Database Installation Guide

Total Page:16

File Type:pdf, Size:1020Kb

Database Installation Guide Oracle® Database Database Installation Guide 19c for Microsoft Windows E96293-06 June 2020 Oracle Database Database Installation Guide, 19c for Microsoft Windows E96293-06 Copyright © 1996, 2020, Oracle and/or its affiliates. Primary Authors: Sunil Surabhi, Tanaya Bhattacharjee Contributing Authors: Prakash Jashnani, Mark Bauer, Bharathi Jayathirtha Contributors: Barb Glover, Eric Belden, Sudip Datta, David Friedman, Alex Keh, Peter LaQuerre, Rich Long, Matt McKerley, Sham Rao Pavan, Hanlin Qian, Sujatha Tolstoy, Sergiusz Wolicki, Sue Mavris, Mohammed Shahnawaz Quadri, Vishal Saxena, Krishna Itikarlapall, , Santanu Datta, Christian Shay, Aneesh Khanderwal, Michael Coulter, Robert Achacoso, Malai Stalin, David Price, Ramesh Chakravarthula This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or “commercial computer software documentation” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms governing the U.S. Government’s use of Oracle cloud services are defined by the applicable contract for such services. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents Preface Audience xiii Documentation Accessibility xiii Set Up Java Access Bridge to Implement Java Accessibility xiv Related Documentation xiv Conventions xv Changes in this Release for Oracle Database Installation Guide Changes in Oracle Database 19c xvi 1 Oracle Database Installation Checklist Server Hardware Checklist for Oracle Database Installation 1-1 Operating System Checklist for Oracle Database Installation on Microsoft Windows 1-2 Server Configuration Checklist for Oracle Database Installation 1-2 Storage Checklist for Oracle Database Installation 1-3 Oracle User Environment Configuration Checklist for Oracle Database Installation 1-4 Installer Planning Checklist for Oracle Database Installation 1-5 2 Oracle Database Preinstallation Tasks Oracle Database Minimum Hardware Requirements 2-1 Hardware Component Requirements for Windows x64 2-1 Hard Disk Space Requirements 2-2 Verifying Hardware Requirements 2-3 Oracle Database Software Requirements 2-3 Windows Certification and Web Browser Support 2-5 Remote Desktop Services 2-5 Microsoft Windows Servicing Options 2-6 Installation Requirements for Web Browsers 2-6 Default Share Configuration Requirement 2-7 Reviewing Operating System Security Common Practices 2-7 iii Confirming Host Name Resolution 2-7 Individual Component Requirements 2-7 Configuring Disk Storage for Oracle Data Files and Recovery Files 2-8 Choosing a Storage Option for Oracle Database and Recovery Files 2-8 Creating Directories for Oracle Data Files or Recovery Files 2-8 Guidelines for Placing Oracle Database Files on a File System or Logical Volume 2-9 Guidelines for Placing Oracle Recovery Files on a File System 2-9 Creating Required Directories 2-10 Oracle Database Security Strong Authentication Requirements 2-11 Oracle Enterprise Manager Requirements 2-11 Oracle-Managed Files Requirements 2-11 Oracle Volume Shadow Copy Service (VSS) Writer 2-11 3 Overview of Oracle Database Installation Installation Considerations 3-1 Oracle Base Directory 3-1 Oracle Home Directory 3-2 Contents of the Oracle Home Environment 3-3 Multiple Oracle Home Components 3-3 Oracle Inventory Directory 3-3 Installing Oracle Database Vault in an Oracle Data Guard Environment 3-3 Oracle Database Vault Default Audit Policy and Initialization Parameters 3-4 Consider Memory Allocation and Automatic Memory Management 3-4 Database Configuration Options 3-4 Creating a Database After Installation 3-5 Creating an Oracle Database on Direct NFS 3-5 4 Configuring Users, Groups and Environments for Oracle Database Creating Required Operating System Groups and Users 4-1 About the Oracle Installation User 4-2 Creating Oracle Home User 4-2 Understanding the Oracle Inventory Directory and the Oracle Inventory Group 4-3 Operating System Groups Created During Oracle Database Installation 4-4 Operating System Groups and Users for Job Role Separation 4-7 About Job Role Separation Operating System Privileges Groups and Users 4-8 Oracle Software Owner for Each Oracle Software Product 4-8 Standard Oracle Database Groups for Job Role Separation 4-8 Extended Oracle Database Groups for Job Role Separation 4-9 Oracle Automatic Storage Management Groups for Job Role Separation 4-10 iv Windows Group Managed Service Accounts and Virtual Accounts 4-11 Microsoft Hyper-V Requirements 4-11 Stopping Existing Oracle Services 4-11 Configuring User Accounts 4-12 Configuring Environment Variables for the Software Installation Owner 4-12 Managing User Accounts with User Account Control 4-12 Creating Oracle Database Vault User Accounts 4-13 5 Configuring File System Storage for Oracle Database About Direct NFS Client Storage 5-2 About the Oranfstab File for Direct NFS Client 5-3 Mounting NFS Storage Devices with Direct NFS Client 