Professional Documents
Culture Documents
ibm.com/redbooks
Figure 1 describes a storage system that also hosts three virtual storage systems. The virtual storage systems are assigned resources from the hosting storage system, which still functions as a normal storage system. The virtual storage system in Figure 1 appears in the network as vfiler2.ibm.com, vfiler3.ibm.com, and vfiler4.ibm.com.
In Figure 1, the hosting storage system and each Vfiler can be a member of the same UNIX NIS domain, ibm.com, the same Microsoft Active Directory domain ibm.com, and the same DNS domain ibm.com. However, each Vfiler could be created in a separate IP space and assigned membership in different security domains and DNS namespaces.
administrators for different organizations do not have permission to access other virtual storage systems unless explicitly allowed, which allows for more flexible management policies and greater security as illustrated in Figure 2.
Administrators can manage virtual storage systems using the command line interface (CLI), the System Storage N series FilerView Web-based application, or the centralized Operations Manager framework. Some advanced tasks, such as those related to the SnapMirror integrated disaster recovery and migration functionality, must be managed using the CLI. Other tasks can be performed using OS-level tools such as Active Directory. The Manage ONTAP solution also allows programmatic management through Java, C, and Perl toolkits. With management options available to meet a range of needs, you can integrate storage systems and MultiStore into a wide range of existing operations and processes. Administrators can create and destroy virtual storage systems easily as needed to accommodate temporary projects or changing project priorities. It takes only minutes to deploy a new Vfiler and even less time to destroy one that you no longer need. No additional hardware needs to be deployed or managed. The unprecedented ease and speed opens doors to more efficient operations and project opportunities.
As business needs and workloads change, the administrator can migrate virtual storage systems to ensure that critical projects receive the required level of service and response times, while retired projects are still available online through lower-tier storage. Using different storage system models in the same infrastructure allows critical projects to run on the most powerful hardware, while other projects are still available through smaller models. As priorities change, the administrator can adjust the Vfiler deployments with just a few commands. This flexibility leads to greater return on investment (ROI) and lower total cost of ownership (TCO). Storage management is virtualized, allowing the IT architect to separate many of the logical needs of the infrastructure from the physical hardware that is used to build it. Because less hardware is required, management and acquisition costs can be reduced and adaptability improved. In conjunction with SnapMover technology, a Vfiler can be migrated to another storage system in seconds, with no data migration required and no interruptions to the user. This migration is especially useful in dynamic computational environments such as Grid Computing where huge computational demands change rapidly as jobs and projects start and finish. The load balancing capabilities provide opportunities for unprecedented application scaling efficiencies. MultiStore and SnapMover technologies can also be used with Vfiler migration for system maintenance with no operational interruptions. Virtual storage systems are migrated from a storage system needing maintenance to another storage system. The maintenance is completed and the storage system rebooted, and the Vfiler is migrated back to the original storage system all with no interruptions or need to re-establish connections with the storage system if using NFS or iSCSI. With SnapMover, the migrations take just seconds and do not require additional network resources. Non-disruptive maintenance delivers higher levels of service and allows more profitable operations by being able to offer more stringent Service Level Agreements. SnapMirror can be used to replicate virtual storage systems to one or more target storage systems, where the mirrored virtual storage systems can be quickly activated for disaster recovery purposes. This significantly simplifies disaster preparedness and reduces the chances of anything else going wrong in the stressful minutes following a disaster.
Configuring Vfiler
When a storage system is installed into equipment racks and the power, disk, and network cables are installed, configuration is exceptionally quick and straightforward. It is not unusual for experienced administrators to unpack a new storage system and deploy it into production in about an hour. Virtual storage systems are even easier because they can be created and deployed in minutes with a few simple software commands. This section explains how to setup and configure Vfiler.
There are three main processes that apply to setting up a Vfiler as listed in Table 1.
Table 1 Processes to set up a Vfiler Setup Process The initial Vfiler setup Information Supplied by the Administrator Administration host or hosts DNS domain name and server name information NIS information (if applicable) Root/administrative password WINS server addresses (if applicable) Root/administrative password Type of user authentication (Windows NT4, Windows 2000, Windows .NET domain, Workgroup Authentication, /etc/passwd, or NIS-based) If Windows domain authentication is selected, the password with the permissions to create a domain computer account By default, the NFS protocol is not turned on or active. A single command activates NFS. (NFS must already be licensed on the hosting storage system.)
