EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
Copyright © 2007 - 2010 EMC Corporation. All rights reserved.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION,
AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section
on EMC Powerlink.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.
All other trademarks used herein are the property of their respective owners.
2 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Contents
Preface
Chapter 1 Introduction
Overview of EMC File Management Appliance ................................................ 16
File Management High Availability (FMHA) .............................................. 16
File Management Appliance/VE (FMA/VE)............................................... 16
File Management Appliances ............................................................................... 17
File Management with Celerra implementation.......................................... 18
File Mangement with NetApp implementation .......................................... 19
File Management tasks........................................................................................... 20
Using File Management ......................................................................................... 22
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 3
Configure name resolution.............................................................................. 48
Prerequisites for using Celerra as an archiving source ............................... 49
Prerequisite on the Celerra Control Station ................................................. 50
Using File Management with the NetApp filer as a source.............................. 55
Prerequisites for using NetApp as an archiving source ............................. 55
vFiler configuration ......................................................................................... 56
Configuring NetApp archiving on the FMA ............................................... 56
Adding a NetApp filer to the File Management configuration ................. 57
Adding a Windows server to the File Management configuration ................. 58
Configuring a NAS-based repository .................................................................. 60
Using FMA with EMC Centera ............................................................................. 61
Using File Management with an Atmos server .................................................. 62
Using File Management with a Data Domain server......................................... 63
Backing up the configuration ................................................................................ 64
Creating a backup dump ................................................................................. 65
Restoring a backup dump................................................................................ 66
Maintaining the database....................................................................................... 69
Performing a CD clean install................................................................................ 70
Software upgrades .................................................................................................. 71
Before upgrading FMA to version 7.3 or later.............................................. 71
CD full upgrade................................................................................................. 72
UPG upgrade ..................................................................................................... 72
Shutting down and restarting the appliance....................................................... 73
4 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Windows domain user ........................................................................................... 95
Creating a Windows domain user ................................................................. 95
Adding an admin user to the local administrator group............................ 95
Configuring Windows 2008 for NTLM ......................................................... 96
Glossary
Index
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 5
6 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Figures
Title Page
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 7
Figures
8 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Tables
Title Page
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 9
Tables
10 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Preface
As part of an effort to improve and enhance the performance and capabilities of its product
lines, EMC periodically releases revisions of its hardware and software. Therefore, some
functions described in this document may not be supported by all versions of the software or
hardware currently in use. For the most up-to-date information on product features, refer to
your product release notes.
If a product does not function properly or does not function as described in this document,
please contact your EMC representative.
Audience This document is part of the EMC File Management Appliance documentation set.
The documentation is intended for use by:
◆ Storage management administrators who are new to the EMC File Management
Appliance .
◆ Existing customers who are new to version 7.3.1.
Preface 11
Preface
Conventions used in EMC uses the following conventions for special notices.
this document
Note: A note presents information that is important, but not hazard-related.
! CAUTION
A caution contains information essential to avoid data loss or damage to the system
or equipment.
! IMPORTANT
An important notice contains information essential to operation of the software.
Typographical conventions
EMC uses the following type style conventions in this document:
Normal Used in running (nonprocedural) text for:
• Names of interface elements (such as names of windows, dialog boxes, buttons,
fields, and menus)
• Names of resources, attributes, pools, Boolean expressions, buttons, DQL
statements, keywords, clauses, environment variables, functions, utilities
• URLs, pathnames, filenames, directory names, computer names, filenames, links,
groups, service keys, file systems, notifications
Bold Used in running (nonprocedural) text for:
• Names of commands, daemons, options, programs, processes, services,
applications, utilities, kernels, notifications, system calls, man pages
Used in procedures for:
• Names of interface elements (such as names of windows, dialog boxes, buttons,
fields, and menus)
• What user specifically selects, clicks, presses, or types
Italic Used in all text (including procedures) for:
• Full titles of publications referenced in text
• Emphasis (for example a new term)
• Variables
Courier Used for:
• System output, such as an error message or script
• URLs, complete paths, filenames, prompts, and syntax when shown outside of
running text
Courier bold Used for:
• Specific user input (such as commands)
Courier italic Used in procedures for:
• Variables on command line
• User input variables
<> Angle brackets enclose parameter or variable values supplied by the user
[] Square brackets enclose optional values
| Vertical bar indicates alternate selections - the bar means “or”
{} Braces indicate content that you must specify (that is, x or y or z)
... Ellipses indicate nonessential information omitted from the example
12 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Preface
Where to get help EMC support, product, and licensing information can be obtained as follows.
Product information — For documentation, release notes, software updates, or for
information about EMC products, licensing, and service, go to the EMC Powerlink
website (registration required) at:
http://Powerlink.EMC.com
Technical support — For technical support, go to EMC Customer Service on
Powerlink. To open a service request through Powerlink, you must have a valid
support agreement. Please contact your EMC sales representative for details about
obtaining a valid support agreement or to answer any questions about your account.
Your comments Your suggestions will help us continue to improve the accuracy, organization, and
overall quality of the user publications. Please send your opinion of this document to:
techpubcomments@EMC.com
13
Preface
14 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
1
Introduction
Introduction 15
Introduction
Note: The FMHA dedicated appliance has installation instructions that differ slightly from the
FMA.
16 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Introduction
4 CIFS R/W CIFS R/W NFS R/W HTTP R/W FTP R/W
1
DHSM
Celerra
File System
/etc/hosts
NFS CIFS
EMC FMHA PowerEdge
2950
Platform API
CNS-001622
Circled numbers correspond to the following steps that illustrate the archive and
recall process in the Celerra implementation:
1. Clients send read/write operations for files that have been archived. These
operations are intercepted by the DHSM layer on the Celerra prior to being
serviced from the filesystem.
2. If the file has been archived to EMC Centera® or EMC Atmos™ storage, the
Celerra blade resolves the fully qualified domain name (FQDN) to one of the
following:
• In an FMA environment, it resolves the FQDN to the IP address of the FMA or
FMHA appliance.
• In an FMA/VE environment, it resolves the FQDN to the IP address of the
FMA/VE.
18 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Introduction
The blade then uses HTTP to read the archived data from the appliance, which in
turn reads it from EMC Centera or Atmos by using the platform API. If an
appliance does not respond to the HTTP read requests, the Celerra blade uses an
alternate IP address of another appliance configured in DNS. Every callback
server (FMA, FMHA, or FMA/VE) has its IP address associated with a single
hostname in DNS. The FQDN uses that hostname, which may have multiple IP
addresses associated with it.
3. If the file has been archived to an NFS or CIFS repository, the blade opens a
connection to the repository and reads back the data.
4. The blade responds to the client operation as usual if the recall was successful, or
the client receives an "access denied" message if the recall fails.
Note: When Celerra data has been archived to a Celerra, NetApp, or Microsoft Windows
repository, the FMA is not involved at all in the recall process. In such an environment, the
FMHA appliance is not necessary.
4 1
CIFS Recall (Writes) CIFS R/W CIFS R/W NFS R/W HTTP R/W FTP R/W
SMB over NetBIOS
WAFL
CNS-001619
Circled numbers correspond to the following steps that illustrate the archive and
recall process in the NetApp FPolicy implementation:
1. Clients send read/write operations for files that have been archived. These
operations are intercepted by the FPolicy layer on the NetApp prior to being
serviced from the Write Anywhere File Layout (WAFL) filesystem.
2. The NetApp is configured with the following groups:
• A primary group of callback servers, such as an FMA and possibly one or
more FMHA appliances.
• A secondary group, such as one or more FMHA appliances.
The NetApp will send FPolicy callbacks to servers registered in the primary
group in round-robin fashion. If a server does not reply to the callback, it is
removed from its group. If there are no servers in the primary group, the
callbacks are distributed in a round-robin fashion among the servers in the
secondary group.
For FMA/VE, the primary group of callback servers consists of one or more
virtual machines that are clustered using VMware.