5-3 Specifying Network Paths for a NFS Server 5-3 Creating an oranfstab File for Direct NFS Client 5-3 Performing Basic File Operations Using the ORADNFS Utility 5-6 Monitoring Direct NFS Client Usage 5-7 Enabling Direct NFS Client 5-7 Disabling Direct NFS Client 5-7 Enabling HCC on Direct NFS Client 5-8 6 Installing and Configuring Oracle Grid Infrastructure for a Standalone Server Requirements for an Oracle Restart Installation 6-3 System Requirements 6-3 Memory Requirements 6-4 Disk Space Requirements 6-4 Oracle ACFS and Oracle ADVM 6-4 Oracle ACFS and Oracle ADVM Support on Microsoft Windows 6-4 Restrictions and Guidelines for Oracle ACFS 6-5 Oracle Automatic Storage Management Storage Configuration 6-6 About Managing Disk Groups for Older Database Versions 6-6 Oracle Automatic Storage Management Installation Considerations 6-7 Configuring Storage for Oracle Automatic Storage Management 6-7 Identifying Storage Requirements for Oracle Automatic Storage Management 6-8 Oracle ASM Disk Space Requirements 6-11 ASM Disk Group Options for Interactive and Noninteractive Installation 6-12 Configuring Disks Manually for Oracle Automatic Storage Management 6-14 About Upgrading Existing Oracle Automatic Storage Management Instances 6-16 v Configuring Oracle Automatic Storage Management Disk
Recommended publications
  • A Definitive Guide to Windows 10 Management: a Vmware Whitepaper
    A Definitive Guide to Windows 10 Management: A VMware Whitepaper November 2015 Table of Contents Executive Summary.................................................................................................................3 Challenges with Windows Management..........................................................................5 How Windows 10 Differs........................................................................................................7 Windows 10 Management Features....................................................................................9 New Methods of Updates......................................................................................................10 New Methods of Enrollment and Device Provisioning................................................11 Unified Application Experiences.........................................................................................13 Domain Joined Management................................................................................................16 Application Delivery.............................................................................................................17 Universal Applications.........................................................................................................17 Classic Windows Applications.........................................................................................17 Cloud-based Applications.................................................................................................17
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide Cygwin User’s Guide ii Copyright © Cygwin authors Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .4 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select . .7 1.7 What’s new and what changed in Cygwin . .7 1.7.1 What’s new and what changed in 3.2 .
    [Show full text]
  • Flare-On 5: Challenge 7 Solution – Worldofwarcraft.Exe
    Flare-On 5: Challenge 7 Solution – WorldOfWarcraft.exe Challenge Author: Ryan Warns Summary This challenge implements a 32-bit Windows binary meant to run in a Windows on Windows (WOW) environment. Analysis I often start my analysis of samples by quickly skimming the output of static analysis tools and looking through IDA. Performing basic static analysis on the binary we see that WorldOfWarcraft.exe is a simple 32-bit DLL. Running strings.exe on this binary shows us several strings that look like they might be related to the key. USER32 WS2_32 %[email protected] Cannot read payload! n1ght_4lve$_R_c00L.bin A_l1ttl3_P1C_0f_h3aV3n RSDS R:\objchk_win7_x86\i386\WorldOfWarcraft.pdb Figure 1 - strings in WorldOfWarcraft.exe Opening the binary in IDA we can see that the binary doesn’t appear to implement much in the way of functionality, with the main function only calling 3 subroutines. The subroutine at address 0x1001A60 contains references to our strings of interest. FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | [email protected] | www.FireEye.com 1 Figure 2 - Decompilation of function using interesting strings I’ve cleaned up the decompilation in the screenshot above to be slightly more accurate. Quickly skimming sub_1001910 reveals that this function grabs the contents of a file, so it looks like sub_0x1001A60 will read the file n1ght_4lve$_R_c00L.bin and XOR the contents against the string A_l1ttl3_P1C_0f_h3aV3n. The result of this operation is compared to a static array on the stack, and if the two match the sample will print our key.
