- Notes, cautions, and warnings
- Introduction to this guide
- PowerScale scale-out NAS
- General cluster administration
- General cluster administration overview
- User interfaces
- Connecting to the cluster
- Licensing
- Certificates
- Viewing and Editing TLS Authority Certificates
- Importing TLS Authority Certificates
- Replacing TLS Authority Certificates - Overview
- Deleting TLS Authority Certificates
- Viewing and Editing TLS Server Certificates
- Importing TLS Server Certificates
- Configuring TLS Certificate Settings
- TLS certificate data example
- Cluster identity
- Cluster date and time
- SMTP email settings
- Configuring the cluster join mode
- File system settings
- Security hardening
- Cluster monitoring
- Monitoring cluster hardware
- Events and alerts
- Cluster maintenance
- SupportAssist
- SRS Summary
- Access zones
- Authentication
- Authentication overview
- Authentication provider features
- Security Identifier (SID) history overview
- Supported authentication providers
- Active Directory
- LDAP
- NIS
- Kerberos authentication
- File provider
- Local provider
- Multifactor authentication (MFA)
- Single sign-on overview
- Multi-instance active directory
- LDAP public keys
- Managing Active Directory providers
- Managing LDAP providers
- Managing NIS providers
- Managing MIT Kerberos authentication
- Managing file providers
- Managing local users and groups
- View a list of users or groups by provider
- Create a local user
- Create a local group
- Naming rules for local users and groups
- Modify a local user
- Modify a local group
- Delete a local user
- Delete a local group
- Configure a login delay
- Set a concurrent session limit
- Set a new user account to disable when inactive
- Set an existing user account to disable when inactive
- Configure minimum password requirements
- Configure the password hash type
- Set password expiration
- Set minimum new password changes
- Set lock users criteria
- Reset a user password
- Managing SSO
- Administrative roles and privileges
- Identity management
- Home directories
- Home directories overview
- Home directory permissions
- Authenticating SMB users
- Home directory creation through SMB
- Home directory creation through SSH and FTP
- Home directory creation in a mixed environment
- Interactions between ACLs and mode bits
- Default home directory settings in authentication providers
- Supported expansion variables
- Domain variables in home directory provisioning
- Data access control
- File sharing
- File sharing overview
- SMB security
- SMB shares in access zones
- SMB Multichannel
- SMB share management through MMC
- SMBv3 encryption
- SMB server-side copy
- SMB continuous availability
- SMB file filtering
- Symbolic links and SMB clients
- Anonymous access to SMB shares
- Managing SMB settings
- Managing SMB shares
- Create an SMB share
- Modify SMB share permissions, performance, or security
- Delete an SMB share
- Limit access to /ifs share for the Everyone account
- Configure anonymous access to a single SMB share
- Configure anonymous access to all SMB shares in an access zone
- Add a user or group to an SMB share
- Configure multi-protocol home directory access
- NFS security
- FTP
- HTTP and HTTPS security
- File filtering
- Auditing
- Auditing overview
- Syslog
- Syslog forwarding and TLS
- OpenBSM service
- Protocol audit events
- Audit log purging
- Managing audit settings
- Enable configuration change auditing
- Forward configuration changes to syslog
- Enable protocol access auditing
- Forward protocol access events to syslog
- Configure protocol audited zones
- Configure protocol event filters
- Enable system auditing and forwarding
- Import certificate for TLS syslog forwarding
- Set the audit hostname
- View audit settings
- Automatic deletion
- Manual deletion
- Integrating with the Common Event Enabler
- Tracking the delivery of protocol audit events
- Snapshots
- Snapshots overview
- Data protection with SnapshotIQ
- Snapshot disk-space usage
- Snapshot schedules
- Snapshot aliases
- File and directory restoration
- Best practices for creating snapshots
- Best practices for creating snapshot schedules
- File clones
- Snapshot locks
- Snapshot reserve
- Writable snapshots
- SnapshotIQ license functionality
- Creating snapshots with SnapshotIQ
- Managing snapshots
- Restoring snapshot data
- Managing snapshot schedules
- Managing snapshot aliases
- Managing with snapshot locks
- Configure SnapshotIQ settings
- Set the snapshot reserve
- Managing changelists
- Deduplication with SmartDedupe
- Data replication with SyncIQ
- SyncIQ data replication overview
- Replication policies and jobs
- Replication snapshots
- Data failover and failback with SyncIQ
- Recovery times and objectives for SyncIQ
- Replication policy priority
- SyncIQ license functionality
- Replication for nodes with multiple interfaces
- Restrict SyncIQ source nodes
- Creating replication policies
- Managing replication to remote clusters
- Initiating data failover and failback with SyncIQ
- Performing disaster recovery for older SmartLock directories
- Managing replication policies
- Managing replication to the local cluster
- Managing replication performance rules
- Managing replication reports
- Managing failed replication jobs
- Data Encryption with SyncIQ
- Data Transfer with Datamover (SmartSync)
- Data layout with FlexProtect
