NetApp University
CIFS istration on Data ONTAP 7.3 Student Guide
NetApp University - Do not distribute or duplicate
NETAPP UNIVERSITY
CIFS istration on Data ONTAP 7.3 Version Number: Version 5.0 Release Number: Release 7.3 Course Number: STRSW-ED-ILT-CIFSAD-REV03 Catalog Number: STRSW-ED-ILT-CIFSAD-REV03-SG
NetApp University - Do not distribute or duplicate
ATTENTION The information contained in this guide is intended for training use only. This guide contains information and activities that, while beneficial for the purposes of training in a closed, non-production environment, can result in downtime or other severe consequences and therefore are not intended as a reference guide. This guide is not a technical reference and should not, under any circumstances, be used in production environments. To obtain reference materials, please refer to the NetApp product documentation located at www.now.com for product information.
COPYRIGHT © 2008 NetApp. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice. No part of this book covered by copyright may be reproduced in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval system—without prior written permission of the copyright owner. NetApp reserves the right to change any products described herein at any time and without notice. NetApp assumes no responsibility or liability arising from the use of products or materials described herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product or materials does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of NetApp. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications.
RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.277-7103 (October 1988) and FAR 52-227-19 (June 1987).
TRADEMARK INFORMATION NetApp, the NetApp logo, and Go further, faster, FAServer, NearStore, NetCache, WAFL, DataFabric, FilerView, SecureShare, SnapManager, SnapMirror, SnapRestore, SnapVault, Spinnaker Networks, the Spinnaker Networks logo, SpinAccess, SpinCluster, SpinFS, SpinHA, SpinMove, SpinServer, and SpinStor are ed trademarks of Network Appliance, Inc. in the United States and other countries. Network Appliance, Data ONTAP, ApplianceWatch, BareMetal, Center-to-Edge, ContentDirector, gFiler, MultiStore, Secure, Smart SAN, SnapCache, SnapDrive, SnapMover, Snapshot, vFiler, Web Filer, SpinAV, SpinManager, SpinMirror, and SpinShot are trademarks of NetApp, Inc. in the United States and/or other countries. Apple is a ed trademark and QuickTime is a trademark of Apple Computer, Inc. in the United States and/or other countries. Microsoft is a ed trademark and Windows Media is a trademark of Microsoft Corporation in the United States and/or other countries. RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, and RealVideo are ed trademarks and RealMedia, RealProxy, and SureStream are trademarks of RealNetworks, Inc. in the United States and/or other countries. All other brands or products are trademarks or ed trademarks of their respective holders and should be treated as such. NetApp is a licensee of the CompactFlash and CF Logo trademarks.
0-2
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
TABLE OF CONTENTS COURSE INTRODUCTION ............................................................................................................ 0-1 MODULE 1: OVERVIEW .............................................................................................................. 1-1 MODULE 2: WORKGROUPS ...................................................................................................... 2-1 MODULE 3: SHARES AND SESSIONS ...................................................................................... 3-1 MODULE 4: ACCESS CONTROL ............................................................................................... 4-1 MODULE 5: DOMAINS ................................................................................................................ 5-1 MODULE 6: ADVANCED ISTRATION ............................................................................ 6-1 MODULE 7: PERFORMANCE ..................................................................................................... 7-1 MODULE 8: TROUBLESHOOTING ............................................................................................ 8-1
0-3
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
This page is intentionally left blank.
0-4
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS istration on Data ONTAP 7.3 Version 5.0 Course#: STRSW-ED-ILT-CIFSAD-REV03
CIFS ISTRATION ON DATA ONTAP 7.3
0-5
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Logistics Introductions Schedule (start time, breaks, lunch, close) Telephones and messages Food and drinks Restrooms
© 2008 NetApp. All rights reserved.
LOGISTICS
0-6
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Safety Alarm signal Evacuation route Assembly area Electrical safety
© 2008 NetApp. All rights reserved.
SAFETY
0-7
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Course Objectives At the end of this course, you should be able to Identify the appropriate server environment for your storage system to Windows® client s Configure the CIFS environment on your storage system by licensing CIFS, setting up CIFS, and setting options ister and manage a storage system in a CIFS environment Troubleshoot basic CIFS problems © 2008 NetApp. All rights reserved.
COURSE OBJECTIVES
0-8
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
4
Course Agenda Day 1
Introductions Module 1: Overview Module 2: Workgroups Module 3: Shares and Sessions Module 4: Access Control Module 5: Domains
Day 2 Module 6: Advanced istration Module 7: CIFS Performance Module 8: CIFS Troubleshooting © 2008 NetApp. All rights reserved.
COURSE AGENDA
0-9
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
5
Information Sources NOWTM (NetApp on the Web) Site – http://NOW.NetApp.com
NetApp Training Schedules – http://www.netapp.com/us/services/university/
NetApp University – http://netappu.custhelp.com
© 2008 NetApp. All rights reserved.
INFORMATION SOURCES
0-10
CIFS istration on Data ONTAP 7.3: M00_Welcome
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
6
TYPOGRAPHIC CONVENTIONS
0-11
CIFS istration on Data ONTAP 7.3: M00_Welcome
© Network Appliance, Inc.isAll rights reserved. Specifications areauthorized subject to for change without notice. NetApp, the Network Appliance logo, © 2008 2008 NetApp. This material intended for training use only. Not re-production purposes. NearStore, SnapLock, and SnapVault are ed trademarks and Network Appliance, DataFort, FlexClone, and FlexVol are trademarks of Network Appliance, Inc. in the U.S. and/or other countries. Windows is a ed trademark of Microsoft Corporation. UNIX is a ed trademark of The Open Group. Oracle is a ed trademark of Oracle Corporation. All other brands or products are trademarks or ed trademarks of their respective holders and should be treated as such.
NetApp University - Do not distribute or duplicate
Overview
NetApp University - Do not distribute or duplicate
MODULE 1: OVERVIEW
Overview CIFS istration on Data ONTAP 7.3
OVERVIEW
1-1
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives Describe basic CIFS features Describe the following network environments: – Microsoft Windows workgroup – Non-Windows workgroup – Windows domains
Describe how a storage system authenticates s in each server environment Explain the advantages and disadvantages of each server environment
© 2008 NetApp. All rights reserved.
NetApp Confidential - Internal Use only
MODULE OBJECTIVES
1-2
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
CIFS Features
© 2008 NetApp. All rights reserved.
CIFS FEATURES
1-3
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
CIFS Definition What is Common Internet File System (CIFS)? – A Microsoft network file-sharing protocol that evolved from the Server Message Block (SMB) protocol
How does CIFS work? – Access and manipulate files and folders on remote servers as if they are on a local machine
© 2008 NetApp. All rights reserved.
NetApp Confidential - Internal Use only
4
CIFS DEFINITION The Common Internet File System (CIFS) is a Microsoft network file-sharing protocol that evolved from the Server Message Block (SMB) protocol. When using CIFS, any application that processes network I/O can access and manipulate files and folders (directories) on remote servers in a way similar to that for accessing and manipulating files and folders on the local system.
1-4
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS: Basic Functions Network browsing to locate: – Machines within an environment (provided by a browse list) – Shared resources that are available on a given machine (provided by that machine)
authentication Authorization – Shared Resource Access – Folder and File Access
© 2008 NetApp. All rights reserved.
NetApp Confidential - Internal Use only
5
CIFS BASIC FUNCTIONS The following are some CIFS features available in a Windows workgroup and domain: •
Network browsing to locate machines within a domain or workgroup (provided by a browse list) and shares that are available on each machine (provided by that machine).
•
authentication.
•
Authorization at the share level and folder and file level.
1-5
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS: Basic Functions (Cont.) Basic file attributes – – – –
Read-only Archive System Hidden
Extended NTFS file attributes of indexing, compression, and encryption Unicode File locking (opportunistic locks) Dialect negotiation © 2008 NetApp. All rights reserved.
NetApp Confidential - Internal Use only
6
CIFS BASIC FUNCTIONS (CONT.) EXTENDED ATTRIBUTES
Extended NTFS file attributes are not generally ed on a storage system. However, Encrypted File Systems (EFS) are ed with Open Systems SnapVault®. UNICODE
The universal character encoding standard provides a unique number for every character, no matter what the platform, program, or language. Characters are represented by more than eight bits. OPPORTUNISTIC LOCKS (OPLOCKS FOR DOMAINS ONLY)
Guarantee to the client that file content is not allowed to be changed by the server or, if some change is imminent, the client is notified before the change proceeds. Oplocks are used to synchronize data and enhance performance.
1-6
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
DIALECT NEGOTIATION
Each protocol version is referred to as a “dialect” and assigned a unique string identifier.
Dialect Identifier
Comments
PC NETWORK PROGRAM 1.0
The original protocol, also known as the core protocol.
PCLAN1.0
Some define this as an alternative to the core protocol.
MICROSOFT NETWORKS 1.03
This extended the core protocol and is known as core plus protocol.
MICROSOFT NETWORKS 3.0
This protocol is known as Extended 1.0 Protocol or LAN Manager 1.0 and was created when IBM and Microsoft were working together on OS/2.
LANMAN1.0
Identical to the MICROSOFT NETWORKS 3.0 dialect except that it was intended for use with OS/2 clients.
Windows for Workgroups 3.1a
Windows for Workgroups Version 1.0 (similar to LANMAN1.0 dialect).
DOS LM1.2X002
This protocol is known as Extended 2.0 Protocol or LAN Manager 2.0.
LM1.2X002
This dialect represents OS/2 LANMAN version 2.0.
DOS LANMAN2.1
This protocol is known as LAN Manager 2.1 and is documented in a paper titled Microsoft Networks SMB File Sharing Protocol Extensions, Document Version 3.4.
LANMAN2.1
This dialect represents OS/2 LANMAN2.1.
NT LM 0.12
This dialect is sometimes called NT LANMAN and was developed for use with Windows NT. All Windows 9x clients and Windows 2000 servers and XP clientscan communicate with this dialect.
See Common Internet File System (CIFS) Technical Reference Revision 1.0 by the Storage Networking Industry Association (SNIA) for more information.
1-7
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Updates for SMB 2.0 SMB 2.0 – Next Generation of CIFS – NTLM v2
SMB 2.0 ed in: – Data ONTAP 7.3 and later – Windows Vista and later clients – Window Server 2008 and later servers
© 2008 NetApp. All rights reserved.
8
UPDATES FOR SMB 2.0 Data ONTAP® 7.3 is compatible with Windows Vista clients and the new Windows Server 2008. Among the Windows Server 2008 features that are compatible with 7.3, NetApp® s SMB 2.0 and NTLM v2, and matches all performance gains from using folder synchronization.
1-8
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
SMB 2.0 Features Increased performance • Folder synchronization is 50% faster
More reliable Increased scalability Increased number of file handles Compatible with Microsoft's new Transactional NTFS (TxF) for Vista and Windows Server 2008 applications
© 2008 NetApp. All rights reserved.
9 9
FEATURES The new Server Message Block 2.0 protocol provides a number of communication enhancements, including greater performance when connecting to file shares over high-latency links and better security through the use of mutual authentication and message g. Data ONTAP 7.3 is fully compatible with SMB 2.0. The following are some of the advantages that SMB2.0 provides. SMB 2.0 s a way of compounding operations to reduce round trips, making it less chatty than SMB 1.0. This reduces network traffic and increases performance over slow WAN links. SMB 2.0 is more resilient to small network outages making it more reliable. According to Microsoft, re-directed folder synchronization will be 50 percent faster for Windows Vista clients accessing a Windows Server 2008. Data ONTAP matches any performance gains introduced by Microsoft for their Windows Server 2008. SMB 2.0 is more scalable because it s much larger buffer sizes and an increase in the number of concurrent open file handles. A file handle is a temporary file that is assigned by the operating system when a opens a file. A special area of main memory is reserved for file handles and determines how many files can be open at once. The increase in concurrent file handles means that a server can have a larger list of shares. Another feature of SMB 2.0 is Microsoft’s new Transactional NTFS (TxF) capabilities in Windows Vista and Windows Server 2008. Transactional NTFS allows file operations on an NTFS file system volume to be performed in a transaction. Transactions can be used to both preserve data integrity and handle error conditions reliably. TxF requires clients to use and deploy SMB 2.0. TxF allows all file operations to be performed as transactions to preserve the integrity of data on disk in case of unexpected error conditions.
1-9
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
NetApp ing SMB 2.0 Data ONTAP 7.3 s SMB 2.001. The SMB version is negotiated between the client and Data ONTAP automatically. Data ONTAP will fall back to SMB 1.0 when the client is using 1.0. Vista / Windows Server 2008
SMB 2.0
Windows XP / Windows Server 2003
SMB 1.0
Windows 98 or previous / Windows Server 2000 or previous
SMB 1.0
© 2008 NetApp. All rights reserved.
10
NETAPP ING SMB 2.0 Data ONTAP 7.3 SMB 2.001. When a client requests that a drive be mapped, the storage system and the client negotiate the version of SMB. If the client cannot use SMB 2.001 then it falls back to SMB 1.0, preserving the connectivity of Windows Vista or Windows Server 2008. When a client tries to discover whether a server s SMB 2.001, it initiates a T session to port 445 on the server and issues a normal SMB negotiate protocol request to the storage system specifying the new dialect SMB 2.001. Windows Vista clients which servers SMB 2.001, so further sessions attempt SMB 2.001 immediately. As customers would expect, existing NetApp storage systems upgraded to Data ONTAP 7.3 Windows Vista and Windows Server 2008 from both an interoperability standpoint and a functionality standpoint. Data ONTAP 7.3 s SMB 2.001 for Windows Server 2008 and Windows Vista desktop clients as well as SMB 1.0 for legacy servers and other desktop clients.
1-10
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Client-Server Communications 1. SMB_COM_NEGOTIATE Client requests CIFS dialect, a list of strings with dialects ed.
2. SMB_COM_NEGOTIATE Server responds with client’s requested CIFS dialect. An 8-byte random string is sent back, which is used in the next step to authenticate the client during logon.
3. SMB_COM_SESSION_SETUP_ANDX Client sends its name and to obtain a ’s Security ID (SID).
4. SMB_COM_SESSION_SETUP_ANDX If the name and are accepted, a valid SID is included in the packet. If not, an error code is sent and access is denied.
5. SMB_COM_TREE_CONNECT_ANDX Client requests access to the share. The packet contains the fully specified path in Uniform
Client Naming Convention (UNC) form.
Server
© 2008 NetApp. All rights reserved.
11
CLIENT-SERVER COMMUNICATIONS This example demonstrates client-server communications for session, share access, and file authorization. The following are the basic steps. The client s the server and requests a CIFS dialect. The server responds with the ed CIFS dialect and the next logon step. Together, these two steps are called dialect negotiation. The client responds with its name and . The server sends a Security ID (SID) if the name and are accepted or an error message if they are not accepted. Together, these two steps are called authentication. The client requests access to a share. The storage system caches all security IDs (SIDs) and names received from the domain controller at boot time.
1-11
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Client-Server Communications (Cont.) 6. SMB_COM_TREE_CONNECT_ANDX If access to the share is granted, the server returns the 16-bit tree ID (TID) corresponding to the share. If the path is not found or there are insufficient credentials, an error is sent. 7. SMB_COM_OPEN_ANDX Client requests to open a file on a share. The name of the file is included.
8. SMB_COM_OPEN_ANDX If access to the file is granted, the server returns the file ID of the requested file. If the file does not exist or there are insufficient credentials, an error is sent. 9. SMB_COM_READ_ANDX The client requests that the server read the data and return its contents. The file ID obtained by the client when the client was opened is included.
10. SMB_COM_READ_ANDX
Client
The requested data is returned.
Server
© 2008 NetApp. All rights reserved.
12
CLIENT-SERVER COMMUNICATIONS (CONT.) The server responds with a tree ID to the requested share (if access is allowed). Together, steps 5 and 6 are called shared resource authorization. The client requests to open a file on a share. If access is allowed, the server responds with the ID of the requested file. Together, these two steps are called folder/file authorization. The client requests that the server read the data and return its contents. The server sends the requested data. During this process, the Access Control Lists (ACLs) are checked for permissions. Together, these two steps are called folder/file I/O.
1-12
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS Environments
© 2008 NetApp. All rights reserved.
CIFS ENVIRONMENTS
1-13
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
13
Network Environments Storage systems can participate in: Workgroups – Windows workgroup – Non-Windows workgroup
Domains – Windows NT 4.0 – Windows Active Directory
© 2008 NetApp. All rights reserved.
NETWORK ENVIRONMENTS
1-14
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
14
Client Requirements Each client in a CIFS environment must: Locate other computers Request resources from a server – Requires authentication – Requires resource authorization Share permissions File-level permissions NOTE: Implementation differs depending on the CIFS environment.
© 2008 NetApp. All rights reserved.
15
CLIENT REQUIREMENTS In a network, a Windows client requires the ability to: •
Find other machines (computers)
•
Request resources from a server (any machine in the role of a server)
Requesting resources requires authentication (verification of a ’s identity) to establish a session with a server and authorization (permission) to access a share and resources (folders and files) in a share.
1-15
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Windows Workgroups
© 2008 NetApp. All rights reserved.
WINDOWS WORKGROUPS
1-16
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
16
Windows Workgroup A Windows workgroup: – Logical grouping of networked machines – Shares resources, such as folders and files
Each machine in the workgroup authenticates and authorizes s via a local security database NOTE: s must have an on the machine they wish to access.
