No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

OceanStor 2600 V3 Video Surveillance Edition V300R006 Basic Storage Service Configuration Guide for File

This document is applicable to OceanStor OceanStor 2600 V3 Video Surveillance Edition. This document describes the basic storage services and explains how to configure and manage basic storage services for storage system.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
How Can I Perform Configuration and Verification on the Host After Access Based Enumeration (ABE) Is Enabled When the Storage System Creates a CIFS Share?

How Can I Perform Configuration and Verification on the Host After Access Based Enumeration (ABE) Is Enabled When the Storage System Creates a CIFS Share?

After ABE is enabled, the share directory does not display files or file folders on which the user has no access permission. The following shows accessing a CIFS share on the host in the domain environment (also applicable to local authentication users).

  1. The host accesses the CIFS share created by the storage system successfully. Figure 5-1 shows share access by domain user aduser00.
    Figure 5-1 The host accesses the CIFS share created by the storage system

  2. Create file test.txt under the share path. Figure 5-2 shows the result.
    Figure 5-2 Create file under the share path

  3. Add permissions to domain users aduser01 and 24aduser1 and remove the default permission of Everyone. If the default permission of Everyone is not removed, all users have full control over the file and can still view the file.

    Figure 5-3 shows how to modify the advanced settings of test.txt.

    Figure 5-3 Modify the advanced settings

    Figure 5-4 shows the advanced security settings before the default permission of Everyone is removed.

    Figure 5-4 Before the default permission of Everyone is removed

    Figure 5-5 shows the advanced security settings after the default permission of Everyone is removed.

    Figure 5-5 After the default permission of Everyone is removed

    Figure 5-6 shows the permission settings for domain user aduser01.

    Figure 5-6 Permission settings for domain user aduser01

    Figure 5-7 shows how to select read data, read attributes, read extended attributes, and read permissions to gain full read permissions.

    Figure 5-7 Full read permissions

    Figure 5-8 shows the permission settings for domain user 24aduser1.

    Figure 5-8 Permission settings for domain user 24aduser1

  4. View and check the files in the share path as domain users aduser01 and 24aduser1. The verification results are as follows:

    Figure 5-9 shows the verification results for domain user aduser01.

Figure 5-9 Verification results for domain user aduser01

Figure 5-10 shows the verification results for domain user 24aduser1.

Figure 5-10 Verification results for domain user 24aduser1

Translation
Download
Updated: 2019-07-12

Document ID: EDOC1100021203

Views: 42936

Downloads: 68

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next