EMC VNX Series: Release 7.1
EMC VNX Series: Release 7.1
EMC VNX Series: Release 7.1
Release 7.1
EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
Copyright â 1998 - 2012 EMC Corporation. All rights reserved.
Published July 2012
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION
MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO
THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license.
For the most up-to-date regulatory document for your product line, go to the Technical
Documentation and Advisories section on EMC Powerlink.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on
EMC.com.
All other trademarks used herein are the property of their respective owners.
Corporate Headquarters: Hopkinton, MA 01748-9103
Preface.....................................................................................................7
Chapter 1: Introduction...........................................................................9
System requirements..................................................................................10
User interface choices.................................................................................10
Related information.....................................................................................10
Chapter 2: Concepts.............................................................................13
Planning considerations..............................................................................14
CIFS user ID resolution...............................................................................14
Security on file system objects....................................................................15
User access control of file system objects..................................................16
Inheritance rules.................................................................................25
Windows-style credential for UNIX users....................................................26
Using Windows-style credential with Virtual Data Mover....................27
Determining the GID for file system objects................................................28
Backing up and restoring file system objects..............................................29
File naming..................................................................................................29
File locking..................................................................................................30
Wide links....................................................................................................31
Distributed File System server....................................................................34
Chapter 3: Managing............................................................................37
Set the access-checking policy...................................................................38
Migrate access_checking policy to MIXED and MIXED_COMPAT..............38
Synchronize Windows and UNIX permissions...................................39
Reset the access policy......................................................................39
Chapter 4: Troubleshooting..................................................................59
EMC E-Lab Interoperability Navigator.........................................................60
VNX user customized documentation.........................................................60
server_log error message construct............................................................60
Kerberos error codes...................................................................................61
NT status codes..........................................................................................61
Known problems and limitations..................................................................62
Error messages...........................................................................................65
EMC Training and Professional Services....................................................65
Glossary..................................................................................................79
Index.......................................................................................................83
As part of an effort to improve and enhance the performance and capabilities of its product
lines, EMC periodically releases revisions of its hardware and software. Therefore, some
functions described in this document may not be supported by all versions of the software
or hardware currently in use. For the most up-to-date information on product features, refer
to your product release notes.
If a product does not function properly or does not function as described in this document,
please contact your EMC representative.
Note: Emphasizes content that is of exceptional importance or interest but does not relate to
personal injury or business/data loss.
Indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
Note: Do not request a specific support representative unless one has already been assigned to
your particular system problem.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications.
Please send your opinion of this document to:
Introduction
System requirements
For system requirements, see:
◆ EMC Unisphere㍷
◆ Microsoft Management Console (MMC) snap-ins
◆ Active Directory Users and Computers (ADUC) extensions
The following documents provide additional information about managing VNX:
Related information
Specific information related to the features and functionality described in this document are
included in:
◆ Managing Volumes and File Systems with VNX Automatic Volume Management
◆ VNX Glossary
VNX wizards
Unisphere software provides wizards for performing setup and configuration tasks. The
Unisphere online help provides more details on the wizards.
Related information 11
Introduction
Concepts
Planning considerations
Prior to configuring features that enable UNIX and Windows users to share the same file
systems, you need to complete the following tasks:
◆ Complete the initial configuation of your CIFS environment, including configuring a CIFS
server. Configuring and Managing CIFS on VNX explains how to configure a basic CIFS
configuration on VNX by using the CLI. This initial environment can also be configured
by using Unisphere.
Configuring and Managing CIFS on VNX also contains advanced procedures that can
be required after the initial configuration of CIFS on VNX and instructions for modifying
and managing VNX in a Windows environment.
◆ Complete the initial configuration of your NFS environment. Configuring NFS on VNX
and NFS Exports online help in Unisphere explain how to configure and manage NFS
(versions 2, 3, and 4) on VNX.
◆ Configure a user mapping technique best suited to your mixed environment. Configuring
VNX User Mapping provides a list of the tools and methods that can be used to map
Windows users to UNIX-style user identifier (UID) and group identifiers (GIDs) and the
tools that can be used to migrate users from a single-protocol environment to a
multiprotocol environment.
◆ The first character of each line indicates the file type: d for a directory, l for a symbolic
link, or dash (-) for a regular file.
◆ The next nine characters of each line are the read/write or execute permission sets
for user or group or other.
◆ kcb is the user and eng is the group.
◆ xyz.doc is a symbolic link that anyone can traverse to retrieve the xyz.html file.
◆ abc.html is a regular file that anyone can read but only the user kcb can write to it.
◆ schedule is a directory that anyone can search and read, but only user kcb can
insert files into it and delete files from it.
in turn, contains a single SID that identifies a user, group, or computer and a list of rights
that are denied or allowed for that SID.
VNX supports ACLs at the share, directory, and file level.
Note: By default, when a file system is first created by using the Control Station, there is no ACL
on the root of that file system. The UNIX owner is root and is the only one with write access to this
file system. VNX automatically sets the ACL permissions as FULL CONTROL for EVERYONE on
the root directory of the file system’s CIFS share only after the first connection is made to this
share.
Note: Ensure that Windows user accounts are not mapped to a UNIX root user. Access as the root
user (UID=0) bypasses all privilege checks, which results in Windows users having full access to
file system objects regardless of ACLs.
Access-checking policies only apply when the Data Mover’s user authentication is set
to the recommended default, NT. Table 1 on page 17 provides more information about
access-checking policies.
Access-checking Description
policy
Access-checking Description
policy
Access-checking Description
policy
Start
No
Multiprotocol
file system?
Yes
Automatic
synchronization
of Windows
and UNIX Yes
permissions
required or
NFSv4?
No
Is cross -
No protocol security
required?
Yes
Equally
Windows
and UNIX
SECURE
CNS-000542
Note: Automatic synchronization refers to the translation of UNIX mode bits into ACLs when setting
permissions from an NFS client, and conversely means the translation of ACLs into UNIX mode
bits on file system objects when setting permissions from a CIFS client.
Automatic synchronization
When the MIXED and MIXED_COMPAT policies are enabled for a file system object,
the ACL and UNIX mode bits are automatically synchronized. Changes to an ACL result
in modifications to the mode bits and changes to the mode bits reconstruct the ACL.
Table 2 on page 21 explains how the MIXED access-checking policy translates ACLS
and UNIX mode bits during synchronization.
Translating UNIX mode bits into Translating ACLs into UNIX mode
ACLs bits
Creates ACL entries for File Owner, Translates the ACL Allow option but
Group, and Everyone based on the not the ACL Deny option.
mode bits of Owner, Group, and Oth-
er.
Translating UNIX mode bits into Translating ACLs into UNIX mode
ACLs bits
Sets Delete or Change permissions Builds Owner mode bits from the
and takes Ownership for the Owner Owner entry, the ACE of the file or di-
but not for Everyone and other rectory, and the Everyone ACE.
Groups.
Translating UNIX mode bits into Translating ACLs into UNIX mode
ACLs bits
Creates only two entries in the ACL: Translates the ACL Allow option but
Owner and Everyone. not the ACL Deny option.
Creates an Everyone ACE from the Builds None, Owner, and Granted
Group mode bits because groups are ACEs into Group and Other mode bits.
not translated with this policy.
