to remove clients.
----End
2.8.4.1.11 Adding an NFS Share Client (Applicable to Versions Earlier Than 6.1.3)
An NFS share client enables client users to access shared file systems through the
network.
Prerequisites
● You have obtained required data for configuring an NFS share.
● You have created a host name available on the DNS if you need to add a
client whose Type is Host.
● You have created a network group name available on the LDAP or NIS server
if you need to add a client whose Type is Network group.
Procedure
Step 1 Choose Services > File Service > Shares > NFS Shares.
Step 2 Select the vStore to which the desired NFS share belongs from the vStore drop-
down list in the upper left corner.
Step 3 Click More on the right of the desired NFS share and select Add Client.
NOTE
NOTE
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets the Type and Permission parameters based on recommendations when you add an
NFS share client. You can directly use the parameters or modify them as required.
Parameter Description
Clients When Type is set to Host, enter client host names (FQDNs
are recommended), IP addresses, or IP address segments, or
use the asterisk (*) to represent IP addresses of all clients.
When Type is set to Network group, enter the network
group names configured in the LDAP or NIS domain.
NOTE
● When Type is set to Host, the system automatically detects
whether the LDAP domain, NIS domain, or DNS has been
configured. To add a client by specifying the host name,
configure at least one of them.
● When Type is set to Network group, the system automatically
detects whether the LDAP domain or NIS domain has been
configured. You must configure at least one of them.
[Value range]
You can enter multiple host names, IP addresses, or network
group names of the clients separated by semicolons (;),
spaces, or carriage returns.
A host name:
● Contains 1 to 255 letters, including letters, digits,
hyphens (-), periods (.), and underscores (_).
● Must start with a letter or digit and cannot end with a
hyphen (-) or underscore (_).
● Cannot contain a combination of a period and
underscore (_. or ._), a combination of a period and
hyphen (-. or .-), consecutive periods (..), or pure digits.
For IP addresses:
● You can enter client IP addresses, client IP address
segments, or an asterisk (*) to represent IP addresses of
all clients.
● IPv4 addresses, IPv6 addresses, or the combination of
IPv4 and IPv6 addresses are supported.
● The mask of an IPv4 address ranges from 1 to 32. The
prefix of an IPv6 address ranges from 1 to 128.
A network group name:
● Contains 1 to 254 characters.
● Can contain only letters, digits, underscores (_), hyphens
(-), and periods (.).
Permission Permission level for the clients to access the NFS share.
Possible options are as follows:
● Read-only: Clients can only read files in the NFS share.
● Read-write: Clients can read and write files in the NFS
share.
Step 5 Set advanced client parameters. Select Advanced in the upper right corner.
Write Mode Indicates how the clients write data to the NFS share. The
modes include:
● Sync: The system writes data onto disks instantly.
● Async: The system responds to clients' requests first and
then writes data.
NOTE
If the value is set to Async, data may be lost when a client and
storage system are faulty at the same time.
[Default value]
Sync
----End
Prerequisites
● You have prepared the data required for configuring an NFS share.
● You have created a host name available on the DNS if you need to add a
client whose Type is Host.
● You have created a network group name available on the LDAP or NIS server
if you need to add a client whose Type is Network group.
● If Share Path is set to global root directory /, you cannot add a client.
Procedure
Step 1 Choose Services > File Service > Shares > NFS Shares.
Step 2 Select the vStore to which the desired NFS share belongs from the vStore drop-
down list in the upper left corner.
Step 3 Click More on the right of the desired NFS share and select Add Client.
The Add Client page is displayed.
NOTE
NOTE
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets the Type and Permission parameters based on recommendations when you add a
client. You can directly use the parameters or modify them as required.
Parameter Description
Clients When Type is set to Host, enter client host names (FQDNs
are recommended), IP addresses, or IP address segments, or
use the asterisk (*) to represent IP addresses of all clients.
When Type is set to Network group, enter the network
group names configured in the LDAP or NIS domain.
NOTE
● When Type is set to Host, the system automatically detects
whether the LDAP domain, NIS domain, or DNS has been
configured. To add a client by specifying the host name,
configure at least one of them.
● When Type is set to Network group, the system automatically
detects whether the LDAP domain or NIS domain has been
configured. You must configure at least one of them.
[Value range]
You can enter multiple host names, IP addresses, or network
group names of the clients separated by semicolons (;),
spaces, or carriage returns.
For host names:
● A host name contains 1 to 255 characters and cannot
contain spaces.
● A host name cannot start with a hyphen (-).
For IP addresses:
● You can enter client IP addresses, client IP address
segments, or an asterisk (*) to represent IP addresses of
all clients.
● IPv4 addresses, IPv6 addresses, or the combination of
IPv4 and IPv6 addresses are supported.
● The mask of an IPv4 address ranges from 1 to 32. The
prefix of an IPv6 address ranges from 1 to 128.
A network group name:
● Contains 1 to 254 characters.
● The value can contain only letters, digits, underscores (_),
periods (.), and hyphens (-).
UNIX Permission Indicates the permission level for the UNIX client to access
the NFS share. Possible options are:
● Read-only: The clients can only read files in the NFS
share.
● Read-write: The clients can read and write files in the
NFS share.
● None: No operation is allowed on the NFS share.
Parameter Description
Step 5 Set advanced client parameters. Select Advanced in the upper right corner.
Table 2-32 describes the parameters.
Parameter Description
Write Mode Indicates how the clients write data to the NFS share. The
modes include:
● Sync: The system writes data onto disks instantly.
● Async: The system responds to clients' requests first and
then writes data.
NOTE
If the value is set to Async, data may be lost when a client and
storage system are faulty at the same time.
[Default value]
Sync
----End
Start
Prepare data.
AccessAdd
thean NFS share
shared space.
client.
End
Optional Mandator
y
● AD domain information
● DNS
IP address of the DNS server.
NOTE
Context
A storage system has nine local authentication user groups that are automatically
created. The nine user groups are reserved for the system and cannot be modified
or deleted.
An access control list (ACL) is a collection of permissions that are authorized to users or
user groups to operate shared files. ACL permissions are classified into ACL storage
permissions and ACL authentication permissions. After a user logs in to a share, the system
determines the user's permissions on the share, reads the ACL permissions, and then
determines whether the user can read and write files. For ACL storage permissions, each
ACL permission is called an Access Control Entry (ACE). After a share is mounted to a
Windows client, the client sends NT ACLs to the server (storage system that provides the
share).
Procedure
Step 1 Choose Services > File Service > Authentication Users > Windows Users > Local
Authentication User Groups.
Step 2 Select the vStore for which you want to create a local authentication user group
from the vStore drop-down list in the upper left corner.
The Create Local Windows Authentication User Group page is displayed on the
right.
Step 4 Set basic parameters for the local authentication user group.
Parameter Description
Step 5 Select privileges for the local authentication user group. You can view details
about the privileges in the description.
----End
Procedure
Step 1 Choose Services > File Service > Authentication Users > Windows Users > Local
Authentication Users.
Step 2 Select the vStore for which you want to create a local authentication user from
the vStore drop-down list in the upper left corner.
Step 3 Click Create.
The Create Local Windows Authentication User page is displayed on the right.
Step 4 Set basic parameters for the local authentication user.
Table 2-34 describes the parameters.
Parameter Description
Owning Groups Groups to which the local authentication user belongs. Click
on the right of Owning Groups. In the Available Groups
list, select the desired groups and add them to Selected
Groups.
NOTE
You cannot configure privileges for local authentication users separately on DeviceManager.
Instead, you can configure privileges for local authentication users on the CLI.
----End
Why AD Domains?
In Windows shared mode, every device that provides shares is an independent
node. The account and permission information about users allowed to access
Working Principles
1. The DNS server provides a full domain name (123.com for example) for the
AD domain.
2. The storage system is added into the AD domain and provides share services.
3. Users can access shares after logging in to hosts in the AD domain using
domain accounts.
Data Preparation
To smoothly add a storage system to an AD domain, prepare or plan the required
data based on the site requirements. Collect Domain Administrator, Password,
Full Domain Name, Organization Unit (optional), and System Name. For details
about how to obtain the data, see 2.8.4.2.7 (Optional) Configuring AD Domain
Authentication Parameters.
Prerequisites
● A DNS server has been configured and is running properly.
● Port 53 for the TCP/UDP protocol between the storage system and the DNS
server is enabled.
● The latency of the network between the DNS server and the storage system is
less than or equal to the configured latency (200 ms by default).
Context
● A DNS server is used to resolve names of hosts in a domain.
● If you want to configure a standby DNS server, keep the domain names of the
active and standby servers consistent.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the details page that is displayed on the
right, click the File Service tab and click Configure in the DNS Service area.
The DNS Service page is displayed on the right.
Step 3 Configure an IP address for the DNS service.
1. Set Active DNS IP Address.
2. (Optional) Set Standby DNS IP Address 1.
3. (Optional) Set Standby DNS IP Address 2.
NOTE
Set Standby DNS IP Address 1 first and then Standby DNS IP Address 2.
4. (Optional) Test the connection between the DNS server and the storage
system.
– You can click Test next to a DNS IP address to test its availability.
– You can click Test All to test the connection between the DNS server and
the storage system.
Step 4 Click OK. Confirm your operation as prompted.
----End
Prerequisites
● An AD domain has been set up.
● The storage system has been connected to the DNS server.
● The AD domain server and DNS server have time synchronization with the
storage system. The time difference must be no larger than 5 minutes.
● Ports 88 (TCP/UDP protocol), 389 (TCP/UDP protocol), 445 (TCP protocol),
and 464 (TCP/UDP protocol) are enabled between the storage system and the
AD domain.
The storage systems can connect to AD domain servers and DNS servers through
management network ports or service network ports (logical ports). If a storage system
connects to an AD domain server and DNS server through management network ports,
ensure that the management network ports on at least two controllers can properly
communicate with the AD domain server and DNS server. If a storage system connects to
the AD domain server and DNS server through service network ports, it is recommended
that the service network ports on at least two controllers can properly communicate with
the AD domain server and DNS server. It is recommended that storage systems connect to
AD domain servers through service network ports.
Precautions
● Before adding a storage system to an AD domain, ensure that the primary
controller of the storage system is connected to the DNS server and AD
domain server.
● When Overwrite System Name is enabled, if a system name entered exists in
the AD domain controller, the information about the current storage system
will overwrite the information about the storage system corresponding to the
system name on the AD domain controller.
● A simple password may result in security issues. A complex password that
contains uppercase letters, lowercase letters, digits, and special characters is
recommended.
● You are advised to use physical isolation and end-to-end encryption to ensure
security of data transfer between the AD domain server and clients.
Procedure
Step 1 Choose Settings > User and Security > Domain Authentication > File Service
AD Domain.
Step 2 Select a vStore from the vStore drop-down list in the upper left corner.
Step 3 View AD domain parameters of the file service. Table 2-35 describes the
parameters.
NOTE
● On the file service AD domain management page, click to refresh file service AD
domain information.
● On the file service AD domain management page, click and select the file service AD
domain information you want to view.
Parameter Description
Full Domain Name Indicates the full domain name of the AD domain server.
Parameter Description
Alternatively, choose Services > vStore Service > vStores and click the name of a
vStore. On the details page that is displayed on the right, select the File Service tab
and click Configure in the AD Domain area.
2. Configure basic information. Table 2-36 describes the parameters.
Full Domain Indicates the full domain name of the AD domain server.
Name NOTE
You can click Test to test the validity of the full domain name.
[Value range]
A string of 1 to 127 characters.
[Example]
abc.com
Parameter Description
----End
Follow-up Procedure
● After adding a storage system to an AD domain that has multiple domain
controllers, you are advised to wait about 2 minutes for these domain
controllers to synchronize configurations and then access shares as a domain
user.
● After the storage system is removed from the AD domain, you are advised to
wait for about 2 minutes before adding the storage system to the AD domain
again.
Procedure
Step 1 Choose Services > File Service > Shares > CIFS Shares.
Step 2 Select the desired vStore from the vStore drop-down list in the upper left corner.
Step 3 Click Create.
The Create CIFS Share page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets the File System and Share Name parameters based on recommendations when
you create a CIFS share. You can directly use the parameters or modify them as required.
Parameter Description
File System File system for which you want to create a CIFS share.
NOTE
If the selected file system is the secondary storage system in a
remote replication pair or remote storage system in a HyperMetro
pair, data in the file system is probably being modified when it is
accessed. Before performing this operation, confirm that the
application allows possible data inconsistency.
[Example]
Filesystem001
Dtree Dtree for which you want to create a CIFS share. If you do
not select a dtree, the CIFS share is created for the entire file
system.
[Example]
Dtree_test
Share Name Name of the share, which is used by users to access shared
resources.
[Value range]
● The name must be unique.
● The name cannot contain characters " / \ [ ] : | < > + ; , ?