© 2008 NetApp. All rights reserved.
17
WINDOWS WORKGROUP A Windows workgroup is a simple, logical group of networked machines (computers) that share resources, such as folders and files. •
Each machine has its own Security s Manager database (for Windows NT) or a local security database (for Windows 2000 or later) that is used to perform authentication and authorization.
•
Each that wants to access resources on a machine must have a on that machine.
1-17
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Storage System s a Workgroup For a storage system to “” a Windows workgroup… It must broadcast its “name” to the network The master browser must update the master browse list It must broadcasts the browse list to all of the domain – 15-minute delay possible NOTE: Storage systems do not pull the master browse list I’m a storage system, and I’m new! List
Master Browser
List
Machine B
List
Storage System
© 2008 NetApp. All rights reserved.
18
STORAGE SYSTEM S A WORKGROUP Although workgroup machines normally pull the updated master browse list to their local machines, the storage system does not. The browse list is a mechanism for of the workgroup to find other . The storage system always acts in a server role. Therefore, there is no need to discovery other in the workgroup.
1-18
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Name Resolution in a Workgroup Machine name to IP resolution: A broadcasts a name query on the network The requested machine responds to the name query by returning its IP address
Storage system’s IP What is the IP address of the storage system? List
Machine A
List
Machine B
List
Storage System
© 2008 NetApp. All rights reserved.
19
NAME RESOLUTION IN A WORKGROUP How does workgroup machine-name resolution work? A machine broadcasts a name query to other machines in the network. For example, Machine A may broadcast a query for the IP address of the storage system. The storage system responds to the name query by broadcasting its IP address back to Machine A.
1-19
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Storage System Authentication Storage system authentication is performed locally: s are added to a storage system Authentication is performed locally Authenticated s are provided with a session Machine B requests session authentication
Authenticates Machine B Info
List
List
Master Machine Browser Info Info B
List
Session with Machine B Storage System Info
Local s
name group info rights
Machine s
© 2008 NetApp. All rights reserved.
20
STORAGE SYSTEM AUTHENTICATION How does authentication work on a storage system in a workgroup? s (local- s) are added to a storage system and authentication is performed locally on the storage system. session authentication with a name and enables a to establish a session with the storage system. Data access on a storage system requires a network logon to the storage system. A can ister a storage system through the network (for example, by way of a Telnet session) using a local on the storage system; however, a cannot log on locally to a storage system to access data. The Machine B requests session authentication from the storage system. The storage system authenticates the Machine B by using the name and found in the storage system local- . After the Machine B is successfully authenticated, a session is established with the Machine B and the storage system. Authenticated s can browse a storage system for available resources, but must be authorized to access a share and resources in a share.
1-20
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Non-Windows Workgroups
© 2008 NetApp. All rights reserved.
NON-WINDOWS WORKGROUPS
1-21
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
21
Non-Windows Workgroups A non-Windows workgroup: – for Windows client machines when there is no Windows workgroup or domain – Share resources with Windows client s
This environment is also referred to as: – UNIX workgroup – /etc/wd-style workgroup
© 2008 NetApp. All rights reserved.
22
NON-WINDOWS WORKGROUPS A non-Windows workgroup is a logical group of networked machines that share resources with Windows client s; the networked machines are of neither a Windows workgroup nor a Windows domain. This network environment also is called: •
UNIX workgroup
•
/etc/wd-style workgroup
1-22
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Non-Windows Workgroup Storage System Provides authentication by one or more of the following: – Storage system local /etc/wd file – Network Information Services (NIS) server – Lightweight Directory Access Protocol (LDAP) server
Provides name to IP resolution by one or more of the following: – Storage system local /etc/hosts file – NIS server – Domain Name System (DNS) server NOTE: /etc/nsswitch.conf sets the order of precedence for the mechanism used © 2008 NetApp. All rights reserved.
23
NON-WINDOWS WORKGROUP STORAGE SYSTEM When a storage system becomes a non-Windows workgroup server, it provides services to clients. An example is an all-UNIX work environment with many UNIX workstations and a few Windows clients with s that need CIFS resources. Note that any UNIX reference also includes LINUX. Servers functioning as directory stores for information ( names, s, and group information): •
Storage system’s local /etc/wd file
•
Network Information Services (NIS) server
•
Lightweight Directory Access Protocol (LDAP) server
Servers that can provide machine (host) name resolution: •
Storage system’s local /etc/hosts file
•
NIS server
•
Domain Name System (DNS) server
1-23
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Windows Workgroup Advantages Does not require running Windows Domain Controller – Advantageous for small organizations
Simple to design and implement Convenient for a limited number of machines in close proximity – Limited to 96 local clients
© 2008 NetApp. All rights reserved.
WINDOWS WORKGROUP ADVANTAGES
1-24
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
24
Non-Windows Workgroup Advantages In a mostly UNIX environment, CIFS shares made available to the few Windows client s authentication performed by existing: – NIS – LDAP server – /etc/wd file
Name to IP resolution performed by existing: – NIS – DNS server – /etc/hosts © 2008 NetApp. All rights reserved.
NON-WINDOWS WORKGROUP ADVANTAGES
1-25
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
25
Workgroup Disadvantages istrative overhead in maintaining a list of s on multiple machines – Any changes to a (for example, s) could be made on each machine
ing or leaving a workgroup must be replicated by the master browse list – Delay up to 15 minutes
Generally, a browse list cannot span subnets – Workgroup depends on subnet broadcasting
© 2008 NetApp. All rights reserved.
WORKGROUP DISADVANTAGES
1-26
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
26
Windows Domains
© 2008 NetApp. All rights reserved.
WINDOWS DOMAINS
1-27
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
27
Window Domains A Windows domain: – A logical grouping of networked machines – Share a central directory of resources
A domain controller centralizes: – /Group/Machine management – authentication – Group policy management across the domain NOTE: In this module, we will consider NT4 and Active Directory domains together.
© 2008 NetApp. All rights reserved.
WINDOWS DOMAINS
1-28
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
28
Typical Machines in a Domain Type of machines in a domain: Clients – Clients requires resources from a server
Member servers – Servers that provide resources to clients
Domain controllers (DCs) – Servers that each maintain a copy of a centralized database
Domain name resolution servers – Windows Internet Name Service (WINS) for Windows NT 4.0 domains – Domain Name System (DNS) for Windows 2000 (or later) domains © 2008 NetApp. All rights reserved.
29
TYPICAL MACHINES IN A DOMAIN NOTE: There are other potential machines in a Windows domain environment, including a global catalog server, PDC emulator, schema master, RID master, domain naming master, bridgehead server, as well as others.
1-29
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Storage System s a Domain When a storage system s a domain: Domain controller adds the storage system to a domain database Becomes a member server
ing a domain
Directory
Machine name Clients
Member Server
Domain Controller
Machine s
© 2008 NetApp. All rights reserved.
30
STORAGE SYSTEM S A DOMAIN When a storage system s a domain, it becomes a member server that provides services to clients. The storage system (member server) goes to a domain controller and the domain controller adds the machine to the directory database.
1-30
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Domain-Name-to-IP Resolution When a client attempts to access a storage system’s resources: Requests the browse list from the DC s DNS/WINS server for the IP address Communicates with the storage system What is the storage system’s IP? Here is the storage system’s IP What machines are available? Here is the browse list
Clients
Member Server
Domain DNS/WINS Controller
© 2008 NetApp. All rights reserved.
31
DOMAIN-NAME-TO-IP RESOLUTION When a storage system s a domain, it becomes a member server that provides services to clients. The storage system (member server) goes to a domain controller and the domain controller adds the machine to the directory database.
1-31
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Authentication Authentication on a storage system in a domain Domain s created on DC session authentication occurs at the DC Authenticated s must be authorized to access a share and resources Client B requests session authentication
Authenticates Client B
Session with Client B Client A
Client B
Member Server Info
Domain Controller
© 2008 NetApp. All rights reserved.
32
AUTHENTICATION How does authentication work on a storage system in a domain? Domain s (already added to the domain controller) can browse the storage system for available shares and then request access to the storage system and its shares and resources in a share. session authentication with a name and is performed centrally on the domain controller; this establishes a session with the storage system. s must be authorized to access a share and resources in a share. Data access to a storage system requires a network logon to the storage system. A can ister a storage system through the network (for example, by way of a Telnet session) using a local on the storage system; however, a cannot log on locally to a storage system to access data. The Client B requests session authentication with the member server (storage system). The member server goes to the domain controller to authenticate the Client B . The domain controller authenticates the Client B and a session is established with the Client B and the member server (storage system).
1-32
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Domain Advantages / Disadvantages Advantages – Centralized istration of all information – A centralized mechanism for authentication – Scalable
Disadvantages – istrative overhead – Complexity
© 2008 NetApp. All rights reserved.
DOMAIN ADVANTAGES / DISADVANTAGES
1-33
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
33
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
1-34
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
34
Module Summary In this module, you should have learned to: Describe basic CIFS features Describe the following network environments: – Microsoft Windows workgroup – Non-Windows workgroup – Windows domains
Describe how a storage system authenticates s in each server environment Explain the advantages and disadvantages of each server environment © 2008 NetApp. All rights reserved.
MODULE SUMMARY
1-35
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
35
Exercise Module 1: CIFS Overview Estimated Time: 15-60 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
1-36
CIFS istration on Data ONTAP 7.3: M01_Overview
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Workgroup
NetApp University - Do not distribute or duplicate
MODULE 2: WORKGROUPS
Workgroups CIFS istration on Data ONTAP 7.3
WORKGROUPS
2-1
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you should be able to: License CIFS on a storage system a storage system to a Windows workgroup environment using the cifs setup command Observe the results of cifs setup Manage newly created configuration files for the CIFS workgroup environment
© 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
2-2
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Setup Overview
© 2008 NetApp. All rights reserved.
SETUP OVERVIEW
2-3
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Preparing a Storage System To prepare a storage system to Windows Clients, perform the following: License CIFS Set up the CIFS environment Configure CIFS Manage CIFS
© 2008 NetApp. All rights reserved.
3
PREPARING A STORAGE SYSTEM To prepare a storage system to Windows client s, perform the following: 1. License CIFS 2. Set up the CIFS environment 3. Configure CIFS 4. Manage CIFS
2-4
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI or FilerView The CIFS service on a storage system can be configured from either: Command Line Interface (CLI) – – – –
Console Telnet RSH SSH
FilerView® – Navigate to: http://[storage_system_name_or_ip]/na_ – Click the FilerView icon © 2008 NetApp. All rights reserved.
4
CLI OR FILERVIEW For more information on how to access the storage system’s console via the command line, please see the Data ONTAP® Fundamental course. FilerView is the graphical interface for a storage system. To access FilerView •
Open an Internet browser and type the following address: http://storage_system_name/na_
where storage_system_name is the name or IP address of the storage system. •
The FilerView main navigational page appears.
•
Click the FilerView icon.
FilerView Main Navigational Page
2-5
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
License
© 2008 NetApp. All rights reserved.
LICENSE
2-6
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
6
Licensing CIFS From CLI: – Enter the license add command with the license code. system> license add license_code A cifs site license has been installed. Run cifs setup to enable cifs.
From FilerView – Go to the Manage Licenses window
NOTE: CIFS license may have been preinstalled at the factory © 2008 NetApp. All rights reserved.
5
LICENSING CIFS To license CIFS on the storage system, you can use either the Data ONTAP command line interface or FilerView. From the Data ONTAP command line interface (CLI) on the storage system, enter the license add command with the CIFS license code. •
Format: license add license_code
•
system> license add XXYYZZA A cifs site license has been installed. Run cifs setup to enable CIFS.
From the FilerView interface for the storage system, do the following: •
In the left column, select Filer and then Manage Licenses.
•
Enter the CIFS license.
•
Click the Apply button located at the bottom of the window.
NOTE: The CIFS license may have been preinstalled at the factory.
2-7
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
ing a CIFS Environment To a storage system to a CIFS environment: From CLI, run the cifs setup command NOTE: If the CIFS license was preinstalled at the factory, the cifs setup script is run automatically at the end of storage system setup script.
From FilerView, choose the CIFS Setup Wizard – FilerView->CIFS->Configure->Setup Wizard NOTE: Upon completion of setup, the CIFS service is started.
© 2008 NetApp. All rights reserved.
6
ING A CIFS ENVIRONMENT To a storage system to a CIFS environment, you can use either the Data ONTAP CLI or FilerView: •
From the Data ONTAP CLI, run the cifs setup command. •
Format: cifs setup
• NOTE: If the CIFS license was preinstalled at the factory, the cifs setup script is run automatically at the end of storage system setup script. •
From FilerView, choose the CIFS Setup Wizard. •
•
2-8
FilerView->CIFS->Configure->Setup Wizard
Upon completion of the setup, the CIFS service is started.
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup
© 2008 NetApp. All rights reserved.
CLI CIFS SETUP
2-9
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
9
CLI cifs setup: WINS During cifs setup system> cifs setup This process will enable CIFS access to the filer from a Windows system. Note: Use "?" for help at any prompt and Ctrl C to exit without committing changes. Your filer does not have WINS configured and is visible only to clients on the same subnet. Do you want to make the system visible via WINS? [n]:
© 2008 NetApp. All rights reserved.
7
CLI cifs setup: WINS Windows Internet Name Service (WINS) is Microsoft’s implementation of NetBIOS Name Server on Windows. As of Windows 2000, DNS is preferred over WINS, particularly for Active Directory. WINS servers usually only installs prior to Windows 2000 and mixed Windows 2000 installs.
2-10
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: Initial Questions During cifs setup (Cont.) A filer can be configured for multiprotocol access, or as an NTFS-only filer. Since NFS, DAFS, VLD, F, and iSCSI are not licensed on this filer, we recommend that you configure this filer as an NTFSonly filer This list varies depending (1) NTFS-only filer on other licensed protocols. (2) Multiprotocol filer Note: Key protocol is NFS. Selection (1-2)? [1]:
© 2008 NetApp. All rights reserved.
8
CLI cifs setup: INITIAL QUESTIONS If the storage system will be in a Windows only environment, selecting the NTFS-only configures the storage system to be most compliant with Microsoft environments. NOTE: All existing volumes will be converted to NTFS, but qtrees are unaffected. If the storage will participate in both Windows and non-Windows environment, the storage system should be configured as multiprotocol.
2-11
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Results of NTFS-only NTFS-only security style changes as a result of cifs setup. Option
Defaults Before
Values After
wafl.default_security_style
unix
ntfs
wafl.nt__priv_map_to_root on
off
by options wafl command
© 2008 NetApp. All rights reserved.
9
RESULTS OF NTFS-ONLY After running the cifs setup command, the options wafl command is run. The option wafl.default_security_style is changed from UNIX to NTFS. This causes all new volumes to default to NTFS security style. Additionally, the nt__priv_map_to_root option changes from on to off.
2-12
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Switching Back to Multiprotocol To switch back to multiprotocol: – Use cifs setup – wafl.default_security_style unix
Results of switching NTFS-only to multiprotocol: – ACLs are unchanged – Security style of volumes and qtrees remains unchanged – New volumes have security style of UNIX
© 2008 NetApp. All rights reserved.
10
SWITCHING BACK TO MULTIPROTOCOL Although you can change a storage system from NTFS-only to multiprotocol using cifs setup, you can achieve the same effect more easily by simply setting the wafl.default_security_style option to unix. The effects of changing an NTFS-only storage system to a multiprotocol storage system are the following: •
Existing ACLs remain unchanged.
•
The security style of all volumes and qtrees remains unchanged.
•
When you create a volume, its default security style is UNIX.
•
The wafl.default_security_style option is set to UNIX.
2-13
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Switching Back to Multiprotocol (Cont.) Root volume security style will remain ntfs UNIX root might be denied access You can gain access: – Map of Windows to UNIX root Discussed in Module 3
– cifs.nfs_root_ignore_acl on
© 2008 NetApp. All rights reserved.
11
SWITCHING BACK TO MULTIPROTOCOL (CONT.) Because the security style of the root volume remains as ntfs after you change the storage system from NTFS-only to multiprotocol, you might be denied access to the root volume when you connect from UNIX as root. •
You can gain access if the ACL for the root volume allows full control for the Windows that maps to the root.
•
You also can gain access by setting the cifs.nfs_root_ignore_acl option to on. • When this option is on, ACLs will not affect root access from the Network File System (NFS).
2-14
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: Root During cifs setup (Cont.): CIFS requires local /etc/wd and /etc/group files and default files will be created. The default wd file contains entries for 'root','pc', and 'nobody'.
Note: These files are used during CIFS authentication processing when mapping Windows s to UNIX s even if it is NTFS-only security style.
Enter the for the root [ ]: Retype the :
The is entered, but it is not displayed.
[This is the root created in the /etc/wd file. With respect to CIFS, this root is used in a non-Windows workgroup only and when authentication is performed with the /etc/wd file.]
© 2008 NetApp. All rights reserved.
12
CLI cifs setup: ROOT With respect to CIFS, the root is used in a non-Windows (UNIX) workgroup only and when authentication is performed with the /etc/wd file.
2-15
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: Server Name During cifs setup (Cont.): The default name for this CIFS server is ' system '. would you like to change this name? [n]:
© 2008 NetApp. All rights reserved.