3. The appliance connects to the filer by using CIFS to read the contents of the stub
file. The stub file points to where the file data is stored. The appliance then
connects to the NFS repository, CIFS repository, or EMC Centera cluster where the
data was archived. It then reads the data by using the native protocol and the file
data is written back to the NetApp.
4. The filer responds to the client operation as usual if the recall was successful, or
with an "access denied" message if the recall failed.
Note: It is a requirement that the software versions of all the appliances match. For example, do
not deploy a configuration with an FMA that is running version 7.3b2 and an FMHA that is
running version 7.3b3. While the software does not perform any explicit checks to ensure the
versions are compatible, the running of different software versions has not been tested and
may result in unexpected behavior.
20 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Introduction
Run a simulation to gain insight into the efficiency of a task before running the task.
This practice is notably important for the delete tasks, since these tasks remove data.
A report displays results of the task. Figure 3 on page 21 is an example of an archived
report.
22 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
2
File Management
Appliance Hardware
and Port Configurations
Note: The following are items are not included: VGA monitor, keyboard, and mouse for a
system console.
24 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management Appliance Hardware and Port
Component FMA-7
CPUs Dual, 2.0 GHz, E5540 4C/4T 80W 4MB Cache Nehalem-EP
Disks Four 1 TB, SATA, 3.5-inch, 7.2 K RPM hard drives in a RAID-1 configuration with
two hot spares. Items (b) through (e) in Figure 5 on page 30.
CD-ROM Read-only DVD that can read CD or DVD material for system upgrades. Item (a) in
Figure 5 on page 30.
Network interfaces Two on-board gigabit 10/100/1000TX Ethernet copper ports with RJ45 connectors.
Item (e) in Figure 4 on page 30.
VGA Standard VGA video connector for a system console. Item (a) in Figure 4 on
page 30.
Keyboard connector Standard USB keyboard connector for a system console. Item (d) in Figure 4 on
page 30.
Mouse connector Standard USB mouse connector for a system console. Item (c) in Figure 4 on
page 30.
Serial port Standard DB9 serial port for a serial-terminal system. Item (b) in Figure 4 on
page 30.
Table 2 on page 25 lists the configurations for the FMA that is based on the Dell 2950
hardware.
Chassis The appliance is based on Dell 2950 The appliance is based on Dell 2950
hardware. hardware.
Size 2U rackmount form factor with universal 2U rackmount form factor with universal
rails. Dimensions: 8.6 cm (h), 44.5 cm rails. Dimensions: 8.6 cm (h), 44.5 cm
(w), 66.1 cm (d). Weight: 34 kg. (w), 66.1 cm (d). Weight: 34 kg.
Power Dual redundant 750 watt hot-plug, Dual redundant 750 watt hot-plug,
power supplies. Total consumption: 5A power supplies. Total consumption: 5A
at 120 V or 2.5 A at 240 V. at 120 V or 2.5 A at 240 V.
CPUs Dual Intel Xeon 3.00 GHz Quad Core Dual Intel Xeon 3.00 GHz Dual Core
processors with 1333 MHz front-side processors with 1333 MHz front-side
bus. bus.
Disks Four 250 GB, SATA, 3.5-inch, 7.2K RPM Six 160 GB, SATA, 3.5-inch, 7.2K RPM
hard drives in a RAID-5 configuration. hard drives in a RAID-1 configuration.
Items (b) through (e) in Figure 7 on Items (b) through (g) in Figure 7 on
page 31. page 31.
RAID controller PERC 6/I integrated controller card with PERC 5/I integrated controller card with
256 MB of battery-backed write cache. 256 MB of battery-backed write cache.
The storage controller buffers all writes The storage controller buffers all writes
to disk so that in the event of a critical to disk so that in the event of a critical
full-system failure. Important state full-system failure. Important state
information is saved even during abrupt information is saved even during abrupt
disk or power failure. disk or power failure.
CD-ROM 24x IDE CD-ROM/DVD-ROM drive for 24x IDE CD-ROM drive for system
system upgrades. Item (a) in Figure 7 upgrades. Item (a) in Figure 7 on
on page 31. page 31.
Memory 667 MHz, (4 x 1 GB), single-ranked 667 MHz, (8 x 512 MB), single-ranked
DIMMs DIMMs
Network interfaces Two on-board gigabit 10/100/1000TX Two on-board gigabit 10/100/1000TX
Ethernet copper ports with RJ45 Ethernet copper ports with RJ45
connectors. Item (e) in Figure 6 on connectors. Item (e) in Figure 6 on
page 30. page 30.
VGA Standard VGA video connector for a Standard VGA video connector for a
system console. Item (a) in Figure 6 on system console. Item (a) in Figure 6 on
page 30. page 30.
Keyboard connector Standard USB keyboard connector for a Standard USB keyboard connector for a
system console. Item (d) in Figure 6 on system console. Item (d) in Figure 6 on
page 30. page 30.
Mouse connector Standard USB mouse connector for a Standard USB mouse connector for a
system console. Item (c) in Figure 6 on system console. Item (c) in Figure 6 on
page 30. page 30.
Serial port Standard DB9 serial port for a Standard DB9 serial port for a
serial-terminal system. Item (b) in serial-terminal system. Item (b) in
Figure 6 on page 30. Figure 6 on page 30.
Table 3 on page 26 lists the configuration for the FMA that is based on the HP
ProLiant hardware.
Component FMA-4
Size 2U rackmount form factor with universal rails. Dimensions: 8.6 cm (h), 44.5 cm (w),
66.1 cm (d). Weight: 27.22 kg.
Power Dual redundant 575 watt, hot-plug, power supplies. Total consumption: 5A at 120V
or 2.5A at 240 V. Item (a) in Figure 8 on page 31.
CPUs Dual Intel Xeon processors 3.6 GHz with 800 MHz front-side bus.
Disks Six 146.8 GB, SCSI, 3.5 inch 10K RPM drives in a RAID 5 configuration. Items (b)
and (c) in Figure 9 on page 31.
26 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management Appliance Hardware and Port
Component FMA-4
CD-ROM CD-ROM drive for system upgrades. Item (a) in Figure 9 on page 31.
Network interfaces Two on-board gigabit 10/100/1000TX Ethernet copper ports with RJ45 connectors.
Item (e) in Figure 8 on page 31. In addition, connectivity to the network is made
through four copper ports. Item (f) in Figure 8 on page 31.
VGA Standard VGA video connector for a system console. Item (g) in Figure 8 on
page 31.
Keyboard connector Standard PS/2 keyboard for a system console. Item (d) in Figure 8 on page 31.
Mouse connector Standard PS/2 keyboard connector for a system console. Item (c) in Figure 8 on
page 31.
Serial port Standard DB9 serial port for a serial-terminal system. Item (b) in Figure 8 on
page 31.
Component FMHA-7
Disks Two 1 TB, SATA, 3.5-inch, 7.2K RPM hard drives in a RAID-1 (SW) configuration.
Items (b) and (c) in Figure 10 on page 32.
CD-ROM Read-only DVD that can read CD or DVD material for system upgrades. Item (a) in
Figure 10 on page 32.
Network interfaces Two on-board gigabit 10/100/1000TX Ethernet copper ports with RJ45 connectors.
Item (e) in Figure 4 on page 30.
VGA Standard VGA video connector for a system console. Item (a) in Figure 4 on
page 30.
Keyboard connector Standard USB keyboard connector for a system console. Item (d) in Figure 4 on
page 30.
Mouse connector Standard USB mouse connector for a system console. Item (c) in Figure 4 on
page 30.
Serial port Standard DB9 serial port for a serial-terminal system. Item (b) in Figure 4 on
page 30.
Table 5 on page 28 lists the hardware configurations for the File Management High
Availability appliance that is based on the Dell 2950 hardware.