* =, and cannot be ipc$, autohome, ~, or print$ reserved
by the system.
NOTE
– ipc$ is a resource that shares named pipes. A named pipe is
one of the mechanisms of inter-process communication.
– autohome is the share name reserved for the autohome
share.
– ~ is a symbol reserved for the autohome share.
– print$ is the shared printer.
● The name contains 1 to 80 characters.
[Example]
share_for_user1
NOTE
The system creates an admin share named c$ by default in 6.1.3 or
later. The c$ share has the following characteristics:
● Its share path is the root directory /, and its share permissions
are Administrators full control permissions.
● Each time a vStore is created, a c$ share is automatically created
for this vStore.
● It cannot be deleted.
● You can view or modify the attributes of the c$ share. For
example, on the Windows Management Console (MMC), you
can modify the description and offline settings of the c$ share.
● On MMC, you can use the c$ share to browse file systems and
dtrees and directly select a file system or dtree to create a share.
You do not need to manually enter the share path.
Parameter Description
Share Path Share path of the file system, which is generated based on
the File System and Dtree parameters.
[Example]
/Filesystem001/Dtree_test
Step 5 Set advanced attributes of the CIFS share. Select Advanced in the upper right
corner.
Table 2-38 describes the parameters.
Parameter Description
ABE After ABE is enabled, files and folders that users have no
access permission are not displayed.
NOTE
● SMB2 and SMB3 support this function but SMB1 does not.
● Only 6.1.3 and later versions support this parameter.
Show Previous If this function is enabled, clients can show and roll back
Version historical versions.
NOTE
Only 6.1.5 and later versions support this parameter.
Show Snapshot This function allows clients to show and traverse snapshot
directories.
NOTE
Only 6.1.3 and later versions support this parameter.
Parameter Description
Step 6 Select user or user groups that can access the CIFS share.
1. In the Permissions area, click Add.
The Add User or User Group page is displayed.
2. Set Type for the users or user groups.
Possible values are Everyone, Local Windows authentication user, Local
Windows authentication user group, AD domain user, AD domain user
group, Local UNIX authentication user, Local UNIX authentication user
group, LDAP domain user, LDAP domain user group, NIS domain user, and
NIS domain user group. Note that Local UNIX authentication user, Local
UNIX authentication user group, LDAP domain user, LDAP domain user
group, NIS domain user, and NIS domain user group are displayed after you
select Advanced in the upper right corner.
NOTE
Local UNIX authentication user, Local UNIX authentication user group, LDAP
domain user, LDAP domain user group, NIS domain user, and NIS domain user
group are available only in 6.1.6 and later versions.
– If you select Local Windows authentication user, Local Windows
authentication user group, Local UNIX authentication user, or Local
UNIX authentication user group, select the users or user groups you
want to add from the list.
NOTE
You can click Create to create a local authentication user or user group.
– If you select AD domain user, AD domain user group, LDAP domain
user, LDAP domain user group, NIS domain user, or NIS domain user
group, enter the names of the users or user groups in Name.
NOTE
▪ If you select a domain user or user group, the system automatically detects
whether the domain has been configured. If no domain is configured, the
system prompts you to configure a domain first.
3. In Permission, select the permission granted for the users or user groups.
Table 2-39 describes the permissions.
Viewing files Xa √b √ √
and
subdirectorie
s
Viewing file X √ √ √
contents
Running X √ √ √
executable
files
Adding files X -c √ √
or
subdirectorie
s
Modifying X - √ √
file contents
Deleting files X - √ √
and
subdirectorie
s
Renaming X - √ √
Changing X - - √
ACL
permissions
of files or
directories
NOTE
– The permission priority from high to low is Forbidden > Full control > Read-write
> Read-only. The highest permission prevails. If a user is granted with a higher
permission than its original one, the new permission takes effect immediately
without re-authentication. For example, the access permission of a user is Read-
only, and then the user is added to a user group whose access permission is Full
control. Therefore, the access permission of the user is changed to Full control
and it can access the CIFS share immediately without re-authentication.
– You can run the change service cifs administrators_privilege=? command on the
CLI to modify permissions of members in the Administrators user group. For
details about the command, refer to Command/Event/Error Code Query. In the
command, the value of the administrators_privilege parameter can be admin
(default), default_group, or owner.
For local authentication users whose primary user group is Administrators, users
with different administrators_privilege values have different permissions.
▪ admin: When members in the Administrators user group access a shared file
system in the storage system, they do not need to be authenticated by share-
level ACLs and NT ACLs. They can operate any file in any share (with
administrator permissions of the share) without authentication.
----End
Procedure
Step 1 Choose Map network drive on a Windows client.
Take Windows Server 2012 as an example. Open File Explorer and choose
Computer > Map network drive > Map network drive.
NOTE
GUIs may be slightly different for clients running different versions of Windows operating
systems. The actual GUIs prevail.
Step 2 In the displayed Map Network Drive dialog box, configure the network folder you
want to map.
Step 3 In the displayed Windows Security dialog box, enter the user name and password
for accessing the CIFS share.
● If you log in as a domain authentication user, enter the domain user name in
the Domain name\Domain user name format and the corresponding
password.
NOTE
After CIFS shares are allocated to domain users, do not modify the domain user
information. If you do, the CIFS shares cannot be accessed.
● If you log in as a local authentication user, enter the user name and password
of the local authentication user.
NOTE
----End
2.8.4.3.1 Overview
This section introduces the user mapping mechanism used during cross-protocol
(CIFS-NFS) share access.
Table 2-40 Permission conversion among UNIX Mode bits and NT ACLs
File Permission Permission Conversion
A file or directory has If an NFS client sends a request to read UNIX Mode bits,
a valid NT ACL. UNIX Mode bits (mapped based on the NT ACL) of the
storage system are returned directly.
● User mappings on NFS clients are cached and expire after four hours by
default. New user mappings and user information changes take effect after
the cached data expires.
User mapping rules specify the mappings among different user accounts. They can
be saved in a local database or managed in an AD domain in a centralized
manner. A user mapping rule includes the mapping type, source user, mapped
user, and mapping priority. If a user matches multiple mapping rules, it is mapped
based on the rule with a higher priority. If the rules have the same priority, the
user is mapped based on the rule that is configured the earliest.
The following describes how local user mapping is performed:
● NFS-CIFS user mapping: An NFS user is authenticated using its UID on a
server. When user mapping occurs, the user name corresponding to the UID is
queried in the sequence of the local, LDAP, and NIS domains, and then the
user name after mapping and its SID and owning user group are queried
based on the locally configured mapping relationships using the user name
corresponding to the UID. After the mapping, identity authentication for
cross-protocol access will be performed on the mapped user and its owning
group.
● CIFS-NFS user mapping: A CIFS user is authenticated by SID on the service
end. When a user mapping occurs, the mapped user will be queried based on
the user name to which the SID corresponds and the local mapping. Then the
UID to which the mapped user name corresponds and its owning group will
be queried in the sequence of the local storage system, LDAP domain, and
NIS domain. After the mapping, identity authentication for cross-protocol
access will be performed on the mapped user and its owning group.
NOTE
● You are not advised to configure users with the same UID or user name in the local
storage system, LDAP domain, and NIS domain. If users with the same UID or user
name exist, the mapping result may not meet the expectation.
● In 6.1.6 and later versions, you can run the add identity_mapping rule
from_identity=? to_identity=? mapping_type=? host_name=? address=? command to
configure client IP address segments or host names in a user mapping rule. Clients can
use the user mapping rule only when their IP address segments or host names match
those specified in the user mapping rule. For details about the command, visit
Command/Event/Error Code Query.
After user mapping, on an NFS client, the owner information of files or directories
owned by CIFS users (the files or directories that are created by CIFS users or the
owner information of the files or directories are changed to CIFS users) is the
information of the NFS users mapped from CIFS users. If no mapping rules have
been configured for CIFS users, the owner information of the files or directories is
about the IDs (calculated using IDMAP, a hash algorithm) of the CIFS users.
After user mapping, on a CIFS client, the owner information of the files or
directories owned by NFS users (the files or directories that are created by NFS
users or the owner information of the files or directories are changed to NFS
users) is about NFS user names. If NFS users are NIS or LDAP domain users, the
owner information is displayed as UNIXUser\user name.
NOTE
When CIFS users are mapped to NFS users, quota statistics will be collected for the NFS
users or owning user group.
Context
If you only use IDMU user mappings, you do not need to configure user mappings
in the local storage system.
Procedure
Step 1 Choose Services > File Service > Authentication Users > User Mappings.
Step 2 Select the vStore for which you want to configure mapping parameters from the
vStore drop-down list in the upper left corner.
Parameter Description
Parameter Description
Map to User with Indicates whether to map to users with the same name.
Same Name After this function is enabled, the system automatically
maps UNIX users and Windows users with the same
name.
Default UNIX User When user mapping is enabled and a Windows user
fails to be mapped, the Windows user will be mapped
to this default UNIX user.
Default Windows When user mapping is enabled and a UNIX user fails to
User be mapped, the UNIX user will be mapped to this
default Windows user.
If the default Windows user is an AD domain user, the
naming format is Domain name\Domain user name.
The AD domain name can only be a NetBIOS name. You
can query the NetBIOS name of a domain by running
the nbtstat -n command. Alternatively, you can right-
click the domain on the Active Directory Users and
Computers page, choose Properties from the shortcut
menu, and find the value of Domain name (pre-
Windows 2000) in the dialog box that is displayed. The
value is the NetBIOS name of the domain.
NOTE
Map to User with Same Name, Default UNIX User, and Default Windows User are
available only when Mapping Mode is set to Support only user mapping of this system,
Preferentially support user mapping in IDMU, or Preferentially support user mapping
of this system. IDMU Search Timeout Duration (s) and IDMU Search DN are available
only when Mapping Mode is set to Support only user mapping in IDMU, Preferentially
support user mapping in IDMU, or Preferentially support user mapping of this system.
----End
NOTE
If Map to User with Same Name is enabled, default user mapping (Default UNIX User or
Default Windows User) is configured, and user mapping is created, you can follow the
following sequence to search for user mapping: the created user mappings > user mappings
with the same name > the default user mapping.
Procedure
Step 1 Choose Services > File Service > Authentication Users > User Mappings.
Step 2 Select the vStore for which you want to create a user mapping from the vStore
drop-down list in the upper left corner.
Step 3 Click Create.
The Create User Mapping page is displayed on the right.
Step 4 Set basic user mapping parameters.
Table 2-42 describes the parameters.
Parameter Description
Step 5 Click Add to Mapping List to add the mapping to the list below.
NOTE
You can set user mapping parameters and click Add to Mapping List to configure multiple
user mappings.
You can also click More on the right of a desired user mapping and choose Test.
● Modifying a user mapping
a. Click More on the right of the desired user mapping and choose Modify.
The Modify User Mapping page is displayed on the right.
You can also click More on the right of the desired user mapping and choose Delete.
----End
Example
● User mapping rule example 1: Map Windows user win_user01 to UNIX user
ux_user01.
– Source user: win_user01
– Target user: ux_user01
– Mapping type: Windows to Unix
– Priority: 10 (default)
● User mapping rule example 2: Map any UNIX user to user1 in the AD domain
(domain name authtest).
– Source user: *
– Target user: authtest\user1
– Mapping type: Unix to Windows
– Priority: 10 (default)
Prerequisites
● The user of the Linux client has the same UID and GID as the local
authentication user.
You can query the local authentication user ID and ID of its owning primary
group on the DeviceManager. On the Linux client, you can run the groupadd
-g GID user group name command to create a user group, and then run the
useradd -u UID -g GID user name command to create a user.
● Before you use an AD domain user to configure user mapping rules, the
storage system has been added to the AD domain.
Context
Before users can use an NFS client to access shared files and folders for which NT
ACLs have been configured, the administrator must follow the process as shown in
Figure 2-6 to configure related parameters.
Start
Create a file system. The security mode of the file system is NTFS.
End
Mandatory Optional
Example
Table 2-43 provides an example of data planning during the configuration.
Name: cifs_user1
3. Choose Services > File Service > Authentication Users > UNIX Users > Local
Authentication Users.
4. Click Create to create a local authentication user named unix_user1 as
planned.
Step 4 Create an NFS share and a CIFS share for the same file system.
1. Choose Services > File Service > Shares.
2. Create an NFS share and a CIFS share for the same file system based on
parameters as planned.
Step 7 Use a Windows client to access shared directory share_dir and set permissions of
files under the shared directory.
1. Use a Windows client to access a CIFS share.
2. Under the shared directory, create folder subdir1 and file file1.
3. Add one ACE to subdir1 and file1.
Right-click the file or folder and choose properties from the shortcut menu
that is displayed. In the properties dialog box that is displayed, click the
Security tab and add the modify permission ACE to user cifs_user1.
