- File system access protocols
- File system tiers
- Data spillage between tiers
It is possible for data to spill between the user data and metadata tiers in both directions.
- Confining new tiered file systems
If the host span is tiered, all new file systems created on it are automatically tiered as well.
- Supported file system limits
The number of supported file systems on a
NAS server depends on the model.
- Creating a new file system
This procedure creates a new file system. A storage pool is required before a file system can be created.
- Read caches
- Dedupe File Systems
- Viewing available file systems
You can view the available file systems using the
- Displaying file system details
You can view file system details using the
- Monitoring file system operations
File system operations per second can be monitored from the File System Ops/Sec page in the Status and Monitoring section of the
- Formatting a file system
- Standard bitmap support
- Mounting a file system
- Unmounting a file system
- Deleting a file system
- Undeleting a file system
- Cloning files and directory trees
- Deleting a tree directory with tree-delete
- Controlling file system space usage
- Using deduplication file system
- Managing file system quotas
You can use a quota to allocate a maximum amount of disk space a user or group may use. It can be flexible in its adherence to the rules assigned and is applied per file system.
- Managing quotas on virtual volumes
- Managing virtual volumes
- Using the per-file system throttle feature
- Creating a read cache file system
- Viewing file system security
Security modes can be configured per-EVS, per-file system, or per-Virtual Volume. You can view the EVSs, the file systems and the configured security modes in the
- NFS security and Kerberos
- Kerberos principal formats
A Kerberos principal can take different forms, containing a varying number of components.
- Setting secure NFS
- Mixed security mode
- AES support for SMB
Windows Vista and Windows Server 2008 introduced support for the Kerberos AES crypto profiles, in addition to the older crypto profiles (DES/DES3 and RC4) already implemented in earlier Windows versions.
- SMB access to native SMB files
- NFS access to native NFS files
- Client access to non-native files
- UNIX security mode
- Changing security modes
- Mixed mode operation
- File system auditing
- Enabling NFS Protocol Support
- Supported NFS versions
- Configuring NFS exports
- About the rquotad service
- SMB protocol support
The server implements the SMB protocols as used by Microsoft Windows platforms. From the client perspective, the server is indistinguishable from a Windows file server.
- Configuring SMB security
- Assigning SMB names
- Viewing SMB setup
- Joining an Active Directory
You can add an SMB (CIFS) server to an ADS domain in the
- Removing SMB server names
SMB (CIFS) server names can be removed from the server’s configuration in the
- Configuring local groups
- Local user authentication for SMB and FTP users
Local User Authentication can be used by the NAS server to authenticate SMB and FTP users without reference, even indirectly, to an external source of authentication, like Kerberos or a Domain Controller. Users and passwords are configured and managed via the command line.
- Using local user authentication
Many SMB clients require a user to be identified by a
domain. When using local user authentication, the domain may be any string you choose and need not correspond to any other domain in use on the network, the IP of any EVS, or any SMB name.
- Configuring SMB shares
- Considerations when using Hyper-V
In general, when using Hyper-V with an HNAS server:
- Configuring the Service Witness Protocol
For SMB3 transparent failover to perform efficiently, the Service Witness Protocol must be configured.
- Using Windows server management
- Restoring a previous version of a file
- FTP protocol support
- Configuring FTP preferences
- FTP statistics
- iSCSI support
- Configuring iSCSI
- Configuring iSCSI Logical Units
- Managing iSCSI logical units
- Configuring iSCSI security (mutual authentication)
- Accessing iSCSI storage
- Using Computer Manager to configure iSCSI storage
- HDP high-level process
The following flow chart shows the high-level process for provisioning storage with
- Understanding HDP thin provisioning
Thin provisioning allows space to be allocated to an application without it being physically mapped on the storage system until it is actually used. Thin provisioning also decouples the logical provisioning of storage to an application from the physical addition of storage capacity to the storage system.
- Understanding how
HDP works with
HNAS provides many benefits.