Enabling NFS
To configure Vfiler, follow these steps: 1. Go to Vfiler - Vfiler wizard menu, leave the check boxes selected, and click Next as shown in Figure 3.
2. Specify the Vfiler name and storage path and click Next as shown in Figure 4.
4. Vfiler1 is created. Click Next to configure the new storage system (Figure 7).
10
5. Input the IP address of the administrative host and select the allowed protocols. Then, click Next as shown in Figure 8.
11
12
7. Specify the IP address and Netmask and assign the Network Interface for vfiler1 as shown in Figure 10.
13
8. At this point, the creation and configuration of vfiler1 is complete. Click Close Window as shown in Figure 11.
14
9. You next need to configure CIFS for Vfiler1. Check whether CIFS has been enabled in FilerView Enable/Disable CIFS Services, as shown in Figure 12.
15
10.After you enable CIFS, go to the CIFS Setup Wizard. Choose the storage system that you want to configure (in our case, vfiler1) and click Next as shown in Figure 13.
11.Input the Vfiler CIFS share name and click Next as shown in Figure 14.
16
12.Choose the network authentication type and click Next (Figure 15).
17
13.Input the CIFS Workgroup Name and click Next as shown in Figure 16.
14.Select the security style of the CIFS Vfiler share and click Next as shown in Figure 17.
18
15.Input the CIFS Root Password for vfiler1 and click Next as shown in Figure 18.
16.You are asked to commit the changes. Review the settings that you made and click Commit. Click Back if you need to modify the settings. See Figure 19.
19
Vfiler1 CIFS setup is now complete (Figure 20). You can access the Vfiler from the network.
20
Clustering considerations
Storage systems that are part of a cluster function independently during normal operation. If one storage system undergoes a system failure or is shut down, the partner storage system will continue to function as itself, while also accessing the failed storage system's disks and assuming its identity. Each member of a cluster must have a MultiStore license to take over its partner with a MultiStore license. When using a cluster, up to 33 virtual storage systems can be created on each node of a cluster, including the hosting storage system, known as vfiler0. Should an outage occur on one of the clustered systems for any reason, virtual storage systems restart automatically on the takeover storage system in a matter of minutes. The virtual storage systems hosted by the storage systems of the cluster are created and configured independently. That is, each storage system can host a different number of virtual storage systems, and the Vfiler configurations on the storage systems can be different from each other. In takeover mode, the functioning storage system takes over all virtual storage systems that are created on the failed storage system. These virtual storage systems include the ones created as well as vfiler0. Therefore, for virtual storage systems on the failed storage system to work correctly after the takeover, each network interface used by a Vfiler in a cluster must have a partner interface already defined. When deploying System Storage N series clusters with virtual storage systems, each storage system's IPspaces and partner network interfaces must be configured correctly for the virtual storage systems to restart on the functioning storage system after a takeover.
Transparent migration
MultiStore supports transparent migration. If the networking infrastructure is up to the task, it is possible to migrate a Vfiler from one storage system to another within seconds, with the higher-level protocols handling any requests outstanding during the short migration time. The level of transparency depends on the higher-level protocols. MultiStore can eliminate disruption for NFS users during the migration process without requiring any service interruptions, remounts, or system downtime. IP SAN users using the iSCSI protocol can also migrate transparently between storage systems. The only caveat is that Data ONTAP associates CHAP authentication with the physical storage system. So, in an environment where CHAP is used, the iSCSI connections need to be re-authenticated on the destination storage system. There are plans to address this necessity to re-authenticate in future versions of Data ONTAP.
21
Unlike NFS, CIFS is a state-full protocol, which means that the client and server need to maintain an active TCP/IP connection during all times that a file is open. Windows clients wait a finite time for a response to a CIFS request. After this timeout, the redirector on the client assumes that the server is down and shuts down the session. This timeout can be set on the client and defaults to the maximum possible value of 45 seconds. If client session context is not transferred within 45 seconds, it can result in data loss for clients that have CIFS files open for writes, op-locks, and so forth. Thus, the Vfiler migration must complete within the defined timeout period. While most Vfiler migration handovers complete in less than 45 seconds, migration time depends on many factors (including the networking infrastructure) and cannot be guaranteed.