4. Delete the Everyone permissions for subdir1, so as to verify that the NFS
client has permissions of the mapped Windows user.
NOTE
This operation is required because Security Style of the file system share_dir in this
example is NTFS and Windows ACLs exist.
Step 9 Use an NFS client to mount the share and access the share as local user
unix_user1.
1. Use an NFS client to mount the NFS share.
2. Run the groupadd -g 100000 unix_group command to create a user group
that has the same GID as the local authentication user group.
3. Run the useradd -u 100001 -g 100000 unix_user1 command to create a user
that has the same UID and GID as the local authentication user.
NOTE
The UID and GID in the command are used as an example only. They vary with site
conditions.
4. Run the su - unix_user1 command to switch users.
5. Write data to folder subdir1.
If the data is written to the folder successfully, the Linux client has a write
permission for the folder.
----End
Prerequisites
The user of the Linux client has the same UID and GID as the local authentication
user.
You can query the local authentication user ID and ID of its owning primary group
on the DeviceManager. On the Linux client, you can run the groupadd -g GID user
group name command to create a user group, and then run the useradd -u UID -
g GID user name command to create a user.
Context
Before users can use a Windows client to access shared files and folders for which
the UNIX permission has been configured, the administrator needs to follow the
process as shown in Figure 2-7 to configure related parameters.
Start
Create a file system. The security mode of the file system is UNIX.
Create a local authentication user. Skip this step if AD domain users access shares.
End
Mandatory Optional
Example
Table 2-44 provides an example of data planning during the configuration.
Name: unix_user2
ID: 100002
Primary group name: unix_group
Primary group ID: 100000
Windows operating systems do not allow a file name to contain special characters.
Therefore, it is recommended that the file name and directory name of an NFS
share do not contain special characters including \:*/?"<>|, and the file name and
directory name do not end with a period (.) or a space. Otherwise, the storage
system converts the file name and directory name to short names (for example,
~PY203).
3. Choose Services > File Service > Authentication Users > UNIX Users > Local
Authentication Users.
4. Click Create to create a local authentication user named unix_user2 as
planned.
Step 4 Create an NFS share and a CIFS share for the same file system.
1. Choose Services > File Service > Shares.
2. Create an NFS share and a CIFS share for the same file system based on
parameters as planned.
Step 5 Configure user mapping parameters.
1. Choose Services > File Service > Authentication Users > User Mappings.
2. Click Set Mapping Parameter and set Mapping Mode to Preferentially
support user mapping of this system.
Step 6 Configure user mapping rules.
1. Choose Services > File Service > Authentication Users > User Mappings.
2. Click Create and configure user mapping rules as planned.
Step 7 Use an NFS client to mount the share and set permissions of files under the
shared directory.
The UID and GID in the command are used as an example only. They vary with site
conditions.
4. Run the su - unix_user2 command to switch users.
5. Create the file1 file and grant the read-only permission.
NOTE
The security style of the file system (share_dir2) on the storage system is UNIX. The
default UNIX permission of the root directory of the file system is 755. Therefore, first
run the change file_system general file_system_id=? unix_permissions=777
command on the storage system to change the UNIX permission to 777.
# touch file1
# chmod 400 file1
Step 8 Use cifs_user2 to access file1 on a Windows client and verify that it has only the
read-only permission.
----End
Context
File systems created in the storage system are thin file systems. That is, the
storage system will not allocate all of the configured capacity to file systems at a
time. Within the configured capacity, the storage system allocates storage
resources to file systems based on the actual capacity used by hosts.
Precautions
In a storage pool, if the total capacity of all thin file systems exceeds that of the
storage pool, data cannot be written if the capacity of the storage pool is used up.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 Click Create.
The Create File System page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
Parameter Description
Parameter Description
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default UNIX user must be an existing local
authentication user or NIS/LDAP domain user.
– In this mode, the default UNIX permission of the file system
root directory is 755. To change the value, run the change
file_system general file_system_id=? unix_permissions=?
command. For details about the command, visit Command/
Event/Error Code Query.
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file or
directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
– This parameter is available only when Security Style is set to
Native.
– Only 6.1.5 and later versions support this parameter.
Step 4 Set the capacity and tuning information of the file system.
Table 2-46 describes the parameters.
Capacity Alarm Alarm threshold of the file system capacity. An alarm will be
Threshold (%) generated when the threshold is reached.
NOTE
● Capacity Alarm Threshold (%) is hidden. To display hidden
parameters, click Advanced.
● Capacity threshold = File system capacity x (1 – Reserved
snapshot space ratio (%)) x Capacity alarm threshold (%)
● The alarm is cleared only when the used capacity of the file
system is smaller than 90% of the capacity threshold or the
capacity threshold minus 1 GB (whichever is larger).
Parameter Description
Auto Expansion When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is greater than this threshold, the storage
(%) system automatically triggers file system capacity
expansion.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion or Auto
expansion/reduction.
● The value of Auto Expansion Trigger Threshold (%) must be
greater than that of Auto Reduction Trigger Threshold (%).
● Only 6.1.5 and later versions support this parameter.
Auto Reduction When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is smaller than this threshold, the storage
(%) system automatically triggers space reclamation to reduce
the file system capacity.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion/reduction.
● Only 6.1.5 and later versions support this parameter.
Parameter Description
Application Type Application type of the file system. Preset application types
are provided for typical applications. In file service scenarios,
possible options are NAS_Default, NAS_Virtual_Machine,
NAS_Database, NAS_Large_File, Office_Automation, and
NAS_EDA.
NOTE
● The Application Request Size and File System Distribution
Algorithm parameters are set for preset application types. The
value of Application Request Size is 16 KB for NAS_Default,
NAS_Virtual_Machine, Office_Automation, and NAS_EDA, 8
KB for NAS_Database, and 32 KB for NAS_Large_File. If
Application Type is set to NAS_Default, NAS_Large_File,
Office_Automation, or NAS_EDA, File System Distribution
Algorithm is Directory balance mode. In this mode, directories
are evenly allocated to each controller by quantity. If
Application Type is set to NAS_Virtual_Machine or
NAS_Database, File System Distribution Algorithm is
Performance mode. In this mode, directories are preferentially
allocated to the controller to which the shared IP address
belongs, improving access performance of directories and files.
● When SmartCompression and SmartDedupe licenses are
imported to the system, the preset application types also display
whether SmartCompression and SmartDedupe are enabled. For
details, see SmartDedupe and SmartCompression Feature Guide
for File of the desired product model and version.
● Application Type cannot be changed once being configured.
You are advised to set the value based on the service I/O model.
● To create an application type, run the create workload_type
general name=? io_size=? command. For details, visit
Command/Event/Error Code Query.
● You can also run the create file_system general or change
file_system general command to create or modify a file system
respectively. For details, visit Command/Event/Error Code
Query.
Step 5 If a HyperMetro vStore pair has been created for the vStore, you need to configure
a HyperMetro pair for the newly created file system.
Specify Remote Storage Pool for creating a remote file system. The system will
create a remote file system on the remote device of the HyperMetro vStore pair
and add the local and remote file systems to a HyperMetro pair.
For details about HyperMetro, see the HyperMetro Feature Guide for File of the
desired version.
Step 6 Configure shares for the file system.
● Set NFS shares for the file system.
a. Enable NFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The system presets the read and write permissions of all clients. You
can click Modify on the right of Share to modify the share
information.
● Set CIFS shares for the file system.
a. Enable CIFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The system presets the full control permission for everyone. You can
click Modify on the right of Share to modify the share information.
Step 7 Set a quota for the file system.
NOTE
1. Enable Quota.
NOTE
– Directory quota
The directory quota of a file system limits the space usage or file quantity
used by all dtrees in the file system.
NOTE
The directory quota of a file system takes effect only for dtrees whose quota
function is enabled. In addition, the quota of each dtree is limited separately.
– User quota
User quota: limits the space usage or file quantity used by a single user.
i. Click Select.
The Select User page is displayed.
ii. Select the users for which you want to create a quota.
○ If you select All users, the quota limits the space usage or file
quantity of each user in the system.
○ If you select Specified users, click Add. On the Add User page
that is displayed, select the UNIX Users or Windows Users tab,
and select one or more desired users. Then click OK.
NOTE
If you set User Type to Local authentication user, select the desired
users in the list below.
If you set User Type to LDAP domain user, NIS domain user, or AD
domain user, enter the user names in the Name text box.
To remove added users, click Remove on the right of a desired user, or
select one or more desired users and click Remove.
○ If you select Specified user groups, the quota limits the space
usage or file quantity of each specified user group. To add a user
group, click Add. On the Add User Group page that is displayed,
select a user group type and select the desired user groups. Then
click OK.
NOTE
○ If you select All user groups, the quota limits the space usage
or file quantity of each user group in the system.
○ If you select Specified user groups, the quota limits the space
usage or file quantity of each specified user group. To add a user
group, click Add. On the Add User Group page that is displayed,
select a user group type and select the desired user groups. Then
click OK.
NOTE
Hard Quota Space hard quota. If the quota is reached, the system
immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be larger than that of Soft Quota.
Soft Quota Space soft quota. If the quota is reached, the system
generates an alarm but still allows writes. After the hard
quota is reached, the system immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be smaller than that of Hard Quota.
Parameter Description
Hard Quota File quantity hard quota. If the quota is reached, new
files cannot be added. Operations on existing files are
not affected.
[Value range]
1 file to 2 billion files
The value must be larger than that of Soft Quota.
Soft Quota File quantity soft quota. If the quota is reached, the
system generates an alarm but new files can still be
added. After the hard quota is reached, new files cannot
be added.
[Value range]
1 file to 2 billion files
The value must be smaller than that of Hard Quota.
NOTE
– If you do not set the space quota or file quantity quota, the storage system only
collects statistics on but does not control the space usage or file quantity. To view
the statistics about used space quota and used file quantity quota, choose Services
> File Service > Quotas > Quota Reports, and select the desired file system.
– To modify a quota, click More on the right of the quota and select Modify.
– To delete a quota, select the quota and click Delete above the list or click More on
the right of the quota.
– The parameters for creating a quota are preset. A quota is created for a file system
only after the file system has been created.
NOTE
Step 9 Select Advanced in the upper right corner and set the audit log items of the file
system. The system records audit logs of operations on the file system. The audit
log items include Create, Delete, Read, Write, Open, Close, Rename, List
folders, Obtain properties, Set properties, Obtain security properties, Set
security properties, Obtain extension properties, and Set extension properties.
NOTE
To ensure that the selected audit log items take effect, choose Settings > File Service >
Audit Log to enable the audit log function.
Atime Update Indicates the Atime update frequency. The options can be
Frequency Hourly and Daily.
Step 11 Set the Write Once Read Many (WORM) properties of the file system. The WORM
file system ensures that a file enters the protected state after being written. In this
case, the file cannot be modified, moved, or deleted, but can be read for multiple
times.
NOTE
The WORM properties are hidden. To display hidden parameters, click Advanced.
Parameter Description
Parameter Description
Lockout Wait Indicates the wait time before a file automatically enters the
Time locked state. This parameter is displayed only when
Automatic Lockout is enabled.
[Value range]
1 minute to 10 years.
[Default value]
If Automatic Lockout is enabled, the default value is 2
hours.
WORM Audit Log After the WORM audit log file system is enabled, the system
File System records operation logs of the WORM file system, including
Add a litigation, Remove a litigation, and privileged
deletion of Enterprise WORM file systems.
NOTE
This parameter is available only when Mode is set to Regulatory
compliance.
[Default value]
Disabled
NOTE
After the task is created successfully, the Execution Result page is displayed. You can view
details about the current task on this page.
----End
Prerequisites
You have created a file system.
Procedure
Step 1 Choose Services > File Service > Dtrees.
Step 2 Click Create.
The Create Dtree page is displayed on the right.
NOTE
The screenshot is for reference only and the actual GUI may vary.
Parameter Description
Parameter Description
Parameter Description
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default UNIX user must be an existing local
authentication user or NIS/LDAP domain user.
– In this mode, the default UNIX permission of the file system
root directory is 755. To change the value, run the change
file_system general file_system_id=? unix_permissions=?
command. For details about the command, visit Command/
Event/Error Code Query.
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file or
directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
● This parameter is available only when Security Style is set to
Native.
● Only 6.1.5 and later versions support this parameter.
----End
Prerequisites
● You have created a dtree in a file system.
● When creating a quota for a specified user or user group, the user or user
group has been created.
Procedure
Step 1 Choose Services > File Service > Quotas > Custom Quotas.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
Step 3 Select the file system and dtree for which you want to create a quota.
NOTE
When the Dtree parameter is blank, the created user or user group quota takes effect for
the file system and the directory quota takes effect for all dtrees in the file system.
Step 4 Select a quota type. Possible options are Directory quota, User quota, and User
group quota.