- Large file size support
- NDMP backup and recovery
- NDMP backup and recovery overview
- NDMP two-way backup
- NDMP three-way backup
- Support for NDMP sessions on Generation 6 hardware
- Setting preferred IPs for NDMP three-way operations
- NDMP multi-stream backup and recovery
- Snapshot-based incremental backups
- NDMP backup and restore of SmartLink files
- NDMP protocol support
- Supported DMAs
- NDMP hardware support
- NDMP backup limitations
- NDMP performance recommendations
- Excluding files and directories from NDMP backups
- Configuring basic NDMP backup settings
- Managing NDMP user accounts
- NDMP environment variables overview
- Managing NDMP contexts
- Managing NDMP sessions
- Managing NDMP Fibre Channel ports
- Managing NDMP preferred IP settings
- Managing NDMP backup devices
- NDMP dumpdates file overview
- NDMP restore operations
- Sharing tape drives between clusters
- Managing snapshot based incremental backups
- Managing cluster performance for NDMP sessions
- Managing CPU usage for NDMP sessions
- File retention with SmartLock
- SmartLock overview
- Compliance mode
- Enterprise mode
- SmartLock directories
- Replication and backup with SmartLock
- SmartLock license functionality
- SmartLock considerations
- Set the compliance clock
- View the compliance clock
- Creating a SmartLock directory
- Managing SmartLock directories
- Managing files in SmartLock directories
- Set a retention period through a UNIX command line
- Set a retention period through Windows Powershell
- Commit a file to a WORM state through a UNIX command line
- Commit a file to a WORM state through Windows Explorer
- Override the retention period for all files in a SmartLock directory
- Delete a file committed to a WORM state
- View WORM status of a file
- Protection domains
- Data-at-rest-encryption
- Data-at-rest encryption overview
- Self-encrypting drives
- Data security on self-encrypting drives
- Data migrations and upgrades to a cluster with self-encrypting drives
- Enabling external key management
- Migrate nodes and SEDs to external key management
- Chassis and drive states
- Smartfailed drive REPLACE state
- Smartfailed drive ERASE state
- S3 Support
- SmartQuotas
- SmartQuotas overview
- Quota types
- Default quota type
- Usage accounting and limits
- Disk-usage calculations
- Quota notifications
- Quota notification rules
- Quota reports
- Creating quotas
- Managing quotas
- Managing quota notifications
- Email quota notification messages
- Managing quota reports
- Basic quota settings
- Advisory limit quota notification rules settings
- Soft limit quota notification rules settings
- Hard limit quota notification rules settings
- Limit notification settings
- Quota report settings
- Storage Pools
- Storage pools overview
- Storage pool functions
- Autoprovisioning
- Node pools
- Virtual hot spare
- Spillover
- Suggested protection
- Protection policies
- SSD strategies
- Other SSD mirror settings
- Global namespace acceleration
- L3 cache overview
- Tiers
- File pool policies
- Managing node pools in the web administration interface
- Managing L3 cache from the web administration interface
- Managing tiers
- Creating file pool policies
- Managing file pool policies
- Configure default file pool protection settings
- Default file pool requested protection settings
- Configure default I/O optimization settings
- Default file pool I/O optimization settings
- Modify a file pool policy
- Prioritize a file pool policy
- Create a file pool policy from a template
- Delete a file pool policy
- Monitoring storage pools
- Pool-based tree reporting in FSAnalyze (FSA)
- System jobs
- Networking
- Networking overview
- About the internal network
- About the external network
- Configuring the internal network
- Managing IPv6
- Managing groupnets
- Managing external network subnets
- Managing IP address pools
- Managing SmartConnect Settings
- Managing network interface members
- Managing node provisioning rules
- Managing routing options
- Managing DNS cache settings
- Managing host-based firewalls
- Modify the OneFS firewall service
- Create a firewall policy
- View a firewall policy
- Create a firewall rule
- View a firewall rule
- Modify a firewall rule
- Delete a firewall rule
- Clone a firewall policy
- Delete a firewall policy
- Associate a network subnet or pool to a firewall policy
- Reset the global default firewall policies
- Managing TCP ports
- NFS3oRDMA
- Smart QoS
- Antivirus
- Antivirus overview
- On-access scanning
- ICAP Antivirus policy scanning
- Individual file scanning using ICAP
- WORM files and antivirus
- Antivirus scan reports
- ICAP servers
- CAVA servers
- ICAP threat responses
- CAVA threat responses
- Configuring global antivirus settings
- Managing ICAP servers
- Managing CAVA servers
- Add and connect to a CAVA server
- List or view CAVA servers
- Modify CAVA connection settings
- Disable connection to a CAVA server
- Delete connection to a CAVA server
- Add a job to a CAVA server
- View an IP pool in a CAVA server
- Create an Active Directory authentication provider for the AvVendor access zone
- Update the role in the access zone
- Scan CloudPool files in a CAVA server
- Create an antivirus policy
- Managing ICAP antivirus policies
- Managing antivirus scans
- Managing antivirus threats
- Managing antivirus reports
- File System Explorer