CLI cifs setup: SERVER NAME
2-16
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
13
CIFS Authentication Methods During cifs setup (Cont.): Data ONTAP CIFS services four styles of authentication. Choose the one from the list below that best suits your situation. 1. Active Directory domain authentication (Active Directory domains only) 2. Windows NT 4 domain authentication (Windows NT or Active Directory domains) 3. Windows Workgroup authentication using the filer's local s 4. etc/wd and/or NIS/LDAP authentication Selection (1-4)? [1]:
© 2008 NetApp. All rights reserved.
14
CIFS AUTHENTICATION METHODS If you plan to have the storage system a Windows domain and make use of that domain's s and groups, you should choose option 1 or 2. Options 3 and 4 are authentication methods that do not require the use of domain controllers, but may still require other systems for full functionality. Option 1: Use this option if the storage system is ing an Active Directory-based domain (i.e. a Windows 2000 or later domain) Option 2: Use this option if the storage system is ing a Windows NT 4-based domain or an Active Directory-based domain as a Windows NT 4 server. Option 3: Use this option if you want to a Windows Workgroup and do not want to depend on external domain controllers. You will need to define a set of local s on the storage system. Option 4: Use this option for a non-Windows Workgroup that uses UNIX style authentication. This style requires the use of clear text s from Windows clients.
2-17
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI: cifs setup Workgroup
Selecting Windows Workgroup: 1. Active Directory domain authentication (Active Directory domains only) 2. Windows NT 4 domain authentication (Windows NT or Active Directory domains 3. Windows Workgroup authentication using the filer's local s 4. /etc/wd and/or NIS/LDAP authentication Selection (1-4)? [1]: 3
© 2008 NetApp. All rights reserved.
CLI: cifs setup WORKGROUP
2-18
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
18
CLI: cifs setup Workgroup (Cont.) What is the name of the Workgroup? [WORKGROUP]: workgroup1 Fri Jun 23 19:32:53 GMT [wafl.quota.sec.change:notice]: security style for /vol/vol0/ changed from unix to ntfs CIFS - Starting SMB protocol... It is recommended that you create the local (DEVSLU10-F1\)for this filer.
(The local can be locally authenticated via CIFS authentication and has privileges to ister CIFS on the storage system. The local s and s are stored in the storage system registry file.) Do you want to create the system\ ? [y]: Enter the new for system\: Retype the :
© 2008 NetApp. All rights reserved.
CLI: cifs setup WORKGROUP (CONT.)
2-19
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
16
CLI: cifs setup Workgroup (Cont.) Workgroup completion continued Welcome to the WORKGROUP1 Windows(R) workgroup CIFS local server is running. system> Fri Jun 23 19:33:18 GMT [nbt.nbns.registrationComplete:info]: NBT: All CIFS name registrations have completed for the local server.
© 2008 NetApp. All rights reserved.
CLI: cifs setup WORKGROUP (CONT.)
2-20
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
17
Results
© 2008 NetApp. All rights reserved.
RESULTS
2-21
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
21
CIFS Server Files During setup, several configuration files are created. /etc/cifsconfig_setup.cfg – Stores CIFS setup configuration /etc/map.cfg – Multiprotocol for NFS and CIFS – Discussed in the next module /etc/wd – Multiprotocol and UNIX workgroup /etc/cifsconfig_share.cfg – Default share definitions /etc/lclgroups.cfg – Local groups definitions NOTE: Additional files are created depending on the environment © 2008 NetApp. All rights reserved.
18
CIFS SERVER FILES During the CLI cifs setup script or FilerView CIFS Setup Wizard, CIFS and configuration files are created in the /etc directory. The number and content of the files are dependent on the environment. The following are files that are common to all environments: •
/etc/cifsconfig_setup.cfg (stores the CIFS setup configuration)
•
/etc/map.cfg (multiprotocol for mapping s of NFS and CIFS)
•
/etc/wd (multiprotocol and UNIX workgroup)
•
/etc/cifsconfig_shares.cfg (default shares definitions)
•
/etc/lclgroups.cfg (local groups definitions)
Additional files are created depending on the environment as in a workgroup (Windows/nonWindows) or a Windows domain.
2-22
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
/etc/cifsconfig_setup.cfg File /etc/cifsconfig_setup.cfg file – Contents are persistent across reboots – Runs each time the CIFS service is started system> rdfile /etc/cifsconfig_setup.cfg #Generated automatically by cifs commands cifs setup -security unix
- 0
-NTFSonly
The content of the file varies depending on the environment that is selected.
© 2008 NetApp. All rights reserved.
19
/etc/cifsconfig_setup.cfg FILE The following shows the contents of an /etc/cifsconfig_setup.cfg file: system> rdfile /etc/cifsconfig_setup.cfg #Generated automatically by cifs commands cifs setup -security unix - 0 -NTFSonly The content of the file varies depending on the environment that is selected. This file is used each time CIFS service is started and persists across reboots.
2-23
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
/etc/wd File /etc/wd file system> rdfile /etc/wd An encrypted root is shown. Note: This root was created during cifs setup for the /etc/wd file. This is not for the storage system “root” that is used for system istration.
root:_J9../ongnoStt3Ei79o:0:1::/: pc::65534:65534::/: nobody::65535:65535::/: ftp::65533:65533:FTP Anonymous:/home/ftp: – Is checked during CIFS authentication processing when mapping Windows s to UNIX UID and GID – Can be used for authentication in a non-Windows (UNIX) workgroup environment Unless the Windows is mapped to a specific UNIX name, pc is the default. © 2008 NetApp. All rights reserved.
/ETC/WD FILE
2-24
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
20
CIFS Default Shares Setup creates three default shares: – C$ maps to /vol/
– ETC$ maps to /vol /
/etc – HOME is /vol /
/home Home directory is accessible to everyone
$ shares are hidden. C$ and ETC$ are available only to s.
© 2008 NetApp. All rights reserved.
21
CIFS DEFAULT SHARES These are the three default share definitions: •
C$ is /vol/
. This is a hidden “ share” to root of the root volume.
•
ETC$ is /vol /
/etc. This is a hidden “ share” to /etc directory on root volume. •
•
The /etc directory stores storage system configuration files, executables required to boot the system, and some log files.
HOME is /vol /
/home. This share is to the /home directory on root volume that is accessible to everyone.
A hidden share means that it is not visible when browsing. An “ share” is available only to s who are of an group. The storage system default root volume is /vol/vol0 unless the installer selected a unique volume name during the storage system setup script. You also can change which volume on your storage system is used as root volume or create a new one and in the process designate a different name for the root volume. The root volume contains special directories and configuration files for istering the storage system.
2-25
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
/etc/cifsconfig_share.cfg File
/etc/cifsconfig_share.cfg file system> rdfile /etc/cifsconfig_share.cfg #Generated automatically by cifs commands cifs shares -add "ETC$" "/etc" "Remote istration“ cifs access "ETC$" S-1-5-32-544 Full Control cifs shares -add "HOME" "/vol/vol0/home“ "Default Share“ nosd = No Security Descriptor cifs access "HOME" S-NONE "nosd“
(The HOME share acts special in that it maps to the who is trying to and the security descriptors on the ’s home directory apply.) cifs shares -add "C$" "/" "Remote istration“ cifs access "C$" S-1-5-32-544 Full Control
This file can be altered via CLI commands or GUIs
© 2008 NetApp. All rights reserved.
22
/etc/cifsconfig_share.cfg FILE The HOME share acts in a special way in that it maps to the who is trying to . The security descriptors on the ’s home directory apply.
2-26
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
/etc/lclgroups.cfg File The local is added to lclgroups.cfg: system> rdfile /etc/lclgroups.cfg [ "Replicators" 552 ( "not ed" ) ] [ "Backup Operators" 551 ( " can by file security to backup files" ) ] [ "Power s" 547 ( " that can share directories" ) ] [ "Guests" 546 ( "s granted Guest Access" ) ] [ "s" 545 ( "Ordinary s" ) ] [ "s" 544 ( " can fully ister the filer" ) ] S-1-5-21-265246955-68147109-1151652928-500 Local
© 2008 NetApp. All rights reserved.
23
/etc/lclgroups.cfg FILE The lclgroups.cfg file defines the of the groups on the storage system.
2-27
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
SIDs
© 2008 NetApp. All rights reserved.
SIDS
2-28
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
28
CLI: cifs lookup Windows security identifiers (SIDs) can be converted to and group IDs or the reverse – CLI: cifs lookup command – FilerView system> cifs lookup S-1-5-32-544 name = BUILTIN\s system> cifs lookup S-1-5-21-265246955-681471091151652928-500 name = system\
NOTE: SID might be listed in the/etc/lclgroups.cfg file
© 2008 NetApp. All rights reserved.
24
CLI: cifs lookup Security IDs (SIDs) can be converted to and group IDs using the CLI or FilerView. The following examples demonstrate using the CLI with the cifs lookup command. system> cifs lookup S-1-5-32-544 name = BUILTIN\s The SID S-1-5-32-544 is the name “BUILTIN\s.” system> cifs lookup S-1-5-21-265246955-68147109-1151652928-500 name = system\ This is the SID for the local , system\, which is listed in the /etc/lclgroups.cfg and /etc/cifsconfig_share.cfg file.
2-29
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
FilerView: cifs lookup Command FilerView -> CIFS -> Look Up Name / SID
© 2008 NetApp. All rights reserved.
25
FILERVIEW: cifs lookup COMMAND The Windows SID can be converted to and group names with FilerView. •
On FilerView go to CIFS Look Up Name/SID.
•
Enter a Windows or group name, or a SID.
•
Click the Look Up button.
•
The response to the lookup appears in the Name/SID Look Up page.
In this example, the SID S-1-5-32-544 shows the name is BUILTIN\s.
2-30
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
SID Cache To manage the SID Cache,
options cifs.sidcache.enable on – Turns on SID Cache
options cifs.sidcache.lifetime time – Sets the normal life span of cached SIDs
cifs sidcache clear all – Clears all CIFS SID-to-name map cache entries
cifs sidcache clear domain [domain] – Clears CIFS SID-to-name map cache entries for a particular domain
cifs sidcache clear [] – Clears CIFS SID-to-name map cache entries for a particular
cifs sidcache clear sid [sid] – Clears CIFS SID-to-name map cache entries for a particular SID © 2008 NetApp. All rights reserved.
26
SID CACHE CIFS is frequently required to map SIDs to and group names and vice versa for authentication, quota management, console command processing, and various RPC responses. The SID-to-name map cache contains entries that map SIDs to pre-Windows 2000 and group names. The storage system obtains the SID-to-name mapping information by querying the domain controller. To minimize multiple lookups of the same names, SID-to-name information received from the domain controller is saved in the SID-to-name map cache on the storage system. The SID-to-name map cache is enabled on the storage system by default. You can manually control the cache by changing the lifetime of the entries, clearing entries, or turning SID-to-name map caching off or on. A cache persists if CIFS is terminated or restarted, but it does not persist across a reboot or a takeover and giveback. When the storage system requires SID-to-name mapping information, it first looks for a matching entry in the SID-to-name map cache. If a matching entry is not found or if an expired matching entry is found, the storage system queries the appropriate domain controller for current mapping information. If the domain controller is not available, an expired mapping entry might be used by the storage system.
2-31
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
NetBIOS Aliases
© 2008 NetApp. All rights reserved.
NETBIOS ALIASES
2-32
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
32
NetBIOS NetBIOS – Means “Network Basic Input/Output System” – Is an API that allows machines to be discovered by “name” – Is typically used by various applications such as Network Neighborhood and net use
Windows clients set NetBIOS name by the Computer Name tab of the System Properties, which can be accessed via the Control /System or by right-clicking on My Computer and selecting Properties On the Storage System, set NetBIOS name(s) using nbalias and the cifs_nbalias.cfg file © 2008 NetApp. All rights reserved.
27
NETBIOS The Network Basic Input/Output System (NetBIOS) is an Application Program Interface (API) that provides simple networking services enabling s to share and use one another’s resources easily. NetBIOS over T/IP (NBT or NetBT) is the standard protocol used for CIFS prior to Windows 2000. NBT is used with Windows 95, Windows98, and Windows NT. The NetBIOS Name Server (NBNS) protocol is part of the NetBIOS over T/IP family of protocols
2-33
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
NetBIOS Aliases system> rdfile /etc/cifs_nbalias.cfg # # This file contains NetBIOS aliases used by the filer. # See the System 's Guide for a full # description of this file. # # There is a limit to the number of aliases that may be specified. # Currently that limit is 200. # # Aliases must be entered one per line. # # After editing this file, use the console command "cifs nbalias load" # to make the filer process the entries in this file. # # Note that the "#" character is valid in a CIFS NetBIOS alias. # Therefore the "#" character is only treated as a comment in this # file if it is in the first column. # myfiler NA1 Filer Stumpy system> © 2008 NetApp. All rights reserved.
28
NETBIOS ALIASES The /etc/cifs_nbalias.cfg configuration file contains the NetBIOS aliases for the storage system. A NetBIOS alias allows the storage system to be accessed by a Windows client using an alternate name for the storage system. To list the current NetBIOS aliases, do the following: system> cifs nbalias No NetBIOS aliases system> rdfile /etc/cifs_nbalias.cfg # After editing this file, use the console command # "cifs nbalias load" # to make the filer process the entries in this file. # # Note that the "#" character is valid in a CIFS # NetBIOS alias. # Therefore the "#" character is only treated as a # comment in this # file if it is in the first column. grumpy happy [Edit and add the NetBIOS aliases.] sneezy system>
2-34
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
NetBIOS Aliases (Cont.) cifs nbalias command List aliases cifs nbalias
Load file after making changes cifs nbalias load
© 2008 NetApp. All rights reserved.
29
NETBIOS ALIASES (CONT.) Once the /etc/cifs_nbalias.cfg file has been edited with the proper NetBIOS Aliases, use the cifs nbalias load command to the update with the Windows Internet Naming Service (WINS) server.
2-35
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Terminating/Restarting CIFS
© 2008 NetApp. All rights reserved.
TERMINATING/RESTARTING CIFS
2-36
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
36
Stopping and Restarting CIFS To terminate CIFS service (a complete shutdown) where all CIFS sessions are ended: – cifs terminate [-t minutes]
To restart CIFS service after terminating: – cifs restart
© 2008 NetApp. All rights reserved.
STOPPING AND RESTARTING CIFS
2-37
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
30
CLI: Stopping and Restarting CIFS As an example, stop and restart CIFS services on the storage system called “system”. system> cifs terminate CIFS local server is shutting down... CIFS local server has shut down... system> cifs restart CIFS local server is running. system> Tue Aug 1 19:07:26 GMT[nbt.nbns.registrationComplete:info]: NBT: All CIFS name registrations have completed for the local server.
© 2008 NetApp. All rights reserved.
CLI: STOPPING AND RESTARTING CIFS
2-38
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
31
FilerView: Stopping CIFS Services
© 2008 NetApp. All rights reserved.
32
FILERVIEW: STOPPING CIFS SERVICES You can disable CIFS for the entire storage system or for a specific workstation. Disabling CIFS for the entire storage system ignores the delay time if there are no active sessions. Otherwise, it tries to notify existing sessions prior to termination. As an example with FilerView, stop CIFS services on the storage system by performing the following steps: •
Go to FilerView CIFS Enable/Disable.
•
There are no active sessions for the storage system, so the Delay Time is ignored.
•
Click the Disable button.
NOTE: You also can enter the name of a specific PC (Windows workstation) to disable CIFS services.
2-39
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
FilerView: Restarting CIFS Services
© 2008 NetApp. All rights reserved.
33
FILERVIEW: RESTARTING CIFS SERVICES As an example with FilerView, restart the CIFS services on the storage system by performing the following steps: •
Go to FilerView CIFS Enable/Disable.
•
Click the Enable CIFS button.
•
Enabling CIFS will allow clients to access shares on this storage system.
2-40
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
2-41
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
41
Module Summary In this module, you should have learned: The CIFS service on a storage system can be configured via CLI with the cifs setup command or from FilerView A successful configuration automatically starts the CIFS service Resulting files reference s using SIDs SIDs can resolved using the cifs lookup command NetBIOS allows machines to be discovered by “name” A storage system can have multiple “aliases” or NetBIOS “names” The CIFS service may be stopped and started from the CLI and FilerView © 2008 NetApp. All rights reserved.
MODULE SUMMARY
2-42
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
34
Exercise Module 2: Workgroups Estimated Time: 45 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
2-43
CIFS istration on Data ONTAP 7.3: M02_Workgroups
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Shares
NetApp University - Do not distribute or duplicate
MODULE 3: SHARES AND SESSIONS
Shares and Sessions CIFS istration on Data ONTAP 7.3
SHARES AND SESSIONS
3-1
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you will be able to: Display all shares available on the storage system List the default shares Configure a client machine to access any share Define sparse files and set their attributes Identify the CIFS sessions established by accessing a share on the storage system Add, modify, and delete shares © 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
3-2
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Share istration Shares may be managed via: – CLI – FilerView® – Microsoft Management Console (MMC) Computer Management
Share istration includes: – – – –
Display shares Add shares Provide access to shares Remove shares
© 2008 NetApp. All rights reserved.
SHARE ISTRATION
3-3
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Displaying Shares
© 2008 NetApp. All rights reserved.
