Adaptec 5325301656 Administration Guide - Page 97

Component, Options, Security > Share Access

Page 97 highlights

Components and Options Component Options Shares Shares are created on the Security > Shares screen. When creating a share, you must set the following options: • Name Select a name for the new share. • Volume Select a volume from the drop-down list. • Path Browse to the directory you want to use as the root of the share or type in the path to the share. If the path does not exist, when you click Browse or OK, you will be asked if you want to create it. • Security Model If you create a share pointing to a volume or a SnapTree directory, a security model must be selected. • Share Access User access to the share can be restricted or full read/ write access. By clicking the Advanced button, you can set the following options: • Hidden Option The Hidden option allows you to hide a share from clients connecting from SMB, HTTP, AFP, and FTP (but not NFS) protocols. • Protocol Access Client access to the share can be restricted to specific protocols. As a security precaution, disable any protocols not needed by users of the share. • Snapshot Share The snapshot share allows access (using identical security) to snapshots of the data that the new share references. Note The Snapshot share option only appears when Snapshots have been licensed. Share Access Share-level access allows users/groups/clients to connect to a share and is configured from the Security > Share Access screen. Users and groups known to the system can be given Full Access or Read Only (R) access to the share. Share NFS Access The Administration Tool provides a window into the exports file for defining how a share is exported to NFS clients. File Permissions File-level permissions define what actions users and groups can perform on files and directories, and are set from a Windows client for a Windows SnapTree; and from a UNIX/Linux client for a UNIX SnapTree. Chapter 6 Share and File Access 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224

Components and Options
Chapter 6
Share and File Access
83
Shares
Shares are created on the
Security > Shares
screen. When creating a
share, you must set the following options:
Name
Select a name for the new share.
Volume
Select a volume from the drop-down list.
Path
Browse to the directory you want to use as the root of the share
or type in the path to the share. If the path does not exist, when you
click Browse or OK, you will be asked if you want to create it.
Security Model
If you create a share pointing to a volume or a
SnapTree directory, a security model must be selected.
Share Access
User access to the share can be restricted or full read/
write access.
By clicking the
Advanced
button, you can set the following options:
Hidden Option
The Hidden option allows you to hide a share from
clients connecting from SMB, HTTP, AFP, and FTP (but not NFS)
protocols.
Protocol Access
Client access to the share can be restricted to
specific protocols. As a security precaution, disable any protocols not
needed by users of the share.
Snapshot Share
The snapshot share allows access (using identical
security) to snapshots of the data that the new share references.
Note
The Snapshot share option only appears when Snapshots have
been licensed.
Share Access
Share-level access allows users/groups/clients to connect to a share
and is configured from the
Security > Share Access
screen. Users and
groups known to the system can be given Full Access or Read Only (R)
access to the share.
Share NFS
Access
The Administration Tool provides a window into the
exports
file for
defining how a share is exported to NFS clients.
File Permissions
File-level permissions define what actions users and groups can perform
on files and directories, and are set from a Windows client for a
Windows SnapTree; and from a UNIX/Linux client for a UNIX SnapTree.
Component
Options