Note: For MIXED and MIXED_COMPAT, ensure that the Windows user default group is set because
VNX uses this group to decide which UNIX primary group to assign to a file system object created
through CIFS.
Table 4. Translating ACL file and directory permissions into UNIX rights
R W X R W X
R W X R W X
Read Data x x
Read Attributes x x x
Write Data x
Append Data x
Write Attributes x x
Delete x x
Read Permissions x
List Folders x
Create Files x
Create Folders x
Note: When VNX is used as an NFSv4 server, some NFSv4 clients might place a plus sign in the
ls -l output when the file system object has an ACL. For example, rwxrw-r +.
Permissions R W X
List Folder x x
Read Data x
Read Attributes x
Permissions R W X
Write Attributes x
Delete
Read Permissions x x x
Change Permissions
Take Ownership
Inheritance rules
Table 6 on page 25 explains the inheritance rules for the NATIVE, UNIX, NT, and SECURE
access-checking policies.
Note: The umask value is specified in octal and is XORed with the permissions of 666 for files and
777 for directories. Common values include 002, which gives complete access to the user or owner
and group and read (and directory search) access to others, or 022 (default), which gives full access
to the user or owner, and read (and directory search), but not write permissions to the group and
others. To change the default umask value, use the parameter share.default.umask.
Protocol Rules
CIFS When a CIFS client creates a file system object:
Table 7 on page 25 explains the inheritance rules for the MIXED and MIXED_COMPAT
access-checking policies.
Protocol Rules
CIFS ◆ When a CIFS client creates a file system object, if the inheritance flag is set and the
object parent has an ACL, the file system object inherits the ACL, and the UNIX mode
bit permissions are created based on the ACL translation.
◆ If the parent does not have an ACL, the UNIX permissions are set according to the
umask value and an ACL is generated based on these values.
Protocol Rules
NFS ◆ UNIX mode bits are based on the umask value.
◆ An ACL is created from the UNIX mode bits.
Note: NFS v4 clients might set the mode bits or ACL at file or directory creation time,
overriding inheritance and umask.
Note: The Windows credential functionality closely resembles a Windows credential, but it does not
support access to the AD and cannot query the AD database for information about Windows users
and groups. UNIX users cannot access the nested, universal, and domain local group information
from the local computer when UNIX credentials are translated to Windows credentials.
No
Yes
Is there a
UID/GID to
SID match? Insert new
Create NT
Yes NT credential
credential
into cache
No
Search for
name associated
with UID
Able to
retrieve SID Yes
from DC?
Insert “mapping
No failed” entry
into cache
CNS-000536
[HKEY_LOCAL_MACHINE\Software\EMC\UnixNTCredential]
"NetbiosDomainName"="<domain_name>”
The Parameters Guide for VNX for File provides more information about the
nfs.NTcred.winDomain parameter.
When the VDM name resolution is confined to the VDM, the nfs.NTcred feature uses the
Windows domain specified in the VDM registry. Accordingly, a CIFS server member of this
domain must be configured in the VDM and joined to the appropriate CIFS domain user to
allow NFS access using a CIFS user credential.
Configuring Virtual Data Movers on VNX provides more information about the VDM for NFS
feature.
Protocol Description
NFS When an FSO is created from a UNIX client, the FSO GID is taken from the GID supplied
by the UNIX client (based on the primary group of the creator).
CIFS When an FSO is created from a Windows client, the GID can be determined in these ways:
◆ (Default) The file system object GID is taken from the GID associated with the primary
group of the creator.
◆ The file system object GID is taken from the UNIX primary group of the user as defined
in the passwd file, NIS, or AD.
Note: For an NFS backup, only the UNIX rights are backed up and restored and determine the ACL
permissions. As a result, the most complex ACEs in the ACLs might be lost during an NFS backup.
File naming
NFS and CIFS use different file naming conventions. Table 9 on page 29 explains these
differences.
Note: When creating UID and GID names for Windows clients, Windows names (usernames, domain
names, and global group names) must be written in lowercase in the NIS, the password files, and the
group UNIX files. You need to be careful when doing explicit user and group mapping. The VNX does
not recognize names like Windows.
File locking
File locking ensures file integrity when multiple users attempt to access the same file at the
same time. File locks manage attempts to read, write, or lock a file that is in use by another
user.
Table 10 on page 30 describes the different ways the NFS and CIFS protocols implement
file locking features.
In a multiprotocol environment, a file might have locks set by CIFS and NFS users. Because
NFSv2 and NFSv3 locks and CIFS or NFSv4 deny modes and oplocks—or delegations—are
not directly equivalent, VNX must translate CIFS or NFSv4 deny modes and oplocks to
NFSv2 and NFSv3 locks and translate NFSv2 or NFSv3 locks into CIFS or NFSv4 deny
modes and oplocks. For example:
◆ A CIFS deny read/write mode request is translated into an NFSv2 or NFSv3 exclusive
read/write lock.
◆ An NFSv2 or NFSv3 shared read lock is translated into a CIFS deny write mode.
To provide some control over the interaction of CIFS and NFS file locking, VNX provides
three different locking policies that can be specified when mounting a file system. These file
locking policies are used in a multiprotocol environment and indicate the impact of locking
behavior on NFS clients in the case of concurrent NFS and CIFS file locking. Table 11 on
page 31 explains the differences between file locking policies.
1 2 3
nolock wlock rwlock
No locks: Treats all locks as advisory Write lock: Enforces CIFS or NFSv4 Read/write lock: Enforces CIFS or
for NFS (v2 or v3) clients (default set- write locks for NFSv2 or NFSv3 client NFSv4 read and write locks for NFSv2
ting, least secure). access. or NFSv3 client access (most secure).
Lock requests: If a CIFS or NFS client Lock requests: If a CIFS or NFS client Lock requests: If a CIFS or NFS client
locks a file, no other client can lock that locks a file, no other client can lock that locks a file, no other client can lock that
file. file. file.
Access requests: Access requests: Access requests:
◆ CIFS clients ignore locks set by ◆ CIFS clients denying concurrent ◆ CIFS clients denying concurrent
NFS. access for write cannot open files access for read or write cannot
◆
locked by NFS for exclusive ac- open files locked by NFS for exclu-
NFSv2 or NFSv3 clients can read
cess. sive or shared access.
and write to files locked by CIFS or
NFSv4. ◆ NFSv2 or NFSv3 clients can read, ◆ NFSv2 or NFSv3 clients cannot
but cannot write to or delete, files read, write, or delete files locked
locked by CIFS or NFSv4. by CIFS.
Note: VNX enforces file locks only when it is configured to do so and when the client application is
using locks. Some simple applications, such as Windows Notepad or Wordpad, UNIX more, and vi
do not use file locking. Files created with these applications are not locked. They can be opened and
edited by another application even when a file system is mounted with wlock or rwlock.
Set the file locking policy on page 50 describes how to set locks on the file system.
Wide links
The wide links feature uses Microsoft DFS functionality to resolve UNIX absolute symbolic
links for Windows clients. This is done by creating a DFS root on a CIFS share and then
establishing a link on the DFS root that maps the UNIX mount point to the Windows
server:\share\path. This mapping is done through the MMC DFS tool. It is difficult for a
Windows client to open a path to a file system object when its path contains an absolute
symbolic link. A Windows client requests the server to perform a function on a file system
object based on a given path. Unlike Windows, a UNIX client uses a target path relative to
its mount point. This can lead to a file system object on a remote server.