Chassis The appliance is based on Dell 2950 The appliance is based on Dell 2950
hardware. It is a 2U rackmount form hardware. It is a 2U rackmount form
factor with universal rails. factor with universal rails.
Size 2U rackmount form factor with universal 2U rackmount form factor with universal
rails. Dimensions: 8.6 cm (h), 44.5 cm rails. Dimensions: 8.6 cm (h), 44.5 cm
(w), 66.1 cm (d). Weight: 34 kg. (w), 66.1 cm (d). Weight: 34 kg.
Power Dual redundant 750 watt hot-plug, Dual redundant 750 watt hot-plug,
power supplies. power supplies.
CPU Single Intel Xeon 2.33 GHz Quad Core Single Intel Xeon 1.86 GHz Dual Core
processor with 1333 MHz front-side processor with 1066 MHz front-side
bus. bus.
28 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management Appliance Hardware and Port
Disks Two 250 GB, SATA, 3.5-inch, 7.2K RPM Two 160 GB, SATA, 3.5-inch, 7.2K RPM
hard drives in a RAID 1 configuration. hard drives in a RAID 1 configuration.
Items (b) and (c) in Figure 11 on Items (b) and (c) in Figure 11 on
page 32. page 32.
RAID Controller PERC 6/I integrated controller card with PERC 5/I integrated controller card with
256 MB of battery-backed write cache. 256 MB of battery-backed write cache.
The storage controller buffers all writes The storage controller buffers all writes
to disk so that in the event of a critical to disk so that in the event of a critical
full-system failure. Important state full-system failure. Important state
information is saved even during abrupt information is saved even during abrupt
disk or power failure. disk or power failure.
CD-ROM 24x IDE CD-ROM/DVD-ROM drive for 24x IDE CD-ROM drive for system
system upgrades. Item (a) in Figure 11 upgrades. Item (a) in Figure 11 on
on page 32. page 32.
Memory 4 GB, 533 MHz (4x1 GB), dual-ranked 4 GB, 533 MHz (4x1 GB), dual-ranked
DIMMs. DIMMs.
Network Interfaces Two on-board gigabit 10/100/1000TX Two on-board gigabit 10/100/1000TX
Ethernet copper ports with RJ45 Ethernet copper ports with RJ45
connectors. Item (e) in Figure 6 on connectors. Item (e) in Figure 6 on
page 30. page 30.
VGA Standard VGA video connector for a Standard VGA video connector for a
system console. Item (a) in Figure 6 on system console. Item (a) in Figure 6 on
page 30. page 30.
Keyboard Connector Standard USB keyboard connector for a Standard USB keyboard connector for a
system console. Item (d) in Figure 6 on system console. Item (d) in Figure 6 on
page 30. page 30.
Mouse Connector Standard USB mouse connector for a Standard USB mouse connector for a
system console. Item (c) in Figure 6 on system console. Item (c) in Figure 6 on
page 30. page 30.
Serial port Standard DB9 serial port for a Standard DB9 serial port for a
serial-terminal system. Item (b) in serial-terminal system. Item (b) in
Figure 6 on page 30. Figure 6 on page 30.
Appliance diagrams
These photographs illustrate configurations of the FMA and FMHA based on the Dell
and HP hardware.
30 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management Appliance Hardware and Port
Appliance diagrams 31
File Management Appliance Hardware and Port
Figure 10 Front view of Dell R710 for High Availability with bezel removed
Figure 11 Front view of Dell 2950 for High Availability with bezel removed
32 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management Appliance Hardware and Port
Port details for FMA-7, FMHA-7, FMA-6, FMHA-6, FMA-5, and FMHA-5
Models FMA-7 and FMHA-7 ship with two on-board ports enabled. Figure 12 on
page 33 is a rear view of the appliance with the ports labeled.
CNS-001354
Models FMA-6, FMHA-6, and FMHA-5 ship with two on-board ports. Figure 13 on
page 33 is a rear view of the appliance with the ports labeled.
eth0 eth1
CNS-001259
Port details for FMA-7, FMHA-7, FMA-6, FMHA-6, FMA-5, and FMHA-5 33
File Management Appliance Hardware and Port
eth5 eth4
CNS-001260
34 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
3
Deploying File
Management
Define Policies
1. Create file matching expressions
and archive destinations
2. Specify policy type, retention, delayed
stubbing, stub retention (as applicable)
Create Task
1. Create an archive, delete, or
auxiliary task
2. Select source (as applicable)
36 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Appliance setup
The appliance arrives with the software installed. Before it may be used to perform
tasks, the appliance and the software must be properly configured:
◆ If an FMA is being deployed, port details that are used to connect the appliance to
the network are provided in Chapter 2, ”File Management Appliance Hardware
and Port Configurations.”
The File Management software is preinstalled on every new appliance. If the
software must be reinstalled without preserving any previous information or
data, follow the instructions provided in “Performing a CD clean install” on
page 70.
“Software upgrades” on page 71 provides instructions to perform a CD full
upgrade or UPG upgrade.
◆ If a File Management High Availability (FMHA) appliance is being deployed,
“File Management High Availability” on page 38 describes configuration
considerations.
◆ If an FMA/VE is being deployed, follow the instructions in “Installing the virtual
appliance” on page 39.
◆ To install the appliance on the network, follow instructions provided in
“Configuring File Management” on page 42.
◆ If the system requires security hardening or any other special configuration,
Chapter 4, ”File Management System Settings,”provides information for all
system settings.
Then proceed to configure the appliance for your environment as described in:
◆ “Using the FMA with the Celerra Data Mover as a source” on page 45
◆ “Using File Management with the NetApp filer as a source” on page 55
◆ “Adding a Windows server to the File Management configuration” on page 58
◆ “Configuring a NAS-based repository” on page 60
◆ “Using FMA with EMC Centera” on page 61
◆ “Using File Management with a Data Domain server” on page 63
Appliance setup 37
Deploying File Management
38 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Run fpsetup on the FMHA appliances that will process recall requests. Use this script
to link together multiple appliances that will process recall requests that are sent from
a common set of NetApp Filers. Later, when configuring NetApp filers, you will have
the option to select specific FM and FMHA appliances that will register in the
primary and secondary groups. “Configuring NetApp archiving on the FMA” on
page 56 provides details on fpsetup.
Appliances are always involved in recall when the FMA archives data from NetApp
primary storage to any secondary storage location. NetApp filers do not recall data
directly from Celerra, EMC Centera, or NetApp storage.
Note: A single FMHA appliance can provide redundancy for multiple FMAs. A single FMA
can have multiple FMHA appliances registered to provide redundancy. Do not use an FMA to
provide redundancy for another FMA.
ESX 3.5 Update 3 Four 64-bit virtual CPUs, 4 GB of RAM, 512 GB of disk space, 2 gigabit virtual
ESXi 3.5 Update 3 interfaces are reserved.
ESX 4.0 64-bit Intel hardware with VT support (EM64T and VT in the chip and BIOS) is
ESXi 4.0 required.
Hardware and firmware requirements for 64-bit guest operating systems are listed at
the VMware web site.
The following example shows the steps to install the FMA/VE virtual appliance on
an ESX 3.5 Server host:
1. Unzip the file to create the directory for your virtual appliance. The Zip file
contains the .OVF file and .VMDK file.
2. Open the Virtual Infrastructure (VI) Client.
a. To find the appliance with the most free space, consider %CPU and %Memory.
b. Select the line for the ESX Server: 10.10.35.101. A summary of the CPU,
memory, and data store capacities appears.
This ESX Server has enough CPU and memory available to install the FMA/VE.
3. Import the OVF file. Instructions differ depending upon VMware version.
40 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
• For ESXi 3.5 Server, from the VI Client, select File > Virtual Appliance >
Import.
• For ESX 4.0 Server, from the VI Client, select File > Deploy OVF Template.
4. Using the Import from file selection, type the path to the OVF file or click Browse
to locate the file.
5. After answering a few basic questions, the summary screen appears. Validate the
information and click Finish.
