Enabling Server for NFS
To enable Server for NFS, you need to specify where User Name Mapping is
running.
To specify where User Name Mapping is running, follow this path,
Services for
UNIX
→
User Name Mapping
, and then enter the server name that is running User
Name Mapping in the Computer Name field. For a cluster, this entry must be the
clustered name or IP address, not that of an individual node.
When planning an NFS installation, consider which machines you want to have
particular access-levels to NFS shares. Each class of access should be captured by
defining a separate client group.
v
To define a client group, click
Services for UNIX
→
Client Groups
, enter the
group name in the Group Name field, then click
New
.
v
To add members to a client group, select a group name from the current groups
list, then click
Advanced
and enter the name of a client (a valid computer name).
v
A note on anonymous access:
It is strongly recommended that you not disable
anonymous access. If a client presents a UID that is not recognized, Server for
NFS can still grant that client a very limited form of access as a special
nobody
user. This is known as anonymous access, and you can enable or disable on a
per-share basis. This anonymous user will have very limited access to resources
on the NAS: it has only the permissions that are granted to the
Everybody
group
in Windows, which corresponds to the
other
(or
world
) bits in a POSIX
permissions mode.
Allowing anonymous access is not a security risk, so disabling it might provide a
false sense of security. (The real security risk is to grant everyone access to
resources that should be protected.) And disabling anonymous access has one
severe consequence: it is so unexpected by NFS clients that they may not be
able to connect as NFS V3 clients at all, and may instead downgrade the
connection to use the NFS V2 protocol.
Antivirus protection
You can perform antivirus scanning of Model 326 storage from clients having the
appropriate access permissions. Also, you can install Norton AntiVirus Version 7.5
or later on the Model 326 engine using standard Windows 2000 software installation
procedures.
Depending on configuration options, antivirus scanning might use substantial CPU
or disk resources. Therefore, you should carefully select the scanning options and
schedule.
Chapter 6. Managing and protecting the network and storage
75
Содержание totalstorage 326
Страница 1: ...IBM TotalStorage Network Attached Storage 300 Model 326 User s Reference Release 2 5 GA27 4276 02...
Страница 8: ...viii Model 326 User s Reference...
Страница 10: ...x Model 326 User s Reference...
Страница 20: ...8 Model 326 User s Reference...
Страница 64: ...52 Model 326 User s Reference...
Страница 88: ...76 Model 326 User s Reference...
Страница 134: ...122 Model 326 User s Reference...
Страница 144: ...132 Model 326 User s Reference...
Страница 146: ...134 Model 326 User s Reference...
Страница 166: ...154 Model 326 User s Reference...
Страница 182: ...170 Model 326 User s Reference...
Страница 192: ...180 Model 326 User s Reference...
Страница 214: ...202 Model 326 User s Reference...
Страница 232: ...220 Model 326 User s Reference...
Страница 238: ...226 Model 326 User s Reference...
Страница 239: ......
Страница 240: ...Printed in the United States of America on recycled paper containing 10 recovered post consumer fiber GA27 4276 02...