For purpose of example, assume that the UNIX client has the following two file systems
mounted:
server1:/ufs1 mounted on /first
3
NFSv2 or NFSv3 applications that do not expect lock conflicts (permission denied) on read/write
operations might have problems.
2
NFSv2 or NFSv3 applications that do not expect lock conflicts (permission denied) on read/write
operations might have problems.
1
Nolock is the only lock policy supported on Multi-Path File System (MPFS).
Wide links 31
Concepts
◆ A wide link can be configured on a per Virtual Data Mover (VDM) basis. This enables a
Windows client to be directed to as many different directory locations as needed.
◆ After the wide links are configured, a symbolic link with an absolute path appears as a
directory instead of a file in Windows Explorer.
◆ The path in the DFS link must be the same in Windows and UNIX (in other words, the
UNIX name of each component must be the M256 name in Windows).
◆ On an NT4 client, the Security tab does not appear in the Properties dialog box for a file
that is located in a share that supports wide links. The security can be set by using a
security tool such as calcs. Alternatively, manage the ACLs of files by using either files
of a Windows 2000 client or shares that do not support wide symbolic links. There can
be two different shares on the same directory, one that supports wide links and one that
does not, and the share that does not support wide links can be used to manage security
setting by using NT4 clients.
◆ If a Windows client is connected to CIFS share on a DFS root and this share is removed
from DFS, the client might not be able to access it. Because the wide links feature is
based on Microsoft DFS, this can also happen with wide links. This behavior occurs
because the clients use a DFS cache to track all DFS links. Until the share’s cache entry
times out, the Windows clients attempt to access the deleted share even though it no
longer exists in DFS.
To resolve this:
•
Wait for the DFS cache entry to time out.
•
Or, disconnect the client from the share, clear the client’s DFS cache by using the
Microsoft command line tool dfsutil/pktflush, and reconnect to the share.
Note: Wide links cannot be used in conjunction with symbolic links containing absolute paths. The
value of the parameter shadow.followabsolutpath must be 0 for wide links support to be enabled. If
symbolic links using paths from the root of the Data Mover are needed, then the linkscan must be
emulated by using wide links. To do this, create DFS links that emulate the directory structure from
the root of the Data Mover. Distributed File System server on page 34 provides more information.
Process steps
The following steps describe how a Windows client processes the wide links feature by
using DFS:
1. Client opens a path that has an absolute symbolic link.
2. Server detects an absolute link path and sends an error stating this path is not covered.
This is typical DFS behavior.
3. Client requests DFS referrals of this path to determine where to connect next.
4. From the DFS root on the Data Mover defined as the widelink database in the Windows
Registry of the Data Mover, the CIFS server finds a link that matches the beginning
of the target path in the symbolic link and determines the CIFS share to use for wide
links resolution.
5. CIFS server sends DFS referrals pointing the client to the new path.
Wide links 33
Concepts
C:\>dir \\dm2-ana0-1-sa\wl_root-1\user1
Volume in drive \\dm2-ana0-1-sa\wl_root-1 is 102
Volume Serial Number is 0000-0014
Directory of \\dm2-ana0-1-sa\wl_root-1\user1
02/02/2005 12:43 PM <DIR> .
02/02/2005 12:23 PM <DIR> ..
02/01/2005 05:49 PM <DIR> user1
02/02/2005 12:25 PM 14 user1_on_fs_wlink-1
02/02/2005 12:25 PM 15 user1_on_fs_wlink-29
02/02/2005 12:43 PM 0 NFS_user_file
3 File(s) 29 bytes
3 Dir(s) 52,867,235,840 bytes free
folders into a logical DFS namespace and make folders that are distributed across multiple
servers appear to users as if they reside in one place on the network. Users can navigate
through the namespace without needing to know server names or the actual shared folders
hosting the data.
Each DFS tree structure has a root target, which is the host server running the DFS service
and hosting the namespace. A DFS root contains DFS links that point to the shared folders—a
share and any directory below it—on the network. The shared folders are referred to as DFS
targets.
Microsoft offers stand-alone and domain-based DFS root servers: the domain DFS root
server and the stand-alone DFS root server. The domain-based DFS server stores the DFS
hierarchy in the AD. The stand-alone DFS root server stores the DFS hierarchy locally. VNX
provides the same functionality as a Windows 2000 or Windows Server 2003 stand-alone
DFS root server.
The Microsoft website at http://www.microsoft.com/windowsserversystem/dfs/default.mspx
provides detailed information about DFS. Configure and administer DFS support on page
51 provides procedural information for creating a DFS root.
Managing
Note: Always verify the current access-checking policy on the file system before executing this command. The default
policy is NATIVE.
Example:
To set the access-checking policy to NT for file system ufs1 on server_2, type:
$ server_mount server_2 -option accesspolicy=NT ufs1 /ufs1
Output
server_2 : done
Note: Because the synchronization task cannot be undone, first perform a backup of the file system.
Always check the access-checking policy set on the file system before and after executing the translate
command. The file system must be mounted as MIXED or MIXED_COMPAT before executing this
command. If not, the command is refused. The file system to be translated must be a UXFS file system
object mounted as read/write.
After remounting a file system object to MIXED or MIXED_COMPAT, perform the following
steps to synchronize Windows and UNIX permissions.
Action
To synchronize Windows and UNIX permissions on the file system, use this command syntax:
$ nas_fs -translate <fs_name> -access_policy start -to {MIXED} -from
{NT|NATIVE|UNIX|SECURE}
where:
fs_name = name of the file system
Example:
To synchronize Windows and UNIX permissions for ufs1 on server_2 and regenerate ACLs based on UNIX modes, type:
$ nas_fs -translate ufs1 access_policy start -to MIXED -from UNIX
Output
server_2 : done
Note: Using MIXED and MIXED_COMPAT on page 21 explains how Windows and UNIX permissions
are translated to MIXED or MIXED_COMPAT from an NT, NATIVE, UNIX, or SECURE originating
policy.
You can remount a file system to reset the access-checking of the file system object to its
originating policy. This action applies the new access right policy and causes the ACLs and
mode bits to become independent when first modified. ACL permissions and the UNIX mode
bits remain unchanged.
Note: File systems might have permissions that are not synchronized. Synchronize Windows and UNIX
permissions on page 39 provides more information.
Action
To reset the MIXED or MIXED_COMPAT access-checking policy for a file system, use this command syntax:
$ server_mount <movername> -option accesspolicy={NT|UNIX|SECURE
|NATIVE|MIXED|MIXED_COMPAT} <fs_name><mount_point>
where:
<movername> = name of the Data Mover
<mount_point> = name of the mount point, which begins with a forward slash (/)
Example:
To reset the access-checking policy to UNIX for file system ufs1 on server_2, type:
$ server_mount server_2 -option accesspolicy=UNIX ufs1 /ufs1
Output
server_2: done
Action
To check the translation status of a file system, use this command syntax:
$ nas_fs -translate <fs_name> -access_policy status
where:
<fs_name> = name of the file system being translated
Example:
To check the translation status for ufs1, type:
$ nas_fs -translate ufs1 -a status
Output Notes
status=In progress ◆ If the translation failed, check if the file system is
percent_inode_scanned=68 mounted as MIXED or MIXED_COMPAT.