6. The import may take 3–30 minutes depending on the network connection
between the VI Client and the VMware ESX Server. Approximately 600 MB will
initially be transferred across the network.
If the FMA/VE will be configured for Celerra to EMC Centera archiving, use
FileMover Settings as described in step 3 of “Adding a Celerra to the File
Management configuration” on page 45 to configure the single set of credentials for
recall. Then run ccdsetup.sh or acdsetup.sh as described in “Configuring Celerra to
EMC Centera or Atmos archiving on the FMA” on page 47 .
42 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
The Rainfinity setup tool appears. This tool performs basic setup tasks that are
not available through the File Management GUI.
3. Select Change File Management Appliance Password, and change the password.
4. Select Configure Date and Time to set the time zone and date for the appliance.
5. Select Configure File Management Networking. The network configuration
menu appears.
Use the menu to change interface settings or set global settings such as hostname,
domain, and DNS servers.
3. Verify that the network configuration has been saved and network connectivity
can be established properly.
◆ Schedule — Displays a list of scheduled tasks that are currently being processed
and the status of each task.
◆ Archived Files — Displays an archived file report. Also provides a search option
to find archived files, recover stub files, and delete orphan files.
◆ Policies — Provides options that apply to creating and managing policies,
including:
• A list of policies, file matching expressions, and NAS destinations.
• Create new policy.
• Create new file matching expression.
• Create new NAS destination.
◆ Configuration — Provides configuration of users, passwords, logging, primary
servers, and secondary destination servers.
44 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Type the username and password for FileMover API authentication and callback
HTTP authentication. The system uses this username and password to create an
HTTP connection by using XML API.
This same username and password are used when creating the FileMover API
user in step 2 of “Prerequisite on the Celerra Control Station” on page 50.
4. Specify the following for the Celerra FileMover:
• Basic File Server Information — Type the Celerra name and select the DART
version from the list. If the Data Mover will be involved in CIFS archiving, the
NetBIOS name of the CIFS server must be used. Do not use the fully qualified
domain name (FQDN) or IP address.
Note: To identify the Celerra as a Virtual Data Mover, select the checkbox. Virtual Data
Movers support only the CIFS protocol.
Note: The CIFS credential is not required if the Celerra performs only NFS archiving.
! CAUTION
Multiple appliances may be configured to archive data from a single Celerra
Data Mover, but more than one FMA or FMA/VE should never be used to
archive data from a single filesystem.
46 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Note: The DNS names for the Celerra Callback agent and Atmos Callback agent must
be distinct. They cannot be the same.
• Directory Exclusion List — These are the directories to exclude for all tasks.
File Management ignores all system directories such as, etc, lost+found, and
ckpt by default.
5. Click Commit to define the Celerra FileMover.
◆ To use DNS:
a. Create a DNS entry for the callback daemon that points to the appliance.
b. Create multiple entries by the same name for each callback appliance.
48 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
c. For each entry that is created, select the checkbox for Create associated
pointer (PTR) record to ensure that it will be included in the Reverse Lookup
Zones list.
Note: The Celerra FileMover supports DNS HA failover. If the DNS server resolves the callback
daemon hostname to multiple IP addresses, the Celerra FileMover transparently switches to
the server at the next available IP address.
50 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Note: A single Celerra Data Mover can be configured as an archiving source with multiple
appliances, but more than one FMA or FMA/VE should never be used to archive data
from a single filesystem.
4. Enable DHSM (FileMover) for the Data Mover. DHSM was disabled by default
with Celerra DART 5.6 and later. To enable DHSM and keep it enabled if the Data
Mover reboots, run the following command once:
server_http <data_mover> –service dhsm –start
5. Enable DHSM for specific filesystems that will be used as archiving sources. To
enable DHSM and keep it enabled if the Data Mover reboots, run the following
command once per filesystem.
fs_dhsm -modify <primary_fs> -state enabled
For example: fs_dhsm -modify fileSystem1 -state enabled
6. Ensure that the DHSM offline attribute is enabled for filesystems that will be used
for archiving. To verify that the offline attribute is on, run the command:
fs_dhsm -i <fs_name> | grep ’offline attr’
• If the offline attribute is on, the following line will appear:
offline attr = on
• If the offline attribute is off, turn it on with the command:
fs_dhsm -m <fs_name> -offline_attr on
Note: Once the offline attribute is set to on, it must remain on or File Management
archiving will not work.
Create one or more connections from the Data Mover to the secondary storage
locations for each filesystem that will be archived. Each CIFS or NFS repository used
to store archived data needs to be configured as a DHSM connection for the Celerra
filesystem. If data will be archived to an EMC Centera or an Atmos cluster, a DHSM
connection that uses the HTTP protocol needs to be configured for the filesystem.
52 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Note: Use the apostrophe instead of quotation marks to encapsulate the CIFS
administrative username and UNC path of the secondary storage location.
◆ When archiving NFS data to NAS, you archive to an NFS repository configured
on the appliance.
Create a connection to each NFS repository that will hold archived data. Log in to
the CLI of the Celerra Control Station, and type the command:
fs_dhsm -connection <primary_fs> -create -type nfsv3 –secondary
‘<fqdn_of_secondary_server>:/<repository_path>’ -proto TCP
–useRootCred True
For example: fs_dhsm -connection fileSystem1 -create -type nfsv3 –secondary
‘oldServer.mydomain.prv:/FMA’ -proto TCP –useRootCred True
◆ When archiving any type of data to an EMC Centera CAS or Atmos server, recall
requests will flow from the Data Mover to FMA, FMHA, or FMA/VE.
• To create the connection for an EMC Centera, log in to the CLI of the Celerra
Control Station, and type the command:
fs_dhsm -connection <primary_fs> -create -type http –secondary
'http://<fqdn for CCD>/fmroot' -httpPort 8000 -cgi n -user <user>
For example: fs_dhsm -connection fileSystem1 -create -type http –secondary
'http://CCD01.mydomain.prv/fmroot' -httpPort 8000 -cgi n -user rffm
When prompted, type a password for the ‘rffm’ user.
• To create the connection for an Atmos server, log in to the CLI of the Celerra
Control Station and type the command:
fs_dhsm -connection <primary_fs> -create -type http –secondary
'http://<fqdn for ACD>/fmroot' -httpPort 9000 -cgi n -user <user>
For example: fs_dhsm -connection fileSystem1 -create -type http –secondary
'http://ACD01.mydomain.prv/fmroot' -httpPort 9000 -cgi n -user rffm
When prompted, type a password for the ‘rffm’ user.
These same settings are used in “Adding a Celerra to the File Management
configuration” on page 45.
• The FQDN for the callback daemon is used for “Celerra Callback Agent
Settings” on page 46 or “Atmos Callback Agent Settings” on page 46. The
FQDN must be distinct even if the the Celerra and Atmos callback daemons
are running on the same appliance.
• The same user and password credentials are used for FileMover Settings in step 3.
Regardless of the type of connection (CIFS, NFS, or HTTP), the target of a connection
should be specified as a hostname or FQDN in the command:
fs_dhsm -connection <primary_fs> -create
◆ When a Celerra Data Mover needs to establish a connection to secondary storage,
it first attempts to resolve the hostname in the local hosts file. If the name cannot
be resolved locally, the Data Mover then issues a DNS query.
◆ When archiving to NAS from Celerra, a DNS record is required to resolve the
FQDN of the secondary storage server to IP addresses if the local hostname
resolution of the Celerra is not going to be used. A PTR record (reverse DNS) is
also required to map the IP addresses of the secondary storage server to the
FQDN.
Note: The Celerra File Level Retention (FLR) enabled filesystems cannot be used as an
archiving source.
54 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Note: If a NetApp filer leverages its vScan interface for virus scanning, the IP addresses of the
vScan servers must be configured on the appliance as excluded clients on the NetApp FPolicy
Special Clients configuration page in the GUI. This allows the virus scanner to scan the stub
file upon a recall event. Failure to configure excluded clients properly will lead to recall
failures when vScan is used in conjunction with FPolicy.
