No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

File Access and Protocols Feature Guide 13

OceanStor 18500 V3 and 18800 V3 Mission Critical Storage System V300R003

This document describes the implementation principles and application scenarios of the NAS feature. Also, it explains how to configure and manage NAS.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Creating a CIFS Share (Applicable to V300R003C10 and V300R003C20)

Creating a CIFS Share (Applicable to V300R003C10 and V300R003C20)

You may share the file system through CIFS, and user can access the shared storage space.

Prerequisites

  • The CIFS service is enabled.
  • If it is a non-domain environment, the CIFS authentication mode is configured as local authentication or global authentication.
  • If it is an AD domain environment, the CIFS authentication mode is configured as domain authentication or global authentication.

Procedure

  1. Log in to DeviceManager.
  2. Choose Provisioning > Share > CIFS (Windows/MAC).
  3. Click Create.

    The Create CIFS Share Wizard dialog box is displayed.

  4. Set CIFS parameters.
    1. On the CIFS setting page, configured required parameters.



      Table 3-10 describes the related parameters.

      Table 3-10  Parameters for creating a CIFS share

      Parameter

      Description

      Value

      File System

      File system for which you want to create a CIFS share.

      [Example]

      Filesystem001

      Quota Tree

      Level-1 directory under the root directory of the file system.

      To share a quota tree, click and select a quota tree you want to share.

      [Example]

      Share

      NOTE:

      The share path is /Filesystem001/Share.

      Share Name

      Name used by a user for accessing the shared resources.

      [Value range]
      • The share name can be in Chinese, English, or Japanese.
      • Contain 1 to 80 characters.
      • Cannot contain special characters "/\[]:|<>+;,?*=.
      • Cannot be the name reserved by the system. The names reserved by the system are: ipc$, autohome, ~ and print$.

      [Example]

      share_for_user1

      Description

      Description of the created CIFS share.

      [Value range]

      The name contains 0 to 255 characters.

      [Example]

      Share for user 1.

      Oplock

      Opportunistic lock (Oplock) is a mechanism used to adjust cache policies of clients, improving performance and network utilization.

      This function is not recommended in the following scenarios:
      • Scenarios that have high requirements for data integrity: Local cache loss will occur if your network is interrupted or your client breaks down after Oplock is enabled. If the upper-layer service software does not have a mechanism to ensure data integrity, recovery, or retry, data loss may occur.
      • Scenarios where multiple clients access the same file: If Oplock is enabled, the system performance will be adversely affected.

      [Default value]

      Enabled

      Notify

      After this parameter is enabled, a client's operations on a directory, such as adding a sub-directory, adding a new file, modifying the directory, and modifying a file, can be sensed by other clients that are accessing this directory or the parent directory of this directory.

      [Default value]

      Enabled

      Offline Cache Mode

      Cache files to be accessed in different offline cache modes to local clients so that files can be operated offline. The following offline cache modes are supported:
      • Manual

        Specified files and programs in the shared directory can be cached to local clients and operated offline.

      • Documents

        If a user accesses the shared directory and opens a file or program in the shared directory, the file or program is automatically cached to a local client so that the user can operate it offline. Files and programs that can be operated offline are saved in the cache of clients and they are synchronized with those in the shared directory until the cache is full or users delete them. Files and programs that have not been opened cannot be cached locally.

      • Programs

        Performance is optimized based on the Documents mode. If an executable file (EXE or DLL) in the shared directory is executed by a local client, the file is automatically cached to the client. If the client needs to run the executable file online or offline next time, it accesses the cached file instead of that in the shared directory.

      • None

        Files and programs in the shared directory cannot be cached to local clients. Therefore, these files and programs cannot be operated offline. This mode prevents the offline file function of clients from creating duplicates of files in the shared directory.

      NOTE:

      The offline file function of clients must be enabled so that files and programs can be automatically cached.

      [Default value]

      Manual

      CA

      This option is for SMB3.0 continuous availability. This feature depends on Oplock, ensure that Oplock is enabled.