1097154093: ADMIN: 4: Command ◆
succeeded: acl database=/ufs1 If the translation does not complete due to system fail-
convertAccessPolicy status ure, run the command again.
Action
To generate Windows credentials for a file system object, use this command syntax:
$ server_mount <movername> -option
accesspolicy={NT|UNIX|SECURE|NATIVE|MIXED|MIXED_COMPAT},ntcredential
<fs_name><mount_point>
where:
<movername> = name of the Data Mover or VDM
Note: The Windows credential function is for multiprotocol file systems. Use this feature only with NT, SECURE, MIXED,
and MIXED_COMPAT access-checking policies.
Example:
To set the access-checking policy and generate the Windows credential for file system ufs1 on server_2, type:
$ server_mount server_2 -option accesspolicy=NT,ntcredential ufs1 /ufs1
Output
server_2: done
EMC recommends setting the acl.extendExtraGid parameter if you use credentials. When
the user accesses VNX through CIFS, VNX can be configured to include the users' UNIX
groups in their Windows credential. This is in addition to their Windows groups. VNX will
include user’s UNIX groups in their Windows credential if the server parameter cifs
acl.extendExtraGid is set to 1. There is no limit to the number of groups a Windows credential
can contain.
Note: The acl.extendExtraGid parameter applies only in multiprotocol environments with a Network
Information Service (NIS) or .etc/group file on the Data Mover. The UNIX groups are retrieved from
the UNIX name services configured on the Data Mover—for example, local group file, NIS, LDAP and
so on—by using the username without the .domain extension.
Action
To include users' UNIX group in their Windows credential, use this command syntax:
$ server_param <movername> -facility cifs -modify acl.extendExtraGID -value
<new_value>
where:
<movername> = name of the Data Mover or VDM
Example:
To merge the users' UNIX and Windows groups together to build a Windows credential, type:
$ server_param server_2 -facility cifs -modify acl.extendExtraGid -value 1
Output
server_2: done
For Windows 2000, access to a trusted domain requires setting additional rights for the CIFS
server retrieving a list of groups to which a user belongs. This server must be granted the
List contents and Read all properties rights.
Perform the following steps to set rights for the CIFS server:
1. Use the Microsoft AD User and Computer MMC in expert mode.
2. From the menu, select View ➤ Advanced features.
3. Right-click the domain name, and select Security ➤ Advanced.
4. Grant rights:
•
For a Data Mover NetBIOS name: Everyone or Anonymous
•
For a Data Mover computer name: serverDomain\Domain Computers
The default Windows domain name is used if several different SIDs match the user UNIX
UID, or the UID-to-name reverse mapping returns an ambiguous username (no domain).
The nfs NTcred.winDomain parameter specifies the Data Mover default Windows NetBIOS
domain name to be used for NFS users accessing a file system where the ntcredential option
has been used.
Note: Parameter and facility names are case-sensitive. NTcred.winDomain can be used with NFSv2,
NFSv3, and NFSv4.
Action
To set the Windows default domain, use this command syntax:
$ server_param <movername> -facility nfs -modify NTcred.winDomain -value
<new_value>
where:
<movername> = name of the Data Mover
Example:
To set the Windows default domain to nasdocs.emc.com, type:
$ server_param server_2 -facility nfs -modify NTcred.winDomain -value nasdocs.emc.com
Output
server_2: done
The credential cache is a size-limited cache containing Windows credentials and any UID
entries that could not be mapped to SIDs.
Note: If the CIFS service is stopped, connected users can continue to use the cache for 20 minutes.
When CIFS is restarted, all the failed mapped entries are removed from the cache.
Action
To set the Windows credential cache size, use this command syntax:
$ server_param <movername> -facility nfs -modify NTcred.size -value
<new_value>
where:
<movername> = name of the Data Mover or VDM
<new_value> = the maximum number of entries in the cache. The default is 1009.
Example:
To set the Windows credential cache size to 1000, type:
$ server_param server_2 -facility nfs -modify NTcred.size -value 1000
Output
server_2: done
Note: Parameter and facility names are case-sensitive. NTcred.TTL parameter can be used with
NFSv2, NFSv3, and NFSv4.
Action
To set the time-to-live expiration stamp of the Windows entry in the credential cache size, use this command syntax:
$ server_param <movername> -facility nfs -modify NTcred.TTL -value
<new_value>
where:
<movername> = name of the Data Mover or VDM
Example:
To set the time-to-live expiration stamp of the Windows credential to 30 minutes, type:
$ server_param server_2 -facility nfs -modify NTcred.TTL -value 30
Output
server_2: done
Note: Setting the cifs acl.unixCheckAcl value to 0 (zero) alters the behavior of the UNIX file system
access policy so that only the UNIX mode bits on directories and files are used to determine user
access to files—regardless of the protocol they use for accessing the file system. The file system still
stores any ACL set, but it does not affect user access rights.
Note: When you use the acl.unixCheckAcl parameter, you might also consider setting bit 1 of the
server parameter cifs acl.extacl value to 2. Doing so exposes the UNIX mode bits on directories and
files as additional ACEs in the ACLs of directories and files. Manage UNIX permissions from a Windows
client on page 46 provides procedural information for this task.
Action
To specify that only UNIX permissions are checked when the file system access policy is set to UNIX, use this command
syntax:
$ server_param <movername> -facility cifs -modify acl.unixCheckAcl
-value <new_value>
where:
<movername> = name of the Data Mover
Note: Parameter and facility names are case-sensitive.The cifs acl.unixCheckAcl parameter affects only those file systems
on a Data Mover that are configured to use the UNIX access policy.
Example:
To ensure that only UNIX permissions are checked when the file system access policy is set to UNIX, type:
$ server_param server_2 -facility cifs -modify acl.unixCheckAcl -value 0
Output
server_2 : done
where:
<movername> = name of the Data Mover
<new_value> = The bit list that enables special capabilities for access control list management.
The bit list consists of seven binary bits (0 to 6). Any combination of bits is allowed. Each bit is 1 when set, otherwise 0.
Bit 0 set (0000001 or +1) = UNIX metadata associated with files and directories is presented to CIFS backup client.
Bit 1 set (0000010 or +2) = Windows clients can view and modify UNIX permissions.
Bit 2 set (0000100 or +4) = CIFS network back up applications can backup and restore UNIX file and directory security
attributes.
Bit 3 set (0001000 or +8) = CIFS network back up applications can backup and restore UNIX symbolic links.
Bit 4 set (0010000 or +16) = CIFS network back up applications can backup and restore all three names of files and direc-
tories.
Bit 5 set (0100000 or +32) = Allows NFS v2 and v3 clients to view and modify ACLs by using the emcsetsd client tool.
Bit 6 set (1000000 or +64) = Modifies the behavior of bit 1. UNIX rights applied are the granted rights less the denied rights
by the discretionary ACL.
Example:
To enable Windows users to view and modify UNIX permissions, type:
$ server_param server_2 -facility cifs -modify acl.extacl -value 2
Note: To use emcsetsd to view and modify ACLs, you must first enable the emcsetsd tool.
