Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 124

About NAS Container Security, Modify the File Security Style for a NAS Container

Page 124 highlights

5. To allow multiple initiators to access the target, select the Allow simultaneous connections from initiators with different IQNs checkbox. (By default, this checkbox is not selected.) 6. Click OK. About NAS Container Security You control access to your NAS containers through volume-level and group-level security. Windows and UNIX operating systems use different mechanisms for user identification, authentication, and resource access control. The file security style controls the type of operations that are permitted in the NAS container. When you create a NAS container, the NAS cluster applies the NAS clusterwide default file security style. When a file or directory is created, the default NAS container security style, which controls the permissions and ownership, is applied. You can modify a NAS container to change the file security style. The modification will affect only those files and directories that are created after the modification. A NAS cluster supports the following security styles: • UNIX - Controls file access using UNIX permissions in all protocols. A client can change a permission only by using the chmod and chown commands on the NFS mount point. You can specify UNIX permissions for files and directories created in the NAS container by Windows clients. Windows clients cannot change any file or directory permissions. Read, write, and execute access is controlled by the UNIX permissions for Windows files and directories, which you set in Group Manager. • NTFS - Controls file access by Windows permissions in all protocols. A client can change the permission and ownership by using the Windows Security tab. This security style is the default style. All access permissions are controlled by the Windows administrator through the use of access control lists or share-level permissions. • Mixed - Supports both NTFS and UNIX security styles. The permissions and ownership for a file or directory will be the last ones set. Permissions and access rights are automatically translated from one protocol to another. A Windows user can override UNIX user settings, and a UNIX user can override Windows user settings. In multiple protocol environments, it can be beneficial to set UNIX security style for UNIX clients and set NTFS security style for Windows clients. Modify the File Security Style for a NAS Container To modify the file security style for a NAS container: 1. Click NAS, expand NAS Clusters and Local Containers, and then select the NAS container name. 2. Click Modify Settings. 3. In the Modify Settings dialog box, click the Access Permissions tab. 4. Select the file security style: NTFS, UNIX, or mixed. The default security style is NTFS. If you select UNIX for the security style, the Modify Settings dialog box displays additional fields that enable you to specify the UNIX file and directory permissions for the NAS container. 5. Click OK. Modify the UNIX Permissions for Windows Directories or Files If you are using the UNIX file security style, you can specify the UNIX permissions for directories that are created in the NAS container by Windows clients using SMB. To modify the UNIX directory permissions for a NAS container: 1. Click NAS, expand NAS cluster and Local Containers, and then select the NAS container name. 2. Click Modify Settings. 124 About Volume-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583

5.
To allow multiple initiators to access the target, select the
Allow simultaneous connections from initiators with
different
IQNs
checkbox. (By default, this checkbox is not selected.)
6.
Click
OK
.
About NAS Container Security
You control access to your NAS containers through volume-level and group-level security.
Windows and UNIX operating systems use
different
mechanisms for user
identification,
authentication, and resource access control.
The
file
security style controls the type of operations that are permitted in the NAS container.
When you create a NAS container, the NAS cluster applies the NAS clusterwide default
file
security style. When a
file
or directory is
created, the default NAS container security style, which controls the permissions and ownership, is applied.
You can modify a NAS container to change the
file
security style. The
modification
will
affect
only those
files
and directories that are
created after the
modification.
A NAS cluster supports the following security styles:
UNIX — Controls
file
access using UNIX permissions in all protocols. A client can change a permission only by using the
chmod
and
chown
commands on the NFS mount point. You can specify UNIX permissions for
files
and directories created in the NAS
container by Windows clients.
Windows clients cannot change any
file
or directory permissions. Read, write, and execute access is controlled by the UNIX
permissions for Windows
files
and directories, which you set in Group Manager.
NTFS — Controls
file
access by Windows permissions in all protocols. A client can change the permission and ownership by
using the Windows Security tab. This security style is the default style.
All access permissions are controlled by the Windows administrator through the use of access control lists or share-level
permissions.
Mixed — Supports both NTFS and UNIX security styles. The permissions and ownership for a
file
or directory will be the last
ones set. Permissions and access rights are automatically translated from one protocol to another.
A Windows user can override UNIX user settings, and a UNIX user can override Windows user settings.
In multiple protocol environments, it can be
beneficial
to set UNIX security style for UNIX clients and set NTFS security style for
Windows clients.
Modify the File Security Style for a NAS Container
To modify the
file
security style for a NAS container:
1.
Click
NAS
, expand
NAS Clusters
and
Local Containers
, and then select the NAS container name.
2.
Click
Modify Settings
.
3.
In the Modify Settings dialog box, click the
Access Permissions
tab.
4.
Select the
file
security style: NTFS, UNIX, or mixed. The default security style is NTFS.
If you select UNIX for the security style, the Modify Settings dialog box displays additional
fields
that enable you to specify the
UNIX
file
and directory permissions for the NAS container.
5.
Click
OK
.
Modify the UNIX Permissions for Windows Directories or Files
If you are using the UNIX
file
security style, you can specify the UNIX permissions for directories that are created in the NAS
container by Windows clients using SMB.
To modify the UNIX directory permissions for a NAS container:
1.
Click
NAS
, expand
NAS cluster
and
Local Containers
, and then select the NAS container name.
2.
Click
Modify Settings
.
124
About Volume-Level Security