Direct command line access through Telnet or SSH is not used by File Management.
However, ONTAPI access is used to send a variety of API calls and hence the
requirement for a local administrator’s credentials. If a user other than root is
specified, then the following option must be set:
options httpd.admin.hostsequiv.enable on
Ensure that the appliance hostname:
◆ Can be resolved to its IP addresses in the local /etc/hosts file of the NetApp filer.
◆ Maps to a user with privileges to access the ONTAPI interface in the
/etc/hosts.equiv file on the filer.
Additional configuration prerequisites vary, depending upon the existing network
environment:
◆ For NetApp filers that run Data ONTAP 7.2 or later, disable duplicate session
detection by setting:
options cifs.client.dup-detection off
◆ To properly support stub files, NetApp FPolicy requires a particular CIFS offline
bit attribute on the stub files:
• The CIFS protocol must be enabled on the NetApp filer to archive either CIFS
or NFS datasets. An active CIFS license must be installed on all file servers that
are archive sources.
• NFS-only exports must be shared as well.
◆ To properly recall stub files, FPolicy must be enabled (options fpolicy.enable on)
and rfpolicy must be the only screen policy registered for reads and writes. If a
policy that monitors stub files on the NetApp filer was previously installed,
manually delete it.
◆ To configure NFS archiving, perform the following steps on the NFS-only source
directories:
1. Create a share at the qtree or volume level for qtree sources.
2. Create a share at the volume level for non-qtree sources, that is, those not part
of any qtree.
3. Add access to only the File Management user.
Note: File Management does not support name clashes on qtrees. For example, QTREE1
against qtree1.
vFiler configuration
Additional configuration prerequisites apply to vFiler support for NetApp filers that
run ONTAP 7.1:
◆ Manually create rfpolicy configuration on the vFiler with the commands:
fpolicy create rfpolicy screen
fpolicy enable rfpolicy
fpolicy options rfpolicy required on
◆ Manually configure secondary FPolicy servers with the command:
fpolicy options rfpolicy secondary_servers ip,ip
To use NetApp vFilers with File Management, ensure that:
◆ The FMA can access to both the vFiler and the hosting NetApp filer.
◆ vFilers and main filers are in IP spaces that can reach each other.
56 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Note: For NetBIOS Domain, use the NetBIOS domain name and not the FQDN. For
example, use emc and not emc.com.
• NetApp as Source — This option configures the FMA to archive data from the
NetApp filer. If more than one FMA is connected to the same NetApp filer,
configure only one FMA with this option. These options are not required if
this NetApp is used as a destination.
! CAUTION
If more than one FMA is configured to archive data from a single NetApp
filer, data loss may occur.
• NetApp Local Admin — Type the username and password of a user on the
NetApp filer. The user must be a member of the NetApp local administrator’s
group.
• Directory Exclusion List
These are the directories to exclude for all tasks. File Management ignores all
system directories such as etc, lost+found, .snapshot by default.
• NetApp FPolicy callback agents
The primary agent recalls all files when it is registered with the NetApp. A
secondary agent recalls files when the primary is unavailable.
– If the FPolicy callback agent is not explicitly configured as a secondary
agent, then it is a primary agent and the NetApp file server will load
balance between the registered primary agents.
– If no primary agents respond, then the NetApp filer will contact any of the
registered secondary agents. When one of the primary agents is responsive
again, the NetApp filer will automatically fail back to the primary agent.
For the primary agent, select the agent that is on the same subnet as the
NetApp machine. For the secondary agent, select another agent on the same
subnet. If no such agent exists, select an agent on the next physically closest
subnet. Up to two secondaries are supported. Secondary agents may include
FMHA appliances.
3. Click Commit to define the NetApp filer.
58 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
3. Select Windows from the Type list box. The Windows Properties page appears:
Note: The appliance must have read/write access to any share or export that may be used as an
archive source or destination. In addition, the appliance must have read/write permission for
any file that it may archive.
1. Click NAS Repository and NAS group on the Configuration tab. The NAS
Repository List and NAS Group List page appears.
2. For Create NAS Repository, click New. The Create New NAS Repository dialog
box appears.
Note: The file server must have a proper DNS entry defined that links the file server
name with the IP address.
• Protocol — Select NFS or CIFS. The source and repository protocol types must
match.
– If the source protocol is CIFS, the NAS repository protocol must be CIFS.
– If the source protocol is NFS, the NAS repository protocol must be NFS.
If the CIFS protocol is selected, use the CIFS user in the filesystem CIFS DHSM
connection string for CIFS specific settings when configuring the primary
storage on the appliance:
– “Adding a Celerra to the File Management configuration” on page 45
provides details on configuring this setting for Celerra NAS.
– “Adding a NetApp filer to the File Management configuration” on page 57
provides details on configuring this setting for NetApp.
– “Adding a Windows server to the File Management configuration” on
page 58 provides details on configuring this setting for Windows.
• Path — Click Browse to select an existing path.
Once the path is specified, a name in the form of Repository at <path>
appears in the Name field.
60 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
• Maximum limit of disk usage — Type a percentage value for disk usage.
Default value is 90%.
4. Click Save Repository. The NAS Repository List reappears with the new NAS
repository listed.
• Access Node IP — Specify the IP address of the EMC Centera access node:
– To specify an additional access node IP, click Add. The IP address is added
both to the list and as an entry in the Access Node String field. If an EMC
Centera cluster is being used, a hostname can be used in place of an IP
address.
– To delete an existing node, select a node IP and click Delete.
• Access Node String — This is automatically generated when the Access Node
IP address is added or deleted. You cannot type data directly into the field.
• Authentication
Select from one of the three choices:
– Anonymous — If selected, no security is used to authenticate with EMC
Centera.
– User profile — If selected, type the username and password of the EMC
Centera profile that is to be used for archiving.
– PEA file — This option requires that a profile and pool entry authorization
(PEA) file was created to access EMC Centera, and that a copy of the PEA
file resides on the File Management Appliance. If selected, the PEA file is
used to authenticate the File Management connection with EMC Centera.
Type the path to the file on the local machine or browse for the file. A copy
of the file will be stored with the File Management configuration.
5. Click Commit to define EMC Centera.
62 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Note: Task and simulation log files are not included in a backup. To preserve these files, copy
the /opt/rainfinity/filemanagement/log/fws directory to secure storage either periodically or
before performing a CD clean install.
64 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
66 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Under Recover File Management, select the .tgz file to restore and click Restore.
The backup file will be restored to /var/fmrestore.
7. Using database information from DBBackup.out, a restoration script reconstructs
the system configuration from the .tgz file selected in step 6. To run the script,
type:
/opt/rainfinity/filemanagement/bin/fmrestore <backup_file.tgz>
As the restoration occurs, the system will prompt for input to:
• Confirm restoration.
• Start the FPolicy callback service for a NetApp.
• Start the callback daemons for Celerra and for Atmos.
At each prompt, type y. When asked if you want to add another server, type n.
If restoring data to the same machine, File Management automatically restarts at the
conclusion of the restoration process. If restoring data to a different machine, File
Management must be manually restarted. Also, original network configuration files,
such as /etc/hosts, may need to be manually edited to reflect the new IP and
hostname of the new machine.
Typical output of the fmrestore script is as follows:
[root@fm2 bin]# fmrestore /var/fmbackup_7.3_fm2.Sun_27-09-09_08_13.tgz
Expanding /var/fmbackup_7.3_fm2.Sun_27-09-09_08_13.tgz in /var...
This will overwrite your configuration and database. Are you sure?
Press any key to continue or abort now...
Starting FileManagemnt...