● Directory quota
● User quota
a. Click Select.
The Select User page is displayed.
b. Select the users for which you want to create a quota.
▪ If you select All users, the quota controls the space usage or file
quantity of each user in the system.
▪ If you select Specified users, click Add. On the Add User page that
is displayed, select the UNIX Users or Windows Users tab, and
select one or more desired users. Then, click OK.
NOTE
○ If you set User Type to Local authentication user, select the users to be
added in the list below.
○ If you set User Type to LDAP domain user, NIS domain user, or AD
domain user, enter the user names in the Name text box.
○ If you set User Type to LDAP domain user, the system automatically
detects whether the LDAP domain has been configured. If no LDAP
domain is configured, the system prompts you to configure an LDAP
domain first.
○ If you set User Type to NIS domain user, the system automatically
detects whether the NIS domain has been configured. If no NIS domain
is configured, the system prompts you to configure an NIS domain first.
○ If you set User Type to AD domain user, the system automatically
detects whether the AD domain has been configured. If no AD domain is
configured, the system prompts you to configure an AD domain first.
○ To remove added users, click Remove on the right of a desired user, or
select one or more desired users and click Remove.
▪ If you select Specified user groups, the quota controls the space
usage or file quantity of each user in specified user groups. Click
Add. On the Add User Group page that is displayed, select a user
group type and select the desired user groups. Then, click OK.
NOTE
○ If you set User Group Type to Local authentication user group, select
the user groups to be added in the list below.
○ If you set User Group Type to LDAP domain user group or NIS domain
user group, enter the user group names in the Name text box.
○ If you set User Group Type to LDAP domain user group, the system
automatically detects whether the LDAP domain has been configured. If
no LDAP domain is configured, the system prompts you to configure an
LDAP domain first.
○ If you set User Group Type to NIS domain user group, the system
automatically detects whether the NIS domain has been configured. If
no NIS domain is configured, the system prompts you to configure an
NIS domain first.
○ To remove added user groups, click Remove on the right of a desired
user group, or select one or more desired user groups and click Remove.
c. Click OK.
● User group quota
a. Click Select.
The Select User Group page is displayed.
b. Select the user groups for which you want to create a quota.
▪ If you select All user groups, the quota controls the space usage or
file quantity of all user groups in the system.
▪ If you select Specified user groups, the quota controls the space
usage or file quantity of each specified user group. Click Add. On the
Add User Group page that is displayed, select a user group type and
select the desired user groups. Then, click OK.
NOTE
○ If you set User Group Type to Local authentication user group, select
the user groups to be added in the list below.
○ If you set User Group Type to LDAP domain user group or NIS domain
user group, enter the user group names in the Name text box.
○ If you set User Group Type to LDAP domain user group, the system
automatically detects whether the LDAP domain has been configured. If
no LDAP domain is configured, the system prompts you to configure an
LDAP domain first.
○ If you set User Group Type to NIS domain user group, the system
automatically detects whether the NIS domain has been configured. If
no NIS domain is configured, the system prompts you to configure an
NIS domain first.
○ To remove added user groups, click Remove on the right of a desired
user group, or select one or more desired user groups and click Remove.
c. Click OK.
Step 5 Set space quotas.
Table 2-52 describes the parameters.
Hard Quota Space hard quota. If the quota is reached, the system
immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be larger than that of Soft Quota.
Soft Quota Space soft quota. If the quota is reached, the system
generates an alarm but still allows writes. After the hard
quota is reached, the system immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be smaller than that of Hard Quota.
Parameter Description
Hard Quota File quantity hard quota. If the quota is reached, new files
cannot be added. However, operations on existing files are
not affected.
[Value range]
1 to 2 billion
The value must be larger than that of Soft Quota.
Soft Quota File quantity soft quota. If the quota is reached, the system
generates an alarm but new files can still be added. After
the hard quota is reached, new files cannot be added.
[Value range]
1 to 2 billion
The value must be smaller than that of Hard Quota.
NOTE
If you do not set the space quota or file quantity quota, the storage system only collects
statistics on but does not control the space usage or file quantity. To view the statistics
about used space quota and used file quantity quota, choose Services > File Service >
Quotas > Quota Reports, and select the desired file system.
----End
NFS
Network File System (NFS) is a file sharing protocol developed by Sun and now
hosted by Internet Engineering Task Force (IETF). It applies to file system sharing
in Linux, Unix, Mac OS, and VMware operating systems.
CIFS
Common Internet File System (CIFS) is a file sharing protocol developed by
Microsoft and primarily used in Windows environments. The shares using CIFS
include CIFS shares and Homedir shares.
● A CIFS share is to share a file system or its quota tree among authentication
users, including local and domain authentication users. The users have the
permissions granted by the storage system on the CIFS share.
● Homedir shares are a type of CIFS shares. A Homedir share is to share a file
system to a specific user as an exclusive directory. The user can only access
the exclusive directory named after its user name.
Start
Prepare data.
Prepare data.
Enable NFSv4.
Configure NFSv4 to be
Add the storage Add the storage compatible with non-
system to an LDAP system to an NIS domain environments.
domain. domain.
End
Optional Mandator
y
● Logical IP address
Logical IP address used by a storage system to provide shared space for
clients.
● File system
File system shared through the NFS share.
● LDAP or NIS domain information
● Permission
The permissions include read-only and read-write.
– Read-only: Clients have the read-only permission for the NFS share.
– Read-write: Clients have the read and write permissions for the NFS
share.
NOTE
o Organization
ou Organization unit
c Country name
dc Domain component
sn Surname
cn Common name
What Is OpenLDAP?
OpenLDAP is an open implementation of LDAP that is now widely used in various
popular Linux releases.
OpenLDAP consists of the following components:
● slapd: an independent LDAP daemon
● slurpd: an independent LDAP update and replication daemon
● Libraries implementing LDAP
● Tool software and illustration client
The OpenLDAP website does not provide OpenLDAP installation packages for
Windows. You can obtain OpenLDAP installation packages for the following
Windows operating systems from the Userbooster website: Windows XP, Windows
Server 2003, Windows Server 2008, Windows Vista, Windows 7, Windows 8, and
Windows Server 2012.
rootpw XXXXXXXXXXXX
– dc=example,dc=com maps to Base DN on the storage system
configuration page.
– cn=Manager,dc=example,dc=com maps to Bind DN on the storage
system configuration page.
– XXXXXXXXXXXX maps to Bind Password on the storage system
configuration page. If the password is in ciphertext, contact LDAP server
administrators to obtain the password.
4. Find configuration files (.ldif files) of the users and user groups that need to
access the storage system.
NOTE
LDAP Interchange Format (LDIF) is one of the most common file formats for LDAP
applications. It is a standard mechanism that represents directories in the text format.
It allows users to import data to and export data from the directory server. LDIF files
store LDAP configurations and directory contents, and therefore can provide you with
related information.
5. Use text editing software to open the configuration file and find the DNs of a
user and a user group that correspond to User Directory and Group
Directory respectively on the storage system configuration page.
#root on the top
dn: dc=example,dc=com
dc: example
objectClass: domain
objectClass: top
#First organization unit name: user
dn: ou=user,dc=example,dc=com
ou: user
objectClass: organizationalUnit
objectClass: top
#Second organization unit name: groups
dn: ou=group,dc=example,dc=com
ou: group
objectClass: organizationalUnit
objectClass: top
#The first user represents user1 that belongs to organization unit user in the organizational structure
topology.
dn: cn=user1,ou=user,dc=example,dc=com
cn: user1
objectClass: posixAccount
objectClass: shadowAccount
objectClass: inetOrgPerson
sn: user1
uid: user1
uidNumber: 2882
gidNumber: 888
homeDirectory: /export/home/ldapuser
loginShell: /bin/bash
userPassword: {ssha}eoWxtWNl8YbqsulnwFwKMw90Cx5BSU9DRA==xxxxxx
#The second user represents user2 that belongs to organization unit user in the organizational
structure topology.
dn: cn=user2,ou=user,dc=example,dc=com
cn: user2
objectClass: posixAccount
objectClass: shadowAccount
objectClass: inetOrgPerson
sn: client
uid: client
uidNumber: 2883
gidNumber: 888
homeDirectory: /export/home/client
loginShell: /bin/bash
userPassword: {ssha}eoWxtWNl8YbqsulnwFwKMw90Cx5BSU9DRA==xxxxxx
#The first user group represents group1 that belongs to organization unit group in the organizational
structure topology. The group contains user1 and user2.
dn: cn=group1,ou=group,dc=example,dc=com
cn: group1
gidNumber: 888
memberUid: user1#Belongs to the group.
memberUid: user2#Belongs to the group.
objectClass: posixGroup
3. Run the ls command to view the system configuration file slapd.conf and the
configuration files (.ldif files) of the users and user groups who want to
access the storage system.
linux-ldap:/etc/openldap #ls
example.ldif ldap.conf schema slap.conf slap.con slapd.conf
4. Run the cat command to open the system configuration file slapd.conf where
you can view related parameters.
linux-ldap:/etc/openldap #cat slapd.conf
suffix "dc=example,dc=com"
rootdn "cn=Manager,dc=example,dc=com"
rootpw XXXXXXXXXXXX
Prerequisites
● An LDAP domain has been set up.
● You have prepared the data required for configuring an NFS share.
NOTE
● The storage systems can connect to an LDAP server through management network
ports or service network ports (logical ports). If a storage system connects to an
LDAP server through management network ports, ensure that the management
network ports on at least two controllers can properly communicate with the LDAP
server. If a storage system connects to an LDAP server through service network
ports, it is recommended that the service network ports on at least two controllers
can properly communicate with the LDAP server. It is recommended that storage
systems connect to LDAP servers through service network ports.
● A storage system can connect to only one LDAP server.
● An LDAP server with high performance is recommended. This prevents issues such
as I/O latency increase when the storage system sends a large number of
concurrent query requests to the LDAP server.
Precautions
● You are advised to use physical isolation and end-to-end encryption to ensure
security of data transfer between the LDAP domain server and clients.
● You are advised to configure a static IP address for the LDAP server. If a
dynamic IP address is configured, security risks may exist.
● In the following scenario (the three situations occurred in sequence), use
clear nfs nfsv4_idmap_cache controller=? to clear the IDMAP cache of all
controllers:
a. First, the storage system had not been added to an LDAP domain or had
not been correctly added to an LDAP domain.
b. Then, an LDAP domain user of the host accessed the shared space of the
storage system through the NFSv4.0 or NFSv4.1 protocol.
c. Finally, the storage system has been correctly added to an LDAP domain.
The following figure shows the relationship between an NIS server and other
hosts.
Working Principles
When NIS is configured, the ASCII files in the NIS domain are converted to NIS
database files (or mapping table files). Hosts in the NIS domain query and parse
the NIS database files to perform operations such as authorized access and
updates. For example, common password file /etc/passwd of a UNIX host is
converted to the following NIS database files:
Data Preparation
Collect Domain Name, Primary Server Address, Standby Server Address 1
(Optional), and Standby Server Address 2 (Optional). For details about how to
Prerequisites
● An NIS domain has been set up.
● You have prepared the data required for configuring an NFS share.
NOTE
● The storage systems can connect to an NIS server through management network
ports or service network ports (logical ports). If a storage system connects to an
NIS server through management network ports, ensure that the management
network ports on at least two controllers can properly communicate with the NIS
server. If a storage system connects to an NIS server through service network ports,
it is recommended that the service network ports on at least two controllers can
properly communicate with the NIS server. It is recommended that storage systems
connect to NIS servers through service network ports.
● A storage system can connect to only one NIS server.
Precautions
● You are advised to use physical isolation and end-to-end encryption to ensure
security of data transfer between the NIS domain server and clients.
● In the following scenario (the three situations occurred in sequence), use
clear nfs nfsv4_idmap_cache controller=? to clear the IDMAP cache of all
controllers:
a. First, the storage system had not been added to an NIS domain or had
not been correctly added to an NIS domain.
b. Then, an NIS domain user of the host accessed the shared space of the
storage system through the NFSv4.0 or NFSv4.1 protocol.
c. Finally, the storage system has been correctly added to an NIS domain.
Background
According to the NFSv4 standard protocol, the NFSv4 service can be used only in a
domain environment to ensure proper running. To use the NFSv4 service in a non-
domain environment, configure the user name@domain name mapping
mechanism used by the NFSv4 service on your client. Then, the NFSv4 service will
use UIDs and GIDs to transfer owner and group information about files during
service transactions between your storage system and client.
The storage system supports NFSv4.1 in 6.1.2 and later versions, and NFSv4.0 in
6.1.3 and later versions.
Risks
● In scenarios where the NFSv4 service is used in a non-domain environment,
the user authentication method of the NFSv4 service is the same as that of
the NFSv3 service. The method cannot meet the theoretical security
requirements of the NFSv4 standard protocol.