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 version 1809 (October 2018 Update) Microsoft Windows Server 2019 (October 2018 Update) Security Target Document Information Version Number 0.05 Updated On June 18, 2019 Microsoft © 2019 Page 1 of 126 Microsoft Common Criteria Security Target Version History Version Date Summary of changes 0.01 June 27, 2018 Initial draft 0.02 December 21, 2018 Updates from security target evaluation 0.03 February 21, 2019 Updates from evaluation 0.04 May 6, 2019 Updates from GPOS PP v4.2.1 0.05 June 18, 2019 Public version Microsoft © 2019 Page 2 of 126 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
    [Show full text]
  • Download Deploying Windows 7, Essential Guidance
    FROM THE Windows® 7 Resource Kit Mitch Tulloch, Tony Northrup, Jerry Honeycutt, Ed Wilson, and the Windows 7 Team at Microsoft I Chapter 3 Deployment Platform .............................................. 85 I Chapter 4 Planning Deployment ............................................ 113 I Chapter 5 Testing Application Compatability ........................... 139 I Chapter 6 Developing Disk Images ......................................... 179 I Chapter 7 Migrating User State Data ...................................... 223 I Chapter 8 Deploying Applications .......................................... 247 I Chapter 9 Preparing Windows PE ........................................... 273 I Chapter 10 Confi guring Windows Deployment Services .............. 293 I Chapter 11 Using Volume Activation ........................................ 335 I Chapter 12 Deploying with Microsoft Deployment Toolkit ........... 355 DEPLOYING WINDOWS 7 83 Chapter 3 Deployment Platform n Tools Introduction 85 n Windows 7 Deployment Terminology 87 n Platform Components 89 n Deployment Scenarios 99 n Understanding Setup 101 n Basic Deployment Process 105 n Microsoft Deployment Toolkit Process 107 n Summary 110 n Additional Resources 111 uilding on technology that the Windows Vista operating system introduced, Windows 7 Bdeployment technology has evolved significantly since Windows XP Professional . For example, it supports file-based disk imaging to make high-volume deployments quicker, more efficient, and more cost effective . The Windows 7 operating system also provides
    [Show full text]
  • Windows System Error Codes and What They Mean
    Windows system error codes and what they mean This information was gathered from: https://msdn.microsoft.com/en-us/library/windows/desktop/ ms681382(v=vs.85).aspx You can find additional error codes and messages in the above website. Code Description: 0 The operation completed successfully. 1 Incorrect function. 2 The system cannot find the file specified. 3 The system cannot find the path specified. 4 The system cannot open the file. 5 Access is denied. 6 The handle is invalid. 7 The storage control blocks were destroyed. 8 Not enough storage is available to process this command. 9 The storage control block address is invalid. 10 The environment is incorrect. 11 An attempt was made to load a program with an incorrect format. 12 The access code is invalid. 13 The data is invalid. 14 Not enough storage is available to complete this operation. 15 The system cannot find the drive specified. 16 The directory cannot be removed. 17 The system cannot move the file to a different disk drive. 18 There are no more files. 19 The media is write protected. 20 The system cannot find the device specified. 21 The device is not ready. 22 The device does not recognize the command. 23 Data error (cyclic redundancy check). 24 The program issued a command but the command length is incorrect. 25 The drive cannot locate a specific area or track on the disk. 26 The specified disk or diskette cannot be accessed. 27 The drive cannot find the sector requested. 28 The printer is out of paper.
    [Show full text]
  • DRBL-Winroll: the Free Configuration Program for Microsoft Windows
    DRBL-Winroll: The Free configuration program for Microsoft Windows Ceasar Sun, Steven Shiau, Thomas Tsai http://drbl-winroll.org , http://drbl.org , http://clonezilla.org/ RMLL (LSM) 2015 Q3, 2015 1 Outline Introduction to DRBL-Winroll – Develop Team – Common Issues for Windows Replication – Feature/Framework Cases of Usages – Basic Installation and usage – How to do centralize management – Advanced usage Limitation/Development/Contribution Q&A 2 Outline Introduction to DRBL-Winroll – Develop Team – Common Issues for Windows Replication – Feature/Framework Cases of Usages – Basic Installation and usage – How to do centralize management – Advanced usage Limitation/Development/Contribution Q&A 3 About us • From Taiwan, working for the NPO NCHC (National Center for High- Performance Computing) • Developers of free/open-source software: – DRBL, Clonezilla – DRBL-Winroll, Tux2live – Partclone, Tuxboot, Cloudboot – ... more Taiwan image source: wikipedia.org 4 Developers/Contributor • Steven Shiau • Ceasar Sun • Thomas Tsai • Jazz Wang • Jean René Mérou Sánchez • K. L. Huang • Jean-Francois Nifenecker • Louie Chen • Nagappan Alagappan • … 5 Replication Issue 6 Copy & Paste ? • Data v.s Configurations – For small scale replication , it's easy. • Deployment is one thing, but configuration is another – Not only copy-and-paste 7 Configuration with Massive Scale • Not possible by hand , automatical configuration is better I©m Robot #1 Hello, I©m Robot #2 Hello, I©m Robot #3 Hello, I©m Robot #.. 8 Mass Deployment • What is “mass deployment”
    [Show full text]
  • Server Administrator Installation and Management 8.1.1 Release Notes