Examples:
To use emcsetsd or emcgetsd tools from a UNIX client, you must set bit 5, type:
$ server_param server_2 -facility cifs -modify acl.extacl -value 32
Output
server_2 : done
Note: Before you can use the emcsetsd tool, you must first enable it by using the cifs acl.extacl
parameter. Manage UNIX permissions from a Windows client on page 46 provides procedural
information for this task.
Appendix A provides detailed information about the emcgetsd and emcsetsd tools.
If a file or directory has SIDs in an ACL belonging to more than one domain, the output lists
the users in the format of domain/user or domain/group without the -D option being specified
in the emcgetsd command.
Action
To display the security descriptor of a file system by using the verbose option, use this command syntax:
# ./emcgetsd -v <local_node_path>
where:
<local_node_path> = path of the file or directory on the UNIX client
Example:
To display the security descriptor of file system /fs2000A/apache/logs by using the verbose option, type:
# ./emcgetsd -v /fs2000A/apache/logs
Output
Dump of
/fs2000A/apache/logs Security Descriptor
------------------------------------------------
The emcgetsd tool allows you to view ACLs on a file or directory from a UNIX client or Control
Station.
Action
To display the access rights of a user currently logged in from a UNIX client, use this command syntax:
# ./emcgetsd -a <local_node_path>
where:
<local_node_path> = path of the file or directory on the UNIX client
Example:
# ./emcgetsd -a /fred/test1/TestDir
Output
Server=dffr1, Path in the server=//test1/TestDir
Access of user uid=602 with groups gids={107-2765} on //test1/TestDir
NT Rights: R-XPDO 0x1f00e9
ReadExecute
Read ListFolderContents
Action
To set the GID mapping for FSOs created on a Windows client to the Windows user’s GID stored in the passwd file, NIS,
or AD, use this command syntax:
$ server_param <movername> -facility -modify acl.useUnixGid -value
<new_value>
where:
<movername> = name of the Data Mover
Examples:
To set the GID mapping for file system objects created on a Windows client to the Windows user’s GID, type:
$ server_param server_2 -facility -modify acl.UnixGid -value 1
Output
server_2 : done
Action
To change the source of the GID for the copied FSO, that is to determine that the primary group is derived from the source
specified by the acl.useUnixGID, use this command syntax:
$ server_param <movername> -facility cifs -modify acl.takegroupship-value
1
where:
<movername> = name of the Data Mover
Example:
To determine that the primary group is derived from the source specified by the acl.useUnixGID, type:
$ server_param server_2 -facility cifs -modify acl.takegroupship -value 1
Output
server_2 : done
Action
To specify file system locking, use this command syntax:
$ server_mount <movername> -option [nolock|wlock|rwlock]<fs_name> <mount_point>
where:
<movername> = name of the Data Mover
Example:
To mount the file system ufs1 with a read/write lock, type:
$ server_mount server_2 -option rwlock ufs1 /ufs1
Output
server_2 : done
Note: Do not establish a DFS root on a file system object with an access-checking policy of UNIX or
SECURE because none of the DFS link components are created with UNIX rights.
Note: If you intend to use a CIFS server as a stand-alone DFS server only (no domain structure), you
must use the dfsutil.exe to create the DFS root.
Note: You can use the optional flag to work with the API instead of the Windows Registry.
Action
To create a DFS root on a global share in a Windows Server 2003 environment, use this command syntax:
C: dfsutil /AddstdRoot /Server:DM2-ANA0-1-SA /Share:wl_root-1
Output
Microsoft(R) Windows(TM) Dfs Utility Version 4.0
Copyright (C) Microsoft Corporation 1991-2001. All Rights Reserved.
Indicates that DfsUtil command completed successfully.
Use the New Root Wizard to create a stand-alone DFS root on the CIFS share:
1. Start the New Root Wizard tool from DFS MMC. Click Next on the Welcome screen to
begin.
2. On the Host Server dialog box, type the name CIFS server on the Data Mover that will
host the DFS root and then click Next.
3. On the Root Type dialog box, select Stand-alone root, and then click Next.
The Root Name dialog box displays the UNC path to the root and the share.
4. Type a unique name for the DFS root. Optionally, add a comment if you want to further
describe this DFS root. Click Next.
5. Browse to a folder that you want to share as part of the DFS environment. Select the
folder and click Next.
You can add additional shares to the DFS root at any time after the initial configuration.
1. Open the Registry Editor of your choice and locate the following Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\EMC\DFS\Enable
Note: This task assumes that DFS support is enabled (by default) and that the DFS roots are created.
Distributed File System server on page 34 provides conceptual information.
1. Start the MMC Distributed File System tool. From the Action dialog box, select Show
Root.
2. In the Show Root dialog box, type the NetBIOS name of the CIFS server used as the
DFS root, on which a wide link is to be created. Then click OK.
5. In the New Link dialog box, type the link name and path to target, which must be the
same in Windows and UNIX, and then click OK.
Note: The UNIX name of each component must be the M256 name in Windows, as is shown in
the following illustration.
This example shows how to create the first wide link, wlink-1\user1 to user1 on wlink-1
on the local Data Mover.
6. Create the second link to user1 on the remote Data Mover by repeating step 5. Type the
link name and path to target.
7. Set the CIFS server and the DFS root in the Windows Registry:
a. Set the CIFS server and CIFS share by using the following Registry:
HKEY_LOCAL_MACHINE\SOFTWARE\EMC\WideLink\Share
The Registry must contain: \\server_name\share_name
where:
•
server_name is the NetBIOS name of the CIFS server. If a global share is used,
only CIFS share name is typed.
•
share_name is the name of the CIFS share or the Windows share.
The following shows the Registry key for wl_root-1, which is a global share:
C:\>dir \\dm2-ana0-1-sa\wl_root-1\user1\user1_on_fs_wlink-1\
The network name cannot be found.
C:\>dir \\dm2-ana0-1-sa\wl_root-1\user1\user1_on_fs_wlink-29\
The network name cannot be found.
After setting the Registry key, symbolic links appear as directories in Windows, enabling
users to read the contents of the following two directories:
Local Data Mover:
C:\>dir \\dm2-ana0-1-sa\wl_root-1\user1\user1_on_fs_wlink-1\
Volume in drive \\dm2-ana0-1-sa\wl_root-1 is 102
Volume Serial Number is 0000-0014
Directory of \\dm2-ana0-1-sa\wl_root-1\user1\user1_on_fs_wlink-1
C:\>dir \\dm2-ana0-1-sa\wl_root-1\user1\user1_on_fs_wlink-29\
Volume in drive \\dm2-ana0-1-sa\wl_root-1 is 102
Volume Serial Number is 0000-0014
Directory of \\dm2-ana0-1-sa\wl_root-1\user1\user1_on_fs_wlink-29
Troubleshooting
◆ The first part is the date and time of the logged event.
◆ The second part is the subsystem of VNX code that reported the event (for example,
NFS, CFS, and LIB).
◆ The third part is a classification code, which is typical of event logging facilities. Information
on classification codes can be found on most UNIX systems under the header file syslog.h
in the directory /usr/include/sys.
The definition of the possible classification codes that VNX supports are:
◆ The fourth part describes the error condition. The error condition on the first two lines of
the example is self-explanatory. The operations being performed are ‘commit’ and ‘open’
with the error condition, NoPermission. Other events are not as descriptive.