● Users mapped by each client depend on the configuration files of client users
and user groups. The configuration file of each user and user group must be
independently maintained for proper mapping.
● UIDs and GIDs must be used when ACLs are configured for non-root users
and non-root user groups. Otherwise, the configuration will fail.
● The NFSv4 service is not recommended in a non-domain environment. If
operations in Configuration on Clients are not performed, executing the
chown command may fail.
Configuration on Clients
Step 1 Run the echo 1 > /sys/module/nfs/parameters/nfs4_disable_idmapping
command.
Step 2 Run the cat /sys/module/nfs/parameters/nfs4_disable_idmapping command. If
Y is displayed in the command output, the NFSv4 service is successfully
configured.
NOTICE
If you have used the NFSv4 service to mount NFS shares before configuring the
NFSv4 service for a non-domain environment, mount the NFS shares again after
configuring the NFSv4 service.
----End
Prerequisites
You have obtained required data for configuring an NFS share.
Procedure
Step 1 Choose Services > File Service > Shares > NFS Shares.
Step 2 On the NFS Shares tab page, click Create.
The Create NFS Share page is displayed on the right.
NOTE
The screenshot is for reference only and the actual GUI may vary.
File System File system for which you want to create an NFS share.
NOTE
When global root directory / is selected for File System, you can
create an NFS global namespace (GNS) share.
● Each vStore can only create one GNS.
● An independent share must be added for a file system. After the
share is added, this file system will not be displayed if a host is
only authorized to access / but not the file system.
● GNS root directory / is read-only. You cannot create, modify, and
delete directories or files under / and you cannot modify
directory attributes of /. Once the directory of a file system is
entered, the permission will be changed to the share permission
of the file system.
● If no GNS is created, root directory / cannot be mounted to an
NFSv3 client. Only shared file systems can be viewed when / is
mounted to an NFSv4 client.
● When creating an NFS GNS share, you can only set the
description for the share.
● If you want to create a HyperMetro or HyperReplication vStore
pair and a GNS has been created for the primary vStore, the
version of the secondary storage system must be the same as
that of the primary storage system. If a vStore pair has been
created, you can create a GNS share only when the versions of
the primary and secondary storage systems are the same and
support GNSs.
[Example]
FileSystem001
NOTICE
If the selected file system is the secondary storage system in a
remote replication pair or remote storage system in a HyperMetro
pair, data in the file system is probably being modified when it is
accessed. Before performing this operation, confirm that the
application allows possible data inconsistency.
Dtree Dtree for which you want to create an NFS share. If you do
not select a dtree, the NFS share is created for the entire file
system.
[Example]
Dtree_test
Share Path Share path of the file system, which is generated based on
the File System and Dtree parameters.
[Example]
/Filesystem001/Dtree_test
Parameter Description
Parameter Description
● HR
Croatian character set, in compliance with ISO 8859-2
● HU
Hungarian character set, in compliance with ISO 8859-2
● NO
Norwegian character set, in compliance with ISO 8859-1
● NL
Dutch character set, in compliance with ISO 8859-1
● PL
Polish character set, in compliance with ISO 8859-2
● RO
Romanian character set, in compliance with ISO 8859-2
● RU
Russian character set, in compliance with ISO 8859-5
● SK
Slovak character set, in compliance with ISO 8859-2
● SL
Slovenian character set, in compliance with ISO 8859-2
● SV
Swedish character set, in compliance with ISO 8859-1
● TR
Turkish character set, in compliance with ISO 8859-9
● EN-US
English character set, in compliance with ISO 8859-1
NOTE
Method of querying character encoding on clients (for example, in
Linux): Run the locale command to view character encoding of the
current system.
Show Snapshot This function allows clients to show and traverse snapshot
directories.
NOTE
Description, Character Encoding, and Show Snapshot are hidden parameters. You can
click Advanced to display them.
NOTE
● When Type is set to Host, the system automatically detects whether the LDAP domain,
NIS domain, or DNS has been configured. To add a client by specifying the host name,
configure at least one of them.
● When Type is set to Network group, the system automatically detects whether the
LDAP domain or NIS domain has been configured. You must configure at least one of
them.
● You can click More on the right of a client and select Modify to modify its information.
● You can select one or more clients and click Remove, or click More on the right of a
client and select Remove, to remove clients.
----End
Prerequisites
● You have obtained required data for configuring an NFS share.
● You have created a host name available on the DNS if you need to add a
client whose Type is Host.
● You have created a network group name available on the LDAP or NIS server
if you need to add a client whose Type is Network group.
● If Share Path is set to global root directory /, you cannot add a client.
Procedure
Step 1 Choose Services > File Service > Shares > NFS Shares.
Step 2 Click More on the right of the desired NFS share and select Add Client.
The Add Client page is displayed.
NOTE
Parameter Description
Clients When Type is set to Host, enter client host names (FQDNs
are recommended), IP addresses, or IP address segments, or
use the asterisk (*) to represent IP addresses of all clients.
When Type is set to Network group, enter the network
group names configured in the LDAP or NIS domain.
NOTE
● When Type is set to Host, the system automatically detects
whether the LDAP domain, NIS domain, or DNS has been
configured. To add a client by specifying the host name,
configure at least one of them.
● When Type is set to Network group, the system automatically
detects whether the LDAP domain or NIS domain has been
configured. You must configure at least one of them.
[Value range]
You can enter multiple host names, IP addresses, or network
group names of the clients separated by semicolons (;),
spaces, or carriage returns.
For host names:
● A host name contains 1 to 255 characters and cannot
contain spaces.
● A host name cannot start with a hyphen (-).
For IP addresses:
● You can enter client IP addresses, client IP address
segments, or an asterisk (*) to represent IP addresses of
all clients.
● IPv4 addresses, IPv6 addresses, or the combination of
IPv4 and IPv6 addresses are supported.
● The mask of an IPv4 address ranges from 1 to 32. The
prefix of an IPv6 address ranges from 1 to 128.
A network group name:
● Contains 1 to 254 characters.
● The value can contain only letters, digits, underscores (_),
periods (.), and hyphens (-).
UNIX Permission Indicates the permission level for the UNIX client to access
the NFS share. Possible options are:
● Read-only: The clients can only read files in the NFS
share.
● Read-write: The clients can read and write files in the
NFS share.
● None: No operation is allowed on the NFS share.
Parameter Description
Step 4 Set advanced client parameters. Select Advanced in the upper right corner.
Table 2-57 describes the parameters.
Context
● The storage system supports NFSv3, NFSv4.0, and NFSv4.1.
NOTE
Precautions
When a file system is mounted using NFSv4.0 or NFSv4.1, ensure that the same
domain name is configured for both the host and storage. (Generally, the default
domain name is localdomain on both the host and storage device.) Otherwise,
when files created by a host user are queried on the storage, the information
about the user and group to which the files belong is incorrectly displayed. For
example, user root is displayed as nobody on the storage.
● On the host, query the domain name in the configuration file of the idmapd
service. For example, in the SUSE operating system, you can run the vi /etc/
idmapd.conf command to query or edit the value of Domain.
● On the storage, run the change vstore view id=? command to enter the
vStore view. You can run the show vstore command to query the value of id.
Then run the show service nfs_config command in developer mode to query
the domain name. The default domain name is localdomain. To change the
domain name on the storage, run the change service nfs_config
domain_name=? command.
NOTE
/nfstest in the output represents the share path of the NFS share created in the storage
system. If a GNS is created, / will be displayed.
NOTE
● If the client uses NFSv4.1 to mount an NFS share, you are advised to specify the
minorversion parameter. For a SUSE client, run the following command (commands for
other operating systems are similar):
mount -t nfs -o vers=4,minorversion=1,proto=tcp,rsize=262144,wsize=262144,hard,intr,timeo=50
192.168.50.16:/nfstest /mnt
● To mount a GNS, run the following command:
#mount -t nfs -o vers=3,proto=tcp,rsize=262144,wsize=262144,hard,intr,timeo=50
192.168.50.16:/ /mnt
Table 2-58 Parameters for mounting an NFS share to a SUSE, Red Hat, or Ubuntu
client
NOTE
In the preceding table, vers is mandatory, and other parameters are optional. You are
advised to use the recommended parameter settings.
Step 4 Run the mount command to verify that the NFS share has been mounted to the
local computer.
#mount
192.168.50.16:/nfstest on /mnt type nfs
(rw,vers=3,proto=tcp,rsize=262144,wsize=262144,hard,intr,timeo=50,addr=192.168.50.16)
NOTE
When the preceding information is displayed, the NFS share has been successfully
mounted to the local computer.
----End
Debian Client
Step 1 Log in to the client as user root.
Step 2 On the client, run the apt-get install nfs-common command to install the nfs-
common software package.
Step 3 Run the showmount -e ipaddress command to view available NFS shares in the
storage system.
NOTE
/nfstest in the output represents the share path of the NFS share created in the storage
system. If a GNS is created, / will be displayed.
Step 4 Run the mkdir /mnt/share command to create a directory on the client to mount
an NFS share.
sharepath represents the Share Path of the NFS share created in the storage
system.
mount 192.168.50.16:/nfstest /mnt/share
NOTE
Step 6 Run the df -hT command to verify that the NFS share has been successfully
mounted to the local computer.
----End
Step 2 Run the showmount -e ipaddress command to view available NFS shares in the
storage system.
NOTE
/nfstest in the output represents the share path of the NFS share created in the storage
system. If a GNS is created, / will be displayed.
Step 3 Run the mount [-F nfs|-f nfs] -o vers=n,proto=m ipaddress:sharepath /mnt
command to mount an NFS share. Table 2-59 describes the related parameters.
sharepath is the share path of the NFS share created in the storage system.
#mount -f nfs -o vers=3,proto=tcp 192.168.50.16:/nfstest /mnt
NOTE
Table 2-59 Parameters for mounting an NFS share to an HP-UX or a SUN Solaris
client
NOTE
In the preceding table, vers is mandatory, and other parameters are optional. You are
advised to use the recommended parameter settings.
Step 4 Run the mount command to verify that the NFS share has been mounted to the
local computer.
#mount
192.168.50.16:/nfstest on /mnt type nfs (rw,vers=3,proto=tcp,addr=192.168.50.16)
NOTE
When the preceding information is displayed, the NFS share has been successfully
mounted to the local computer.
----End
Step 2 Run showmount -e ipaddress to view available NFS shares in the storage system.
NOTE
/nfstest in the output represents the share path of the NFS share created in the storage
system. If a GNS is created, / will be displayed.
Step 3 Run the mount ipaddress:sharepath /mnt command to mount an NFS share.
sharepath represents the Share Path of the NFS share created in the storage
system.
#mount 192.168.50.16:/nfstest /mnt
mount: 1831-008 giving up on:
192.168.50.16:/nfstest
Vmount: Operation not permitted.
#
NOTE
Step 4 Run the mount command to verify that the NFS share has been mounted to the
local computer.
#mount
192.168.50.16:/nfstest on /mnt type nfs (rw,addr=192.168.50.16)
NOTE
When the preceding information is displayed, the NFS share has been successfully
mounted to the local computer.
----End
VMware Client
NOTE
When you want to create VMs on an NFS share, Root Permission Constraint of the NFS
share must be no_root_squash.
● vSphere Client
NOTE
Step 2 Select the desired host from the left navigation tree.
Step 4 In Select Storage Type, select Network File System and click Next.
Step 5 Set the related parameters. Table 2-60 describes related parameters.
Step 8 On the Configuration tab page, view the newly added NFS share.
----End
Step 3 On the Select creation type page, select Mount NFS datastore and click Next.
Parameter Description
NFS server Name of the NFS server, which can be the IP address of
the logical port or DNS name.
----End
Follow-up Procedure
If you modify NFS user information, new user authentication information takes
effect after 30 minutes.
Start
Prepare data.
AccessAdd
thean NFS share
shared space.
client.
End
Optional Mandator
y
Context
A system has nine local authentication user groups that are automatically created.
The nine user groups are reserved for the system and cannot be modified or
deleted:
An access control list (ACL) is a collection of permissions that are authorized to users or
user groups to operate shared files. ACL permissions are classified into ACL storage
permissions and ACL authentication permissions. After a user logs in to a share, the system
determines the user's permissions on the share, reads the ACL permissions, and then
determines whether the user can read and write files. For ACL storage permissions, each
ACL permission is called an Access Control Entry (ACE). After a share is mounted to a
Windows client, the client sends NT ACLs to the server (storage system that provides the
share).
Procedure
Step 1 Choose Services > File Service > Authentication Users > Windows Users > Local
Authentication User Groups.
The Create Local Windows Authentication User Group page is displayed on the
right.
Step 3 Set basic parameters for the local authentication user group.