Starting rslogd (already running): [ OK ]
Starting rslogd Monitor (already running): [ OK ]
Starting File Management [ OK ]
Starting File Management watchdog [ OK ]
rssystatd is running
127.0.0.1
quiet is set to 0
Since there is only one interface, (10.10.9.56/255.255.255.192), it
will be
used to receive CelerraDaemon callbacks from Celerra.
68 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
quiet is set to 0
Since there is only one interface, (10.10.9.56/255.255.255.192), it
will be
used to receive AtmosCallbackDaemon callbacks from Celerra.
70 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Software upgrades
The EMC File Management software may be upgraded with a CD full upgrade or a
UPG upgrade.
After upgrading, run the Rainfinity setup tool, rfhsetup, to configure the network
settings. “Configuring File Management” on page 42 provides information on how to
run the Rainfinity setup tool.
For version 7.3 or later, a simpler method of authentication verification has been
implemented. The username and password settings for the FileMover API and the
Celerra Callback Agent are the same.
When upgrading, the Celerra Callback Agent settings used for File Management
version 7.2 are automatically applied to File Management version 7.3 or later. If
multiple usernames and passwords were configured, only the first set will be
preserved. This username and password will be the single set of credentials for recall
as described in step 3 of “Adding a Celerra to the File Management configuration” on
page 45.
To reduce any potential complication from the consolidation of these settings, before
upgrading to File Management version 7.3 or later, use FMA version 7.2 to
reconfigure the FileMover API settings and Celerra Callback Agent settings to a
single set of credentials and apply the same settings to all Celerra file servers. When
choosing the set to use, it is best to copy the Celerra Callback Agent settings to the
FileMover settings. For example, the username for FileMover Settings in Figure 16 on
page 71 would be changed from dhsm_user to rffm, and the password would be
changed respectively. This same single set would be used for the FileMover and
Callback Agent settings on all Celerra file servers.
Software upgrades 71
Deploying File Management
If the FileMover settings are changed, it will not be possible to archive until the
FileMover API is reconfigured with the new username and password. To re-create the
user, perform step 2 of “Prerequisite on the Celerra Control Station” on page 50.
If the Celerra Callback Agent settings are changed, it will not be possible to recall
until the DHSM connections are re-created with the new username and password.
1. Delete the DHSM connections with the option recall_policy set to no.
2. Follow the steps in “Configuring manually created DHSM connections” on
page 53. Use the single set of credentials to re-create the connections manually.
CD full upgrade The CD full upgrade refreshes all system software packages. If upgrading both an
FMA and an FMHA appliance, upgrade the FMA first.
1. Insert the software recovery CD in the drive.
2. Type reboot. The machine will restart.
Note: To abort the upgrade, power down the node, remove the CD, and reboot.
Note: On the HP platform, the CD ejects automatically. Press Enter to restart the appliance.
UPG upgrade Minor version changes require only a UPG upgrade. This upgrade changes the core
packages. The UPG upgrade is much faster than a full CD upgrade. If upgrading both
an FMA and an FMHA appliance, upgrade the FMA first.
1. If the FMA GUI is running, log out.
2. Stop the File Management daemon with the command:
filemanagement stop
3. Download the upgrade file to the root directory on the appliance:
rf_7.3-##.i686.upg
where ## indicates the build number.
4. Back up the File Management configuration with the command:
fmbackup
The process writes a backup file to
/var/fmbackup.<machine_name>.<timestamp>.tgz.
72 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Deploying File Management
Copy the fmbackup file to another system. If needed for disaster recovery, restore
the backup with the command:
fmrestore /var/fmbackup.<machine_name>.<timestamp>.tgz
“Restoring a backup dump” on page 66 provides more details on the fmrestore
command.
5. Start the upgrade with the command:
/opt/rainfinity/filemanagement/bin/rfupgrade rf_7.3-##.i686.upg
The upgrade process begins with a database pretest script that checks to see if the
File Management databases are consistent between the old and new releases. If
the pretest finds inconsistencies, the upgrade will exit with a "Failed to upgrade
database" error message. Contact an EMC Customer Support Representative to
correct the problem before restarting the upgrade.
If no problems are encountered, the process upgrades the excecutables.
Note: For large databases, the upgrade between versions (for example, 7.2.5 to 7.3) will
require significantly more time than the upgrade within the same version (for example, 7.2
to 7.2.5). To avoid any disruption during the upgrade process, start the File Management
daemon in a screen session on a server that will not be rebooted or shutdown.
74 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
4
File Management
System Settings
Security hardening
By default, security hardening is not enabled:
To configure security hardening:
1. Start the Rainfinity setup tool, type rfhsetup.
2. Select Configure System Security. A set of security settings options appears.
3. Select Harden Appliance.
The default settings for the items that affect the appliance security level are:
• Use single security database =no
• Disable root logins =no
• Strengthen passwords =no
• Age passwords =no
• Harden to STIG requirements =disabled
When all four settings are “no,” security hardening is disabled and this disabled
security level is referred to as the default level.
If any of the settings is set to a non-default value, security hardening is enabled.
Note: In addition to the security settings, the GUI access method may also be configured
from the Harden Appliance menu. By default, the GUI is accessible over both http and
https. Enabling https only or redirecting http to https does not change the appliance
setting to hardened.
Admin users An admin user who is a member of the wheel group and logged in through SSH can
become a superuser to:
• Create/delete other users
• Run rfhsetup
To add an admin user for access from the CLI:
a. Log in to the FMA as root.
b. Type the following commands:
adduser –G rainfinity,wheel <username>
passwd <username>
76 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
Linux PAM users A Linux PAM user is created through the CLI. When a Linux PAM user is logged in to
the GUI with the single security database setting enabled, the user’s role (admin or
ops) is cached for the duration of the session.
If the administrator changes the user’s setting while the user is logged in, the user’s
role will not be refreshed until one of the three following conditions occurs:
◆ User logs out.
◆ GUI is restarted.
◆ Cached user information in the Tomcat server expires due to inactivity.
Note: When the single security database setting is disabled, users created through the GUI are
allowed to log in through the GUI but not the CLI. In addition, if the single security database
setting is enabled, user accounts cannot be created through the GUI. If the user attempts to
invoke the configuration page for Rainfinity users, a warning appears.
Security hardening 77
File Management System Settings
◆ The wheel users are in the local /etc/group file. File Management ignores LDAP
users while performing this check because LDAP servers occasionally become
unreachable. The same holds true for RADIUS users.
Note: Configure a small set of admin users locally for each FMA. Most admin and ops users are
configured on an LDAP server. In this way, the management of these users scales to large
networks.
Strengthen passwords
If the passwd command is run with password strengthening enabled, your new
password must be at least eight characters long and satisfy the following
requirements:
◆ At least three characters are different from the previous password.
◆ At least one character is an uppercase letter.
◆ At least one character is a number.
◆ At least one character is a special character.
In a clustered environment, run the passwd command on both the primary and
backup nodes.
Note: The root user can change any password including its own to any value, regardless of the
password strengthening setting to strengthen it.
Age passwords
If password aging is enabled, every user (except root) who can log in with a shell
account will have an aging password. The root user configures:
◆ When to print a user warning that a password is about to expire.
◆ The maximum number of days a password can remain valid before it must be
changed.
◆ How often a password may be changed.
◆ The number of days following password expiration after which the account will
be locked. Once an account is locked, only the root user can unlock the account by
using the change command to change the age of the password.
Note: If a large number of devices are deployed, a central authentication service (such as
LDAP) should be used. Password administration through the central site greatly facilitates user
scalability, as one user is not required to log in to every deployed File Management appliance
to update an aging password.
78 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
STIG hardening
Security Technical Implementation Guide (STIG) is a set of security guidelines issued by
the US Department of Defense. These STIG UNIX guidelines define how
UNIX/Linux appliances should behave from a security standpoint.
80 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
Global LDAP settings Global LDAP settings affect all LDAP operations. The following settings impact how
the LDAP client on the File Management appliance will behave when the LDAP
server does not respond.