      [Default value]

      Disabled

      Security Restriction

      After security restriction is enabled, only the added IP addresses can be used to access devices. If security restriction is not enabled, all IP addresses can be used to access devices.

      [Default value]

      Disabled

      Create Default ACL

      This function creates a default ACL (full control rights to everyone; applied to the current directory, its subdirectories, and files in them) for a shared CIFS root directory if the directory has no ACL. You can change the default ACL in follow-up operations. If you want to retain the UNIX MODE rights, disable this function.

      [Default value]

      Enabled

    2. Click Next.

      The Set Permissions page is displayed.

  5. Set the permissions of user or user group accessing the CIFS share.
    1. In Users/User Groups area, click Add.

      The Add User/User Group dialog box is displayed.

    2. In User/User Group, select user type or user group type.

      The values include: Everyone, Local authentication user, Local authentication user group, Domain user and Domain user group.

      • If you select Everyone, click Add.
      • If you select Local authentication user or Local authentication user group, click Find, in the pop-up Find Local Authentication User or Find Local Authentication User Group dialog boxes to select the user or user group you want to add. Click OK.
      • If the desired local authentication user or user group does not exist, click Create to create and add a new authentication user or user group.
      • If you select Domain user or Domain user group, enter the corresponding name in Name, and click Add.
        NOTE:
        • Everyone means every user has the access permission.
        • The name format is Domain name\Domain user name or Domain name\Domain user group name.

    3. In Permission Level, select the CIFS access permission for the user or user group added.

      Table 3-11 provides details about the permissions.

      Table 3-11  Description of CIFS share permissions

      Operation

      Forbidden

      Read-Only

      Read and Write

      Full Control

      Viewing files and subdirectories

      Not allowed

      Allowed

      Allowed

      Allowed

      Viewing the contents of files

      Not allowed

      Allowed

      Allowed

      Allowed

      Running executable files

      Not allowed

      Allowed

      Allowed

      Allowed

      Adding files or subdirectories

      Not allowed

      N/A

      Allowed

      Allowed

      Modifying the contents of files

      Not allowed

      N/A

      Allowed

      Allowed

      Deleting files and subdirectories

      Not allowed

      N/A

      Allowed

      Allowed

      Renaming

      Not allowed

      N/A

      Allowed

      Allowed

      Changing the ACL of files or directories

      Not allowed

      N/A

      N/A

      Allowed

      NOTE:

      Priorities in the descending order are Forbidden, Full control, Read and write , and Read-only. The permission with the highest priority prevails. When a user's access permission is extended, the new permission takes effect immediately. For example, if a user's original access permission is Read-only but the user is added to a user group with Full control permission later, the user's access permission changes to Full control and it does not need to be re-authenticated to access the CIFS share.

    4. Click OK.

      The system adds the user or user group you select to the Users/User Groups list.

    5. Click Next.

      The Security Restriction page is displayed.

  6. Set security restriction. This parameter is valid only after security restriction is enabled.
    1. In the Accessible IP Address/Address Segment area, click Add.

      The Add IP Address or IP Address Segment dialog box is displayed.

    2. In IP Address/Address Segment, specify the IP addresses or IP address segments.

      NOTE:
      • The IP address segment is in the format of IP address/mask, for example, 192.168.1.100/16. The mask of IPv4 ranges from 1 to 32, and the mask of IPv6 ranges from 1 to 128. A mixed IP address segment (IPv4 and IPv6) is not supported.
      • The IP rule can be:
        • A single IPv4 or IPv6 address, for example, 192.168.1.100.
        • An IP address segment, for example, 192.168.1.100/16 or 192.168.1.10~192.168.1.11/30.
      • A maximum of 32 IP addresses or IP address segments can be added.

    3. Click OK.

      The added IP addresses or IP address segments are displayed in the list.

    4. Click Next.

      The Summary page is displayed.

  7. On the Summary page, check whether the CIFS information is correct. Click Finish.
  8. On the Execution Result page, view the execution result. Click Close to finish creating a CIFS share.

    You can view the created share in the CIFS share list.

Translation
Download
Updated: 2019-08-14

Document ID: EDOC1000084098

Views: 32856

Downloads: 72

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next