Parameter Description
Step 4 Select privileges for the local authentication user group. You can view details
about the privileges in the description.
----End
Procedure
Step 1 Choose Services > File Service > Authentication Users > Windows Users > Local
Authentication Users.
The Create Local Windows Authentication User page is displayed on the right.
Parameter Description
Parameter Description
Owning Groups Groups to which the local authentication user belongs. Click
on the right of Owning Groups. In the Available Groups
list, select the desired groups and add them to Selected
Groups.
NOTE
You cannot configure privileges for local authentication users separately on DeviceManager.
Instead, you can configure privileges for local authentication users on the CLI.
----End
Why AD Domains?
In Windows shared mode, every device that provides shares is an independent
node. The account and permission information about users allowed to access
shares are stored on each node. As a result, the information maintenance is
complex and uncontrollable.
If an AD domain is used, the domain controller manages all the user configuration
information and authenticates the access to the domain. The domain controller
incorporates a database that stores information about the domain account,
password, and nodes in the domain. A user can access all the shared content in
the domain after passing the authentication by the domain controller.
Working Principles
1. The DNS server provides a full domain name (123.com for example) for the
AD domain.
2. The storage system is added into the AD domain and provides share services.
3. Users can access shares after logging in to hosts in the AD domain using
domain accounts.
Data Preparation
To smoothly add a storage system to an AD domain, prepare or plan the required
data based on the site requirements. Collect Domain Administrator, Password,
Full Domain Name, Organization Unit (optional), and System Name. For details
about how to obtain the data, see 2.8.4.2.7 (Optional) Configuring AD Domain
Authentication Parameters.
Prerequisites
● A DNS server has been configured and is running properly.
● Port 53 for the TCP/UDP protocol between the storage system and the DNS
server is enabled.
● The latency of the network between the DNS server and the storage system is
less than or equal to the configured latency (200 ms by default).
Context
● A DNS server is used to resolve and access external domain name addresses.
● If you want to configure a standby DNS server, keep the domain names of the
active and standby servers consistent.
Procedure
Step 1 Choose Settings > File Service > DNS Service.
Step 2 Click Configure in the upper right corner and configure the DNS service.
Set Standby DNS IP Address 1 first and then Standby DNS IP Address 2.
Step 6 (Optional) Test the connection between the DNS server and the storage system.
● You can click Test next to a DNS IP address to test its availability.
● You can click Test All to test the connection between the DNS server and the
storage system.
Step 7 Click OK.
----End
Prerequisites
● An AD domain has been set up.
● The storage system has been connected to the DNS server.
● The AD domain server and DNS server have time synchronization with the
storage system. The time difference must be no larger than 5 minutes.
● Ports 88 (TCP/UDP protocol), 389 (TCP/UDP protocol), 445 (TCP protocol),
and 464 (TCP/UDP protocol) are enabled between the storage system and the
AD domain.
NOTE
The storage systems can connect to AD domain servers and DNS servers through
management network ports or service network ports (logical ports). If a storage system
connects to an AD domain server and DNS server through management network ports,
ensure that the management network ports on at least two controllers can properly
communicate with the AD domain server and DNS server. If a storage system connects to
the AD domain server and DNS server through service network ports, it is recommended
that the service network ports on at least two controllers can properly communicate with
the AD domain server and DNS server. It is recommended that storage systems connect to
AD domain servers through service network ports.
Precautions
● Before adding a storage system to an AD domain, ensure that the primary
controller of the storage system is connected to the DNS server and AD
domain server.
● When Overwrite System Name is enabled, if a system name entered exists in
the AD domain controller, the information about the current storage system
will overwrite the information about the storage system corresponding to the
system name on the AD domain controller.
● A simple password may result in security issues. A complex password that
contains uppercase letters, lowercase letters, digits, and special characters is
recommended.
● You are advised to use physical isolation and end-to-end encryption to ensure
security of data transfer between the AD domain server and clients.
Procedure
Step 1 Choose Services > File Service > Shares > CIFS Shares.
Step 2 Click Create.
The Create CIFS Share page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets the File System and Share Name parameters based on recommendations when
you create a CIFS share. You can directly use the parameters or modify them as required.
Parameter Description
File System File system for which you want to create a CIFS share.
NOTE
If the selected file system is the secondary storage system in a
remote replication pair or remote storage system in a HyperMetro
pair, data in the file system is probably being modified when it is
accessed. Before performing this operation, confirm that the
application allows possible data inconsistency.
[Example]
Filesystem001
Dtree Dtree for which you want to create a CIFS share. If you do
not select a dtree, the CIFS share is created for the entire file
system.
[Example]
Dtree_test
Share Name Name of the share, which is used by users to access shared
resources.
[Value range]
● The name must be unique.
● The name cannot contain characters " / \ [ ] : | < > + ; , ?
* =, and cannot be ipc$, autohome, ~, or print$ reserved
by the system.
● The name contains 1 to 80 characters.
[Example]
share_for_user1
NOTE
By default, an ADMIN share named c$ is created. The c$ share has
the following characteristics:
● Its share path is the root directory /, and its share permissions
are Administrators full control permissions.
● Each time a vStore is created, a c$ share is automatically created
for this vStore.
● It cannot be deleted. New user permissions cannot be added to
it.
● You can view or modify the attributes of the c$ share. For
example, on the Windows Management Console (MMC), you
can modify the description and offline settings of the c$ share.
● On MMC, you can use the c$ share to browse file systems and
dtrees and directly select a file system or dtree to create a share.
You do not need to manually enter the share path.
Share Path Share path of the file system, which is generated based on
the File System and Dtree parameters.
[Example]
/Filesystem001/Dtree_test
Step 4 Set advanced properties of the CIFS share. Select Advanced in the upper right
corner.
Parameter Description
ABE After ABE is enabled, files and folders that users have no
access permission are not displayed.
NOTE
SMB2 and SMB3 support this function but SMB1 does not.
Show Snapshot This function allows clients to show and traverse snapshot
directories.
Step 5 Select users or user groups that can access the CIFS share.
1. In the Permissions area, click Add.
The Add User or User Group page is displayed.
2. Select the type of the users or user groups.
The value can be Everyone, Local Windows authentication user, Local
Windows authentication user group, AD domain user, or AD domain user
group.
You can click Create to create a local Windows authentication user or local
Windows authentication user group.
– If you select AD domain user or AD domain user group, enter the
names of the users or user groups in Name.
NOTE
Viewing files Xa √b √ √
and
subdirectorie
s
Viewing file X √ √ √
contents
Running X √ √ √
executable
files
Adding files X -c √ √
or
subdirectorie
s
Modifying X - √ √
file contents
Deleting files X - √ √
and
subdirectorie
s
Renaming X - √ √
Changing X - - √
ACL
permissions
of files or
directories
NOTE
– The permission priority from high to low is Forbidden > Full control > Read-write
> Read-only. The highest permission prevails. If a user is granted with a higher
permission than its original one, the new permission takes effect immediately
without re-authentication. For example, the access permission of a user is Read-
only, and then the user is added to a user group whose access permission is Full
control. Therefore, the access permission of the user is changed to Full control
and it can access the CIFS share immediately without re-authentication.
– You can run the change service cifs administrators_privileg=? command on the
CLI to modify permissions of members in the Administrators user group. For
details about the command, see Command Reference of the desired version. In the
command, the value of the administrators_privileg parameter can be admin
(default), default_group, or owner.
For local authentication users whose primary user group is Administrators, users
with different administrators_privileg values have different permissions.
▪ admin: When members in the Administrators user group access a shared file
system in the storage system, they do not need to be authenticated by share-
level ACLs and NT ACLs. They can operate any file in any share with
administrator permissions without the need to be authenticated.
----End
Procedure
Step 1 Choose Map network drive on a Windows client.
The following uses a Windows Server 2012 client as an example.
Open File Explorer and choose Computer > Map network drive > Map network
drive.
NOTE
GUIs may be slightly different for clients running different versions of Windows operating
systems. The actual GUIs prevail.
Step 2 In the displayed Map Network Drive dialog box, configure the network folder you
want to map.
● If you log in as a domain authentication user, enter the domain user name in
the Domain name\Domain user name format and the corresponding
password.
NOTE
After CIFS shares are allocated to domain users, do not modify the domain user
information. If you do, the CIFS shares cannot be accessed.
● If you log in as a local authentication user, enter the user name and password
of the local authentication user.
NOTE
----End
2.9.4.3.1 Overview
This section introduces the user mapping mechanism used during cross-protocol
(CIFS-NFS) share access.
Table 2-67 Permission conversion among UNIX Mode bits and NT ACLs
File Permission Permission Conversion
A file or directory has If an NFS client sends a request to read UNIX Mode bits,
a valid NT ACL. UNIX Mode bits (mapped based on the NT ACL) of the
storage system are returned directly.
● User mappings on NFS clients are cached and expire after four hours by
default. New user mappings and user information changes take effect after
the cached data expires.
User mapping rules specify the mappings among different user accounts. They can
be saved in a local database or managed in an AD domain in a centralized
manner. A user mapping rule includes the mapping type, source user, mapped
user, and mapping priority. If a user matches multiple mapping rules, it is mapped
based on the rule with a higher priority. If the rules have the same priority, the
user is mapped based on the rule that is configured the earliest.
It is not advised to configure the same UID or user name in the local storage system, LDAP
domain, or NIS domain. If the same UID or user name exists, the user mapping results will
not be the expected results.
After user mapping, on an NFS client, the owner information of files or directories
owned by CIFS users (the files or directories that are created by CIFS users or the
owner information of the files or directories are changed to CIFS users) is the
information of the NFS users mapped from CIFS users. If no mapping rules have
been configured for CIFS users, the owner information of the files or directories is
about the IDs (calculated using IDMAP, a hash algorithm) of the CIFS users.
After user mapping, on a CIFS client, the owner information of the files or
directories owned by NFS users (the files or directories that are created by NFS
users or the owner information of the files or directories are changed to NFS
users) is about NFS user names. If NFS users are NIS or LDAP domain users, the
owner information is displayed as UNIXUser\user name.
NOTE
When CIFS users are mapped to NFS users, quota statistics will be collected for the NFS
users or owning user group.
Context
If only IDMU user mappings are used, you do not need to configure user
mappings in the local storage system.
Procedure
Step 1 Choose Services > File Service > Authentication Users > User Mappings.
Step 2 Click Set Mapping Parameter.
The Set Mapping Parameter page is displayed on the right.
Step 3 Enable Mapping Parameters and configure user mapping parameters.
Table 2-68 describes the parameters.
Parameter Description
Map to User with Indicates whether to map to users with the same name.
Same Name After this function is enabled, the system automatically
maps UNIX users and Windows users with the same
name.
Default UNIX User When user mapping is enabled and a Windows user
fails to be mapped, the Windows user will be mapped
to this default UNIX user.
Default Windows When user mapping is enabled and a UNIX user fails to
User be mapped, the UNIX user will be mapped to this
default Windows user.
If the default Windows user is an AD domain user, the
naming format is Domain name\Domain user name.
The AD domain name supports only the NetBIOS name.
You can query the NetBIOS name of a domain by
running the nbtstat -n command on the CLI.
Alternatively, you can right-click the domain on the
Active Directory Users and Computers page, choose
Properties from the shortcut menu, and view the value
of Domain name (pre-Windows 2000) in the dialog
box that is displayed. The value is the NetBIOS name of
the domain.
NOTE
Map to User with Same Name, Default UNIX User, and Default Windows User are
available only when Mapping Mode is set to Support only user mapping of this system,
Preferentially support user mapping in IDMU, or Preferentially support user mapping
of this system. IDMU Search Timeout Duration (s) and IDMU Search DN are available
only when Mapping Mode is set to Support only user mapping in IDMU, Preferentially
support user mapping in IDMU, or Preferentially support user mapping of this system.
----End
NOTE
If Map to User with Same Name is enabled, default user mapping (Default UNIX User or
Default Windows User) is configured, and user mappings are created, you can follow the
following sequence to search for a user mapping: the created user mappings > user
mappings with the same name > the default user mapping.
Procedure
Step 1 Choose Services > File Service > Authentication Users > User Mappings.
Parameter Description
Parameter Description
Step 4 Click Add to Mapping List to add the mapping to the list below.
NOTE
You can set user mapping parameters and click Add to Mapping List to configure multiple
user mappings.
You can also click More on the right of a desired user mapping and select Test.
● Modifying a user mapping
a. Click More on the right of the desired user mapping and select Modify.
The Modify User Mapping page is displayed on the right.
b. Set basic user mapping parameters.
Table 2-69 describes the parameters.
c. Click OK.
● Deleting a user mapping
Select one or more desired user mappings and click Delete.
NOTE
You can also click More on the right of a desired user mapping and select Delete.
----End
Example
● User mapping rule example 1: Map Windows user win_user01 to UNIX user
ux_user01.