Consolidating storage
For most companies, data storage growth combined with the rapid proliferation of UNIX and Windows servers throughout the enterprise has complicated data management. Data is spread among large numbers of disparate servers, each of which must be managed and maintained. MultiStore functionality adds even more flexibility to the already compelling advantages offered by System Storage N series when used for data consolidation. Companies with large numbers of UNIX and Windows servers have long enjoyed the benefits of migrating data to a storage system, which unifies shared access to UNIX and Windows data. Integrated cross-protocol file locking for UNIX and Windows data, ease of use and management, scalability, Snapshot technology, built-in RAID protection, and file system checksums are all features intrinsic to System Storage N series. System Storage N series are fast, simple, and reliable. Using MultiStore, an administrator can connect to a storage system anywhere in the world and create, set up, and deploy a Vfiler into production in a matter of minutes.
22
Figure 21 shows a System Storage N series and two general-purpose UNIX or Windows file servers. Imagine a scenario where the engineering data is accessed primarily through NFS and the corporate data through CIFS. As time passes and new applications are added, it becomes advantageous to access all the data through both NFS and CIFS. Trying to patch and update the general-purpose operating systems to serve both NFS and CIFS can be complex and error-prone. In addition, the general-purpose servers can be redeployed for a range of other applications if there was a more effective way to serve the files. Licensing MultiStore on the existing storage system and creating a Vfiler to replace each of the older general-purpose servers provides a cost effective solution.
Figure 21 System Storage N series and two general servers acting as file servers
23
Figure 22 shows the System Storage N series hosting two virtual storage systems that reuse the names of the older servers. The data previously stored on the general-purpose servers has been copied to the new virtual storage systems, and is now available through both CIFS and NFS. The general-purpose servers have been redeployed elsewhere, providing investment protection and greater return on investment.
There are many benefits to consolidating data from a large number of general-purpose servers to virtual storage systems running on a storage system. The data can be centrally managed, backed up, easily scaled, and replicated to other storage systems for disaster recovery purposes using proven SnapMirror technology. In addition, powerful System Storage N series features such as Snapshot, FlexVol, and FlexVol Cloning become available to simplify management and to empower the IT administrator. In many cases, the consolidation is not readily apparent to users. As far as users or applications are concerned, the file servers exist as they did before, using the same names and IP addresses. Administrators do not need to change most scripts or references to the servers or their network IP addresses within applications. Administrators also do not need to modify records in the corporate DNS namespace.
24
Migrating Vfiler
Through integration with either SnapMirror or SnapMover, virtual storage systems can be migrated to other storage systems over a LAN, WAN, or back-end storage interconnect for the purposes of load balancing or maintenance. Integrated mirror relationships can be established to simplify the migration of virtual storage systems to other physical storage systems.
25
Figure 23 summarizes the steps to complete prior to defining a SnapMirror migration or disaster recovery relationship.
26
Each Vfiler's configuration, security, and networking information is stored within its own root directory. This allows administrators to mirror or migrate complete virtual storage systems over the network.
27
successful SnapMirror update. The only difference between the original Vfiler and the disaster recovery Vfiler is that the disaster recovery Vfiler is inactive until a situation forces it to be activated. Thus, the failover can be transparent relative to the applications and users throughout the enterprise.
28
Figure 24 illustrates disaster recovery with SnapMirror. In this illustration, vfiler3.ibm.com is mirrored from storage1.ibm.com to storage2.ibm.com. vfiler3.ibm.com can be activated on storage2.ibm.com if storage1.ibm.com becomes unavailable. vfiler3.ibm.com appears in the network exactly as it did before. Users, for example, would not necessarily know a Vfiler had been moved to a different physical storage system.
29
When enabled, the hosting storage system becomes also known as vfiler0. The name vfiler0 is used internally by MultiStore to identify the hosting storage system. The hosting storage system's actual host name and configuration do not change. Because of the security features of MultiStore, all networking and storage resources need to be owned by one (and only one) Vfiler.
