No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor 2600 V3 Video Surveillance Edition V300R006 Basic Storage Service Configuration Guide for File

This document is applicable to OceanStor OceanStor 2600 V3 Video Surveillance Edition. This document describes the basic storage services and explains how to configure and manage basic storage services for storage system.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Modifying Properties of a CIFS Share

Modifying Properties of a CIFS Share

This section describes how to modify the properties of a CIFS share to improve the sharing efficiency.


  1. Log in to DeviceManager.
  2. Choose Provisioning > Share > CIFS (Windows/MAC).
  3. Select the CIFS share whose properties you want to modify.
  4. Click Properties.

    The Properties of CIFS Share dialog box is displayed.

  5. Modify the following parameters based on site requirements.

    Table 4-23 describes the related parameters.

    Table 4-23 Parameters for a CIFS share





    Description of the created CIFS share.

    [Value range]

    The description can be left blank or contain up to 255 characters.


    Share for user 1.


    Opportunistic locking (Oplock) is a mechanism used to adjust cache policies of clients, improving performance and network utilization.

    It is not advised to enable Oplock in the following scenarios:

    • High data integrity is required. If Oplock is enabled, data in the local cache on a client may be lost when your network is interrupted or your client breaks down. If the upper-layer service software does not have a mechanism to ensure data integrity, recovery, or retry, data loss may occur.
    • Multiple clients access the same file. If Oplock is enabled, the system performance will be adversely affected.

    [Default value]



    After this function is enabled, a client's operations on a directory, such as adding a sub-directory, adding a new file, modifying the directory, and modifying a file, can be sensed by other clients that are accessing the same directory or its parent directory.

    [Default value]


    Offline Cache Mode

    Mode in which files to be accessed are cached to local clients so that the files can be operated offline. The possible values are as follows:

    • None

      Files and programs in the shared directory cannot be cached to local clients. Therefore, these files and programs cannot be operated offline. This mode prevents client's offline file function from creating duplicates of files in the shared directory.

    • Manual

      Specified files and programs in the shared directory can be cached to local clients and operated offline.

    • Documents

      A file or program opened in the shared directory is automatically cached to a local client so that the user can operate it offline. Files and programs that can be operated offline are saved in the clients' cache and synchronized with those in the shared directory until the cache is full or users delete them. Files and programs that have not been opened cannot be cached locally.

    • Programs

      Performance is optimized based on the Documents mode. If an executable file (EXE or DLL) in the shared directory is executed by a local client, the file is automatically cached to the client. If the client needs to run the executable file later on either online or offline, it accesses the cached file instead of the one in the shared directory.


    The client's offline file function must be enabled for files and programs to be cached automatically.

    [Default value]



    This option is for SMB3.0 continuous availability, only applied to the Hyper-V share. This feature depends on Oplock and requires that it be enabled.

    [Default value]


    Security Restriction

    After security restriction is enabled, only the added IP addresses can be used to access devices. If security restriction is disabled, all IP addresses can be used to access devices.

    [Default value]


    Create Default ACL

    If a shared CIFS root directory has no default ACL, this function creates one (giving full control rights to everyone and applied to the current directory, its subdirectories, and all files in them). You can change the default ACL in follow-up operations. If you want to retain the UNIX MODE rights, disable this function.


    This function cannot be enabled when you modify a GNS.

    [Default value]


    File Name Extension

    This function can control access to a specific type of files in CIFS shares.

    • SMB2 and SMB3 support this function but SMB1 does not.
    • If file name extension filtering is enabled/disabled or rules are modified, the enabling/disabling and modification will take effect when the next new CIFS service request is initiated (such as refreshing directories, creating files, renaming files, performing failover retries, and querying file attributes).

    [Default value]



    After this function is enabled, files and folders that users have no access permission are not displayed.


    SMB2 and SMB3 support ABE but SMB1 does not.

    [Default value]


    Audit Log

    After this function is enabled for a shared directory, the system can record audit logs of operations related to the shared directory. The operations include Open, Create, Read, Write, Close, Delete, Rename, Obtain properties, Set properties, Obtain security properties, Set security properties, Obtain extension properties, and Set extension properties. By default, the system records audit logs of Create, Write, Delete, and Rename operations related to the shared directory.


    Before configuring this function, choose Settings > Monitor Settings > Audit Log Settings, and enable Record Log.

    [Default value]


  6. Click OK.

    The Execution Result dialog box is displayed.

  7. Click Close to finish modifying the CIFS properties.
Updated: 2019-07-12

Document ID: EDOC1100021203

Views: 43053

Downloads: 68

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next