DISPLAYING SHARES
3-4
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
4
CLI: Displaying CIFS Shares As a result of setting up the CIFS service, default shares are created To display all shares: cifs shares Example: system> cifs shares Name Mount Point Description -----------------------ETC$ /etc Remote istration BUILTIN\ s / Full Control HOME /vol/vol0/home Default Share everyone / Full Control C$ / Remote istration BUILTIN\ s / Full Control
© 2008 NetApp. All rights reserved.
CLI: DISPLAYING CIFS SHARES
3-5
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
5
FilerView: Displaying CIFS Shares Display CIFS shares with FilerView
© 2008 NetApp. All rights reserved.
6
FILERVIEW: DISPLAYING CIFS SHARES You can go to FilerViewCIFSSharesReport to display CIFS shares. In this example, the three default shares: C$, ETC$, and HOME display with their mount points (paths) and descriptions.
3-6
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Displaying Storage System Shares Connect to the storage system with a right-click and selecting “Connect to another computer…” You are now interacting with the storage system
s and Groups is disabled in workgroup authentication
NOTE: You must with a that is defined in the BUILTIN\istrations group © 2008 NetApp. All rights reserved.
7
MMC: DISPLAYING STORAGE SYSTEM SHARES To display storage system shares, click the Shares folder in the console tree. The three default shares C$, ETC$, and HOME display, as does the hidden IPC$ share. The IPC$ share is an interprocess communications mechanism for temporary connections between clients and servers. It is primarily used to ister network servers remotely. This share enables the communication between the Windows Computer Management GUI and the storage system.
3-7
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Accessing Shares
© 2008 NetApp. All rights reserved.
ACCESSING A SHARE
3-8
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
8
Accessing a Share Once the share has been created, it may be accessed from Windows by The Microsoft’s net use command – net use e: \\toaster\jdoe /:marketing\jdoe
Using the Run Dialog Mapping a Drive
© 2008 NetApp. All rights reserved.
ACCESSING A SHARE
3-9
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
9
Run Dialog
© 2008 NetApp. All rights reserved.
10
RUN DIALOG On a Windows workstation using the Windows “run line,” access the C$ share on the storage system “system” by performing the following steps: •
On the Windows desktop, click the Start menu and choose Run. The Run window appears.
•
In the Open text box, type \\storage_system_name\C$ (\\system\C$). NOTE: The storage system name can be the name or IP address. Click the OK button and the Connect To window appears.
•
3-10
In the Connect To window, type the name and the , and click the OK button. The \\system\C$ window appears with the share access to C$ that displays the etc and home folders.
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Mapping a Drive to a Share
\\10.254.134.35\C$...
© 2008 NetApp. All rights reserved.
11
MAPPING A DRIVE TO A SHARE On a Windows workstation, map a network drive letter to a share by performing the following steps: •
Open Windows Explorer and to go Tools Map Network Drive. The Map Network Drive window appears.
•
In the Drive list box, select any unused letter. In the example, the letter K is selected.
•
In the Folder list box, type \\storage_system\C$. NOTE: The storage system name can be the name or IP address.
•
Click the Finish button. The Map Network Drive attempts to connect to the storage system and share.
•
When the Connect to window appears, in the name text box, type and in the text box, type the ’s .
•
Click the Ok button.
3-11
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Mapping a Drive to a Share (Cont.)
© 2008 NetApp. All rights reserved.
12
MAPPING A DRIVE TO A SHARE (CONT.) (The following continues the mapping of a network drive letter to a share.) •
3-12
The mapped network drive letter (K in this example) displays the mapping to the C$ share. Both the etc and home folders are in the C$ share.
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Encoding CIFS uses Unicode for its encoding. If a volume is exclusively being accessed by CIFS, consider: – vol options
create_ucode on – vol options
convert_ucode on
If the ucode options are not set, Data ONTAP® will transparently convert a non-Unicode directory when first accessed by CIFS. – Time consuming – If read-only (i.e., snapshot copy), then access is refused © 2008 NetApp. All rights reserved.
13
ENCODING The CIFS protocol requires a UNICODE encoding method. Unicode is an industry standard allowing computers to consistently represent text in most of the world’s writing systems. Unicode provides a unique number for every character regardless of the language. See http://www.unicode.org for more information. If a volume is exclusively being accessed by CIFS or Network File System (NFS) version 4.0 or later, then consider setting the create_ucode and convert_ucode volume options. Create_ucode option forces newly created directories to be unicode directories for both NFS and CIFS. By default it is set to off, in which case all directories are created in a non-unicode format and the first CIFS access will convert it to the Unicode format. Convert_ucode option on forces all directories to be converted to the Unicode format when accessed from both NFS and CIFS. By default this option is set to off. Unicode is not defaulted on a storage system because Unicode directories take up more space and are slower on some workloads.
3-13
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Sparse Files
© 2008 NetApp. All rights reserved.
SPARSE FILES
3-14
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
14
Sparse Files Now that we have access to a share, s can create and read files from that location. When creating files, normally Data ONTAP allocates space for the complete size of the file regardless if the file contains data. Sparse files are files in which much of the data are zeros. Data ONTAP 7.3 and later can store sparse files more efficiently.
© 2008 NetApp. All rights reserved.
15
SPARSE FILES In the Windows environment, a sparse file is a file in which many of the data blocks contain zeros. The blocks in the sparse files that contain zeros are known as sparse data sets. Files like these are typically very large. Some examples of sparse files are files containing disk images, a matrix within a high-speed database or log files. The problem with files containing sparse data sets is that they use disk space inefficiently. for sparse files was introduced in the NTFS filesystem as another way to make the disk space usage more efficient. The NTFS filesystem used compression as a partial solution to the problem. File compression compacts ranges of data blocks containing zeros. However, a drawback of file compression is that access time may increase due to data compression and decompression. When the sparse file functionality is enabled, Data ONTAP only allocates hard drive space to a file for regions that contain nonzero data. When a write operation is attempted where a large amount of the data in the buffer is zeros; the zeros are not written to the file. Instead, the file system creates an internal list containing the locations of the zeros in the file. This list is consulted during all read operations. When a read operation is performed in areas of the file where zeros were located, the file system returns the appropriate number of zeros in the buffer allocated for the read operation. In this way, maintenance of the sparse file is transparent to all processes that access it.
3-15
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Sparse Files and Data ONTAP Features To configure, use the fsutil tool from Microsoft. Setting sparse attribute: – Deletes space reservations for the file – All of the operations to set the space reservations on the sparse files fail
The sparse bit is preserved during the qtree SnapMirror® process. The sparse bit is preserved during the backup (dump) and restore processes.
© 2008 NetApp. All rights reserved.
16
SPARSE FILES AND DATA ONTAP FEATURES To set the sparse attribute, the client uses the fsutil tool from Microsoft. fsutil: sparse Syntax fsutil sparse [queryflag] PathName fsutil sparse [queryrange] PathName fsutil sparse [setflag] PathName fsutil sparse [setrange] PathName BeginningOffset length Example: To mark a file as sparse, type: fsutil sparse setflag C:\Temp\sample.txt When Windows client s set the sparse attribute on a file, then the space reservations for that file are deleted. Any reserved space is returned to the available space. Any attempts to set space reservations on a sparse file will fail. When s turn the sparse attribute off, space reservations will remain off as well until intentionally set by the .
3-16
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Quotas with Sparse File Attribute Data ONTAP 7.2 and lower – physical file size Data ONTAP 7.3 and higher – logical file size Without sparse file attribute set
With sparse file attribute set
sparse data sets (zeros)
Allocated
10 Gigabytes
10 Megabytes
© 2008 NetApp. All rights reserved.
17
QUOTAS WITH SPARSE FILE ATTRIBUTE Using Data ONTAP 7.2 and lower, the number of blocks charged to the 's quota for a file is equal to the number of blocks actually allocated. Data ONTAP 7.3 has modified quota ing in the WAFL® file system so that the full logical size of a file is ed for by quotas. This simplifies quota management and matches the way quotas are implemented by Microsoft for Windows Server 2008.
3-17
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Sessions
© 2008 NetApp. All rights reserved.
SESSIONS
3-18
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
18
CIFS Sessions A client establishes a session with a storage system upon the first share access – Access is based on authentication and share access rules
Display a CIFS session status by using these methods: – CLI: cifs sessions command – FilerView: FilerView -> CIFS -> Session Report – Windows Computer Management: GUI-> System Tools -> Shared Folders->Sessions
© 2008 NetApp. All rights reserved.
CIFS SESSIONS
3-19
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
19
cifs sessions Command With the cifs sessions command, you can display the following types of session information: A summary of session information, including the number of open shares and files opened by – cifs sessions Share and file information about a specified connected or all connected s, including shares and files opened – cifs sessions name | IPaddress | host – cifs sessions * [all connected s] Security information – cifs sessions -s © 2008 NetApp. All rights reserved.
20
CIFS SESSIONS COMMAND • With the cifs sessions command, you can display the following types of session information: •
A summary of session information, including storage system information and the number of open shares and files opened by each connected
• •
3-20
cifs sessions
Share and file information about a specified connected or all connected s, including: •
The names of shares opened by a specified connected or all connected s
•
The access levels of opened files •
cifs sessions _name | IP_address |workstation_name
•
cifs sessions *
[all connected s]
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
With the cifs sessions command, you can display the following types of session information: •
Security information about a specified connected or all connected s, including the UNIX ID (UID) and a list of UNIX groups and Windows groups to which the belongs:
cifs sessions –s _name | IP_address | workstation_name
cifs sessions –s
[all connected s]
NOTE: The number of open shares shown in the session information includes the hidden IPC$ share. The cifs sessions command can be used as a “status” command even when there is no session. Example 1 is a storage system in a Windows workgroup. The storage system uses local authentication. system> cifs sessions Server s as 'system' in workgroup 'WORKGROUP1‘ Root volume language is not set. Use vol lang. Using Local s authentication Comment: This is a Windows workgroup server =================================================== PC IP(PC Name) () #shares #files
Example 2 is a storage system in a Windows 2000 domain. The storage system uses the domain controller for authentication. system> cifs sessions Server s as 'system' in Windows 2000 domain 'DEVELOPMENT‘ Root volume language is not set. Use vol lang. Selected domain controller \\DEVDC01 for authentication Comment: This is a Windows 2000 member server ==================================================== PC IP(PC Name) () #shares #files
3-21
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
OPTIONS: •
The -t option displays the total count of CIFS sessions, open shares and open files.
•
If you include the argument, the command displays information about the specified , along with the names and access level of files that has opened. If you use * as the specified , the command lists all s.
•
Specifying the -c option with a argument, will display the names of open directories and the number of active ChangeNotify requests against the directory.
•
The -s option displays security information for a specified connected . If you do not specify a or workstation name, the command displays security information for all s.
Here are examples using the machine_name and machine_IP_address arguments: cifs sessions 192.168.228.4 s shares/files opened TORTOLA (nt-domain\danw - root) HOME
cifs sessions tortola s shares/files opened TORTOLA (nt-domain\danw - root) HOME
3-22
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Here is an example using the -t option: cifs sessions -t Using domain authentication. Domain type is Windows NT. Root volume language is not set. Use vol lang. Number of WINS servers: 2 CIFS sessions: 1 CIFS open shares: 1 CIFS open files: 3 CIFS sessions using security signatures: 0
3-23
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs sessions Example The following example of the cifs sessions command shows a session with a storage system in a Windows domain. system> cifs sessions Server s as ‘system' in workgroup ‘WORKGROUP' Root volume language is not set. Use vol lang. Using Local s authentication ==================================================== PC IP(PC Name) () #shares #files 10.254.134.40() (system\ - root) 1 0
© 2008 NetApp. All rights reserved.
24
CIFS SESSIONS EXAMPLE The following example of the cifs sessions command shows a session with a storage system in a Windows workgroup. The PC IP address 10.254.134.40 is the Windows workstation WIN. The system\ is the local on the storage system. The mapping for this is root. One share is currently being accessed.
3-24
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI: cifs sessions Security Information system> cifs sessions -s s Security Information 10.254.134.40() (system\ - root) *************** UNIX uid = 0 is a member of group daemon (1) is a member of group daemon (1) NT hip system\ BUILTIN\s is also a member of Everyone, Network s, Authenticated s ***************
© 2008 NetApp. All rights reserved.
25
CLI: CIFS SESSIONS SECURITY INFORMATION The following example of cifs sessions -s command shows security information for a with a session with a storage system in a Windows workgroup.
3-25
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
FilerView: CIFS Sessions
© 2008 NetApp. All rights reserved.
26
FILERVIEW: CIFS SESSIONS Go to FilerViewCIFSSession Report and click the Sessions button to display session information. In this example, CIFS is running, and the storage system is in a Windows workgroup.
3-26
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: CIFS Sessions GUI connected to the storage system
List and terminate all the current sessions except the session that Computer Management uses
© 2008 NetApp. All rights reserved.
27
MMC: CIFS SESSIONS With the Computer Management GUI, click the System ToolsShared FoldersSessions folders to display the CIFS sessions. In this example, the local has a session with the storage system “system” that is in a Windows workgroup. •
The name of the ’s computer is 10.254.134.40 WIN.
•
The number of Open Files is 3.
•
This is not a Guest .
3-27
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Broadcasting a Message
To display a message on Windows s’ sessions: –
cifs broadcast {workstation | -v volname} “message”
–
You can inform s about pending terminations or other important events.
The Messenger service on the Windows workstation must be enabled. 1. On your Windows workstation, go to StartProgramsistrative Tools ServicesMessenger. 2. If the Messenger service is disabled, start the service.
© 2008 NetApp. All rights reserved.
BROADCASTING A MESSAGE
3-28
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
28
Broadcasting a Message Example Example of broadcasting a message from a storage system: system> cifs broadcast -v flexvol1 "The shutdown will start in 10 minutes."
The following message displays on the Windows workstation:
© 2008 NetApp. All rights reserved.
BROADCASTING A MESSAGE EXAMPLE
3-29
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
29
Terminating Sessions cifs terminate Host1 Host1 cifs terminate [-t time] host
Host2 cifs terminate
Host3
Host4
© 2008 NetApp. All rights reserved.
30
TERMINATING SESSIONS The cifs terminate command stops CIFS service. If a single host is named, all CIFS sessions opened by that host are terminated. If a host is not specified, all the CIFS sessions are terminated and the CIFS service is shut down. If you run cifs terminate without specifying a time before shutdown and s have open files, you are prompted to enter the number of minutes to delay before terminating. If CIFS service is terminated immediately for a host that has one or more files open, the will not be able to save changes. You can use the -t option to warn of an impending shutdown of service. If you execute cifs terminate from rsh, you need to supply the -t option.
3-30
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Creating / Deleting Shares
© 2008 NetApp. All rights reserved.
CREATING / DELETING SHARES
3-31
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
31
Default Shares As you recall, three default share definitions are created upon completion of cifs setup: – C$ – ETC$ – HOME
But you can create new shares…
© 2008 NetApp. All rights reserved.
DEFAULT SHARES
3-32
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
32
Creating a Share When you create a share, you must provide: – Complete path name – Name of the share – Optionally, a description of the share
Data ONTAP CLI also allows: – Group hip for files in the share – for wide symbolic links – Disabling/enabling of virus scanning when files in the share are first opened
MMC also allows permissions for the share © 2008 NetApp. All rights reserved.
33
CREATING A SHARE When you create a share, you must provide these items: •
The complete path name of an existing volume or directory to be shared
•
The name of the share entered by s when they connect to the share
•
Optionally, a description of the share
When creating a share from the Data ONTAP CLI, you can specify a variety of share properties, including group hip for files in the share, for wide symbolic links, and disabling of virus scanning when files in the share are first opened. Virus scanning occurs when files are opened, renamed, and closed after being modified. Microsoft interfaces additionally allow the to set permissions as you create the share.
3-33
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Creating a Share (Cont.) Additional properties can be set/modified after creating a share: Maximum number of s who can simultaneously access the share – If not specified, the limit is defined by the storage system’s memory
Share-level access control list (ACL)
© 2008 NetApp. All rights reserved.
CREATING A SHARE (CONT.)
3-34
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
34
CLI: Preparing to Create a Share You can create shares for folders, qtrees, or volumes For example: – To prepare for creating a share on a qtree, first create the following resources: An aggregate (aggr1) A flexible volume (flexvol1) on aggr1 A qtree (datatree1) on flexvol1 – NOTE: This path example will be used throughout this module
© 2008 NetApp. All rights reserved.
35
CLI: PREPARING TO CREATE A SHARE You can create shares for volumes or directories including qtrees. For example, to prepare for creating a share on a qtree, first create the following resources: •
An aggregate (aggr1)
•
A flexible volume (flexvol1) on aggr1
•
A qtree (datatree1) on flexvol1
CLI: CREATING AN AGGREGATE
To create on a storage system an aggregate aggr1 with RAID type raid4 and with 3 disks. system> aggr create aggr1 -t raid4 -r 3 Fri Jun 30 08:59:18 GMT [raid.vol.disk.add.done:notice]: Addition of Disk /aggr1/plex0/rg0/0b.27 She lf 1 Bay 11 [NETAPP X272_HJURE073F10 NA14] S/N [41519624] to aggregate aggr1 has completed successfully Fri Jun 30 08:59:18 GMT [raid.vol.disk.add.done:notice]: Addition of Disk /aggr1/plex0/rg0/0b.25 She lf 1 Bay 9 [NETAPP X272_HJURE073F10 NA14] S/N [414Y7808] to aggregate aggr1 has completed successfully
3-35
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Fri Jun 30 08:59:18 GMT [raid.vol.disk.add.done:notice]: Addition of Disk /aggr1/plex0/rg0/0b.22 Shelf 1 Bay 6 [NETAPP X272_HJURE073F10 NA14] S/N [415R9619] to aggregate aggr1 has completed successfully Creation of an aggregate with 3 disks has completed. system> Fri Jun 30 08:59:18 GMT [wafl.vol.add:notice]: Aggregate aggr1 has been added to the system.