Because Kerberos is standardized, there are public resources available on the Internet for
looking up the meanings of a majority of these status codes.
NT status codes
The NT status codes are reported for CIFS or Microsoft Windows emulation functions on
VNX product. The NT status codes are 32-bit unsigned integers that are broken up into
subgroups of binary data that identify the particulars of an event status. The 32-bit values
are laid out as follows:
3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1
1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0
+---+-+-+-----------------------+-------------------------------+
|Sev|C|R| Facility | Code |
+---+-+-+-----------------------+-------------------------------+
where:
• 00 — Success
• 01 — Informational
• 10 — Warning
• 11 — Error
Typically, the NT status codes appear in the server_log with a subsystem specification of
SMB. The NT status code is presented in several ways in logged system events. Some
popular ones are:
◆ A simple hexadecimal number with no prefix nor any indication of its format:
SMB: 4: SSXAuth_SERVER_EXT13 aT=3 mT=1 c0000016
◆ A simple hexadecimal number with a prefix of reply= with no indication of the format:
SMB: 4: lookupNames:bad reply=c0000073
◆ A simple hexadecimal number with a prefix of failed= with no indication of the format:
SMB: 4: SessSetupX failed=c0000016
With NT user authentication, certain The domain name sent to the Data Verify that the client is sending the cor-
Windows 95 clients might not be able Mover by the client was incorrectly rect domain name to the passwd file.
to map drives from the Data Mover. specified, or the username.domain is
To verify that the client is sending the
not mapped in the passwd file on the
correct domain:
Data Mover.
◆ In the Network option in the Control
Panel, double-click the network
client (Client for Microsoft Net-
works).
◆ Under General properties, verify
that the correct domain name is
shown.
With NT user authentication, The Windows NT user account might Add the Windows NT user to the PDC
Incorrect password be missing from the primary domain and map the user to a UNIX username
or controller (PDC), or the Data Mover was and UID.
unknown username unable to determine a UID to use for
error message appears after attempts this user.
to connect to the server, and the
username and password window
appears.
With NT user authentication, clients are No domain controller found for the do- Check if PDC or backup domain con-
unable to connect to the server, and the main. troller (BDC) is up. Check if the Data
window to prompt for username and Mover can access a WINS server that
password does not appear on the client knows about the PDC domain, or have
side. the PDC and BDC in the same local
subnet as the Data Mover.
The server NetBIOS name is not Verify that the computer account exists
registered as a computer account on and add the computer account, if
needed. If the computer account does
the PDC domain or a trust relationship
has not been established between the exist, remove it and add it again before
client and server domains. retrying the command. The Microsoft
NT server 4.0 documentation provides
The following message appears in the
more information on setting up a trust
server_log:
relationship between domains.
The SAM database on the
Windows NT server does
not have a complete
account for this
workstation trust
relationship.
After joining a CIFS server to a domain, The DNS servers zone might include Verify that the DNS server’s zone does
the following error appears in the the same fully-qualified domain name not have the same FQDN with a differ-
server_cifs output, indicating that the (FQDN) for another computer account. ent IP address for another computer
system cannot update the DNS record: account.
FQDN=dm4-a140-ana0.c1t1.
pt1.c3lab.nsgprod.emc.com
(Update of "A" record
failed during update:
Operation refused for
policy or security
reasons)
0xC0000022 Access is denied because the computer Delete the computer and then re-create
2004-04-26 10:49:40: was created on the domain controller it with the Allow pre-Windows 2000
SMB: 3: without enabling the Allow pre-Windows computers to use this account option
Srv=<VNX_netbios_name> 2000 computers to use this account enabled.
buildSecureChanel=Authenticate2 option on the Windows New Object -
InvalidReply Computer dialog box.
E=0xc0000022
When attempting to start MMC, the MMC requires Internet Explorer 6.0 to Upgrade the version of the Internet Ex-
following error message appears: use its Document Object Model (DOM) plorer to 6.0.
OLE Object: PBrush XML parser.
Solaris client receives the following This is likely caused by the Solaris In a multiprotocol environment, to ex-
warning message during the creation NGROUPS_MAX kernel parameter be- tend this group number to more than
of a user account: ing set to more than 16 groups, which 16, use VNX File Server NT credential
UX:useradd: WARNING: is the default limit on Solaris systems. feature.
more than NFS only has support for a maximum
NGROUPS_MAX(16) groups of 16 groups.
specified
Depending on the UNIX implementation,
The user account is still created but the limit on the number of groups per
data availability might occur. user is different:
When attempting access, Solaris client ◆ Solaris has a limit of 16 groups
receives an error message similar to:
nfs: [ID XXXXXX ◆ Linux has a limit of 32 groups
kern.notice] NFS access
failed for server
dm3-121-ana0-2: error 1
(RPC: Can not encode
arguments)
When upgrading from a Windows NT Unable to change domain suffix be- Before upgrading, change the domain
domain to Windows 2000, unable to cause it was hardcoded in dynamic suffix.
change the original domain suffix during DNS (DDNS).
Windows 2000 setup.
Access is denied to Internet Information For a stand-alone CIFS server with local Specify the same username and pass-
Services (IIS) 6.0 when attempting to user support enabled, the username word on IIS 6.0, the Data Mover, and
connect to the web directory on VNX and password must be the same on IIS the client.
share. 6.0, the Data Mover, and the client.
In the IIS web log, the error bad user-
name or password appears even though
the username and password are in the
local user database.
Error messages
All event, alert, and status messages provide detailed information and recommended actions
to help you troubleshoot the situation.
To view message details, use any of these methods:
◆ Unisphere software:
• Right-click an event, alert, or status message and select to view Event Details, Alert
Details, or Status Details.
◆ CLI:
• Use this guide to locate information about messages that are in the earlier-release
message format.
• Use the text from the error message's brief description or the message's ID to search
the Knowledgebase on the EMC Online Support website. After logging in to EMC
Online Support, locate the applicable Support by Product page, and search for the
error message.
Error messages 65
Troubleshooting
The emcgetsd and emcsetsd tools can be used on Linux, Solaris, and
HP-UX operating systems. Use the executable appropriate for your
operating system.
You can copy these tools on to a UNIX client without performing an
installation procedure on the client. EMC recommends that prior to using
these tools, you use the chmod command to be sure that the files are
executable, for example:
chmod 755 <filename>
View ACLs
Use the emcgetsd tool to view ACLs on a file or directory from a UNIX client or Control
Station. Table 13 on page 68 lists the emcgetsd tool command options and descriptions.
Command Description
Modify ACLs
Use the emcsetsd tool to modify and view the ACL on a file or directory from a UNIX
client or Control Station.
When Windows permissions are changed by using the emcsetsd tool, the Windows
owner is replaced by the UNIX SID and the UNIX UID/GID, as shown in the following
examples:
Note: You must have the appropriate rights to use this tool.
Table 14 on page 70 lists the emcsetsd tool command options and descriptions.