Prerequisites
● A Linux client user has the same UID and GID as a local authentication user.
You can query the local authentication user ID and ID of its owning primary
group on the DeviceManager. On the Linux client, you can run the groupadd
-g GID user group name command to create a user group, and then run the
useradd -u UID -g GID user name command to create a user.
● Before you use an AD domain user to configure user mapping rules, the
storage system has been added to the AD domain.
Context
Before users can use an NFS client to access shared files and folders for which NT
ACLs have been configured, the administrator must follow the process as shown in
Figure 2-11 to configure related parameters.
Start
Create a file system. The security mode of the file system is NTFS.
End
Mandatory Optional
Example
Table 2-70 provides an example of data planning during the configuration.
Name: cifs_user1
3. Choose Services > File Service > Authentication Users > UNIX Users > Local
Authentication Users.
Step 4 Create an NFS share and a CIFS share for the same file system.
1. Choose Services > File Service > Shares.
2. Create an NFS share and a CIFS share for the same file system based on
parameters as planned.
Step 7 Use a Windows client to access shared directory share_dir and set permissions of
files under the shared directory.
1. Use a Windows client to access a CIFS share.
2. Under the shared directory, create folder subdir1 and file file1.
This operation is required because Security Style of the file system share_dir in this
example is NTFS and Windows ACLs exist.
Step 9 Use an NFS client to mount the share and access the share as local user
unix_user1.
1. Use an NFS client to mount the NFS share.
2. Run the groupadd -g 100000 unix_group command to create a user group
that has the same GID as the local authentication user group.
3. Run the useradd -u 100001 -g 100000 unix_user1 command to create a user
that has the same UID and GID as the local authentication user.
NOTE
The UID and GID in the command are used as an example only. They vary with site
conditions.
4. Run the su - unix_user1 command to switch users.
5. Write data to folder subdir1.
If the data is written to the folder successfully, the Linux client has a write
permission for the folder.
----End
Prerequisites
The user of the Linux client has the same UID and GID as the local authentication
user.
You can query the local authentication user ID and ID of its owning primary group
on the DeviceManager. On the Linux client, you can run the groupadd -g GID user
group name command to create a user group, and then run the useradd -u UID -
g GID user name command to create a user.
Context
Before users can use a Windows client to access shared files and folders for which
the UNIX permission has been configured, the administrator needs to follow the
process as shown in Figure 2-12 to configure related parameters.
Start
Create a file system. The security mode of the file system is UNIX.
Create a local authentication user. Skip this step if AD domain users access shares.
End
Mandatory Optional
Example
Table 2-71 provides an example of data planning during the configuration.
Name: unix_user2
ID: 100002
Primary group name: unix_group
Primary group ID: 100000
Windows operating systems do not allow a file name to contain special characters.
Therefore, it is recommended that the file name and directory name of an NFS
share do not contain special characters including \:*/?"<>|, and the file name and
directory name do not end with a period (.) or a space. Otherwise, the storage
system converts the file name and directory name to short names (for example,
~PY203).
3. Choose Services > File Service > Authentication Users > UNIX Users > Local
Authentication Users.
4. Click Create to create a local authentication user named unix_user2 as
planned.
Step 4 Create an NFS share and a CIFS share for the same file system.
1. Choose Services > File Service > Shares.
2. Create an NFS share and a CIFS share for the same file system based on
parameters as planned.
Step 5 Configure user mapping parameters.
1. Choose Services > File Service > Authentication Users > User Mappings.
2. Click Set Mapping Parameter and set Mapping Mode to Preferentially
support user mapping of this system.
Step 6 Configure user mapping rules.
1. Choose Services > File Service > Authentication Users > User Mappings.
2. Click Create and configure user mapping rules as planned.
Step 7 Use an NFS client to mount the share and set permissions of files under the
shared directory.
The UID and GID in the command are used as an example only. They vary with site
conditions.
4. Run the su - unix_user2 command to switch users.
5. Create the file1 file and grant the read-only permission.
NOTE
The security style of the file system (share_dir2) on the storage system is UNIX. The
default UNIX permission of the root directory of the file system is 755. Therefore, first
run the change file_system general file_system_id=? unix_permissions=777
command on the storage system to change the UNIX permission to 777.
# touch file1
# chmod 400 file1
Step 8 Use cifs_user2 to access file1 on a Windows client and verify that it has only the
read-only permission.
----End
3 Managing vStores
Context
● After the system supports the SmartMulti-Tenant feature after an upgrade, all
LUNs, file systems, and ports in the original system are allocated to internal
system vStore System_vStore.
● On the vStore management page, you can click to refresh vStore
information.
● On the vStore management page, you can click or next to a parameter
and enter a keyword or select a parameter value to search for the desired
vStores.
● On the vStore management page, you can click to select the vStore
parameters you want to view.
● On the vStore management page, you can click or next to a parameter
to change the display order of vStores.
● On the vStore management page, you can click to export vStore
information to your local PC.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 View information about vStores in the function pane. Table 3-1 describes the
parameters.
ID ID of a vStore.
Audit Log Indicates whether the audit log function is enabled for a
vStore. Audit logs record operations performed for file
systems in a vStore.
NAS Capacity Capacity quota of a vStore. The total file system capacity
Quota of the vStore cannot exceed the quota.
NOTE
● In 6.1.5 and later versions, NAS capacity quotas can be set on
the CLI by using the create vstore general command. For
details about this command, see Command/Event/Error Code
Query.
● In 6.1.6 and later versions, NAS capacity quotas can be set on
DeviceManager.
SAN Capacity Capacity quota of a vStore. The total LUN capacity of the
Quota vStore cannot exceed the quota.
NOTE
In 6.1.7 and later versions, SAN capacity quotas can be set on
DeviceManager.
Step 3 (Optional) Click the name of a desired vStore to view its Summary, File Service,
User Management, and Protection.
NOTE
● In the Basic Information area on the Summary tab page, you can click the values of
Associate with Storage Pool and Associate with FC Port to modify the parameters on
the displayed Associate with Storage Pool and Associate with FC Port pages. Table
2-3 describes the parameters.
● On the File Service tab page, you can configure DNS Service, DNS Zone, LDAP
Domain, NIS Domain, AD Domain, NDMP Service, and Kerberos Realms for the
selected vStore.
----End
Precautions
● Internal system vStore System_vStore cannot be modified.
● Only the super administrator and administrators can modify vStores.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click More on the right of the desired vStore and choose Modify.
The Modify vStore page is displayed on the right.
NOTE
Alternatively, click the name of the desired vStore. In the upper right corner of the page
that is displayed, select Modify from the Operation drop-down list.
– In 6.1.5 and later versions, NAS capacity quotas can be set on the CLI by using the
create vstore general command. For details about this command, see Command/
Event/Error Code Query.
– In 6.1.6 and later versions, NAS capacity quotas can be set on DeviceManager.
3. Modify SAN Capacity Quota. The total LUN capacity of the vStore cannot
exceed the quota.
NOTE
In 6.1.7 and later versions, SAN capacity quotas can be set on DeviceManager.
4. Input necessary information about the vStore in Description to help you
identify the vStore.
NOTE
----End
Precautions
● Internal system vStore System_vStore cannot be deleted.
● Only the super administrator and administrators can delete vStores.
Prerequisites
● Service information such as logical ports of the vStore has been deleted.
● The administrator that manages the vStore is offline.
● The users of the vStore have been deleted.
Procedure
Step 1 Choose Services > vStore Service > vStores.
----End
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab.
Step 3 In the function pane, view user information listed in Table 3-2.
Parameter Description
Login Authentication Authentication mode for user login. Possible options are
Login password, Login password + email one-time
password, and Login password + RADIUS one-time
password.
----End
Precautions
● Only a super administrator can initialize the passwords of other users.
● Only users whose status is Offline can be modified.
● If a non-super administrator account encounters a security problem, a super
administrator can set password properties of this account. In this case, the
password of the account must be changed upon the next login.
● If a password has expired or been initialized, the system prompts you to
change the password when you log in to DeviceManager.
● If a password is about to expire, the system prompts you to change the
password after you log in to DeviceManager.
● To prevent security risks of the storage system due to password leakage, you
need to modify a password upon initial login and regularly change the
password on DeviceManager.
● Do not change a password during information collection or expansion.
Otherwise, information collection or capacity expansion fails.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab, locate the row that contains the user to be
modified, click More, and select Modify.
The Modify User page is displayed.
NOTE
Alternatively, click the desired user name. In the upper right corner of the page that is
displayed, select Modify from the Operation drop-down list.
Role User right range. You can select a built-in role provided by the
system or create a role.
Parameter Description
NOTE
● To ensure account security, change the password upon your first login.
● To ensure account security, change the password regularly.
----End
Prerequisites
● Only a super administrator can forcibly log out a user.
● The status of the user to be logged out is Online.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab, locate the row that contains the target user, click
More, and select Offline.
NOTE
You can also click the desired user name. In the upper right corner of the page that is
displayed, select Offline from the Operation drop-down list in the upper right corner.
----End
Prerequisites
● Only a super administrator can lock a user.
● Lock Status of the user to be locked is Unlocked.
● Only local users can be locked.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab, locate the row that contains the target user, click
More, and select Lock.
NOTE
Alternatively, click the desired user name. On the page that is displayed, select Lock from
the Operation drop-down list the upper right corner.
----End
Prerequisites
● Only a super administrator can unlock a user.
● Lock Status of the user to be unlocked is Locked.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab, locate the row that contains the user to be
unlocked, click More, and select Unlock.
NOTE
Alternatively, click the desired user name. Select Unlock from the Operation drop-down list
the upper right corner.
Step 3 Enter the password of the login user and click OK.
----End
Context
● Only a super administrator can force a user to change its password upon the
next login.
● The super administrator, other super administrators, LDAP users, and LDAP
user groups cannot change their passwords upon the next login.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab, click More on the right of the user to be
modified, and select Modify Password Next Login.
NOTE
Alternatively, click the desired user name. On the page that is displayed, select Change
Password Next Login from the Operation drop-down list in the upper right corner.
----End
Prerequisites
● A super administrator can delete other users.
● An online user cannot be deleted.
Procedure
Step 1 Choose Services > vStore Service > vStores.
Step 2 Click the name of the desired vStore. On the page that is displayed on the right,
click the User Management tab, locate the row that contains the user to be
deleted, click More, and select Delete.
NOTE
Alternatively, click the name of the desired user name. On the page that is displayed, select
Delete from the Operation drop-down list in the upper right corner.
----End
After configuring basic storage services of a vStore, you can manage the following
items of the vStore to meet service requirements:
● File system
● Dtree
● Quota
● Logical port
● Local authentication user and user group
● NFS share
● Managing CIFS Shares
For details, see the Basic Storage Service Configuration Guide for File specific to
your product model.
This section provides some CLI commands for configuring and managing
SmartMulti-Tenant.
NOTE
Start
Create a storage
pool.
Create a vStore.
Create a VLAN.
Create a dtree.
Create a quota.
Configure the
network.
End
Mandatory Optional
Procedure Command
Procedure Command
Operation Command
For details about commands used for managing basic vStore services, see
Managing Basic Storage Services Using the CLI in the Basic Storage Service
Configuration Guide for File.
C Glossary
A
AC power module The module that transfers the external AC power
supply into the power supply for internal use.
Application server A service processing node (a computer device) on the
network. Application programs of data services run
on the application server.
Asynchronous remote A kind of remote replication. When the data at the
replication primary site is updated, the data does not need to be
updated synchronously at the mirroring site to finish
the update. In this way, performance is not reduced
due to data mirroring.
Air baffle It optimizes the ventilation channels and improves
the heat dissipation capability of the system.
Audit log guarantee A mode for recording audit logs. This mode
mode preferentially ensures that the audit log function is
normal and no audit log is missing.
Audit log non- A mode for recording audit logs. In this mode,
guarantee mode services are running properly. Audit logs may be
missing.
B
Backup A collection of data stored on (usually removable)
non-volatile storage media for purposes of recovery
in case the original copy of data is lost or becomes
inaccessible; also called a backup copy. To be useful
for recovery, a backup must be made by copying the
source data image when it is in a consistent state.
The act of creating a backup.
C
Cache hit ratio The ratio of the number of cache hits to the number
of all I/Os during a read task, usually expressed as a
percentage.
Captive screw Specially designed to lock into place on a parent
board or motherboard, allowing for easy installation
and removal of attached pieces without release of
the screw.
Challenge Handshake A password-based authentication protocol that uses a
Authentication challenge to verify that a user has access rights to a
Protocol system. A hash of the supplied password with the
challenge is sent for comparison so the cleartext
password is never sent over the connection.
Compliance mode A protection mode of WORM. In compliance mode,
files within their protection period cannot be changed
or deleted by either the file user or by the system
administrator. Files with expired protection periods
can be deleted but not changed by the file user or
the system administrator.
