N2000H V3 Appliance
User Guide
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
3.1 Powering On........................................................................................................................................................................ 63
3.2 Powering Off ....................................................................................................................................................................... 64
4 Configuring the N2000H V3 ............................................................................................... 66
4.1 Configuration Overview ..................................................................................................................................................... 66
4.1.1 Default Information ......................................................................................................................................................... 66
4.1.2 Configuration Process ..................................................................................................................................................... 67
4.2 Checking the N2000H V3 .................................................................................................................................................. 68
4.3 Configuring RAID Properties ............................................................................................................................................ 72
4.4 Configuring the BIOS......................................................................................................................................................... 76
4.5 Changing an iBMC User Password ................................................................................................................................... 81
4.6 Installing an OS................................................................................................................................................................... 83
4.6.1 Envirament Preparing ...................................................................................................................................................... 83
4.6.2 OS installation.................................................................................................................................................................. 84
4.7 Service configuration .......................................................................................................................................................... 92
4.7.1 Configuring Basic Features ............................................................................................................................................. 92
4.7.1.1 Creating Volumes.......................................................................................................................................................... 92
4.7.1.2 Checking the Factory Configuration ........................................................................................................................... 93
4.7.1.3 Configuring Local Users and User Groups ................................................................................................................. 94
4.7.2 Configuring Sharing Features ......................................................................................................................................... 96
4.7.2.4 Configuring a CIFS Share ............................................................................................................................................ 96
4.7.2.5 Configuring an NFS Share ........................................................................................................................................... 99
4.7.2.6 Configuring an FTP Share .........................................................................................................................................102
4.7.2.7 Configuring an HTTP Share ......................................................................................................................................104
4.7.3 Configuring Value-Added Features ..............................................................................................................................106
4.7.3.8 Configuring Deduplication ........................................................................................................................................106
4.7.3.9 Configuring the iSCSI Target Server.........................................................................................................................107
4.7.3.10 Configuring BranchCache (Hosted Cache Mode).................................................................................................. 110
4.7.3.11 Configuring BranchCache (Distributed Cache Mode) ........................................................................................... 113
4.7.3.12 Configuring DFS ...................................................................................................................................................... 115
5 System Security Policy ...................................................................................................... 118
5.1 System Security Reinforce ............................................................................................................................................... 118
5.1.1 Security Settings ............................................................................................................................................................ 118
5.1.2 Auditing and Account policies ......................................................................................................................................122
5.1.3 Administrative Templates ..............................................................................................................................................123
5.1.4 Additional Security Protection ......................................................................................................................................126
5.2 System Patch Update ........................................................................................................................................................128
5.2.1 Update Automatically ....................................................................................................................................................128
5.2.2 Update manually ............................................................................................................................................................129
6 Security Maintenance Policy ............................................................................................ 131
6.1.1 System Secruity Patch Updating ..................................................................................................................................131
6.1.2 Secutity Configuration and Reinforce ..........................................................................................................................131