CLI: CREATING A FLEXIBLE VOLUME
To create on a storage system a flexible volume flexvol1 on aggr1. NOTE The qtree status command verifies the existence of the newly created flexvol1. system> vol create flexvol1 aggr1 10g Creation of volume 'flexvol1' with size 10g on containing aggregate 'aggr1' has completed. system> qtree status Volume Tree Style -------- -------- -----
Oplocks --------
Status ---------
vol0
ntfs
enabled
normal
flexvol1
ntfs
enabled
normal
The New Technology File System (NTFS) security style for flexvol1 is based on the wafl.default_security_style option.
CLI: CREATING A QTREE
To create on a storage system a qtree datatree1 on flexvol1. system> qtree create /vol/flexvol1/datatree1 system> qtree status Volume Tree Style -------- -------- -----
Oplocks --------
Status ---------
vol0
ntfs
enabled
normal
flexvol1
ntfs
enabled
normal
enabled
normal
flexvol1 datatree1 ntfs
3-36
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI: Adding a CIFS Share
As an example, add a share called datatree1 (for the qtree datatree1). system> cifs shares -add datatree1 /vol/flexvol1/datatree1 -comment "Qtree for Windows s" The share name 'datatree1' will not be accessible by some MS-DOS workstations Are you sure you want to use this share name? [n]:y Name ----
Mount Point -----------
Description -----------
datatree1
/vol/flexvol1/datatree1 everyone / Full control
Qtree for Windows s
Default access control (discussed later) © 2008 NetApp. All rights reserved.
CLI: ADDING A CIFS SHARE
3-37
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
37
FilerView: Adding a CIFS Share
© 2008 NetApp. All rights reserved.
38
FILERVIEW: ADDING A CIFS SHARE As an example with FilerView, add a new share called datatree1 (for the qtree datatree1) on volume flexvol1 by performing the following steps: •
Go to FilerView CIFS Shares Add.
•
For Share Name, type datatree1.
•
For Mount Point, type /vol/flexvol1/ datatree1.
•
For Share Description, type Qtree for Windows s.
•
Click the Add button.
You receive a caution message that the share name “datatree1” will not be accessible by some MS-DOS workstations (because the length of the name is more than eight characters).
3-38
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Adding a CIFS Share
Right-click Shares.
Choose New Share...
© 2008 NetApp. All rights reserved.
39
MMC: ADDING A CIFS SHARE As an example with the Windows Computer Management GUI, add a new share called datatree1 (for the qtree datatree1) on volume flexvol1 by performing the following steps:| •
In the console tree, right-click the Shares folder and choose New Share…. The Welcome to the Share a Folder Wizard appears.
•
Click the Next button to start the wizard, and the “Folder Path” page displays with the Computer name text box showing your storage system name or IP address.
•
In the Folder path text box, type the path C:\vol\flexvol1\datatree1 for the datatree1 share, and click the Next button.
3-39
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Adding a CIFS Share (Cont.)
Click the Customize button.
© 2008 NetApp. All rights reserved.
40
MMC: ADDING A CIFS SHARE (CONT.) (The following continues the adding of a CIFS share.) •
In the Name, Description, and Settings page, in the Share name text box enter datatree1.
•
In the Description text box, type Qtree for Windows s and click the Next button.
•
In the Permissions page, mark the Use custom share and folder permissions radio button, and then click the Customize button.
3-40
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Adding a CIFS Share (Cont.)
Click the OK button.
© 2008 NetApp. All rights reserved.
41
MMC: ADDING A CIFS SHARE (CONT.) (The following continues the adding of a CIFS share.) •
In the Customize Permissions window, mark the Allow check boxes for Full Control, Change, and Read, and click the OK button.
•
In the “Permissions” page, click the Finish button.
•
You receive the message that sharing was successful.
•
Click the Close button to close the wizard.
3-41
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI: Deleting a Share As an example, delete the share called datatree1. system> cifs shares -delete datatree1 system> cifs shares Mount Point Description Name -----------------------ETC$ /etc Remote istration BUILTIN\ s / Full Control HOME /vol/vol0/home Default Share everyone / Full Control C$ / Remote istration BUILTIN\ s / Full Control
NOTE: The share datatree1 is deleted © 2008 NetApp. All rights reserved.
CLI: DELETING A SHARE
3-42
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
42
FilerView: Deleting a Share
Click the OK button.
Click the operation Delete.
© 2008 NetApp. All rights reserved.
43
FILERVIEW: DELETING A SHARE As an example with FilerView, delete the share called datatree1 by performing the following steps: •
Go to FilerView CIFS Shares Manage.
•
For datatree1 share, click the operation Delete.
•
When the confirmation dialog box asks if you really want to delete the share datatree1, click OK.
3-43
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Deleting a Share Right-click datatree1 share.
Choose Stop Sharing.
Click the Yes button to confirm stop sharing datatree1.
© 2008 NetApp. All rights reserved.
44
MMC: DELETING A SHARE As an example with the Windows Computer Management GUI, delete the share called datatree1 by performing the following steps: •
In the Computer Management window, right-click the datatree1 share and choose Stop Sharing.
•
In the Shared Folders window, when it asks if you are sure that you wish to stop sharing datatree1, click the Yes button.
3-44
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
3-45
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
45
Module Summary In this module, you should have learned: The available shares can be displayed via CLI, FilerView, or Microsoft tools. Shares are accessed from the client by the Run menu, mapping a drive, or the Windows command net use. A CIFS session can be istered via CLI, FilerView, or Microsoft tools. Creating and deleting shares can be done through CLI, FilerView, or Microsoft tools.
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
3-46
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
46
Exercise Module 3: Shares Estimated Time: 15 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
3-47
CIFS istration on Data ONTAP 7.3: M03_Shares
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Access Control
NetApp University - Do not distribute or duplicate
MODULE 4: ACCESS CONTROL
Access Control CIFS istration on Data ONTAP 7.3
ACCESS CONTROL
4-1
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you should be able to: Create and manage local s for a storage system Identify how to create a local group and make a local a member of that group Use the CLI, FilerView® or Microsoft tools to add, delete, and modify access permissions of shares Use Microsoft tools to add, delete, and modify access permissions of files and folders Determine and mappings for CIFS s accessing NTFS and UNIX volumes/qtrees
© 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
4-2
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Local s
© 2008 NetApp. All rights reserved.
4-3
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Local s Local s are: s that are authenticated locally Associated with Groups on the storage system Created and managed using command or a text editor Saved in the /etc/registry or /etc/wd
© 2008 NetApp. All rights reserved.
4
LOCAL S On the storage system, the domain s group and the local are part of the BUILTIN\s group. They can do the following: •
Provide a text editor to edit configuration files. Data ONTAP® does not include an editor.
•
Provide the ability to ister a storage system and hence have access to the root file system (C$ and ETC$).
•
Modify the share access for C$ and ETC$ to grant additional s access.
•
The local can set up local s on the storage system with the add command.
4-4
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Purpose of Local s Two main reasons for local authentication: 1. Provides local s the ability to configure the storage system – Discussed in Data ONTAP Fundamentals Course 2. Provides local client s access to the resources on the storage system for all environments – Windows workgroup – Non-Windows workgroup – Windows domain NOTE: You can create a maximum of 96 local s. © 2008 NetApp. All rights reserved.
5
PURPOSE OF LOCAL S Reasons for local s include the following: •
Windows workgroup •
•
Non-Windows workgroup (UNIX mode) •
•
You must create local s so that the storage system can authenticate local s.
Do not create local s because the storage system authenticates s with the UNIX (/etc/wd) database.
Windows domain •
The storage system can authenticate s (with the local s) who try to connect to the storage system from an untrusted domain.
•
Local s can access the storage system when the domain controller is down or not available for domain authentication.
NOTE: You can create a maximum of 96 local s.
4-5
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Purpose of Local s (Cont.) When the CIFS server is configured for: Windows workgroup – You must create local s so that the storage system can authenticate s – Use the command – s are stored in /etc/registry
Non-Windows workgroup (UNIX mode) – You must create local UNIX s – Use the wd command – s are stored in /etc/wd and /etc/shadow © 2008 NetApp. All rights reserved.
PURPOSE OF LOCAL S (CONT.)
4-6
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
6
Purpose of Local s (Cont.) When the CIFS server is configured for: Windows domain – Storage system can authenticate s (with the local s) who try to connect to the storage system from an untrusted domain – Local s can access the storage system when the domain controller is down or not available for domain authentication – Use the command – s are stored in /etc/registry
© 2008 NetApp. All rights reserved.
PURPOSE OF LOCAL S (CONT.)
4-7
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
7
Local As you recall, during cifs setup, the local may be created. It is highly recommended that you create the local : (system\) for this filer. This allows access to CIFS from Windows when domain controllers are not accessible. Do you want to create the system\ ? [y]: Enter the new for system\: Retype the :
© 2008 NetApp. All rights reserved.
LOCAL
4-8
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
8
Local Definitions List the local s on the storage system. system> list Name: root Info: Default system . Rid: 0 Groups:
This is the storage system root .
Name: Info: Built-in for istering the filer Rid: 500 Groups: s A local is added to the list if the response during cifs setup was to create a local for the storage system. Be sure to set an appropriate for the .
© 2008 NetApp. All rights reserved.
9
LOCAL DEFINITIONS A local is added to the list if the response during cifs setup was to create a local for the storage system. Be sure to set an appropriate for the .
4-9
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
istrating Local s Local s Must provide a unique name Associate to a group Created only via CLI’s command when the storage system is set to CIFS workgroup authentication
© 2008 NetApp. All rights reserved.
10
ISTRATING LOCAL S With FilerView, you cannot create local s. Microsoft Management Console (MMC) tools have some capabilities that are discussed in the next module because they only are available when the storage system is using CIFS domain authentication.
4-10
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Local Management Manage local s fully by using the CLI command. To add a new local : add _name –g group_name
To modify a local : modify _name –g group_name
To list information: list _name
To delete a local : delete _name
© 2008 NetApp. All rights reserved.
LOCAL MANAGEMENT
4-11
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
11
CLI: Adding a New Local As an example, add a local called Jane to the predefined Guests group. Note: names are not case sensitive. system> add jane -g Guests New : is typed but Retype new : not displayed. <jane> added. system> Mon Jul 31 01:13:18 GMT [.added.deleted:info]: The 'jane' has been added.
© 2008 NetApp. All rights reserved.
12
CLI: ADDING A NEW LOCAL As an example, add a local called Jane to the predefined Guests group. NOTE: names are not case sensitive. system> add jane -g Guests New : Retype new : <jane> added. system> Mon Jul 31 01:13:18 GMT [.added.deleted:info]: The 'jane' has been added. NOTE: The is typed but not displayed.
4-12
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI: Adding a New Local (Cont.) In the example, that the local Jane has been added to the predefined Guests group. system> list jane Name: jane Info: Rid: 131075 Groups: Guests Full Name: Allowed Capabilities: min/max age in days: 0/4294967295 Status: enabled
© 2008 NetApp. All rights reserved.
13
CLI: ADDING A NEW LOCAL (CONT.) In the example, that the local Jane has been added to the predefined Guests group. system> list jane Name: jane Info: Rid: 131075 Groups: Guests Full Name: Allowed Capabilities: min/max age in days: 0/4294967295 Status: enabled NOTE: Jane has no allowed capabilities in the Guests group, but she can and be authenticated.
4-13
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Local Groups
© 2008 NetApp. All rights reserved.
4-14
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
14
Local Groups Local Groups Contain local and domain s Created only via CLI’s command when the storage system is set to CIFS workgroup authentication
© 2008 NetApp. All rights reserved.
15
LOCAL GROUPS With FilerView, you cannot create local group s. MMC tools have some capabilities that are discussed in the next module because they only are available when the storage system is using CIFS domain authentication.
4-15
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI: Group Management Manage local groups by using the CLI . To add a new group: group add group_name –r role
To modify an existing group: group modify group_name –g new_group_name
To list group information: group list group_name
To delete a group: group delete group_name
To add an existing Windows domain to a group: domain add name –g group_name
To list Windows domain s in a group: domain list –g group_name © 2008 NetApp. All rights reserved.
CLI: GROUP MANAGEMENT
4-16
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
16
CLI: Local Groups As an example, add a local group called Helpers with the predefined role and the Results. system> group add Helpers -r Group
added. system > Mon Jul 31 02:02:43 GMT [.added.deleted:info]: The group 'Helpers' has been added. system > group list Helpers Name: Helpers Info: Rid: 131076 Roles: Allowed Capabilities: -*,cli-*,api *,security-*
© 2008 NetApp. All rights reserved.
17
CLI: LOCAL GROUPS As an example, add a local group called Helpers with the predefined role and the results. system> group add Helpers -r Group
added. system> Mon Jul 31 02:02:43 GMT [.added.deleted:info]: The group 'Helpers' has been added. system> group list Helpers Name: Helpers Info: Rid: 131076 Roles: Allowed Capabilities: -*,cli-*,api-*,security-* Note: The role has full capabilities. When groups are created, they are placed in the lclgroups.cfg file. Normally, this file is for istrative reference only; it is not used to reload groups into the system memory. However, sometimes you need Data ONTAP to reload this file―for example, when you migrate a storage system. Do not edit this file without direction from .
4-17
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Share Permissions
© 2008 NetApp. All rights reserved.
SHARE PERMISSIONS
4-18
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
18
Permissions Permissions can be set at: – Share level – Folder/File level
Both permission levels must be satisfied to gain access to the resource
© 2008 NetApp. All rights reserved.
PERMISSIONS
4-19
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
19
Share Permissions Share permissions can be managed by: – CLI: cifs access command – FilerView – MMC such as Computer Management
Windows share permissions are the following: – Read-only – Full control – Change
If all the permissions are denied, then there is no access. © 2008 NetApp. All rights reserved.
SHARE PERMISSIONS
4-20
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
20
cifs access Command CLI cifs access command sets or modifies the share-level ACL to share definitions – To modify a share access: cifs access <share> [-g] [_rights] – To delete an ACL entry for a on a share: cifs access -delete <share> [-g] [] The –g option specifies that the is the name of a UNIX group. Use this command when you have: – A UNIX group and a UNIX or an NT or group with the same name
© 2008 NetApp. All rights reserved.
CIFS ACCESS COMMAND
4-21
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
21
CLI: Setting and Deleting Share Access As an example, on the datatree1 share, set the share access for the to Full Control and delete the Everyone access system> cifs access datatree1 Full Control 1 share(s) have been successfully modified system> cifs access -delete datatree1 everyone 1 share(s) have been successfully modified system> cifs shares datatree1 Name Mount Point Description -----------------------datatree1 /vol/flexvol1/datatree1 Windows Qtree system\ / Full Control
NOTE: This is the storage system local
© 2008 NetApp. All rights reserved.
CLI: SETTING AND DELETING SHARE ACCESS
4-22
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
22
FilerView: Managing Share Access
© 2008 NetApp. All rights reserved.
23
FILERVIEW: MANAGING SHARE ACCESS As an example with FilerView, on the datatree1 share, set the share access for the to Full Control and delete the Everyone access by performing the following steps: •
Go to FilerView CIFS Shares Manage.
•
For datatree1 share, click operation Change Access.
4-23
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
FilerView: Managing Share Access (Cont.)
© 2008 NetApp. All rights reserved.
FILERVIEW: MANAGING SHARE ACCESS (CONT.) (The following continues the setting and deleting of share access.) •
In the Change Access for datatree1 page, click Add Access Control Entry.
•
In the Add access Control Entry for datatree1 page, perform these steps:
•
In the /Group text box, type .
•
In the Permissions list box, select Full Control (rwx).
•
Click the Add button.
4-24
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
24
FilerView: Managing Share Access (Cont.)
Click the operation Delete.
© 2008 NetApp. All rights reserved.
25
FILERVIEW: MANAGING SHARE ACCESS (CONT.) (The following continues the setting and deleting of share access.) •
In the Change Access for datatree1 page, view the newly added with Full-Control share access.
•
In the‘everyone row, click the operation Delete to remove the share access.
4-25
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Setting and Deleting Share Access
Right-click datatree1 share.
Choose Properties.
Click the Share Permissions tab.
© 2008 NetApp. All rights reserved.
26
MMC: SETTING AND DELETING SHARE ACCESS As an example with Windows Computer Management GUI, on the datatree1 share, set the share access for the to Full Control and delete the Everyone access by performing the following steps: •
Right-click the datatree1 share and choose Properties.
•
In the datatree1 Properties window, the General tab appears displaying the share name, folder path, and description for the datatree1 share. Click the Share Permissions tab.
4-26
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Managing Share Access (Cont.)
Location of s or groups. Click the Add button.
Type .
© 2008 NetApp. All rights reserved.