Bind type — There are two types of binds:
◆ Hard — File Management will continue to retry the bind attempt until a
maximum timeout is reached.
◆ Soft — File Management will attempt to bind once and abort if the server does not
respond.
Time limits — There are two types of time limits.
◆ Search time limit — The amount of time that the LDAP client will wait for an
initial response from the server.
◆ Bind time limit — The amount of time that the LDAP client will attempt to bind.
By default, these time limits are set to 10 seconds to allow the appliance to remain
responsive when the LDAP server is down, and to fail over to an alternate
authentication mechanism, if another mechanism is configured.
Server type — The File Management LDAP client works with three types of LDAP
servers:
◆ OpenLDAP
◆ Active directory with SFU 3.5 support
◆ Active directory with RFC 2307 support
LDAP authentication When LDAP is configured, LDAP authentication is established through a sequence of
events.
◆ A user connects to the File Management appliance. The user is challenged for user
authentication.
◆ The File Management LDAP client contacts the LDAP server to validate the
user’s credentials. To validate that the client is trusted, the server attempts:
• To accept anonymous bind attempts, such as accepting all connections without
a password.
• To accept a plain-text password sent over an unencrypted communication
channel.
• To establish a secure communication channel with the client, and then
authenticate by using a plain-text password or SASL.
The client establishes the secure communication channel as follows:
– The client requests the server’s public key.
– The client validates that the server’s public certificate is signed by a known
Certificate Authority (CA).
– The client then encrypts its data using the server’s public certificate. Only
the private key stored on the server can decrypt this data.
Initial data from the client contains negotiation information that the server and
client will both use to establish a secure communication channel.
Just as the client uses the server’s public key to encrypt its first message, the
server ensures that the client is authentic by requesting the client’s public
certificate, and validating that it is signed by a known Certificate Authority.
After the secure channel is established, the password is exchanged. If SASL is
configured, it may be used instead of a password.
◆ The server and client may negotiate an encryption scheme to secure all traffic
between them.
Once authentication is established and an encryption scheme is optionally selected,
the LDAP client will request user authentication.
Note: Other LDAP servers have not been validated for File Management version 7.2 or
later.
82 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
When using SSL and TLS, type the hostname that matches the hostname used in
the certificate generation. If an IP address was used in the certificate generation
instead of the hostname, type the IP address.
Note: Failure to type the proper information will create problems during the LDAP setup.
This is one of the most common configuration errors during LDAP setup.
◆ LDAP basedn
Type the suffix for your domain name.
◆ Advanced LDAP settings
Type Y, to configure a bind password, or enable SASL (Kerberos), SSL, or TLS. If
advanced LDAP settings are left unconfigured, anonymous bind without a bind
password is used by default.
If the GUI is running and LDAP is enabled through rssetup, the GUI will not
recognize LDAP authentication attempts until it is restarted by typing the command:
/opt/rainfinity/filemanagement/bin/fmgui restart
To avoid this problem:
1. Enable external authentication (LDAP, RADIUS, TACACS+) before enabling the
single security database.
2. Invoke the GUI.
Note: When configuring SASL, enter the absolute path for the scp path. ~ is not supported
as root home.
◆ Encryption type
Select cleartext, SSL, or TLS.
◆ Option for the LDAP client to validate the server’s certificate
Type Y if using SSL or TLS. File Management will prompt you to scp the CA
certificate.
◆ Option for the LDAP server to validate the client’s certificate
Before enabling this option, ensure that the client’s key and certificate were
generated and placed on the File Management client.
Note: After the appliance checks with the RADIUS and TACACS+ servers for authentication, it
will, by default, check the local /etc/passwd file for authorization information.
If the user does not exist in the local file, add the user with the commands:
useradd –G rainfinity,wheel <adminusername>
useradd –G rainfinity <opsusername>
Certificate management
When configuring LDAP, TLS, and SSL for authentication, key and certificate files are
required. In order for authentication encryption to work correctly, these keys and
certificates must be:
◆ Periodically refreshed
◆ Correctly located on the appliance
Each certificate has an expiration date. Every week, File Management checks the
validity of each certificate. Certificate warning information is logged into the
/var/log/secure file, and if the alert is enabled, e-mail is sent when the certificate is
due to expire. Once a certificate expiration warning is received, SSL/TLS certificates
must be updated.
84 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
Log settings
When the security level is set to harden, any event that might affect the security of the
system is written to the File Management log files. Use the Rainfinity setup tool to
administer and preserve log files.
86 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
3. For the external server where the log files will be placed, create a user with write
access to the copy directory. Do not use the root user.
Note: In the following steps, server is the IP address or hostname of the external server, and
user is the name of the user on the external server which will copy the files.
Log settings 87
File Management System Settings
Alerts
File Management can be configured to monitor various system log files and send
e-mail to alert whenever an event occurs.
Table 7 on page 88 lists the SNMP traps for which File Management will send a
notification.
88 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
001-0005 Failed to bind to LDAP Attempt to bind to the LDAP secuirtyAlert 1.3.6.1.4.1.1139.9.3.2.0.3
server server failed. This could be
due to a misconfigured
LDAP server address, or
due to a network
connectivity issue. The user
could see delays in logging
in or executing commands if
the LDAP server is
unavailable.
001-0007 SCP of system log files Secure copy of system log genericAlert 1.3.6.1.4.1.1139.9.3.2.0.5
files.
001-0008 SCP of Rainfinity log files Secure copy of Rainfinity log genericAlert 1.3.6.1.4.1.1139.9.3.2.0.5
files.
001-0011 Security level change System security level has secuirtyAlert 1.3.6.1.4.1.1139.9.3.2.0.3
been modified.
001-0017 Log alerts system rfalertd has been started. secuirtyAlert 1.3.6.1.4.1.1139.9.3.2.0.3
enabled
002-1003 Power supply alert A power supply status has hardwareAlert 1.3.6.1.4.1.1139.9.3.1.0.3
changed, or a power supply
failure occurs.
Log settings 89
File Management System Settings
90 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
All alerts are listed in the Log Pattern Index of the GUI.
A different throttle time may be applied to each alert pattern. If alerts occur more
than once within a specified throttle time, the repeated alerts are suppressed.
Note: In order to generate alert e-mail messages from the device, sendmail must be configured.
Log settings 91
File Management System Settings
92 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
Note: To poll for SNMP objects without enabling rfalertd, execute the command: service
rfsnmp start from the root account. This restarts SNMP and no alert history is viewable until
the alert daemon is restarted.
94 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
File Management System Settings
Note: If you have NetApp Filers but no Windows 2000, 2003, or 2008 servers in your domain,
then you must include rsadmin in the domain administrator group. Otherwise you will not be
able to include the rsadmin user in the NetApp filers’ administrators group.
96 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
A
Network Topology
Scenarios
98 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Network Topology Scenarios
Note: Configuration settings are saved, but are not implemented until the File
Management Network Setup menu is exited.
100 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Network Topology Scenarios
Note: When using the VST mode, do not create a VLAN interface.
Configuring VLAN On the FMA/VE side, the VGT mode requires the creation of VLAN interfaces on top
interfaces on the of the FMA/VE ethernet interface. IP addresses are assigned only to the VLAN
FMA/VE interfaces. Use the rfhsetup networking menu to bring the ethernet interface up.
To add a VLAN interface on the FMA/VE:
1. Log in to the FMA/VE. The rfhsetup configuration menu appears.
2. Select Configure FileManagement networking. The Network configuration
menu appears.
3. Select Configure Networking. A list of interfaces appears as follows:
FileManagement Network Setup, Main Menu
1 of 4 entries displayed
Command: [Q]uit [A]dd [R]emove [S]ave [U]p [D]own re[F]resh [H]elp
Status: OK
rfhsetup <- Network configuration -> Interface eth0's
configuration
4. Type A to add a new interface. Use the left and right arrows to select a VLAN
interface and press Enter.
