No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

OceanStor 2600 V3 Video Surveillance Edition V300R006 Basic Storage Service Configuration Guide for File

This document is applicable to OceanStor OceanStor 2600 V3 Video Surveillance Edition. This document describes the basic storage services and explains how to configure and manage basic storage services for storage system.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Introduction

Introduction

A storage system allows application servers to access shared files using different protocols, such as Common Internet File System (CIFS), Network File System (NFS), File Transfer Protocol (FTP), and Hypertext Transfer Protocol (HTTP).

File Access Protocols

  • NFS

    A protocol developed by Sun for file sharing among Linux, UNIX, Mac OS, and VMware operating systems. The Internet Engineering Task Force (IETF) is in charge of developing newer versions.

  • CIFS

    A file system share protocol developed by Microsoft and primarily used in Windows environments.

  • FTP

    A universal protocol for transferring files between two computers over a TCP/IP network and primarily used in Internet.

  • HTTP

    A protocol for transferring hypertext from web servers to local clients and primarily used in Internet.

Protocol Comparison

Table 1-1 compares the file access protocols.

Table 1-1 Protocol comparison

Type

Application Scenario

Transmission Protocol

Working Principle

NFS

Linux and UNIX environments, including a non-domain environment, Lightweight Directory Access Protocol (LDAP)a domain environment, and network information service (NIS)b domain environment.

Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)

Client/Server architecture, requiring client software

CIFS

Windows environments, including non-domain and active directory (AD)c domain environments.

TCP

Client/Server architecture, with client software being integrated into operating systems

FTP

No restrictions on operating systems.

TCP

Client/Server architecture, with client software being integrated into operating systems

HTTP

No restrictions on operating systems.

TCP

Browser/Server architecture

a: LDAP is a domain environment in Linux and is used to construct a user authentication system based on directories.

b: NIS is a domain environment in Linux and can centrally manage the directory service of system databases.

c: AD is a domain environment in Windows and can centrally manage computers, servers, and users.

Authentication Specifications for File Access

Table 1-2 describes the authentication specifications supported by a storage system.

Table 1-2 Authentication specifications

Authentication Mode

Kerberosa

NTLMb

User/User Group Management

Network Group

Local authentication

Not supported

Supported

Supported

Not supported

AD domain server authentication

  • Access using node name. AD domain name: supported
  • Access using another method: not supported

Supported

Not supported

Not supported

LDAP domain server authentication

Not supported

Not supported

Not supported

Supported

NIS domain server authentication

Not supported

Not supported

Not supported

Supported

a: Kerberos is a computer network authentication protocol. This protocol is used to authenticate user identity in an open network environment and automate user authentication every time a logged in user accesses resources on networks. By default, Kerberos authentication is used in Microsoft Windows 2000 and later.

b: NT LAN Manager (NTLM) is a security protocol proposed in Microsoft Windows NT. This protocol is used to protect user names and passwords during authentication.

NOTE:
  • You can add a storage system to an AD domain, an LDAP domain, and a NIS domain simultaneously. However, you cannot add a storage system to multiple domains of the same type.
  • NFS shares support LDAP/NIS domain authentication but do not support Kerberos authentication.
  • For FTP and HTTP shares, the storage system uses User/User Group Management for local authentication.

Tips

  • A storage system supports two file access protocol management modes: graphical user interface (GUI) and command-line interface (CLI). This document explains how to manage file access protocols using GUI. For details about how to manage file access protocols using the CLI, see the command reference specific to your product model.
  • GUIs may vary with product versions and models. The actual GUIs prevail.
  • This document describes storage service configurations in non-tenant scenarios.
Translation
Download
Updated: 2019-07-12

Document ID: EDOC1100021203

Views: 43181

Downloads: 68

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next