Data ONTAP 7.3 File Access and Protocols Management Guide

Data ONTAP 7.3 File Access and Protocols Management Guide

Data ONTAP 7.3 File Access and Protocols Management Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 USA Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 4-NETAPP Documentation comments: [email protected] Information Web: http://www.netapp.com Part number: 210-04505_B0 Updated for Data ONTAP 7.3.2 on 10 September 2009 Table of Contents | 3 Contents Copyright information.................................................................................13 Trademark information...............................................................................15 About this guide............................................................................................17 Audience......................................................................................................................17 Accessing Data ONTAP man pages............................................................................17 Where to enter commands...........................................................................................18 Keyboard and formatting conventions.........................................................................19 Special messages.........................................................................................................20 How to send your comments.......................................................................................20 Introduction to file access management.....................................................21 File protocols that Data ONTAP supports...................................................................21 How Data ONTAP controls access to files..................................................................21 Authentication-based restrictions....................................................................21 File-based restrictions......................................................................................21 File access using NFS....................................................................................23 Exporting or unexporting file system paths.................................................................23 Editing the /etc/exports file..............................................................................24 Using the exportfs command...........................................................................25 Enabling and disabling fencing of one or more NFS clients from one or more file system paths................................................................................27 Displaying the actual file system path for an exported file system path.....................28 Displaying the export options for a file system path...................................................29 Managing the access cache..........................................................................................29 Adding entries to the access cache..................................................................30 Removing entries from the access cache.........................................................31 Viewing access cache statistics........................................................................31 Optimizing access cache performance.............................................................32 Setting access cache timeout values................................................................32 Enabling Kerberos v5 security services for NFS.........................................................33 Configuring Kerberos v5 security services for NFS to use an Active-Directory-based KDC................................................................34 4 | Data ONTAP 7.3 File Access and Protocols Management Guide Configuring Kerberos v5 security services for NFS to use a UNIX-based KDC...................................................................................37 Determining whether an NFS client supports Kerberos v5 security services.........................................................................................41 Debugging mounting problems...................................................................................42 Displaying mount service statistics.................................................................42 Tracing mountd requests..................................................................................43 Displaying NFS statistics.............................................................................................43 Enabling or disabling NFSv3......................................................................................44 Supporting NFSv4 clients............................................................................................44 About Data ONTAP support of NFSv4...........................................................45 Limitations of Data ONTAP support for NFSv4.............................................45 How the pseudo-fs in NFSv4 affects mountpoints..........................................46 Enabling or disabling NFSv4..........................................................................47 Specifying the user ID domain for NFSv4......................................................47 Managing NFSv4 ACLs...................................................................................47 Managing NFSv4 open delegations.................................................................51 Configuring NFSv4 file and record locking....................................................54 Supporting PC-NFS clients.........................................................................................56 How the pcnfsd daemon works........................................................................56 Enabling or disabling the pcnfsd daemon........................................................57 Creating PC-NFS user entries in the storage system's local files....................57 Defining the umask for files and directories that PC-NFS users create.................................................................................................58 Supporting WebNFS clients.........................................................................................59 Enabling or disabling the WebNFS protocol...................................................59 Setting a WebNFS root directory.....................................................................59 NFS over IPv6.............................................................................................................60 Enabling or disabling NFS over IPv6 .............................................................61 Textual representation of IPv6 addresses.........................................................61 File access using CIFS..................................................................................63 Configuring CIFS on your storage system..................................................................63 Supported Windows clients and domain controllers........................................64 What the cifs setup command does.................................................................64 Setting up your system initially.......................................................................65 Specifying WINS servers.................................................................................65 Table of Contents | 5 Changing the storage system domain..............................................................66 Changing protocol modes................................................................................67 Specifying Windows user account names........................................................69 Reconfiguring CIFS on your storage system...................................................70 Configuring SMB on your storage system..................................................................71 Support for the original SMB protocol............................................................72 Support for the SMB 2.0 protocol...................................................................72 When to enable the SMB 2.0 protocol............................................................74 Enabling or disabling the SMB 2.0 protocol...................................................75 Enabling or disabling SMB 2.0 durable handles.............................................75 Specifying the SMB 2.0 durable handle timeout value...................................76 SMB signing....................................................................................................76 Enabling or disabling the storage system's SMB 2.0 protocol client capability............................................................................79 Managing shares..........................................................................................................79 Creating a share...............................................................................................80 Displaying and changing the properties of a share..........................................83 Deleting a share...............................................................................................92 Managing access control lists......................................................................................93 About share-level ACLs...................................................................................93 Displaying and changing a share-level ACL...................................................93 Displaying and changing a file-level ACL.......................................................99 Specifying how group IDs work with share-level ACLs...............................101

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    382 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us