File Services Administration Guide
- Last updated
- Save as PDF
This guide explains about file system formats, and provides information about creating and managing file systems, and enabling and configuring file services (file service protocols).
- Child Topics
- Joining an Active Directory
- File system access protocols
- File system tiers
- Tiered file systems and snapshots
- Creating a new file system
- Read caches
- Dedupe File Systems
- Viewing available file systems
- Displaying file system details
- Formatting a file system
- Mounting a file system
- Standard bitmap support
- Unmounting a file system
- Undeleting a file system
- Deleting a tree directory with tree-delete
- Controlling file system space usage
- Deleting a file system
- Using deduplication file system
- Managing file system quotas
You can use a quota to allocate a maximum amount of disk space a user or group may use. It can be flexible in its adherence to the rules assigned and is applied per file system.
- Managing quotas on virtual volumes
- Managing virtual volumes
- Using the per-file system throttle feature
- Creating a read cache file system
- Viewing security considerations
This page displays all EVSs and the configured security mode. Security modes can be configured per-EVS, per-file system, or per-Virtual Volume. This page can list all the EVSs or a particular EVS, and show the file systems based on the selections made on the page, and the filter is defined.
- Enabling NFS Protocol Support
- Supported NFS versions
- Configuring NFS exports
- About the rquotad service
- CIFS/SMB protocol support
- Configuring CIFS security
- Assigning CIFS names
- Viewing CIFS Setup
- Removing CIFS server names
- CIFS/SMB protocol support
- Configuring CIFS security
- Configuring local groups
- Local user authentication for SMB and FTP users
Local User Authentication can be used by the NAS server to authenticate SMB and FTP users without reference, even indirectly, to an external source of authentication, like Kerberos or a Domain Controller. Users and passwords are configured and managed via the command line.
- Using local user authentication
Many CIFS clients require a user to be identified by a username and domain. When using local user authentication, the domain may be any string you choose and need not correspond to any other domain in use on the network, the IP of any EVS, or any CIFS name.
- Configuring CIFS shares
- Considerations when using Hyper-V
In general, when using Hyper-V with an HNAS server:
- Configuring the Service Witness Protocol
For SMB3 transparent failover to perform efficiently, the Service Witness Protocol must be configured.
- Using Windows server management
- Restoring a previous version of a file
- FTP protocol support
- Configuring FTP preferences
- FTP statistics
- iSCSI support
- Configuring iSCSI
- Configuring iSCSI Logical Units
- Managing iSCSI logical units
- Configuring iSCSI security (mutual authentication)
- Accessing iSCSI storage
- Using Computer Manager to configure iSCSI storage
- HDP high-level process
The following flow chart shows the high-level process for provisioning storage with HDP:
- Understanding HDP thin provisioning
Thin provisioning allows storage to be allocated to an application without it being physically mapped on the storage system until it is actually used. Thin provisioning also decouples the logical provisioning of storage to an application from the physical addition of storage capacity to the storage system.
- Understanding how
HDP works with
HNAS
Using HDP with HNAS provides many benefits.