No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Basic Storage Service Configuration Guide for File

OceanStor V3 Series V300R006

This document is applicable to OceanStor 2200 V3, 2600 V3, 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18500 V3, and 18800 V3. It describes the basic storage services and explains how to configure and manage them.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


A storage system allows application servers to access shared files using different protocols, such as Common Internet File System (CIFS), Network File System (NFS), File Transfer Protocol (FTP), and Hypertext Transfer Protocol (HTTP).

File Access Protocols

  • NFS

    A protocol developed by Sun for file sharing among Linux, UNIX, Mac OS, and VMware operating systems. The Internet Engineering Task Force (IETF) is in charge of developing newer versions.

  • CIFS

    A file system share protocol developed by Microsoft and primarily used in Windows environments.

  • FTP

    A universal protocol for transferring files between two computers over a TCP/IP network and primarily used in Internet.

  • HTTP

    A protocol for transferring hypertext from web servers to local clients and primarily used in Internet.

Protocol Comparison

Table 1-1 compares the file access protocols.

Table 1-1 Protocol comparison


Application Scenario

Transmission Protocol

Working Principle


Linux and UNIX environments, including a non-domain environment, Lightweight Directory Access Protocol (LDAP)a domain environment, and network information service (NIS)b domain environment.

Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)

Client/Server architecture, requiring client software


Windows environments, including non-domain and active directory (AD)c domain environments.


Client/Server architecture, with client software being integrated into operating systems


No restrictions on operating systems.


Client/Server architecture, with client software being integrated into operating systems


No restrictions on operating systems.


Browser/Server architecture

a: LDAP is a domain environment in Linux and is used to construct a user authentication system based on directories.

b: NIS is a domain environment in Linux and can centrally manage the directory service of system databases.

c: AD is a domain environment in Windows and can centrally manage computers, servers, and users.

Authentication Specifications for File Access

Table 1-2 describes the authentication specifications supported by a storage system.

Table 1-2 Authentication specifications

Authentication Mode



User/User Group Management

Network Group

Local authentication

Not supported



Not supported

AD domain server authentication

  • Access using node name. AD domain name: supported
  • Access using another method: not supported


Not supported

Not supported

LDAP domain server authentication

Not supported

Not supported

Not supported


NIS domain server authentication

Not supported

Not supported

Not supported


a: Kerberos is a computer network authentication protocol. This protocol is used to authenticate user identity in an open network environment and automate user authentication every time a logged in user accesses resources on networks. By default, Kerberos authentication is used in Microsoft Windows 2000 and later.

b: NT LAN Manager (NTLM) is a security protocol proposed in Microsoft Windows NT. This protocol is used to protect user names and passwords during authentication.

  • You can add a storage system to an AD domain, an LDAP domain, and a NIS domain simultaneously. However, you cannot add a storage system to multiple domains of the same type.
  • NFS shares support LDAP/NIS domain authentication but do not support Kerberos authentication.
  • For FTP and HTTP shares, the storage system uses User/User Group Management for local authentication.


  • A storage system supports two file access protocol management modes: graphical user interface (GUI) and command-line interface (CLI). This document explains how to manage file access protocols using GUI. For details about how to manage file access protocols using the CLI, see the command reference specific to your product model.
  • GUIs may vary with product versions and models. The actual GUIs prevail.
  • This document describes storage service configurations in non-tenant scenarios.
Updated: 2019-07-12

Document ID: EDOC1000138856

Views: 61945

Downloads: 828

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next