30
Be aware of the following key behaviors: By default, vfiler0 owns all of the storage system's storage and networking resources. At any given time, any resources not explicitly assigned to a Vfiler belong to the hosting storage system (vfiler0). Each Vfiler must be assigned at least one storage resource and one networking resource. Moving, adding, or removing resources between virtual storage systems only affects the associations between a vfiler and those resources. User data is not affected. When an administrator creates a Vfiler on a given volume or adds a volume to an existing Vfiler, resources are moved from the hosting storage system (vfiler0) to the new Vfiler. When resources are removed from a Vfiler or a Vfiler itself is removed, the resources associated with that Vfiler are returned to the hosting storage system. These behaviors help ensure that only authorized users and administrators have access to resources and information in question.
Storage resources
Storage resources on storage systems start with a physical file system, or volume. The volume can be either a Traditional Volume or a Flexible Volume. Within a volume, special subdirectories can be created called qtrees that function as logical volumes. Both volumes and qtrees can be assigned to virtual storage systems as storage resources. Vfiler storage resources (volumes and qtrees) can be added or removed at any time. Removing the storage resource holding the Vfiler configuration information is not allowed without first destroying the Vfiler in question. The storage system's entire root volume (typically vol0) cannot be assigned to a Vfiler, though qtrees created within the root volume can be assigned to a Vfiler. All storage resources assigned to virtual storage systems are secured within the file system. If a Vfiler is deleted, for example, the portion of the file system and data previously owned by that Vfiler might not be accessible to other virtual storage systems in different security domains.
31
Volumes or qtrees assigned to virtual storage systems are known as storage units. The first assignment of a volume or qtree to a Vfiler is known as the primary storage unit. The primary storage unit contains an /etc directory that consists of a subset of the files normally found in the hosting storage system's /etc directory, specific to that Vfiler's configuration. Examples of this information are UNIX NIS or Windows domain information, configuration options, disk quota assignments, UNIX/Windows user mappings, DNS namespace and server information, and so forth. As a result, each Vfiler independently stores information about its membership in Windows or UNIX security domains. One Vfiler can serve UNIX clients only, another can be a member of a Windows 2000 or Windows .NET Active Directory Domain, a Windows NT 4.0 and NIS Domain, and so forth. Resources assigned to a Vfiler are owned only by that Vfiler. In other words, each Vfiler and its resources are distinct and meaningful only to itself and the security environment (for example, Windows Domain) to which it belongs. The hosting storage system administrator or an administrator responsible for vfilerA does not necessarily have any access to resources assigned to vfilerB.
Networking resources
There are many choices available when it comes to choosing network cards for a storage system. However, the storage system's physical network cards (interfaces) can also be logically configured in combinations of up to 128 virtual interfaces, each of which is indistinguishable from a physical interface when it comes to assigning IP addresses. Virtual storage systems can be created and assigned IP addresses that correspond to any network interface (logical or physical) on the storage system. Each physical interface can be used individually, and assigned a base IP address.The storage system's physical interfaces can be combined into virtual interfaces or VIFs, which are link aggregations or trunks of (up to 16) combined links providing fault tolerance and improved throughput. Multiple (logical) Virtual Local Area Network (VLAN) interfaces can be created and associated with any physical interface or VIF. In addition to the flexibility offered by VLANs and VIFs, IP address aliases can be assigned to any interface. IP address aliasing allows more than one IP address at a time to be associated with an interface.