27
MMC: MANAGING SHARE ACCESS (CONT.) (The following continues the setting and deleting of share access.) •
In the Share Permissions tab, click the Add button. The Select s, Computers, or Groups window appears.
•
In the Enter the object names to select text box, type and click OK. The datatree1 Properties window appears, displaying the new share access for the .
4-27
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Managing Share Access (Cont.)
Select Everyone.
Click the Remove button.
© 2008 NetApp. All rights reserved.
28
MMC: MANAGING SHARE ACCESS (CONT.) (The following continues the setting and deleting of share access.) •
In the dataree1 Properties window, select Everyone and click the Remove button to delete share access for Everyone.
•
The datatree1 Properties window displays that the Everyone share access is deleted.
4-28
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
File Permissions
© 2008 NetApp. All rights reserved.
FILE PERMISSIONS
4-29
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
29
Folder/File Permissions A storage system stores the NTFS file-level permissions for folders and files. – Managed only from a Windows client or GPOs
Standard Windows GUI tools display and set permissions. Manage permissions as you would an NTFS file system on a Windows workstation or server.
© 2008 NetApp. All rights reserved.
FOLDER/FILE PERMISSIONS
4-30
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
30
File Permissions of a Mapped Drive
Right-click the file, and choose Properties. Right-click and choose Properties.
© 2008 NetApp. All rights reserved.
FILE PERMISSIONS OF A MAPPED DRIVE To display the file permissions, perform the following steps: •
From a mapped network drive, right-click the file.
•
Choose Properties from the shortcut menu.
4-31
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
31
Security Tab
Click the Security tab
The Everyone system group has full control for permissions, including Modify, Read & Execute, Read, Write, and Special Permissions
© 2008 NetApp. All rights reserved.
32
SECURITY TAB To set up security, perform the following steps: •
In the file Properties window, click the Security tab.
•
Note the group and names and the permissions for the group or .
•
Click the OK button.
In this example, the Everyone system group has full control for permissions including Modify, Read and Execute, Read, and Write.
4-32
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
ABE
© 2008 NetApp. All rights reserved.
ABE
4-33
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
33
Access-based Enumeration Share permissions conventionally allow s to view shared folders or files regardless of whether the s have access to them – Causes security risk s can protect sensitive information using Access-based Enumeration (ABE) option cifs shares -change <sharename> [-accessbasedenum | noaccessbasedenum] – May be set with -add switch when creating shares – No ABE is the default
© 2008 NetApp. All rights reserved.
34
ACCESS-BASED ENUMERATION Conventional share properties allow you to specify which s (individually or in groups) have permission to view or modify shared resources. However, they do not allow you to control whether shared folders or files are visible to s who do not have permission to access them. This could pose problems if the names of shared folders or files describe sensitive information, such as the names of customers or new products under development. Access-based Enumeration (ABE) extends share properties to include the enumeration of shared resources. When ABE is enabled on a CIFS share, s who do not have permission to access a shared folder or file underneath it (whether through individual or group permission restrictions) do not see that shared resource displayed in their environment. ABE therefore enables you to filter the display of shared resources based on access rights. ABE for a CIFS share on a NetApp® storage system can be managed by the CIFS shares option [–accessbasedenum | -noaccessbasedenum].
4-34
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Access-based Enumeration (Cont.)
Without ABE
With ABE
© 2008 NetApp. All rights reserved.
35
ACCESS-BASED ENUMERATION (CONT.) The two figures illustrate how ABE affects Data ONTAP directory listing. In the first figure, all the folders under the share “customer data” are visible to the , who does not have access to some of the folders containing sensitive information. In the bottom figure, after enabling Accessbased Enumeration on this share, s can see only the folders to which they have access.
4-35
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Multiprotocol But CIFS s don’t necessarily have to access only NTFS volumes or qtrees Volumes and qtrees can have either: – NTFS style ACL permissions – UNIX style permissions
Having UNIX style permissions does not prevent Windows (CIFS) s from accessing a volume or qtree if Multiprotocol is correctly configured
© 2008 NetApp. All rights reserved.
MULTIPROTOCOL
4-36
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
36
Multiprotocol
© 2008 NetApp. All rights reserved.
MULTIPROTOCOL
4-37
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
37
Security Style Interaction For a Windows to access: A NTFS style volume or qtree – Windows is tested against NTFS style ACLs A UNIX style volume or qtree – Windows must be mapped to a UNIX UID and GID
Windows HOST Windows and Group ID
UNIX and Group ID
NTFS
UNIX
© 2008 NetApp. All rights reserved.
38
SECURITY STYLE INTERACTION NOTE: There is always a mapping (UNIX NTFS ) whether the chosen security style is NTFS or multiprotocol. Even when a Windows client is accessing data through an NTFS qtree on a storage system with NTFS security style, a mapping occurs for the Windows client . Both NTFS and UNIX s are always mapped.
4-38
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Windows to UNIX Resolution
Domain Authenticated
Windows authenticated
Unauthenticated Windows Domain Controller
Workgroup Authentication Authenticated by /etc/registry
Windows authenticated
Unauthenticated Storage System
© 2008 NetApp. All rights reserved.
39
WINDOWS TO UNIX RESOLUTION When a CIFS attempts to access a storage system, regardless of whether the attempts to access a volume or qtree that has UNIX permissions, the is authenticated with the method by which the CIFS server has previously been configured. If the storage system has been configured for domain authentication, the storage system es the credentials to the domain controller for proper authentication. The credentials are either authenticated or not. If the storage system has been configured for workgroup authentication, then the storage will authenticate the via the /etc/registry.
4-39
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Windows to UNIX Resolution (Cont.) If not verified
Check wafl.default_unix_
Windows authenticated
Check mapping /etc/map.cfg Domain/ => UNIX
If mapping exists, try mapped
UNIX by /etc/wd, NIS, or domain
If no mapping, try Windows If mapped to ‘ ‘
Invalid
accepted
© 2008 NetApp. All rights reserved.
40
WINDOWS TO UNIX RESOLUTION (CONT.) A Windows authenticated then is looked up in the /etc/map.cfg file. Three possibilities are available. The maybe mapped to a UNIX , not mapped at all, or mapped to an empty string. If the is mapped, then the mapped UNIX is ed to verification. If the is not mapped, then the authenticated CIFS ’s name is tried for UNIX verification with all letters lowercased. If the is mapped to an empty string “ ”, then the is invalid. VERIFICATION
The storage system will attempt to a UNIX by employing the mechanism as stated in the /etc/nsswitch.conf file. These mechanisms are using /etc/wd, NIS, and/or LDAP. If verification is unsuccessful, then the option wafl.default_unix_ is tried as a generic . A typical default UNIX is “pc” with UID =65534 and GID=65534, which is stored in /etc/wd file by default. If verification is successful, the CIFS is properly associated with a UNIX . If verification is unsuccessful, the CIFS is invalid. WINDOWS
The Windows is a special case. The is mapped to the UNIX name root with UID=0 and GID=1 if the wafl.nt__priv_map_to_root option is set on.
4-40
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Windows to UNIX Resolution (Cont.)
Unauthenticated or Invalid
Guest configured options cifs.guest_
Yes
Try guest
UNIX by /etc/wd, NIS, or LDAP
Guest accepted
No
Unauthenticated or Invalid rejected
Guest rejected
© 2008 NetApp. All rights reserved.
41
WINDOWS TO UNIX RESOLUTION (CONT.) Unauthenticated or invalid s still may be allowed access to the resource if options cifs.guest_ is configured. The guest then is ed to the storage system for UNIX verification that is specified by the /etc/nsswitch.conf file.
4-41
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Mappings A Windows-to-UNIX mapping is kept as part of the CIFS session credential. – A fresh Windows-to-UNIX mapping is required only when a new CIFS session is established for a . – Use cifs session -s command to mapping.
© 2008 NetApp. All rights reserved.
MAPPINGS
4-42
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
42
Multiprotocol Options A CIFS can access the file without disrupting UNIX permissions. A CIFS might then attempt to set security restrictions on a file or folder. – Prior to Data ONTAP 7.2, the CIFS must have an add-on from the NOW™ site called SecureShare®. – Data ONTAP 7.2 and later, the CIFS can manage security directly with cifs.preserve_unix_security
© 2008 NetApp. All rights reserved.
MULTIPROTOCOL OPTIONS
4-43
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
43
Preserving UNIX Permissions cifs.preserve_unix_security option preserves UNIX permissions as files are edited and saved by Windows applications that perform the following steps: 1. 2. 3. 4.
Read the security properties of the file Create a new temporary file Apply those properties to the temporary file Rename temporary file with original file name
Windows clients that perform a security query receive a constructed ACL that exactly represents the UNIX permissions © 2008 NetApp. All rights reserved.
PRESERVING UNIX PERMISSIONS
4-44
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
44
Preserving UNIX Permissions (Cont.) cifs.preserve_unix_security option allows manipulation of UNIX permissions by using the Security tab on a Windows client – When enabled, UNIX qtrees appear as NTFS volumes – The default for this option is “off” NOTE: You cannot change the owner and group from the Windows Security tab.
© 2008 NetApp. All rights reserved.
PRESERVING UNIX PERMISSIONS (CONT.)
4-45
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
45
File Permissions with Mapped UNIX
UNIX credentials are used when evaluating access requests by comparing Windows credentials against the file or folder’s permissions.
© 2008 NetApp. All rights reserved.
46
FILE PERMISSIONS WITH MAPPED UNIX In this example, a Windows is accessing a UNIX file. The Security tab in the file Properties window displays the ’s mapped UNIX credentials. The UNIX credentials are used when evaluating the ’s access requests by comparing the ’s credentials against the file or folder’s UNIX access permissions.
4-46
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
4-47
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
47
Module Summary In this module, you should have learned to: Create and manage local s for a storage system Identify how to create a local group and make a local a member of that group Use the CLI, FilerView® or Microsoft tools to add, delete, and modify access permissions of shares Use Microsoft tools to add, delete, and modify access permissions of files and folders Determine and mappings for CIFS s accessing NTFS and UNIX volumes/qtrees
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
4-48
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
48
Exercise Module 4: Access Control Estimated Time: 30 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
4-49
CIFS istration on Data ONTAP 7.3: M04_AccessControl
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Domains
NetApp University - Do not distribute or duplicate
MODULE 5: DOMAINS
Domains CIFS istration on Data ONTAP 7.3
DOMAINS
5-1
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you should be able to: Terminate the CIFS service to prepare for CIFS domain configuration Reconfigure the CIFS service for a Windows domain Identify the resulting files Create domain s and add the domain s to a local storage system group Set up Preferred Domain Controllers (DCs)
© 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
5-2
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Reconfiguring CIFS
© 2008 NetApp. All rights reserved.
RECONFIGURING CIFS
5-3
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Reconfiguring CIFS To reconfigure CIFS on a storage system: 1. Disconnect s and stop CIFS service: cifs terminate
2. Reconfigure CIFS service: cifs setup
CIFS server restarts with the new configuration Next we will investigate reconfiguring a storage system for an Active Directory domain
© 2008 NetApp. All rights reserved.
RECONFIGURING CIFS
5-4
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
4
CLI cifs setup: AD cifs setup Windows 2000 (Active Directory) domain completion (1) Active Directory domain authentication (Active Directory domains only) (2) Windows NT 4 domain authentication (Windows NT or Active Directory domains) (3) Windows Workgroup authentication using the filer's local s (4) /etc/wd and/or NIS/LDAP authentication Selection (1-4)? [1]:
© 2008 NetApp. All rights reserved.
5
CLI CIFS SETUP: AD This is an example of the configuring the storage system for an Active Directory (AD) domain.
5-5
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: AD (Cont.) Windows 2000 completion continued What is the name of the Active Directory domain? [development.netappu.com]: In Active Directory-based domains, it is essential that the filer's time match the domain's internal time so that the Kerberos-based authentication system works correctly. If the time difference between the filer and the domain controllers is more than 5 minutes, CIFS authentication will fail. Time services currently are not configured on this filer. Would you like to configure time services? [y]:
© 2008 NetApp. All rights reserved.
6
CLI CIFS SETUP: AD (CONT.) Active Directory uses a time-based key mechanism. It is important for the domain controller and the storage system to be in sync by five (5) minutes or less.
5-6
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: AD (Cont.) Windows 2000 completion continued CIFS Setup will configure basic time services. To continue, you must specify one or more time servers. Specify values as a comma or space separated list of server names or IPv4 addresses. In Active Directory-based domains, you can also specify the fully qualified domain name of the domain being ed (for example:(“DEVELOPMENT.NETAPPU.COM") and time services will use those domain controllers as time servers. Enter the time server host(s) and/or address(es) [DEVELOPMENT.NETAPPU.COM]:10.254.134.2 [The IP address is for the domain controller or a time server. It is best to enter the IP address of the main (root) domain controller for the domain.] Would you like to specify additional time servers? [n]: Wed Jun 21 16:28:22 GMT [rc:ALERT]: timed: time daemon started
© 2008 NetApp. All rights reserved.
7
CLI CIFS SETUP: AD (CONT.) The IP address is for the domain controller or a time server. It is best to enter the IP address of the main (root) domain controller for the domain. The timed daemon allows the storage system to synchronize its time with external resources. You need to configure the following: •
options timed.max_skew 30m
•
options timed.proto ntp
•
options timed.sched hourly
•
options timed.servers [server_ip_or_name,…] •
For a list of available time servers, see http://www.eecis.udel.edu/~mills/ntp/servers.htm
•
options timed.enable on
•
options timed.log on
5-7
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: AD (Cont.) Windows 2000 completion continued In order to create an Active Directory machine for the filer, you must supply the name and of a Windows with sufficient privileges to add computers to the DEVELOPMENT.NETAPPU.COM domain. Enter the name of the Windows [
[email protected]]: [This Windows is the domain that has privileges to (add) the storage system to the domain controller.] for
[email protected]: CIFS -Logged in as
[email protected]. The that you specified has permission to create the filer's machine in several (4) containers. Please choose where you would like this to be created. © 2008 NetApp. All rights reserved.
8
CLI CIFS SETUP: AD (CONT.) This Windows is a domain with privileges to (add) the storage system to the domain controller.
5-8
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: AD (Cont.) [The container list displays OUs (Organizational Units) in which you have permission to create computer s. The list reflects your Active Directory domain and may contain customized OUs.] (1) CN=computers NOTE: CN means Common Name. The storage system is ing as a member server.
(2) OU=Domain Controllers (3) OU=Additional_OU (4) OU=sub_Additional_OU,OU=Additional_OU (5) None of the above Selection (1-5)? [1]:
© 2008 NetApp. All rights reserved.
9
CLI CIFS SETUP: AD (CONT.) The container list displays Organizational Units (OUs) in which you have permission to create computer s. The list reflects your Active Directory domain structure and may contain customized OUs.
5-9
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: AD (Cont.) Windows 2000 completion continued Wed Jun 21 16:29:23 GMT [wafl.quota.sec.change:notice]: security style for /vol/vol0/ changed from unix to ntfs CIFS - Starting SMB protocol... It is highly recommended that you create the local (system\) for this filer. This allows access to CIFS from Windows when domain controllers are not accessible. Do you want to create the system\ ? [y]: Enter the new for system\: Retype the : © 2008 NetApp. All rights reserved.
10
CLI CIFS SETUP: AD (CONT.) The local has privileges to ister CIFS on the storage system even if the domain controller is down. The local can set up local s on the storage system with the add command.
5-10
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CLI cifs setup: AD (Cont.) Windows 2000 completion continued Currently, the “system\" and of the group “DEVELOPMENT\Domain s" have permission to ister CIFS on this filer. You may specify an additional or group to be added to the filer's "BUILTIN\s" group, thus giving them istrative privileges as well. Would you like to specify a or group that can ister CIFS? [n]: Wed Jun 21 16:30:18 GMT [nbt.nbns.registrationComplete:info]: NBT: All CIFS name registrations have completed for the local server. Welcome to the DEVELOPMENT.NETAPPU.COM (DEVELOPMENT) Active Directory(R) domain. CIFS local server is running.
© 2008 NetApp. All rights reserved.
CLI CIFS SETUP: AD (CONT.)
5-11
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
11
FilerView Setup
© 2008 NetApp. All rights reserved.
FILERVIEW SETUP
5-12
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
12
CIFS Setup Wizard
This description is available from the CLI: cifs comment
© 2008 NetApp. All rights reserved.
13
CIFS SETUP WIZARD To start the CIFS Setup Wizard, choose CIFS Configure Setup Wizard. The CIFS Setup Wizard helps you configure your storage system for CIFS access. You may run the wizard at any time to change the settings. CIFS is stopped and restarted upon completion of the wizard. In the CIFS Setup Wizard – Filer Name window, the name of the storage system appears. You can add a description of the storage system. This description is available from the CLI by typing cifs comment.
5-13
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS Setup Wizard (Cont.) Help (?)
Domain must have authority to the storage system to the domain.
© 2008 NetApp. All rights reserved.
14
CIFS SETUP WIZARD (CONT.) In the CIFS Setup Wizard – Authentication window, choose an authentication method. You can click ? for help. The Authentication help window shows the four choices for authentication methods: •
•
Workgroup •
UNIX Clear Text (Non-Windows workgroup)
•
NT Local (Windows workgroup)
Domain •
NT4 (Windows NT4 domain)
•
Windows 2000 (Windows Active Directory domain)
For workgroup authentication, enter the name of the workgroup. For NT domain authentication, a domain must have already created a machine for the storage system on the domain controller (Primary Domain Controller) before the storage system s the domain. Enter the NT4 domain name. The domain () added to the Windows 2000 domain must have the authority (privileges) to the storage system to the domain. Enter the Windows 2000 (Active Directory) domain name, name, and .