Command Description
emcsetsd -D<domain> -r
-g <us
er_or_group>,<rights>[,<flags>]
-d <us
er_or_group>,<rights>[,<flags>]
-s <us
er_or_group>,<rights>[,<flags>]
-f <us
er_or_group>,<rights>[,<flags>]
-a<us
er_or_group>,<rights>[,<flags>]
<local_node_path>
Command Description
User
A user can be one of the following:
◆ UI=number
◆ User=NIS name
◆ domain\user
Group
A group can be one of the following:
◆ GID=number
◆ Group=NIS name
◆ Everyone
◆ CreatorOwner
◆ CreatorGroup
◆ domain\user
Rights
The rights can be one of the following
separated by a pipe (|):
◆ READ_DATA
◆ WRITE_DATA
◆ APPEND_DATA
◆ READ_EA
Command Description
◆ WRITE_EA
◆ EXECUTE
◆ DELETE_CHILD
◆ READ_ATTRIBUTES
◆ WRITE_ATTRIBUTES
◆ DELETE
◆ READ_CONTROL
◆ WRITE_DAC
◆ WRITE_OWNER
A combination of RWXPDO:
◆ R: Read
◆ W: Write
◆ X: Execute
◆ P: ChangePermission
◆ D: Delete
◆ O: TakeOwnership
◆ FullControl
◆ Modify
◆ ReadExecute
◆ ListFolderContents
◆ Read
◆ Write
Flags
Command Description
Command Description
nfs4_getfacl, nfs4_setfacl,
and nfs4_editfacl
The nfs4_getfacl, nfs4_editfacl, and nfs4_setfacl are Linux tools. They are
part of the nfs4_acl_tools package. These tools can be used to get the
ACLs data for any file or directory.
Topics included are:
◆ NFS4 ACL on page 76
◆ Using nfs4_getfacl, nfs4_setfacl, and nfs4_editfacl on page 77
NFS4 ACL
An NFS4 ACL contains an ordered sequence of ACEs. NFS4 ACL can be used on an NFS4
file system by using the nfs4_acl_tools package. Each ACE has type, flags, and an access
mask.
The bitmask constants used for the ACE flag fields are as follows:
The bit INHERITED_ACE (0x10) is translated by the protocol layer to the bit
ACE4_INHERITED_ACE (0x80). The new O flag is displayed and managed by the tools
nfs4_getfacl, nfs4_setfacl, and nfs4_editfacl.
nfs4_getfacl
The nfs4_getfacl is used to view the NFSv4 ACL for file or directory, provided that the
file is on a mounted NFSv4 file system which supports ACLs. A file system which supports
NFSv4 ACL is mounted with the option accesspolicy=MIXED.
To read an acl, use the nfs4_getfacl:
nfs4_getfacl /mnt/nfsv4/fs_name
nfs4_setfacl
Use the nfs4_setfacl tool to modify the NFSv4 ACL of one or more files or directories.
The file is required to be on a mounted NFSv4 file system which supports ACLs. A file
system that supports NFSv4 ACL is mounted with the option accesspolicy=MIXED.
To modify an acl, use the nfs4_setfacl:
nfs4_setfacl -e /mnt/nfsv4/fs_name
nfs4_editfacl
The nfs4_editfacl is equivalent to nfs4_setfacl. The nfs4_editfacl edits file's ACL in the
editor defined in the EDITOR environment variable.
Note: These are not EMC tools. You can refer to the nfs4_getfacl and nfs4_setfacl man pages
available online for more information.
authentication
/π∂™¨∫∫ ≠∂π Ω¨π∞≠¿∞µÆ ªØ¨ ∞´¨µª∞ª¿ ∂≠ ® º∫¨π ªπ¿∞µÆ ª∂ ®™™¨∫∫ ® π¨∫∂ºπ™¨, ∂©±¨™ª, ∂π ∫¨πΩ∞™¨, ∫º™Ø
®∫ ® ≠∞≥¨ ∂π ® ´∞𨙪∂π¿.
CIFS server
+∂Æ∞™®≥ ∫¨πΩ¨π ªØ®ª º∫¨∫ ªØ¨ "(%2 ∑π∂ª∂™∂≥ ª∂ ªπ®µ∫≠¨π ≠∞≥¨∫. #®ª® ,∂Ω¨π ™®µ Ø∂∫ª ¥®µ¿ ∞µ∫ª®µ™¨∫
∂≠ ® "(%2 ∫¨πΩ¨π. $®™Ø ∞µ∫ª®µ™¨ ∞∫ π¨≠¨ππ¨´ ª∂ ®∫ ® "(%2 ∫¨πΩ¨π.
CIFS service
"(%2 ∫¨πΩ¨π ∑π∂™¨∫∫ ªØ®ª ∞∫ πºµµ∞µÆ ∂µ ªØ¨ #®ª® ,∂Ω¨π ®µ´ ∑π¨∫¨µª∫ ∫Ø®π¨∫ ∂µ ® µ¨ªæ∂π≤ ®∫
æ¨≥≥ ®∫ ∂µ ,∞™π∂∫∂≠ª 6∞µ´∂æ∫-©®∫¨´ ™∂¥∑ºª¨π∫.
Data Mover
(µ 5-7 ≠∂π ≠∞≥¨, ® ™®©∞µ¨ª ™∂¥∑∂µ¨µª ªØ®ª ∞∫ πºµµ∞µÆ ∞ª∫ ∂æµ ∂∑¨π®ª∞µÆ ∫¿∫ª¨¥ ªØ®ª π¨ªπ∞¨Ω¨∫
´®ª® ≠π∂¥ ® ∫ª∂π®Æ¨ ´¨Ω∞™¨ ®µ´ ¥®≤¨∫ ∞ª ®Ω®∞≥®©≥¨ ª∂ ® µ¨ªæ∂π≤ ™≥∞¨µª. 3Ø∞∫ ∞∫ ®≥∫∂ π¨≠¨ππ¨´ ª∂ ®∫
® ©≥®´¨.
domain
+∂Æ∞™®≥ Æπ∂º∑∞µÆ ∂≠ ,∞™π∂∫∂≠ª 6∞µ´∂æ∫ 2¨πΩ¨π∫ ®µ´ ∂ªØ¨π ™∂¥∑ºª¨π∫ ªØ®ª ∫Ø®π¨ ™∂¥¥∂µ
∫¨™ºπ∞ª¿ ®µ´ º∫¨π ®™™∂ºµª ∞µ≠∂𥮪∞∂µ. ≥≥ π¨∫∂ºπ™¨∫ ∫º™Ø ®∫ ™∂¥∑ºª¨π∫ ®µ´ º∫¨π∫ ®π¨ ´∂¥®∞µ
¥¨¥©¨π∫ ®µ´ Ø®Ω¨ ®µ ®™™∂ºµª ∞µ ªØ¨ ´∂¥®∞µ ªØ®ª ºµ∞∏º¨≥¿ ∞´¨µª∞≠∞¨∫ ªØ¨¥. 3ب ´∂¥®∞µ
®´¥∞µ∞∫ªπ®ª∂π ™π¨®ª¨∫ ∂µ¨ º∫¨π ®™™∂ºµª ≠∂𠨮™Ø º∫¨π ∞µ ªØ¨ ´∂¥®∞µ, ®µ´ ªØ¨ º∫¨π∫ ≥∂Æ ∞µ ª∂ ªØ¨
´∂¥®∞µ ∂µ™¨. 4∫¨π∫ ´∂ µ∂ª ≥∂Æ ∞µ ª∂ ¨®™Ø ∞µ´∞Ω∞´º®≥ ∫¨πΩ¨π.
file system
,¨ªØ∂´ ∂≠ ™®ª®≥∂Æ∞µÆ ®µ´ ¥®µ®Æ∞µÆ ªØ¨ ≠∞≥¨∫ ®µ´ ´∞𨙪∂π∞¨∫ ∂µ ® ∫¿∫ª¨¥.