102 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Network Topology Scenarios
104 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Glossary
This glossary contains terms related to file management. Many of these terms are
used in this manual.
A
API Application programming interface. A source code interface provided by the
computer application to support requests for services.
archiving Process that walks the share/export and performs policy-based file archiving.
Atmos Callback File Management callback service to support FileMover recall from Atmos.
Service
C
Celerra Callback File Management callback service to support FileMover recall from EMC Centera.
Service
Celerra FileMover HSM implementation used to support offline files on the Celerra.
D
DHSM Distributed Hierarchical Storage Management is the former name for Celerra
FileMover.
E
EMC Centera API API used to write and read files from EMC Centera.
EMC Centera content Unique key to the saved file on EMC Centera.
address
F
File version Multiple copies on secondary storage of the same file or path.
FileMover API API over HTTP exposed by Celerra Data Mover to create stub files.
FPolicy Callback File Management callback daemon used to support NetApp Fpolicy recall from all
Daemon (FCD) secondary storage.
FPolicy server NetApp Fpolicy server. Provides notification when client accesses stub files.
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 105
Glossary
FQDN Fully qualified domain name. Used with the Celerra Callback DNS entry.
H
HSM Hardware security module.
L
LDAP Lightweight Directory Access Protocol
M
MB Megabyte, 106 bytes.
N
NAS Network attached storage.
O
orphan file Files on the secondary storage with no reference to the primary storage.
P
primary storage NAS device that exports CIFS or NFS volumes.
R
RADIUS Remote Authentication Dial In User Service
retention period Number of days from time of archiving that a file can not be deleted.
S
secondary storage Data storage that is a backup to primary storage.
stub file/offline files Files that appear as normal files on the primary storage but point to data content
stored on the secondary storage.
T
TACACS+ Terminal Access Controller Access-Control System Plus
V
VMotion VMware VMotion technology is virtual machine mobility unique to VMware.
106 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Index
A Celerra
access node IP 62 Atmos settings 46
access node string 62 callback agent settings 46
acdsetup.sh 47 configure in File Management GUI 45
admin user 76 Control Station 46
age passwords 78 DART version 46
alert settings file management configuration 45
email 91 FileMover API user 50
SNMP 92 FQDN 38, 46
alerts 88 prearchiving tasks 50
anonymous 62 source 46
anonymous bind 83 VDM 46
appliance Celerra callback agent
diagrams 30 before upgrade 71
rails 24 Celerra properties 46
Atmos Celerra Callback Service 47
configure in File Management GUI 62 celerracallback
creating connection from Celerra 54 FM upgrade 73
DNS name 63 stop 70
recall from 47 Certificate Authority 81
shared secret 63 certificate authority 85
Atmos callback agent 46 certificate management 84
atmoscallback chassis
FM upgrade 73 File Management 25, 26
stop 70 FMHA 28
authentication 62 CIFS specific settings
Celerra 46
NetApp 57
B Windows 59
backup dump cifs.client.dup-detection 55
create 65 clean install 70
File Management 64 cleartext 83
restore 66 CLI login 44
bind policy 81 client certificate 85
bind type 81 client configuration 81
command history 93
C command line interface 44
callback daemon community string 93
clean install 70 control station 46
DNS entry 48
ccdsetup.sh 47
CD clean install 70
CD full upgrade 72
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 107
Index
D FMHA
DART version 46 appliance details 28
Data Domain 63 CD full upgrade 72
database maintenance 69 configuring on Celerra 38
DBMaintenance.log 69 configuring on NetApp 38
Deploy OVF Template 41 UPG upgrade 72
DHSM 51 fmha_clean 70
automatically create connections 51 fmha_upgrade 72
connection password 53 fmrestore 44, 66, 67
manually create connections 53 fmsupportdump 44
directory exclusion 47, 58 fpolicy callback agent 58
disaster recovery 64 FPolicy Callback Service 56
disks fpolicy.enable 56
File Management 26 fpolicycallback
FMHA 29 FM upgrade 73
DNS entry 48, 60 stop 70
DNS server 43 fpsetup.sh 56
domain 43 FQDN 38, 46
DUMPFILE 66 fs_dhsm 53
duplicate session disable 55 Fully Qualified Domain Name. See FQDN
E G
EMC Centera global LDAP 81
access node IP 62 graphical user interface 44
access node string 62 GUI 44
authentication 62
creating connection from Celerra 54 H
recall from 47 harden appliance 76, 79, 84
enable SNMP alerts 92 host IP 57
ESX 39 hostname 43
hostname resolution 48
F
File Management I
adding Celerra 45 installation 70
adding NetApp 57 ISO image 70
backup 64, 66
Celerra to EMC Centera archiving 47
configure Atmos server 62 K
configure Data Domain server 63 Kerberos 83
configure Windows server 58
disable duplicate session 55 L
high availability appliance details 28 last 94
NetApp archiving 56 LDAP 84
overview 16 advanced settings 83
restore 64 authentication 81
filemanagement 72 basic settings 82
FileMover API 50 bind policy 82
setting before upgrading 71 global settings 81
setting in FMA 46 server type 81, 82
setting on Celerra 52 time limits 81
FileMover settings 45 Linux PAM users 77
fm_clean 70 local admin 58
fm_upgrade 72 local authentication database 84
FM-4 34 log alert pattern 91
FM-5 33 logs
FMA setup 43 alerts 88
fmbackup 44 rotating 86
before upgrade 72
creating backup 66
108 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide
Index
M restore
md5sum 70 dumpfile 66
memory file management 66
File Management 26, 27 reverse lookup zones 49
FMHA 29 rfalertd 93
rffm 44
rfhsetup 76, 79, 82, 84, 85, 86, 87, 91, 93
N rflastcomm 94
NAS repository 60 rfpolicy 56
NAS repository list 61 rfsnmp 93
nasadmin 50 rfupgrade 73
NetApp root logins 77
directory exclusion 47, 58 rotating logs 86
file management configuration 55 rsadmin 95
FPolicy callback agent 58 rssystat 45
local admin 58
prerequisites as archiving source 55
source 58 S
vFiler 56 SASL 83
vFiler host IP 57 scp 86
network interfaces security hardening
File Management 26, 27 features 76
FMHA 29 logs 86
networking 43 sendmail 91
notification host 92 serial port
File Management 26, 27
FMHA 29
O server type 81
online help 22 shared secret 63
Open LDAP 81 simple bind 83
ops user 77 single security database 76
OVF file 39 SNMP
community string 93
P notification host 92
PAM. See pluggable authentication module SNMP alerts 92
passwords 78 SNMP polling 93
PEA file 62 STIG hardening 79
pluggable authentication module 76 strengthen passwords 78
Pool Entry Authentication file 62 system command accounting 93
port detail
FM-4 34 T
FM-5 33 TACACS+ 84
pretest script 72, 73 tgz file 66
Process Acounting package 93 time limits 81
psacct 93 TLS 83
track command history 94
R track user login history 94
RADIUS 84
RAID Controller U
FMHA 29 uc_config 50
RAID controller Unicode 50
FMA on Dell 26 UPG upgrade 72
FMA on HP 27 upgrade
rails 24 CD full 72
rainacd.domain 48 FileMover API considerations 71
rainccd.domain 48 pretest script 72, 73
Rainfinity setup tool 43 UPG 72
recall_policy 72 user profile 62
repository 60 UTF-8 50
EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide 109
Index
V
vFiler 56
VGT 102
VI Client 42
virtual data mover 46
VLAN tagging mode
virtual guest tagging 102
virtual switch tagging 101
VMDK file 39
VMotion 102
VMware
ESX 4.0 server 39
ESXi 3.5 server 39
VST 101
W
web service specific settings 63
wheel group 76
Windows 58
Windows domain user 95
X
xlt.cfg 50
110 EMC File Management Appliance and File Management Appliance/VE Version 7.3.1 Getting Started Guide