5-14
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS Setup Wizard (Cont.)
© 2008 NetApp. All rights reserved.
15
CIFS SETUP WIZARD (CONT.) In the CIFS Setup Wizard – Security Style window, choose the type of security style to be used as the default on the storage system. The choices are multiprotocol or NTFS-only. The default security style is NTFS-only if CIFS-only is licensed. If both CIFS and NFS are licensed, the default is multiprotocol. Note that changing the default security style does not change existing files and directories, but only the newly created files and directories.
5-15
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Results
© 2008 NetApp. All rights reserved.
RESULTS
5-16
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
16
Results Additional files created in domain environment: /etc/filersid.cfg – Contains the storage system SID
/etc/cifssec.cfg – Contains the Windows domain SID NOTE: These files are not readable; do not edit the files
© 2008 NetApp. All rights reserved.
17
RESULTS The /etc/filersid.cfg file is created in a domain environment and contains the storage system security identifier (SID). The /etc/cifssec.cfg file contains the Windows domain controller information. NOTE: These files are not readable; do not edit the files.
5-17
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
lclgroups.cfg Changes Domain s are added to lclgroups.cfg: system> rdfile /etc/lclgroups.cfg [ "Replicators" 552 ( "not ed" ) ] [ "Backup Operators" 551 ( " can by file security to backup files" ) ] [ "Power s" 547 ( " that can share directories" ) ] [ "Guests" 546 ("s granted Guest Access") ] [ "s" 545 ( "Ordinary s" ) ] [ "s" 544 ( " can fully ister the filer" ) ] Local
S-1-5-21-265246955-68147109-1151652928-500 S-1-5-21-3723512375-496415379-1150184651-512 Domain s Group
use cifs lookup to resolve SIDs © 2008 NetApp. All rights reserved.
LCLGROUPS.CFG CHANGES
5-18
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
18
Domain Specific Commands After configuring the storage system for a domain environment, do the following: Display your domain information: – cifs domaininfo
Test the storage system connection to the Windows domain controller: – When CIFS has been successfully started and is operational: cifs testdc
– When the CIFS subsystem is not running: cifs testdc [WINSsvrIPaddress]domainname [storage_sys_name] © 2008 NetApp. All rights reserved.
DOMAIN SPECIFIC COMMANDS
5-19
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
19
CLI: cifs domaininfo Command The following example is output from the cifs domaininfo command on a storage system in a domain system> cifs domaininfo NetBios Domain: DEVELOPMENT Windows 2000 Domain Name:development.netappu.com Type: Windows 2000 Filer AD Site: none
© 2008 NetApp. All rights reserved.
CLI: CIFS DOMAININFO COMMAND
5-20
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
20
CLI: cifs domaininfo Command (Cont.) Example output from the cifs domaininfo command (cont.): Current Connected DCs: \\WIN2K3 Total DC addresses found:2 Preferred Addresses: None Favored Addresses: None Other Addresses: 10.0.0.5 WIN2K2 PDC 10.0.0.6 PDC Connected AD LDAP Server:\\win2k3.netapp.com Preferred Addresses: None Favored Addresses: None Other Addresses: 10.0.0. win2k3.netapp.com 10.0.0.6 win2k3-2.netapp.com © 2008 NetApp. All rights reserved.
CLI: CIFS DOMAININFO COMMAND (CONT.)
5-21
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
21
CLI: cifs testdc Command The following example is output from the cifs testdc command on a storage system in a domain system> cifs testdc Using Established configuration Current Mode of NBT is B Mode Netbios scope "" ed names...
system system system GRUMPY GRUMPY GRUMPY HAPPY HAPPY HAPPY
< 0> < 3> <20> < 0> < 3> <20> < 0> < 3> <20>
Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast
© 2008 NetApp. All rights reserved.
CLI: CIFS TESTDC COMMAND
5-22
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
22
CLI: cifs testdc Command (Cont.) Output from the cifs testdc command (cont.): SNEEZY SNEEZY SNEEZY DEVELOPMENT
< 0> < 3> <20> < 0>
Broadcast Broadcast Broadcast Broadcast
Testing all Primary Domain Controllers found 1 unique addresses found PDC DEVDC01 at 10.254.134.2 Testing all Domain Controllers found 1 unique addresses found DC DEVDC01 at 10.254.134.2 © 2008 NetApp. All rights reserved.
CLI: CIFS TESTDC COMMAND (CONT.)
5-23
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
23
FilerView: CIFS Test Domain Controller
© 2008 NetApp. All rights reserved.
FILERVIEW®: CIFS TEST DOMAIN CONTROLLER
5-24
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
24
Preferred DCs
© 2008 NetApp. All rights reserved.
PREFERRED DCS
5-25
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
25
Preferred DCs Microsoft domain use a mechanism called “site awareness” to discover their closest domain controllers within the domain Storage system s can override this default mechanism by setting preferences for other domain controllers – options cifs.site_awareness.enable off – cifs prefdc
© 2008 NetApp. All rights reserved.
26
PREFERRED DCS Site awareness, also called site discovery, is the process of automatically discovering the preferred domain controller. By default, a storage system is configured with cifs.site_awareness.enable set to on. A storage can override this default mechanism by setting the cifs.site_awareness.enable option to off and setting the preferred domain controllers using the cifs prefdc command.
5-26
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Configuring prefdc List The cifs prefdc command configures and displays CIFS preferred domain controller information To display the preferred domain controller list: cifs prefdc print [domain]
To add a preferred domain controller list: cifs prefdc add domain address [address…]
To delete a preferred domain controller list: cifs prefdc delete domain
system> cifs prefdc print No preferred domain controllers configured.Domain controllers will be automatically discovered.
© 2008 NetApp. All rights reserved.
27
CONFIGURING PREFDC LIST The cifs prefdc command can be used to configure or display CIFS preferred domain controller information. To display the preferred domain controller list: •
cifs prefdc print [domain]
To add a preferred domain controller list: •
cifs prefdc add domain address [address]
To delete a preferred domain controller list: •
cifs prefdc delete domain
In the following example, there are no preferred domain controllers configured and domain controllers will be automatically discovered. system> cifs prefdc print No preferred Domain Controllers configured. DCs will be automatically discovered.
5-27
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
DC Ping Ordering Best! Specified by the
Preferred
Determined by DC Ping Ordering
Favored
Other Worst!
© 2008 NetApp. All rights reserved.
28
DC PING ORDERING Most Windows server environments have multiple domain controllers. A NetApp® storage system s domain controller in the following order: •
Preferred: Any domain controller(s) configured as preferred with the cifs prefdc command.
•
Favored: Any domain controller(s), which is determined by site awareness rules to be readily accessible.
•
Other: Any other domain controller(s) that is reachable.
NOTE: A DC ping occurs every time the CIFS server starts, every time cifs prefdc is executed, and every four hours.
5-28
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Domain s
© 2008 NetApp. All rights reserved.
DOMAIN S
5-29
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
29
Domain Domain is: Created in a domain Authenticated by the domain Created with the Active Directory s and Computers tool
© 2008 NetApp. All rights reserved.
30
DOMAIN A domain is a nonlocal that belongs to a Windows domain and is authenticated by the domain. This type of can also be placed into storage system groups that grant it capabilities on the storage system. On the Windows workstation, you can create a domain with the Active Directory s and Computers tool. The Windows Active Directory s and Computers tool allows you to manage s, groups, organizational units, and all other Active Directory objects. You can ister and publish information in the directory. The following example demonstrates how to add a domain named Jane Doe. To create a domain with the Active Directory s and Computers Tool, perform the following steps: 1. To open the tool from your Windows workstation, go to StartProgramsistrative ToolsActive Directory s and Computers.
5-30
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Creating a Domain
Right-click the s folder.
© 2008 NetApp. All rights reserved.
31
CREATING A DOMAIN 2. To add a new domain , right-click the s folder and choose New .
5-31
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Creating a Domain (Cont.)
© 2008 NetApp. All rights reserved.
32
CREATING A DOMAIN (CONT.) 3. In the New Object – window, type the name of the in the First name, Last name, and Full name text boxes. 4. In this example, _jdoe (for Jane Doe) is typed in the First name text box and repeated in the Full name text box. 5. In the logon name text box, type the logon of _jdoe to add the domain Jane Doe. Click the Next button. 6. In the window, type the for Jane Doe and confirm the . 7. Mark the never expires check box for this example. 8. Click the Next button. 9. Click the Finish button to complete adding _jdoe to the domain.
5-32
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Creating a Domain (Cont.)
© 2008 NetApp. All rights reserved.
CREATING A DOMAIN (CONT.)
5-33
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
33
Local Authentication When the storage system is using CIFS Domain authentication: Local authentication is still possible Additional MMC functionality is available – s: Displays a current list of local s only Cannot create, delete, or view properties of local s Cannot ister s
– Groups: Can display, create, and delete a group, and add or delete s in the group Cannot add or modify roles (and hence, capabilities) for the group
© 2008 NetApp. All rights reserved.
LOCAL AUTHENTICATION
5-34
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
34
Adding Domain s to Groups Assign a Windows domain to a custom or predefined local group CLI: domain subcommand Computer Management (MMC) domain add win__name -g {custom_group|s|"Backup Operators"|Guests|"Power s"|s}
© 2008 NetApp. All rights reserved.
ADDING DOMAIN S TO GROUPS
5-35
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
35
MMC: Groups
Right-click Groups folder.
Type the Group Name.
Click the Add button to add .
Choose New Group….
© 2008 NetApp. All rights reserved.
36
MMC: GROUPS As an example, from the Windows Computer Management GUI, in the Groups folder, add a new group Helpers2 and add local Jane to the group by performing the following steps: 1. Go to System ToolsLocal s and GroupsGroups. 2. Right-click the Groups folder and choose New Group. 3. In the New Group window, in the Group name text box, type the group name Helpers2. 4. Click the Add button to add to the new group.
5-36
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Groups (Cont.)
Click the Create button, and then click the Close button.
Type the local Jane, and to use the storage_sys_name\_name format.
© 2008 NetApp. All rights reserved.
37
MMC: GROUPS (CONT.)
5. In the Select s window, use the format of storage_sys_name\_name and type the local DEVSLU10-F1\jane. 6. Click the OK button. The New Group window is displayed, showing the local Jane as a member. 7. In the New Group window, click the Create button and then click the Close button.
5-37
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
MMC: Groups (Cont.)
Note that the new group Helpers2 has been added.
© 2008 NetApp. All rights reserved.
38
MMC: GROUPS (CONT.) (The following continues the adding of a new local group.) 8. Note that in the Computer Management GUI, the new group Helpers2 has been added.
5-38
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
5-39
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
39
Module Summary In this module, you should have learned to:
Create and manage local s for a storage system Identify how to create a local group and make a local a member of that group Use the CLI, FilerView®, or Microsoft tools to add, delete, and modify access permissions of shares Use Microsoft tools to add, delete, and modify access permissions of files and folders Determine and mappings for CIFS s accessing NTFS and UNIX volumes/qtrees
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
5-40
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
40
Exercise Module 5: Domains Estimated Time: 60 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
5-41
CIFS istration on Data ONTAP 7.3: M05_Domains
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Advanced istration
NetApp University - Do not distribute or duplicate
MODULE 6: ADVANCED ISTRATION
Advanced istration CIFS istration on Data ONTAP 7.3
ADVANCED ISTRATION
6-1
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you should be able to: Configure event auditing Set up Auto Home Shares for your -base Configure Group Policy Objects (GPOs) Manage CIFS opportunistic locks (oplocks) Set up virus scanning Increase security by configuring caching, SMB g, and the minimum security level
© 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
6-2
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Event Auditing
© 2008 NetApp. All rights reserved.
EVENT AUDITING
6-3
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Auditing CIFS Events Enable auditing of: – Logon and logoff events – File access events NTFS volumes/qtrees MIXED volumes/qtrees UNIX volumes/qtrees – cifs.audit.nfs.enable on
Audit records are recorded in an internal format and then are saved off into an external format for viewing
© 2008 NetApp. All rights reserved.
4
AUDITING CIFS EVENTS You can enable auditing for the following categories of events:
• •
Logon and logoff events File access events
These are the prerequisites for auditing file access events:
• •
The file or directory can be audited in a mixed or NTFS volume, or qtree.
•
You must activate auditing for individual files and directories according to your Windows documentation.
If the cifs.audit.nfs.enable option is on, you can audit events for files in UNIX securitystyle qtrees.
For more information about configuring NFS auditing, please see technical report #3595 at http://www.netapp.com/library/tr/3595.pdf.
6-4
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Configuring Auditing To set up CIFS auditing: 1. 2. 3. 4. 5.
Determine what you are going to audit Configure any System ACLs (SACLs) needed Set options for CIFS auditing and turn it on Save off audit record into .evt file Use Microsoft Event Viewer to access the audit record
When you configure Data ONTAP for CIFS auditing, the event log file and settings for all options persist across a reboot or if CIFS is terminated or restarted. © 2008 NetApp. All rights reserved.
CONFIGURING AUDITING
6-5
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
5
Determining What to Audit
To enable auditing for file access events: options cifs.audit.file_access_events.enable on
To enable auditing for logon and logoff events: options cifs.audit.logon_events.enable on
© 2008 NetApp. All rights reserved.
6
DETERMINING WHAT TO AUDIT To enable auditing specifically for file access events: options cifs.audit.file_access_events.enable on The auditing of file access events is turned on by default and requires that the cifs.audit.enable option is on. To enable auditing specifically for logon and logoff events: options cifs.audit.logon_events.enable on The auditing of logon and logoff events is turned on by default and requires that the cifs.audit.enable option is on. NOTE: Auditing settings applies to the entire storage system, not just an individual share or volume.
6-6
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Setting an SACL for Event Logging If you desire file access events auditing, you must set a SACL on a file and specify the groups/s/events to monitor. To set a SACL – For a volume or qtree: Use Storage-Level Access Guard security
– For individual files and directories: Use the Windows Properties/Security tab to set the ACL – Security tab >Advanced > Auditing
Use Storage-Level Access Guard security © 2008 NetApp. All rights reserved.
7
SETTING AN ACL FOR EVENT LOGGING System access control lists (SACLs) can be used to enable auditing access on files and directories. There are three ways to set SACLs for auditing access: If you want to audit access events on all files and directories within a volume or qtree, it is recommended that you set SACLs by applying Storage-Level Access Guard security. For more information about Storage-Level Access Guard, see the Data ONTAP® 7.3 Fundamentals, course. If you want to audit access events on individual files and directories, you can set SACLs in two ways:
• •
Using your Windows Explorer GUI Using Storage-Level Access Guard security
NOTE: Make sure that you select only the events you need to audit, as because selecting too many audit options might impact system performance.
6-7
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Auditing Configuration Set the location of the saved log file – options cifs.audit.saveas <path>
Set the log file size – options cifs.audit.logsize
To enable CIFS auditing on the storage system: – options cifs.audit.enable on – The default is CIFS auditing disabled (off)
© 2008 NetApp. All rights reserved.
AUDITING CONFIGURATION
6-8
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
8
Saving the Audit Record The audit record is recorded in an internal format.
– /etc/log/auditlog.alf – Can wrap, resulting in event loss, if not written to external file
The audit record can be saved to an external file 2 ways: – Manually cifs audit save [-f]
– Automatically, on the occurrence of File size threshold
– cifs.audit.autosave.onsize.enable – cifs.audit.autosave.onsize.threshold
Time interval
– cifs.audit.autosave.ontime.enable – cifs.audit.autosave.ontime.threshold
File size threshold and time interval © 2008 NetApp. All rights reserved.
SAVING THE AUDIT RECORD
6-9
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
9
Options for Autosaving The saved files are automatically named. Each time the internal log file is saved, an extension is added to the base name of the .evt file. – Counter options cifs.audit.autosave.file.extension counter – Example: If the base file name is evtlog, when an automatic save occurs, the newest evtlog.evt is renamed to evtlog1.evt, the former evtlog1.evt is then renamed to evtlog2.evt, and so on. – Timestamp options cifs.audit.autosave.file.extension timestamp – basename.YYYYMMDDHHMMSS.evt © 2008 NetApp. All rights reserved.
OPTIONS FOR AUTOSAVING
6-10
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
10
Options for Autosaving (Cont.) This option limits the number of files automatically saved. The can specify how many files can be saved by the autosave feature; when saved, event files are much larger than the internal .alf files. To specify the maximum number of .evt files that can be automatically stored (1 to 999): options cifs.audit.autosave.limit value options cifs.audit.autosave.limit 20
© 2008 NetApp. All rights reserved.
OPTIONS FOR AUTOSAVING (CONT.)
6-11
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
11
View the External Audit File From a Windows client, you can view audit events with Microsoft Event Viewer with the following displays: Real-time display using Live View (Windows 2000 or later) – options cifs.audit.liveview.enable
Static display of the event log file
© 2008 NetApp. All rights reserved.
12
VIEW THE EXTERNAL AUDIT FILE To view the external audit file:
•
To enable or disable Live View on your storage system, set options cifs.audit.liveview.enable on | off.
