SnapServer 7.0 Administrator’s Guide
10400317-001 10/2011 ©2010-11 Overland Storage, Inc. W vii
How the SnapServer Calculates Usage .....................................................................................................5-17
Enable/Disable Quotas ................................................................................................................................5-18
Displaying Quotas .........................................................................................................................................5-18
Chapter 6 - Other Storage Options
Snapshots ..............................................................................................................................................................6-2
Creating Snapshots ........................................................................................................................................6-3
Schedule Snapshots .......................................................................................................................................6-5
Snapshot Space ..............................................................................................................................................6-6
Snapshot Properties ........................................................................................................................................6-7
iSCSI Disks ...............................................................................................................................................................6-9
Configuring iSCSI Initiators ...........................................................................................................................6-10
iSCSI Configuration on the SnapServer ......................................................................................................6-17
Create iSCSI Disks ..........................................................................................................................................6-20
Edit an iSCSI Disk ...........................................................................................................................................6-21
Delete an iSCSI Disk ......................................................................................................................................6-22
Configuring VSS/VDS for iSCSI Disks ............................................................................................................6-22
Disks ......................................................................................................................................................................6-25
Replacing Disk Drives ...................................................................................................................................6-25
Adding Additional Disk Drives .....................................................................................................................6-27
Disk Drive LED Indicator Usage ....................................................................................................................6-28
Chapter 7 - Security Options
Overview ...............................................................................................................................................................7-1
Guidelines for Local Authentication .............................................................................................................7-2
UID and GID Assignments ....................................................................................................................................7-3
Security Guides .....................................................................................................................................................7-3
Windows Active Directory Security Guide ...................................................................................................7-4
Entire Volume Security Guide ........................................................................................................................7-5
Folder on Volume Security Guide .................................................................................................................7-5
Shares .....................................................................................................................................................................7-6
Share and Folder Security Overview ............................................................................................................7-7
Create Shares ...............................................................................................................................................7-10
Advanced Share Properties ........................................................................................................................7-10
Edit Share Properties .....................................................................................................................................7-12
Delete Shares ................................................................................................................................................7-13
Configuring Share Access ...........................................................................................................................7-13
Windows ACLs ............................................................................................................................................7-19
Local Users ...........................................................................................................................................................7-20
Create a User ................................................................................................................................................7-20
Edit User Properties .......................................................................................................................................7-22
User Password Policies ..................................................................................................................................7-23
Assign User to Group ....................................................................................................................................7-24
Delete Local User ..........................................................................................................................................7-25
Local Groups .......................................................................................................................................................7-26
Create New Group ......................................................................................................................................7-26
Edit Group Properties ...................................................................................................................................7-27
Specify Users in Group ..................................................................................................................................7-28
Delete Group ................................................................................................................................................7-28
Security Models ...................................................................................................................................................7-28
Security Model Functionality .......................................................................................................................7-29