NetBIOS name
-®¥¨ π¨™∂Ƶ∞¡¨´ ©¿ 6(-2, æØ∞™Ø ¥®∑∫ ªØ¨ µ®¥¨ ª∂ ®µ (/ ®´´π¨∫∫.
NTFS
-3%2 ∞∫ ªØ¨ ∫ª®µ´®π´ ≠∞≥¨ ∫¿∫ª¨¥ ∂≠ 6∞µ´∂æ∫ -3, ∞µ™≥º´∞µÆ ∞ª∫ ≥®ª¨π Ω¨π∫∞∂µ∫. -3%2 ∫º∑¨π∫¨´¨∫
ªØ¨ % 3 ≠∞≥¨ ∫¿∫ª¨¥ ®∫ ªØ¨ ∑π¨≠¨ππ¨´ ≠∞≥¨ ∫¿∫ª¨¥ ≠∂π ,∞™π∂∫∂≠ª 6∞µ´∂æ∫. -3%2 Ø®∫ ∫¨Ω¨π®≥
∞¥∑π∂Ω¨¥¨µª∫ ∂Ω¨π % 3 ∫º™Ø ®∫ ∞¥∑π∂Ω¨´ ∫º∑∑∂πª ≠∂𠥨ª®´®ª® ®µ´ ªØ¨ º∫¨ ∂≠ ®´Ω®µ™¨´ ´®ª®
∫ªπº™ªºπ¨∫ ª∂ ∞¥∑π∂Ω¨ ∑¨π≠∂π¥®µ™¨, π¨≥∞®©∞≥∞ª¿, ®µ´ ´∞∫≤ ∫∑®™¨ ºª∞≥∞¡®ª∞∂µ, ∑≥º∫ ®´´∞ª∞∂µ®≥
¨øª¨µ∫∞∂µ∫ ∫º™Ø ®∫ ∫¨™ºπ∞ª¿ ®™™¨∫∫ ™∂µªπ∂≥ ≥∞∫ª∫ ( "+∫) ®µ´ ≠∞≥¨ ∫¿∫ª¨¥ ±∂ºπµ®≥∞µÆ.
share name
-®¥¨ Æ∞Ω¨µ ª∂ ® ≠∞≥¨ ∫¿∫ª¨¥, ∂π π¨∫∂ºπ™¨ ∂µ ® ≠∞≥¨ ∫¿∫ª¨¥ ®Ω®∞≥®©≥¨ ≠π∂¥ ® ∑®πª∞™º≥®π "(%2 ∫¨πΩ¨π
ª∂ "(%2 º∫¨π∫. 3Ø¨π¨ ¥®¿ ©¨ ¥º≥ª∞∑≥¨ ∫Ø®π¨∫ æ∞ªØ ªØ¨ ∫®¥¨ µ®¥¨, ∫Ø®π¨´ ≠π∂¥ ´∞≠≠¨π¨µª "(%2
∫¨πΩ¨π∫.
Windows domain
,∞™π∂∫∂≠ª 6∞µ´∂æ∫ ´∂¥®∞µ ™∂µªπ∂≥≥¨´ ®µ´ ¥®µ®Æ¨´ ©¿ ® ,∞™π∂∫∂≠ª 6∞µ´∂æ∫ 2¨πΩ¨π ©¿ º∫∞µÆ
ªØ¨ ™ª∞Ω¨ #∞𨙪∂π¿ ª∂ ¥®µ®Æ¨ ®≥≥ ∫¿∫ª¨¥ π¨∫∂ºπ™¨∫ ®µ´ ©¿ º∫∞µÆ ªØ¨ #-2 ≠∂π µ®¥¨ π¨∫∂≥ºª∞∂µ.
Windows NT domain
,∞™π∂∫∂≠ª 6∞µ´∂æ∫ ´∂¥®∞µ ™∂µªπ∂≥≥¨´ ®µ´ ¥®µ®Æ¨´ ©¿ ® ,∞™π∂∫∂≠ª 6∞µ´∂æ∫ -3 ∫¨πΩ¨π ©¿
º∫∞µÆ ® 2 , ´®ª®©®∫¨ ª∂ ¥®µ®Æ¨ º∫¨π ®µ´ Æπ∂º∑ ®™™∂ºµª∫ ®µ´ ® -¨ª!(.2 µ®¥¨∫∑®™¨. (µ ®
6∞µ´∂æ∫ -3 ´∂¥®∞µ, ªØ¨π¨ ∞∫ ∂µ¨ ∑π∞¥®π¿ ´∂¥®∞µ ™∂µªπ∂≥≥¨π (/#") æ∞ªØ ® π¨®´/æπ∞ª¨ ™∂∑¿ ∂≠
ªØ¨ 2 ,, ®µ´ ∑∂∫∫∞©≥¿ ∫¨Ω¨π®≥ ©®™≤º∑ ´∂¥®∞µ ™∂µªπ∂≥≥¨π∫ (!#"∫) æ∞ªØ π¨®´-∂µ≥¿ ™∂∑∞¨∫ ∂≠ ªØ¨
2 ,.
See also domain and domain controller.
A DFS (continued)
wide links 31
access rights
configuring policies 41, 42
access-checking E
using only UNIX permissions 45 EMC E-Lab Navigator 60
access-checking policies 25, 39, 40 emcgetsd 46, 47, 68
reset to originating policy 39 emcsetsd 46, 47, 69
translation status 40 error messages 65
ACL expand group membership
modify from UNIX client 69 Windows credential 42
view from UNIX client 68
acl.extacl 46
acl.extendExtraGid parameter 42 F
acl.takegroupship 50
acl.unixCheckAcl 45 file locking
CIFS deny modes 30
definition 30
C limitations 30
policies 30
cache setting lock policy 50
Windows credential 44 file system objects
cifs backing up and restoring 29
acl.useUnixGid 49 determining GID 28
manage UNIX permissions 46
CIFS
deny modes 30 G
file locking 30
GID 28, 49, 50
D
I
DFS
configuring 51 inheritance rules 25
creating stand-alone root 52
DFS server 35 M
disable support 52
using MMC 52 master policy 39
messages, error 65
MIXED or MIXED_COMPAT
N U
NATIVE/USER/NT/SECURE UID 28
inheritance rules 25 umask 25
NDMP 29 UNIX
NFS client:view access rights 49
file locking 30 determining GID 28
NT status codes 61 Windows-style credential 26
user interfaces 10
P
parameter W
acl.extacl 46 wide links
acl.extendExtraGid 42 creating 53
acl.takegroupship 50 DFS 31
acl.unixCheckAcl 45 setting Windows Registry 55
acl.useUnixGid 49 Windows credential
acl.useUnixGID 50 access a trusted domain using Windows 2000
Planning considerations 14 42
access trusted domain using Windows 2000
S 42
for UNIX users of 26
security descriptor 48 include UNIX groups 42
server_log 60, 61 setting 43
NT status codes 61 Windows credential cache 44
set access-checking policies cache
access-checking policies 38 Windows expiration stamp 44