32
IPspaces
Virtual storage systems can be grouped into IPspaces, each of which represents a distinct networking environment. An IPspace defines an IP address space that is separate from other IPspaces. Each IPspace maintains its own distinct routing table and no cross-IPspace traffic is routed. In addition to the always present default-ipspace, up to 100 separate IPspaces can be created on a storage system. IPspaces are beneficial in environments where a storage system must host storage for two separate departments or organizations, each with private networks. They are invaluable to service providers who can readily create and allocate a brand new virtual storage system with its own secure storage, secure administration, and secure routing to customers. Virtual storage systems allow service providers to deploy and bill for service within minutes. IP addresses defined within an IPspace are only meaningful within that IPspace. That means that IP addresses are not forced to be unique across IPspaces, and the same IP address can be used in multiple IPspaces for more standardized management. Virtual storage systems in different IPspaces cannot internally communicate with each other, even though they are running on the same hosting storage system. Incoming network traffic on the storage system's network interfaces is internally tagged with the IPspace ID to identify the target Vfiler, and virtual storage systems use the routing table for their IPspace when communicating with other computers. By default, a single default IPspace exists, named default-ipspace. All of the storage system's interfaces belong to the default-ipspace unless they are assigned to a non-default IPspace created by the administrator. Before an IPspace can be used, it must be assigned a network interface. Any of the storage system's physical, VLAN, or VIF network interfaces can be assigned to an IPspace. By creating and using logical VLAN interfaces, more IPspaces can be created than physical interfaces available in the storage system. Note how each Vfiler has the same IP address. This is possible because each Vfiler is in a different IPspace, each of which functions as though on a separate LAN. They function within a network space that has its own network addressing and routing table. Thus, even though they have the same IP address and are hosted on the same storage system, there are no address conflicts because they cannot communicate with one another unless they go through an external network router. This kind of practice can simplify planning and administration because all customers have similar configurations, with servers which have the same role using the same IP address across customers. See Figure 26 for graphical illustration.
33
34
When an IPspace is associated with a VLAN interface, virtual storage systems within that IPspace only communicate with other computers that are members of the same VLAN. In Figure 27, the storage system has two Gigabit Ethernet network interfaces (e7 and e8) that are combined into a storage system VIF (trunk) for maximum performance and reliability. Four VLAN interfaces are defined on the storage system's tr1 VIF interface that correspond to the VLANs defined on a network switch. There are four IPspaces (tr1-10, tr1-20, tr1-30, and tr1-40), each of which are assigned to one of the four VLAN interfaces. There is one Vfiler in each IPspace whose IP addresses are associated with each IPspace/VLAN. The result is that each Vfiler functions as thought it is on its own local area network. It should be noted that each one of the virtual storage systems in the example could also be members of different security domains. This secure architecture allows for maximum flexibility and allows the storage system to determine the target VLAN, IPspace, and Vfiler.
Figure 27 Using Virtual Interfaces, VLANs, and IPspaces with a single network switch
35
Higher-level integration
The IBM System Storage N series integrates with several common data management tools. This section discusses some of these tools.
Virus scanning
Data ONTAP includes integrated antivirus server support for data accessed by Windows computers. The efficient, on-access nature of the N series storage system antivirus architecture ensures files are scanned before allowing any reads, writes, or changes to data. For the virus scanning server or servers to intercept file I/O requests, antivirus servers must register with the hosting storage system or Vfiler. Virus scanning can be enabled or disabled for each Vfiler, and options can be set independently for each Vfiler. Virtual storage systems can use scanning servers that are either: Registered with the hosting storage system Registered with a specific Vfiler
Quota management
Administrators can manage disk quotas on a per-Vfiler basis on the qtrees and volumes owned by a particular Vfiler. However, if a qtree owned by a Vfiler resides in a volume owned by the hosting storage system, the hosting storage system administrator can also specify a quota for the qtree. The qtree cannot exceed the storage system specified limit in the more restrictive of the two quotas (the lesser quota takes precedence.) Quota settings are preserved when virtual storage systems are duplicated through SnapMirror to other hosting storage systems. For a complete list and description of Vfiler-related commands, see the Data ONTAP MultiStore Management Guide.
36
Windows administration
When all of the necessary setup steps are complete, the Vfiler shows up in the network just like a regular storage system. For example, Figure 28 shows how RED1 hosting storage system and its two virtual storage systems BLUEN1 and BLUEN1 appear like native active directory servers within the Active Directory Users and Computers administrative window.
Figure 28 Windows Active Directory sees Vfiler like any other storage system
Some aspects of storage system or Vfiler management can be performed by right-clicking on the storage system and selecting the Manage menu option, as shown in Figure 29.
37
Figure 30 shows the detailed Vfiler management in Active Directory showing user sessions connected to BLUEN2 vfiler.
