EasyManua.ls Logo

Huawei N2000H V3 - Page 6

Huawei N2000H V3
279 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
N2000H V3 Appliance
User Guide
Contents
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
v
3.1 Powering On........................................................................................................................................................................ 63
3.2 Powering Off ....................................................................................................................................................................... 64
4 Configuring the N2000H V3 ............................................................................................... 66
4.1 Configuration Overview ..................................................................................................................................................... 66
4.1.1 Default Information ......................................................................................................................................................... 66
4.1.2 Configuration Process ..................................................................................................................................................... 67
4.2 Checking the N2000H V3 .................................................................................................................................................. 68
4.3 Configuring RAID Properties ............................................................................................................................................ 72
4.4 Configuring the BIOS......................................................................................................................................................... 76
4.5 Changing an iBMC User Password ................................................................................................................................... 81
4.6 Installing an OS................................................................................................................................................................... 83
4.6.1 Envirament Preparing ...................................................................................................................................................... 83
4.6.2 OS installation.................................................................................................................................................................. 84
4.7 Service configuration .......................................................................................................................................................... 92
4.7.1 Configuring Basic Features ............................................................................................................................................. 92
4.7.1.1 Creating Volumes.......................................................................................................................................................... 92
4.7.1.2 Checking the Factory Configuration ........................................................................................................................... 93
4.7.1.3 Configuring Local Users and User Groups ................................................................................................................. 94
4.7.2 Configuring Sharing Features ......................................................................................................................................... 96
4.7.2.4 Configuring a CIFS Share ............................................................................................................................................ 96
4.7.2.5 Configuring an NFS Share ........................................................................................................................................... 99
4.7.2.6 Configuring an FTP Share .........................................................................................................................................102
4.7.2.7 Configuring an HTTP Share ......................................................................................................................................104
4.7.3 Configuring Value-Added Features ..............................................................................................................................106
4.7.3.8 Configuring Deduplication ........................................................................................................................................106
4.7.3.9 Configuring the iSCSI Target Server.........................................................................................................................107
4.7.3.10 Configuring BranchCache (Hosted Cache Mode).................................................................................................. 110
4.7.3.11 Configuring BranchCache (Distributed Cache Mode) ........................................................................................... 113
4.7.3.12 Configuring DFS ...................................................................................................................................................... 115
5 System Security Policy ...................................................................................................... 118
5.1 System Security Reinforce ............................................................................................................................................... 118
5.1.1 Security Settings ............................................................................................................................................................ 118
5.1.2 Auditing and Account policies ......................................................................................................................................122
5.1.3 Administrative Templates ..............................................................................................................................................123
5.1.4 Additional Security Protection ......................................................................................................................................126
5.2 System Patch Update ........................................................................................................................................................128
5.2.1 Update Automatically ....................................................................................................................................................128
5.2.2 Update manually ............................................................................................................................................................129
6 Security Maintenance Policy ............................................................................................ 131
6.1.1 System Secruity Patch Updating ..................................................................................................................................131
6.1.2 Secutity Configuration and Reinforce ..........................................................................................................................131

Table of Contents

Related product manuals