Summary of the content on the page No. 1
'HOO3RZHU9DXOW11DQG1
6<67(0$'0,1,675$725$1'
&200$1'5()(5(1&(*8,'(
ZZZGHOOFRP
Summary of the content on the page No. 2
___________________ Information in this document is subject to change without notice. © 19981999 Network Appliance, Inc. Licensed to Dell Computer Corporation. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Computer Corporation is strictly forbidden. No part of this book covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic
Summary of the content on the page No. 3
3UHIDFH $ERXW7KLV*XLGH This guide describes how to configure, operate, and manage Dell PowerVault F720N, F740N, and F760N filers that run Data ONTAP 5.3 software. The guide is organized in three parts: Chapters 1 through 19 describe how to configure, operate, and manage Dell PowerVault 720N, 740N, and 760N filers. Appendix A, Command Reference, provides the commands that you use to control a filer. Glossary provides definitions of terms, acronyms, and abbreviations used in this
Summary of the content on the page No. 4
The Users Guide provides instructions for configuring and operating a new filer that runs Data ONTAP 5.3 software. You may also have one or more of the following documents. NOTE: Documentation updates are sometimes included with your system to describe changes to your system or software. Always read these updates before consulting any other documentation because the updates often contain the latest information. Documentation is included with any options you purchase separately from your
Summary of the content on the page No. 5
7\SRJUDSKLFDO&RQYHQWLRQV Typographical conventions used in this guide are shown in the following table: &RQYHQWLRQ 7\SHRI,QIRUPDWLRQ Italic type Words or characters that require special attention. File names. Placeholders for information you must supply. For example, if the guide says to enter the arp -d hostname command, you enter the characters arp -d followed by the actual name of the host. Man page names. Book titles in cross-references. Monospaced font Command and daemon names. Inf
Summary of the content on the page No. 6
viii
Summary of the content on the page No. 7
&RQWHQWV &KDSWHU ,QWURGXFLQJ'HOO)LOHUV About Filers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 What a Filer Is . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Components of a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Filer and Filer Main Unit . . . . . . . . . . .
Summary of the content on the page No. 8
Monitoring and Maintaining Filer Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 Periodic Administration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 &KDSWHU )LOHU$GPLQLVWUDWLRQ%DVLFV Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 9
Creating Administrative Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Steps to Create a New Admini
Summary of the content on the page No. 10
Naming Conventions for Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19 Interface Types the Filer Supports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19 How Interfaces Are Numbered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19 How Multiple Ports Are Identified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19 How Interfaces Are Named. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 11
Sending Automatic Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27 How Automatic Email Messages Are Controlled. . . . . . . . . . . . . . . . . . . . . . 2-27 How the autosupport Daemon Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28 Mail Host Requirement for autosupport. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28 About Configuring autosupport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 12
Understanding Hot Spare Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Understanding Hot Swap. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Understanding Usable Space on Each Disk. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Handling Disk Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Effects of Disk Failure on Filer Operation . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 13
Example With Ages Option Specified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16 Example to Determine Volume Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Getting a File Statistics Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 14
Command to Configure the SNMP Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2 SNMP Commands Supported by Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 About the Dell Custom MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 About MIB Group Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 About Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 15
Two Kinds of Trunks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Single-Mode Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19 Multiple-Mode Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19 Hardware Requirements for Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20 Virtual Interfaces . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 16
Displaying the Status of a Trunk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27 Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27 Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27 Sample Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27 Displaying Trunk Statistics . .
Summary of the content on the page No. 17
NFS and CIFS Use of the Read-Only Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 About Read-only Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 How NFS Treats the Read-Only Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 How the Filer Tracks the NFS or CIFS Client Read-Only Bit . . . . . . . . . . . . . . 5-5 Naming Files Used by Both NFS and CIFS . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 18
CIFS File Name Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14 Case Preservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14 Case Conversion Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14 Forcing CIFS File Names to Lowercase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14 Description. . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 19
Displaying WAFL Credential Cache Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Sample Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22 Displaying a Mapping Result for a UNIX
Summary of the content on the page No. 20
Filer Determines Permissions by Matching Longest Prefix. . . . . . . . . . . . . . . 6-4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4 Edit /etc/exports After Changing Volume Names . . . . . . . . . . . . . . . . . . . . . . 6-4 Default /etc/exports Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5 /vol/vol0 and /vol/vol0 home Are Exported by Default. . . . . . . . . . . . . . . . . .