CIFS and Data Domain Systems Tech Note
CIFS and Data Domain Systems Tech Note
CIFS and Data Domain Systems Tech Note
Tech Note
Applications Engineering
Data Domain LLC
2421 Mission College Boulevard, Santa Clara, CA 95054
866-WE-DDUPE; 408-980-4800
Version 1 Revision B
July 11, 2011
Data Domain Proprietary and Confidential
Page 4
Page 5
Page 5
Page 6
Page 6
Page 7
Page 9
Page 12
Page 13
Page 13
Related Documents
Data Domain Documents
The Documentation page at https://my.datadomain.com/documentation provides
access to three categories of documents that are related to use of Data Domain products:
Documents about how to integrate Data Domain systems with third party backup
applications, under Integration Documentation.
Matrices that show which components are compatible with each other, under
Compatibility Matrices.
following steps:
a. Select the Data Domain model from the Platform list and click View.
b. On the row for the correct Data Domain operating system (DD OS) version, click
http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/
support/kb/articles/Q102/0/67.asp&NoWebContent=1
If the SESSTIMEOUT key does not exist, click in the right panel and select New and
DWORD value. Create a new DWORD Value, SESSTIMEOUT. Note: The registry is
case sensitive. Use all caps for the new DWORD name.
Click the Decimal button and then, in the Base box, set the DWORD value to 3600.
With CIFS configured for Active Directory mode, be sure that the realm is fully
qualified. For example: domain_name.yourcompany.com *. The domain name alone
does not allow connectivity. Use the cifs show config command to check the realm
entry. Use the cifs set authentication command to reset the realm.
(decimal).
3. Add a new DWORD value named DefaultReceiveWindow and set the value to
262144 (decimal).
b. If you do not know which interface is active, add a new DWORD value named
TCPWindowSize in each listed interface and set each value to 262144 (Decimal).
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
7. Add a new DWORD value named GlobalMaxTcpWindowSize and set the value to
262144 (decimal).
8. Add a new DWORD value named TcpWindowSize and set the value to 262144
(decimal).
9. Add a new DWORD value named Tcp1323Opts and set the value to 3.
10. Restart the Windows server.
b. If you do not know which interface is active, add a new DWORD value named
TcpWindowSize in each listed interface and set each value to 65536 (Decimal).
65536 (decimal).
5. Add a new DWORD value named TcpWindowSize and set the value to 65536
(decimal).
6. Add a new DWORD value named Tcp1323Opts and set the value to 3.
7. Restart the Windows server.
For an administrative account, all necessary permissions are available with no setup
needed beyond creating the account on both the system and in the Windows domain.
For non-administrative accounts, follow the steps in the rest of this section before
using the cifs set authentication command or the config setup process on the system.
Follow the steps in this sub-section for both Active Directory and Domain set ups. Active
Directory set ups require more steps that are detailed in the next sub-section.
For new accounts on a Windows 2000 domain controller:
1. On the Windows server, click Start .. Programs .. Administrative Tools .. Active
2. Right click an existing container to which to you want to add the system.
3. Select New .. Computer.
4. Enter a name in the Computer name field.
5. Select Change.
6. Select the user or group. For example, the group might be backup.
7. Click OK.
2. Right click an existing container to which to you want to add the system.
3. Select New .. Computer.
4. Enter a name in the Computer name field.
5. Select Change.
6. Put the cursor in the window labeled Enter the object name to select and enter a user
7. Click Check Names to bring up a list with all names that contain the key word.
8. Select a name from the list.
Reset Password
Reset Password
For less secure sites, include the Write permission. The account then has all write
permissions. See the procedures above for adding permissions to existing accounts.
For sites with security policies that do not allow all write permissions, add the
following specific write permissions. See the procedures above for adding
permissions to existing accounts.
Write dNSHostName
Write Operating System
Write Operating System Version
Write servicePrincipalName
Write userPrincipalName
If the config setup command was run before creating a NetBIOS name on the system or if
the domain controller for any other reason already has an entry for the system in the
Active Directory User list:
1. On the Data Domain controller, delete the system hostname from the Active
2. On the system, use the cifs show config command to check for a NetBIOS name on the
system.