Controller The control logic in a disk or tape that performs
command decoding and execution, host data transfer,
serialization and deserialization of data, error
detection and correction, and overall management of
device operations. The control logic in a storage
subsystem that performs command transformation
and routing, aggregation (RAID, mirroring, striping, or
other), high-level error recovery, and performance
optimization for multiple storage devices.
Controller enclosure An enclosure that accommodates controllers and
provides storage services. It is the core component of
a storage system and generally consists of
components, such as controllers, power supplies, and
fans.
Copying A pair state. The state indicates that the source LUN
data is being synchronized to the target LUN.
Container root Space used to store the metadata for running
directory container images and container instances.
Container image An image is a special file system, which provides the
programs, libraries, resources, and configuration files
required for running containers. It also contains
configuration parameters, for example, for
anonymous disks, environment variables, and users.
The image does not contain dynamic data, and its
content will not be modified after construction.
Containerized An image can start multiple containers, and an
application application can contain one or a group of containers.
D
Data compression The process of encoding data to reduce its size. Lossy
compression (i.e., compression using a technique in
which a portion of the original information is lost) is
acceptable for some forms of data (e.g., digital
images) in some applications, but for most IT
applications, lossless compression (i.e., compression
using a technique that preserves the entire content of
the original data, and from which the original data
can be reconstructed exactly) is required.
Data flow A process that involves processing data extracted
from the source system. These processes include:
filtering, integration, calculation, and summary,
finding and solving data inconsistency, and deleting
invalid data so that the processed data meets the
requirements of the destination system for the input
data.
Data migration A movement of data or information between
information systems, formats, or media. Migration is
performed for reasons such as possible decay of
storage media, obsolete hardware or software
(including obsolete data formats), changing
performance requirements, the need for cost
efficiencies etc.
Data source A system, database (database user; database
instance), or file that can make BOs persistent.
Deduplication The replacement of multiple copies of data — at
variable levels of granularity — with references to a
shared copy in order to save storage space and/or
bandwidth.
Dirty data Data that is stored temporarily on the cache and has
not been written onto disks.
E
eDevLUN Logical storage array space created by a third-party
storage array.
Expansion module A component used for expansion.
Expansion Connects a storage system to more disk enclosures
through connection cables, expanding the capacity of
the storage system.
F
Field replaceable unit A unit or component of a system that is designed to
be replaced in the field, i.e., without returning the
system to a factory or repair depot. Field replaceable
units may either be customer-replaceable or their
replacement may require trained service personnel.
Firmware Low-level software for booting and operating an
intelligent device. Firmware generally resides in read-
only memory (ROM) on the device.
Flash Translation Layer Flash Translation Layer (FTL) organizes and manages
host data, enables host data to be allocated to NAND
flash chips of SSDs in an orderly manner, maintains
the mapping relationship between logical block
addresses (LBAs) and physical block addresses
(PBAs), and implements garbage collection, wear
leveling, and bad block management.
Front-end port The port that connects the controller enclosure to the
service side and transfers service data. Front-end port
types are Fibre Channel and iSCSI.
Front-end interconnect On a storage device, all controllers share the front-
I/O module (FIM) end interface modules.
G
Garbage collection The process of reclaiming resources that are no
longer in use. Garbage collection has uses in many
aspects of computing and storage. For example, in
flash storage, background garbage collection can
improve write performance by reducing the need to
perform whole block erasures prior to a write.
Gateway A device that receives data via one protocol and
transmits it via another.
H
Hard disk tray The tray that bears the hard disk.
Heartbeat Heartbeat supports node communication, fault
diagnosis, and event triggering. Heartbeats are
protocols that require no acknowledgement. They are
transmitted between two devices. The device can
judge the validity status of the peer device.
Hit ratio The ratio of directly accessed I/Os from the cache to
all I/Os.
Hot swap The substitution of a replacement unit (RU) in a
system for a defective unit, where the substitution
can be performed while the system is performing its
normal functioning normally. Hot swaps are physical
operations typically performed by humans.
HyperMetro A value-added service of storage systems.
HyperMetro means two datasets (on two storage
systems) can provide storage services as one dataset
to achieve load balancing among applications and
failover without service interruption.
HyperMetro domain A HyperMetro configuration object generally; made
up of two storage arrays and one quorum server.
HyperMetro services can be created on a HyperMetro
domain.
I
In-band management The management control information of the network
and the carrier service information of the user
network are transferred through the same logical
channel. In-band management enables users to
manage storage arrays through commands.
Management commands are sent through service
channels, such as I/O write and read channels. The
advantages of in-band management include high
speed, stable transfer, and no additional
management network ports required.
Initiator The system component that originates an I/O
command over an I/O interconnect. The endpoint
that originates a SCSI I/O command sequence. I/O
adapters, network interface cards, and intelligent I/O
interconnect control ASICs are typical initiators.
L
Load balance A method of adjusting the system, application
components, and data to averagely distribute the
applied I/Os or computing requests to physical
resources of the system.
Logical unit The addressable entity within a SCSI target that
executes I/O commands.
Logical unit number The SCSI identifier of a logical unit within a target.
Industry shorthand, when phrased as "LUN", for the
logical unit indicated by the logical unit number.
LUN formatting The process of writing 0 bits in the data area of the
logical drive and generating related parity bits so that
the logical drive can be in the ready state.
LUN mapping A storage system maps LUNs to application servers
so that application servers can access storage
resources.
LUN migration A method for the LUN data to migrate between
different physical storage spaces while ensuring data
integrity and uninterrupted operation of host
services.
LUN snapshot A type of snapshot created for a LUN. This snapshot
is both readable and writable and is mainly used to
provide a snapshot LUN from point-in-time LUN
data.
M
Maintenance terminal A computer connected through a serial port or
management network port. It maintains the storage
system.
Management interface The module that integrates one or more
module management network ports.
Management network An entity that provides means to transmit and
process network management information.
Management network The network port on the controller enclosure
port connected to the maintenance terminal. It is provided
for the remote maintenance terminal. Its IP address
can be modified with the change of the customer's
environment.
N
NVM Express A host controller interface with a register interface
and command set designed for PCI Express-based
SSDs.
NVMe SSD A solid state disk (SSD) with a non-volatile memory
express (NVMe) interface. Compared with other
SSDs, such SSDs can deliver higher performance and
shorter latency.
O
Out-of-band A management mode used during out-of-band
management networking. The management and control
information of the network and the bearer service
information of the user network are transmitted
through different logical channels.
P
Power failure When an external power failure occurs, the AC PEM
protection depends on the battery for power supply. This
ensures the integrity of the dirty data in the cache.
Pre-copy When the system monitors a failing member disk in a
RAID group, the system copies the data from the disk
to a hot spare disk in advance.
Palm-sized NVMe SSD A palm-sized NVMe SSD is a type of NVMe SSD of
which the dimensions (H x W x D) are 160 mm x 79.8
mm x 9.5 mm (neither 3.5-inch nor 2.5-inch).
Q
Quorum server A server that can provide arbitration services for
clusters or HyperMetro to prevent the resource access
conflicts of multiple application servers.
Quorum Server Mode A HyperMetro arbitration mode. When a HyperMetro
arbitration occurs, the quorum server decides which
site wins the arbitration.
R
RAID level The application of different redundancy types to a
logical drive. A RAID level improves the fault
tolerance or performance of the logical drive but
reduces the available capacity of the logical drive.
You must specify a RAID level for each logical drive.
Ransomware file When launching attacks, ransomware usually
interception generates encrypted files with special file name
extensions. In light of this, the system intercepts the
write to files with specific file name extensions to
block the extortion from known ransomware and
protect file systems in the storage system.
Real-time ransomware Ransomware has similar I/O behavior characteristics.
detection By analyzing file I/O behavior characteristics, the
system quickly filters out abnormal files and
performs deep content analysis on the abnormal files
to detect files attacked by ransomware. Then, secure
snapshots are created for file systems where files
have been attacked, and alarms are reported to
notify the data protection administrator, limiting the
impact of ransomware and reducing losses.
S
Script A parameterized list of primitive I/O interconnect
operations intended to be executed in sequence.
Often used with respect to ports, most of which are
able to execute scripts of I/O commands
autonomously (without policy processor assistance).
A sequence of instructions intended to be parsed and
carried out by a command line interpreter or other
scripting language. Perl, VBScript, JavaScript and Tcl
are all scripting languages.
Serial port An input/output location (channel) that sends and
receives data (one bit at a time) to and from the CPU
of a computer or a communications device. Serial
ports are used for serial data communication and as
interfaces for some peripheral devices, such as mouse
devices and printers.
Service data The user and/or network information required for the
normal functioning of services.
Service network port The network port that is used to store services.
Simple network An IETF protocol for monitoring and managing
management protocol systems and devices in a network. The data being
monitored and managed is defined by an MIB. The
functions supported by the protocol are the request
and retrieval of data, the setting or writing of data,
and traps that signal the occurrence of events.
Single point of failure One component or path in a system, the failure of
which would make the system inoperable.
Slot A position defined by an upper guide rail and the
corresponding lower guide rail in a frame. A slot
houses a board.
Small computer system A collection of ANSI standards and proposed
interface standards that define I/O interconnects primarily
intended for connecting storage subsystems or
devices to hosts through host bus adapters. Originally
intended primarily for use with small (desktop and
desk-side workstation) computers, SCSI has been
extended to serve most computing needs, and is
arguably the most widely implemented I/O
interconnect in use today.
Snapshot A point in time copy of a defined collection of data.
Clones and snapshots are full copies. Depending on
the system, snapshots may be of files, LUNs, file
systems, or any other type of container supported by
the system.
Snapshot copy A copy of a snapshot LUN.
Source LUN The LUN where the original data is located.
Static Priority Mode A HyperMetro arbitration mode. When a HyperMetro
arbitration occurs, the preferred site always wins the
arbitration.
Storage system An integrated system that consists of the following
parts: controller, storage array, host bus adapter,
physical connection between storage units, and all
control software.
Storage unit An abstract definition of backup storage media for
storing backup data. The storage unit is connected to
the actual storage media used to back up data.
T
Target The endpoint that receives a SCSI I/O command
sequence.
Target LUN The LUN on which target data resides.
Thin LUN A logic disk that can be accessed by hosts. It
dynamically allocates storage resources from the thin
pool according to the actual capacity requirements of
users.
Topology The logical layout of the components of a computer
system or network and their interconnections.
Topology deals with questions of what components
are directly connected to other components from the
standpoint of being able to communicate. It does not
deal with questions of physical location of
components or interconnecting cables. The
communication infrastructure that provides Fibre
Channel communication among a set of PN_Ports
(e.g., a Fabric, an Arbitrated Loop, or a combination
of the two).
U
User interface The space where users interact with a machine.
U-shaped bracket It is an optional structural part like letter "U". It is
located between the mounting ear of a chassis and
the mounting bar of a cabinet or bay and is used to
adjust the locations of the chassis and mounting bar
of the cabinet or bay.
W
Wear leveling A set of algorithms utilized by a flash controller to
distribute writes and erases across the cells in a flash
device. Cells in flash devices have a limited ability to
survive write cycles. The purpose of wear leveling is
to delay cell wear out and prolong the useful life of
the overall flash device.
Write amplification Increase in the number of write operations by the
device beyond the number of write operations
requested by hosts.
Write amplification The ratio of the number of write operations on the
factor device to the number of write operations requested
by the host.
Write back A caching technology in which the completion of a
write request is signaled as soon as the data is in the
cache. Actual writing to non-volatile media occurs at
a later time. Write back includes inherent risks: an
application will take action predicated on the write
completion signal, and a system failure before the
data is written to non-volatile media will cause
media contents to be inconsistent with that
subsequent action. For these reasons, sufficient write
back implementations include mechanisms to
preserve cache contents across system failures
(including power failures) and a flushed cache at
system restart time.
Write Once Read Many A type of storage, designed for fixed content, that
preserves what is written to it in an immutable
fashion. Optical disks are an example of WORM
storage.
Write through A caching technology in which the completion of a
write request is not signaled until data is safely
stored on non-volatile media. Write performance
equipped with the write through technology is
approximately that of a non-cached system. However,
if the written data is also held in a cache, subsequent
read performance may be dramatically improved.
Z
Zone A collection of Fibre Channel N_Ports and/or
NL_Ports (i.e., device ports) that are permitted to
communicate with each other via the fabric. Any two
N_Ports and/or NL_Ports that are not members of at
least one common zone are not permitted to
communicate via the fabric. Zone membership may
be specified by: 1) port location on a switch, (i.e.,
Domain_ID and port number); or, 2) the device's
N_Port_Name; or, 3) the device's address identifier;
or, 4) the device's Node_Name. Well-known
addresses are implicitly included in every zone.