    Server Administrator Installation and Management 8.1.1 Release Notes Version 8.1.1 Release Date: June 2015 Previous Version 8.1.0 Importance RECOMMENDED: Dell recommends applying this update during your next scheduled update cycle. The update contains feature enhancements or changes that will help keep your system software current and compatible with other system modules (firmware, BIOS, drivers and software). What’s New The release highlights of Server Administrator are: • Support for only PowerEdge R530 xd and PowerEdge R930 Installation • To install Server Administrator on Windows Server 2008 R2 SP1 Core and Windows Server 2012 Core, Windows-on-Windows (WOW) mode must be enabled. • On the Red Hat Enterprise Linux and SUSE Linux Enterprise Server operating systems, to perform an Express Install, execute srvadmin-install.sh -x from the SYSMGMT/srvadmin/linux/supportscripts directory. For more information on installation instructions, including silent installation options, see the Server Administrator Installation Guide at dell.com/support/openmanagemanuals. User Notes for Supported Microsoft Windows Operating Systems In the Prerequisite checker screen, you may get the following may message: An error occurred while attempting to execute a Visual Basic Script. Please confirm that Visual Basic files are installed correctly. This error occurs when the Prerequisite checker uses the vbstest.vbs (a Visual Basic [VB]) script to verify the installation environment and fails for some reason. The possible causes are: Issue: Description: Incorrect Internet Explorer Security settings. Resolution: Ensure that Active Scripting is enabled. Click Tools Internet Options Security Custom Level Scripting Active Scripting Enable. Ensure that Scripting of Java Applets is enabled.
    [Show full text]
  • Quick Start Guide for Windows Server Container (SQL Server Express )
    EXPRESSCLUSTER X for Windows Quick Start Guide for Windows Server Container (SQL Server Express) Version 2 May 10, 2017 Disclaimer The contents of this document are subject to change without notice. NEC Corporation assumes no responsibility for technical or editorial mistakes in or omissions from this document. To obtain the benefits of the product, it is the customer’s responsibility to install and use the product in accordance with this document. The copyright for the contents of this document belongs to NEC Corporation. Copying, altering, or translating this document, in full or in part, without the permission of NEC Corporation, is prohibited. Trademark Information Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of NEC Corporation. Microsoft® and Windows® are registered trademarks of Microsoft Corporation. Other system names, company names, and product names are trademarks and registered trademarks of their respective companies. Quick Start Guide for Windows Server Container (SQL Server Express) 2 Contents 1 About This Guide ............................................................................. 5 1.1 Using This Guide ......................................................................................... 5 1.2 Revision History .......................................................................................... 5 1.3 Evaluation Environment
    [Show full text]
  • Serverprotect Support for Microsoft Windows Server System
    Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes and the latest version of the Getting Started Guide, which are available from the Trend Micro Website at: http://docs.trendmicro.com/ NOTE: A license to the Trend Micro Software includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. Thereafter, you must renew Maintenance on an annual basis by paying Trend Micro then-current Maintenance fees to have the right to continue receiving product updates, pattern updates and basic technical support. To order renewal Maintenance, you may download and complete the Trend Micro Maintenance Agreement at the following site: www.trendmicro.com/license Trend Micro, ServerProtect, Control Manager, MacroTrap, TrendLabs, and the Trend Micro t-ball logo are trademarks of Trend Micro Incorporated. Microsoft Windows, Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows 7, Windows 8, Windows 10, Windows NT, MS-DOS, PowerPoint, Excel, and Microsoft Office are trademarks of Microsoft Incorporated. Netware® is the trademark of the Novell corporation. Intel®, and Pentium® are trademarks of Intel Corporation. All other brand and product names are trademarks or registered trademarks of their respective companies or organizations. Copyright © 2019, Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated.
    [Show full text]
  • Clustered Data ONTAP® 8.3 File Access Management Guide for NFS
    Updated for 8.3.1 Clustered Data ONTAP® 8.3 File Access Management Guide for NFS NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-10105_A0 495 East Java Drive Fax: +1 (408) 822-4501 June 2015 Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277 U.S. Web: www.netapp.com Feedback: [email protected] Table of Contents | 3 Contents Considerations before configuring file access .......................................... 10 File protocols that Data ONTAP supports ................................................................. 10 How Data ONTAP controls access to files ................................................................ 10 Authentication-based restrictions .................................................................. 10 File-based restrictions ................................................................................... 11 LIF configuration requirements for file access management .................................... 11 How namespaces and volume junctions affect file access on SVMs with FlexVol volumes ................................................................................................................ 11 What namespaces in SVMs with FlexVol volumes are ................................. 11 Volume junction usage rules ......................................................................... 12 How volume junctions are used in SMB and NFS namespaces .................... 12 What the typical NAS namespace architectures are ...................................... 12 Creating and managing data volumes
    [Show full text]