3. If the system has no NetBIOS name, create a NetBIOS name on the system: cifs set nb-
hostname netbiosname.
4. On the system, set the authentication mode to active directory: cifs set authentication
5. Wait for a couple of minutes for the domain controllers to sync up.
6. Disable and enable CIFS on the system.
cifs disable
cifs enable
A reminder from the help page for the cifs command: The system must meet all active
directory requirements, such as a clock time that is no more than five minutes different
than the domain controller.
For the Absolute pathname to directory, specify the backup share. For example:
\\rstr01\backup
10
\CONFIG. If either or both do not exist, create them and enter the values given
below. If the entries do exist, make sure that the values are at least as high as the
values given below. The entries and values are:
However, the value should not exceed the maximum tape I/O size supported by
the tape drives or operating system.
b. NUMBER_DATA_BUFFERS With a value of at least 16. Note that the entries are
used globally by NetBackup version 4 and below for tape and disk drives. The
entries degrade performance with tape drives.
\CONFIG. If either or both do not exist, create them and enter the values given
below. If the entries do exist, make sure that the values are at least as high as the
values given below. The entries and values are:
a. SIZE_DATA_BUFFERS_DISK With a value of at least 262144 (256K bytes).
However, the value should not exceed the maximum tape I/O size supported by
the tape drives or operating system.
HKEY_LOCAL_MACHINE\Software\Veritas\NetBackup\Current
Version\Config.
equivalent to 128.
3. On the media server, add the following file, which improves communication between
clients and the media server. In the file, enter a single line with the value 131072.
VERITAS uses the file for rsize and wsize over the network.
%VERITAS_HOME%\NETBACKUP\NET_BUFFER_SZ.
11
HKEY_LOCAL_MACHINE\Software\Veritas\NetBackup\Current
Version\Config.
equivalent to 128.
3. On the media server, add the following file, which improves communication between
clients and the media server. In the file, enter a single line with the value 65536.
VERITAS uses the file for rsize and wsize over the network.
%VERITAS_HOME%\NETBACKUP\NET_BUFFER_SZ.
performance bottleneck. Before using the command: Create a log directory for the
command output. The location and directory name are:
%VERITAS_HOME%\NETBACKUP\LOGS\bpbkar
2. Initialize the command by opening the NetBackup GUI and going to NetBackup
Management, Host Properties, and Clients. Click on the client name and select
Logging.
The filepath is the path to the data to read for the test.
4. View the resulting performance statistics in the bpbkar debug log file or use a
stopwatch to time the operation and manually calculate the performance statistics.
Defragment disks
The Windows defragmenter utility can improve disk performance. Find the utility under
Start, Settings, Administrative Tools, Computer Management, Disk Defragmenter.
12
In Data Domain software versions 2.0.1.0 and later, can include only alpha and
numeric characters and the underbar ( _ ), exclamation point (!), and dollar sign
($).
installation.
With the feature set, if the system is not mounted when a request that involves the
system comes into the backup server, then the system is automatically mounted.
a. Open the NetWorker console.
b. Go to Devices and select the system.
c. Select Details for the device.
d. Click the checkbox for Auto media management, which by default is not set.
13
The originator and the replica are in the same domain, but a user from a different
(and trusted) domain does the backup; or, the originator and the replica are in
different domains:
The same user may be mapped to different system user IDs on the originator and on
the replica and, as the originator is not in Workgroup mode, the password database is
not copied to the replica. When ownership is different on the replica, the
DOMAIN\user that wrote files to the originator cannot access the files on the replica
if the default, world-readable permissions are changed.
The DOMAIN\user is able to login to the replica using the domain/active directory
password and can access all files if the files have default, world-readable permissions.
For all of above situations, recovery from a replica to an originator can be done in the
same way. If recovery is done over a network, set up the originator (the recovery target)
authentication mode or domain to match the replica (the recovery source). After the
recovery, change the originator authentication mode or domain back to the previous
setting. If recovery to an originator is done offline with tape, make sure that the same
backup user that did the original backup to the originator is used by the backup software
that does the recovery.
14