Summary
MultiStore allows a storage system's storage and networking resources to be partitioned into multiple virtual storage systems, each of which appears as an individual storage system in the network. The dynamic, flexible nature of virtual storage systems simplifies UNIX and Windows storage consolidation, and offers unified access to data over both CIFS and NFS. Virtual storage systems can be wholly mirrored to other storage systems over a network for data migration, disaster recovery, or load balancing purposes. Virtual storage systems can be grouped into private network address spaces and belong to different security domains for maximum security. MultiStore simplifies data storage and management for companies or service providers requiring highly available storage and secure, multi-domain flexibility.
38
The following capabilities lead directly to added value for organizations using MultiStore and SnapMover: Different organizations might be responsible for managing the hosting storage system or each Vfiler. Organizations benefit by centralizing management of the hosting storage system, while allowing client departments to independently, securely, and responsively manage their own data. The result is efficiency and great service, with the some functions reliably centralized and scaled, while others are distributed closer to the user who ultimately benefits from responsive and more tailored service. Vfiler administrators for different organizations do not have permission to access other virtual storage systems unless explicitly allowed. This allows for more flexible management policies and greater security. Virtual storage systems can be managed using the CLI, the Web-based FilerView application, the centralized DataFabric Manager, or the Manage ONTAP API. Many management options means it is possible to integrate storage systems and MultiStore into a wide range of existing operations and processes. The result is rapid deployment and reduced process re-engineering costs. Virtual storage systems can be created and destroyed easily as needed to accommodate temporary projects or changing project priorities. No additional hardware needs to be deployed or managed. The unprecedented ease and speed opens doors to more efficient operations and project opportunities. As business needs and workloads change, administrators can migrate virtual storage systems to ensure that critical projects receive the required level of service and response times, while retired projects are still available online through lower-tier storage. As priorities change, the administrator simply adjusts Vfiler deployments. This flexibility leads to greater ROI and lower TCO. Storage management is virtualized, allowing the IT architect to separate many of the logical needs of the infrastructure from the physical hardware used to build it. Because less hardware is required, management and acquisition costs can be reduced, and adaptability improved. In conjunction with SnapMover technology, administrators can migrate a Vfiler to another storage system in seconds, with no data being copied and no interruptions to the user. Combined with Grid technology, the load balancing capabilities provide opportunities for unprecedented application scaling efficiencies. MultiStore and SnapMover technologies can also be used with Vfiler migration for system maintenance with no operational interruptions. Non-disruptive maintenance delivers higher levels of service and allows more
39
profitable operations by being able to offer more stringent Service Level Agreements. SnapMirror can be used to replicate virtual storage systems to one or more target storage systems, where the mirrored virtual storage systems can be quickly activated for disaster recovery purposes. This significantly simplifies disaster preparedness, and reduces the chances of anything else going wrong in the stressful minutes following a disaster.
40
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces. Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
41
This document created or updated on August 22, 2007. Send us your comments in one of the following ways: Use the online Contact us review redbook form found at: ibm.com/redbooks Send your comments in an email to: redbook@us.ibm.com Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099, 2455 South Road Poughkeepsie, NY 12601-5400 U.S.A.
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: Redbooks (logo) IBM Redbooks System x System Storage
The following terms are trademarks of other companies: Vfiler, Snapshot, SharedStorage, FlexVol, Network Appliance, SnapMover, SnapMirror, MultiStore, FilerView, DataFabric, Data ONTAP, and the Network Appliance logo are trademarks or registered trademarks of Network Appliance, Inc. in the U.S. and other countries. Vfiler, Snapshot, SharedStorage, Data ONTAP, Network Appliance, SnapMover, SnapMirror, MultiStore, FilerView, DataFabric, and NetApp logo are trademarks or registered trademarks of NetApp Corporation or its subsidiaries in the United States, other countries, or both. Vfiler, Snapshot, Data ONTAP, SnapMover, SnapMirror, MultiStore, FilerView, DataFabric, Network Appliance, The Network Appliance logo, the bolt design,Camera-to-Viewer, Center-to-Edge, ContentDirector, ContentFabric, NetApp Availability Assurance, NetApp ProTech Expert, NOW, NOW NetApp on the Web, RoboCache, RoboFiler, SecureAdmin, Serving Data by Design, Smart SAN,The evolution of storage, Virtual File Manager, and Web Filer are trademarks of Network Appliance, Inc. in the U.S. and other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. Java, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Active Directory, Microsoft, Windows NT, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, or service names may be trademarks or service marks of others.
42