
5-2
Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
Byte-range locks work on portions of a file. Byte-range operations other than reads by
a UNIX-based NFS client fail if the attempted operation is forbidden by the lock. As is
appropriate for NFS, a UNIX-based NFS application might be forbidden to access a
byte-range that is locked by CIFS.
NOTE: There is one exception to the enforcement of locks set by CIFS clients on the
filer. When the filer runs the
dump
command, it ignores the file lock set by a CIFS cli-
ent that prevents read access to parts of a file or the entire file. Ignoring the read
file lock allows the filer to back up all files.
0DQDJLQJ6\PEROLF/LQNVIRU&,)6$FFHVV
$ERXW6\PEROLF/LQNV
CIFS clients can follow symbolic links, which are created by NFS clients. A symbolic
link is a special file that points to another file or directory. A symbolic link is, in some
respects, like a shortcut in the Windows environment.
There are two kinds of symbolic links: absolute and relative:
Absolute symbolic links begin with a slash (/) and are treated as a path relative to
the root of the file system.
Relative symbolic links begin with a character other than a slash (
/
) and are
treated as a path relative to the parent directory of the symbolic link.
&RQWUROOLQJ$FFHVVWR6\PEROLF/LQNV
You can control CIFS access to symbolic links in three ways:
Enabling or disabling symbolic links
Redirecting absolute symbolic links
Preventing or allowing the following of symbolic links that can refer to a directory
higher in the same tree
(QDEOLQJ6\PEROLF/LQNV
When the symbolic links for CIFS feature is enabled, which is the default setting, if
the object being accessed by a CIFS client is an absolute or relative symbolic link, the
filer follows the link under the following conditions:
The ultimate target is in the same share as the symbolic link.
A symbolic link encountered in any path component other than the final one is
always followed.
The final component of a symbolic link is followed only if the operation is to open
an existing file.
Other operations, such as deleting and renaming, result in deleting or renaming
the symbolic link itself rather than the target of the symbolic link.
Summary of Contents for PowerVault 720N
Page 1: ... ZZZ GHOO FRP HOO 3RZHU9DXOW 1 1 DQG 1 6 67 0 0 1 675 725 1 200 1 5 5 1 8 ...
Page 6: ...viii ...
Page 48: ...l ...
Page 124: ...3 28 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 252: ...8 12 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 280: ...10 10 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 332: ...14 6 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 344: ...15 12 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 362: ...16 18 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 372: ...17 10 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 392: ...18 20 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 414: ...19 22 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 416: ...A 2 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 417: ...Command Reference A 3 8VHU RPPDQGV This section contains user commands ...
Page 531: ...Command ReferenceA 117 ...
Page 588: ...A 174 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...