•
From a Windows client, start the Event Viewer from istrative Tools or from MMC.
•
From the Action menu, select Connect to Another Computer. Enter the name of the storage system you want to audit and click OK.
•
On the left side of the application, select the Security entry.
•
The right side of the application is populated with the latest audit events captured on the storage system (up to 5,000 events).
6-12
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Auto Home Shares
© 2008 NetApp. All rights reserved.
AUTO HOME SHARES
6-13
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
13
Auto Home Shares Auto Home Shares – Match s by “name” and provide a home directory share automatically – Save s from manually creating home shares for their s When logs in, ’s “name” is matched to a home directory path and share becomes available – Each can connect to the ’s home directory only, not to the home directories of other s. – Exception: BUILTIN\s group can access others shares by setting options cifs.homedirs_public_for_ on
© 2008 NetApp. All rights reserved.
14
AUTO HOME SHARES You can create home directories on the storage system and configure Data ONTAP to automatically offer each a home directory share. Each can connect to the ’s home directory only, not to the home directories of other s. The cifs share command does not display the home directories. To specify the naming style used for matching home directories to s:
•
options cifs.home_dir_namestyle {ntname | hidden | domain | mapped | “”}
To specify whether of the storage system BUILTIN\s group can connect to the CIFS home directories of other s:
•
options cifs.homedirs_public_for_ on
When you create a ’s folder for the ’s home directory, Data ONTAP automatically searches the paths in the cifs_homedir.cfg file for the name that matches the logon name, and dynamically creates the share for that .
6-14
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Creating Auto Home Shares To set up an auto home share: 1. Configure the parent location of the s’ home directories 2. Specify the naming style of the home directories 3. Create individual directories in a home directory path 4. Access the auto home share NOTE: The cifs share command does not display the home directories. © 2008 NetApp. All rights reserved.
CREATING AUTO HOME SHARES
6-15
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
15
Creating Home Directories Create a parent directory or qtree for the s’ home directories – Example: /vol/vol1/mktghome
Specify the parent home directory paths by editing the /etc/cifs_homedir.cfg file – Changes to this file are processed automatically whenever CIFS starts. – You can also process changes immediately to this file by using the cifs homedir load command. – The cifs homedir command displays the current list of home directory paths. © 2008 NetApp. All rights reserved.
16
CREATING HOME DIRECTORIES The /etc/cifs_homedir.cfg configuration file contains the configured home directory paths for s that access the storage system using the CIFS network protocol. For changes to take effect after editing the file, you must run the cifs homedir load command.
6-16
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
DEVSLU10-F1> rdfile /etc/cifs_homedir.cfg # This file contains the path(s) used by the filer to # determine if a CIFS has a home directory. See # the System 's Guide # for a full description of this file and a full # description of the CIFS homedir feature. # There is a limit to the number of paths that may be # specified. # Currently that limit is 1000. # Paths must be entered one per line. After editing this file, use the console command "cifs homedir load" to make the storage system process the entries in this file. # Note that the "#" character is valid in a CIFS # directory name. Therefore the "#" character is only # treated as a comment in this file if it is in the # first column. # Two example path entries are given below. # /vol/vol0/s1 # /vol/vol1/s2 # Actual path entries follow this line /vol/Vol/s 6-17
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Specify Naming Style Naming Style – Determines how Data ONTAP will attempt to match the to the directory
To specify the naming style used for matching home directories to s: – options cifs.home_dir_namestyle {ntname | hidden | domain | mapped | “”}
ntname or “” = \\toaster\jdoe hidden = \\toaster\jdoe$ domain = \\toaster\~marketing~jdoe mapped = \\toaster\~jdoe
© 2008 NetApp. All rights reserved.
18
SPECIFY NAMING STYLE The cifs homedir command displays the current list of home directory paths. The options cifs.home_dir_namestyle command enables you to specify the naming style used for matching home directories to s.
•
Use ntname if the home directories have the same names as the Windows names.
•
Use hidden if you want to use a Windows name with a dollar sign ($) appended to it to initiate a search for a home directory with the same name as the Windows name.
•
Use domain if you want to use the domain name in addition to the Windows name to search for the home directory.
•
Use mapped if the home directories have the UNIX names as specified in the map.cfg file.
•
Use “” if you do not want to specify a namestyle and want Data ONTAP to match home directories to s the same way it did before Data ONTAP 6.0.
NOTE: By default, the cifs.home_dir_namestyle option is “”.
6-18
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Create s’ Directories If the namestyle is set to ntname, hidden, mapped or “”, create s’ directories under the home directory path – Example: /vol/vol1/mktghome/jdoe
If the namestyle is set to domain, create a domain directory under the home directory path before the directory – Example: /vol/vol1/mktghome/marketing/jdoe
© 2008 NetApp. All rights reserved.
CREATE S’ DIRECTORIES
6-19
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
17
Access the Home Directory as the Access the home share by – Run dialog box from the Start menu – Map a drive to the share NOTE: A may have s in two domains – If jdoe is logged in as engineering/jdoe, jdoe sees only the engineering home directory – To access the marketing domain’s home share, use net use * \\toaster\jdoe /:marketing\jdoe
© 2008 NetApp. All rights reserved.
ACCESS THE HOME DIRECTORY
6-20
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
20
Group Policy Objects
© 2008 NetApp. All rights reserved.
GROUP POLICY OBJECTS
6-21
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
21
Group Policy Objects Group Policy Objects (GPOs) are a set of rules that apply to computers in an Active Directory environment. – While not all GPOs are applicable to your storage system, the storage system recognizes and processes relevant GPOs.
When CIFS and GPOs are enabled on your storage system, Data ONTAP sends LDAP queries to the Active Directory server and requests GPO information. – If the GPO definitions are applicable to the storage system, the Active Directory server returns the GPO information. © 2008 NetApp. All rights reserved.
GROUP POLICY OBJECTS
6-22
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
22
Relevant GPOs The following GPOs are currently ed on your storage system: Startup and shutdown scripts Group Policy refresh interval for computers File System security policy Restricted Groups security policy Event Log Auditing
© 2008 NetApp. All rights reserved.
RELEVANT GPOS
6-23
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
23
Example of Using GPOs GPO File System security settings can be applied directly to Data ONTAP file system objects (directories or files). The settings are propagated down the directory hierarchy. The File System security settings can be applied to mixed or NTFS volumes or qtrees only. – Cannot be applied UNIX security style
The File System security ACL propagation is limited to about 280 levels of directory hierarchy. © 2008 NetApp. All rights reserved.
EXAMPLE OF USING GPOS
6-24
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
24
Configuring GPOs To use GPOs on your storage system: CIFS is licensed and enabled on the storage system. CIFS is configured using cifs setup, and the storage system s a Windows 2000 (or later) domain environment. GPOs are configured on a Windows Active Directory server by associating a GPO to an Organizational Unit (OU), and then placing the storage system within that OU. GPO is enabled on the storage system with options cifs.gpo.enable on. – When is enabled the first time, the /etc/ad directory is created as an information repository. © 2008 NetApp. All rights reserved.
CONFIGURING GPOS
6-25
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
25
CLI GPO Commands cifs gpresult – Displays GPOs currently in effect for the storage system and the results of those GPOs
cifs gpupdate – Updates GPOs on the storage system immediately with the most current Group Policy settings available in the Active Directory domain
© 2008 NetApp. All rights reserved.
CLI GPO COMMANDS
6-26
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
26
GPO: Mapping Home Folders A “” GPO in Active Directory can be configured to automatically map the ’s auto home share. The basic steps are: 1. 2. 3. 4.
Create an OU Create the GPO within the OU Create a script and associate it with the GPO Test the configuration
© 2008 NetApp. All rights reserved.
27
GPO: MAPPING HOME FOLDERS The corresponding labs provide detailed instructions on how to create a GPO to automatically map the ’s auto home share to a network drive. The next several slides are only intended for high-level discussion.
6-27
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
GPO: Mapping Home Folders (Cont.) Create an OU
This has been added to the OU.
This is the new OU.
© 2008 NetApp. All rights reserved.
GPO: MAPPING HOME FOLDERS (CONT.)
6-28
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
28
GPO: Mapping Home Folders (Cont.) Create the GPO within the OU
Right-click
Select
© 2008 NetApp. All rights reserved.
29
GPO: MAPPING HOME FOLDERS (CONT.) Right-click _Logon_GPO and select the Properties tab, then select the Create and Link a GPO Here… option. In this example, the _Homespace_Mapping GPO has already been created. To edit an existing GPO, right-click the GPO and select Edit to open the Group Policy Object Editor.
6-29
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
GPO: Mapping Home Folders (Cont.) Create a script and associate it with the GPO
Right-click
© 2008 NetApp. All rights reserved.
GPO: MAPPING HOME FOLDERS (CONT.)
6-30
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
30
GPO: Mapping Home Folders (Cont.) Create the script: – net use m: \\<storagesystem>\%name% – NOTE: This assumes ntname or “” namestyle
Place the script in the GPO logon scripts default location. – C:\Windows\SYSVOL\<domain>\policies\<SID>\ \scripts\logon
Test the configuration. – as a and there should be an auto home share mapped to the “m” drive.
© 2008 NetApp. All rights reserved.
GPO: MAPPING HOME FOLDERS (CONT.)
6-31
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
31
Oplocks
© 2008 NetApp. All rights reserved.
OPLOCKS
6-32
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
32
CIFS Oplocks CIFS opportunistic locks (oplocks) enable the redirector on a CIFS client in certain filesharing scenarios to perform client-side caching of read-ahead, write-behind, and lock information. – A client can then work with a file (read or write it) without regularly reminding the server that it needs access to the file in question. – This improves performance by reducing network traffic.
CIFS oplocks on the storage system are on by default. © 2008 NetApp. All rights reserved.
CIFS OPLOCKS
6-33
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
33
CIFS Oplocks (Cont.) To set the CIFS protocol oplock setting: – options cifs.oplocks.enable [on|off]
Setting the cifs.oplocks.enable option: – OFF Disables oplocks on the storage system regardless of the volumes’ or qtrees’ setting
– ON Enables oplocks on the storage system if enabled on the volume or qtree
© 2008 NetApp. All rights reserved.
CIFS OPLOCKS (CONT.)
6-34
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
34
CIFS Oplocks (Cont.) You might turn oplocks off for one of the following reasons: – You are using a database application with documentation that recommends oplocks be turned off. – The CIFS clients are on an unreliable network. – You are handling critical data, and you cannot afford even the slightest data loss.
Otherwise, leave CIFS oplocks on. To change CIFS oplocks use: – qtree oplocks [path] {enable|disable} © 2008 NetApp. All rights reserved.
CIFS OPLOCKS (CONT.)
6-35
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
35
Virus Scanning
© 2008 NetApp. All rights reserved.
VIRUS SCANNING
6-36
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
36
CIFS Virus Protection CIFS virus protection: Provides on-access virus scanning of files on a storage system Requires a virus-scanning Windows server running compliant antivirus applications May require a file to be scanned before a CIFS client can open it
© 2008 NetApp. All rights reserved.
37
CIFS VIRUS PROTECTION CIFS virus protection is a Data ONTAP feature that enables a virus-scanning Windows server running compliant antivirus applications to provide on-access virus scanning of files on a storage system. On-access virus scanning means that a file is scanned before a CIFS client is allowed to open it.
6-37
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
CIFS Virus Scanning The following steps describe how virus scanning works: 1. The scanner (Windows server) s with the storage system, so no storage system configuration is required. 2. At the storage system prompt, type the vscan on command to enable scanning. 3. The scanner waits for requests to come from the storage system. – –
Several scanners can with the storage system. This is recommended for performance and reliability. A single scanner can scan multiple storage systems.
4. The scanner pings the storage system from time to time to detect and recover from reboots and takeovers. © 2008 NetApp. All rights reserved.
CIFS VIRUS SCANNING
6-38
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
38
Virus-Scanning Process 1. Client requests a file 2. Storage system requests scanner to scan file 3. Scanner returns a go or no-go reply – If file is go, the storage system allows access. – If file is no-go, storage system denies access. Storage System
Scanner
Ethernet
Client © 2008 NetApp. All rights reserved.
VIRUS-SCANNING PROCESS
6-39
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
39
vscan Commands vscan help
List of virus-scanning commands
vscan extensions
Specify files to check or ignore for viruses
vscan off
Disable virus scanning
vscan on
Enable virus scanning
vscan options
Set timeout value, mandatory scan, and Client MsgBox
vscan reset
Reset cache of already-scanned files
vscan scanners
Manage scanning clients
© 2008 NetApp. All rights reserved.
VSCAN COMMANDS
6-40
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
40
Client MsgBox There are three “styles” of MsgBox: “Attempt to scan modified file failed.” – Your machine is probably the source of the virus.
“Attempt to scan file failed.” – Your Windows workstation is probably innocent, but it has attempted to open an infected file.
“Could not scan file and storage system is configured to deny access.” – vscan “mandatory_scan” is set, and no scanners are available to scan files. © 2008 NetApp. All rights reserved.
CLIENT MSGBOX
6-41
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
41
Secondary Scanners Actual virus scanning is done by an attached antivirus scanner, running on a Windows server. All scanners are primary scanners unless explicitly made a secondary. The secondary scanner’s main purpose is to act as a hot standby in case the primary goes down. Storage system will not use the secondary scanner unless there are no primary scanners available. To turn on secondary scanners: – system> vscan scanners secondary_scanners IP1[,IP2…] – system> vscan scanners secondary_scanners 10.1.2.3,10.2.3.4 © 2008 NetApp. All rights reserved.
SECONDARY SCANNERS
6-42
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
42
Setting Up Virus Scanning Turn on vscan – vscan on
Set vscan extension – vscan extensions include – vscan extensions exclude
Set vscan options – vscan options timeout [seconds] – vscan mandatory_scan [on | off] – vscan client_msgbox [on | off]
Set up secondary scanners – vscan scanners secondary_scanners [IP,…] © 2008 NetApp. All rights reserved.
43
SETTING UP VIRUS SCANNING NOTE: Primary scanners “attach” to the storage system automatically and will appear in the list of available scanners by using the vscan scanners command. s may designate primary scanners as secondary or designate a secondary back to a primary scanner.
6-43
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
vscan Options for CIFS Shares cifs shares -add <sharename> <path> – [novscan] – [novscanread] – Example: cifs shares –add engineering /vol/vol0 –novscan
cifs shares –change <sharename> <path> – [novscanread|vscanread] – [vscan|novscan] – Example: cifs shares –change engineering /vol/vol0 -novscanread © 2008 NetApp. All rights reserved.
VSCAN OPTIONS FOR CIFS SHARES
6-44
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
44
File Scanning File Policies (FPolicy) – Allows s to create file policies that specify file operation permissions according to file type – Example: Restrict .jpg and .mpg files from being stored on a storage system
FPolicy is enabled two ways: – Using third-party file screening software Can be located at www.netapp.com/partners
– Using native file blocking
© 2008 NetApp. All rights reserved.
45
FILE SCANNING You use file screening to specify files or directories with restrictions to be placed on them. Upon receiving a file operation request (such as open, write, create, or rename), Data ONTAP checks its file screening policies before permitting the operation. A file screening policy determines how the storage system handles requests from individual client systems for operations such as open, rename, create, and delete.
6-45
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Triggering Operations Operations that can trigger a file policy:
create open write rename delete close create_dir
getattr link lookup read rename_dir setattr symlink
© 2008 NetApp. All rights reserved.
TRIGGERING OPERATIONS
6-46
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
46
Third-Party File-Screening Process 1. Client requests a file. 2. Storage system consults the screen server. 3. Screen server responds as follows: – If file is OK, storage system allows access. – If a file is denied, storage system denies access. File Screen Server Storage System
Ethernet
Possible operations controlled by file screening are creation of a new file, opening an existing file, and renaming a file. Client © 2008 NetApp. All rights reserved.
THIRD-PARTY FILE-SCREENING PROCESS
6-47
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
47
Configuring FPolicy To enable FPolicy: Turn the feature on – options fpolicy.enable on
Create a file policy – fpolicy create
screen Screen is the only ed policy type
Add/remove extensions and options to the file policy Set up a file policy monitor Enable the file policy – fpolicy enable
© 2008 NetApp. All rights reserved.
CONFIGURING FPOLICY
6-48
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
48
Blocking MP3s Example To block MP3s on a storage system: – fpolicy create mp3blocker screen Creates the FPolicy
– fpolicy ext inc set mp3blocker mp3 Adds the extension mp3 to the FPolicy
– fpolicy options mp3blocker required on Requires FPolicy to be implemented
– fpolicy monitor set mp3blocker -p cifs,nfs create,rename Assigns FPolicy to create and rename operation over CIFS and NFS traffic
– fpolicy enable mp3blocker -f Turns it on
© 2008 NetApp. All rights reserved.
49
BLOCKING MP3S EXAMPLE This is intended as a high-level discussion. The corresponding labs have detailed instructions on how to implement this example.
6-49
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Security
© 2008 NetApp. All rights reserved.
SECURITY
6-50
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
50
Security Security is always a concern. NetApp® provides several mechanisms to increase security within the CIFS protocol: – Disable share caching – Enable SMB g – Set minimum security level
© 2008 NetApp. All rights reserved.
SECURITY
6-51
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
51
Share Caching s can configure caching by using a share property: – Enable manual caching (default) cifs shares -change sharename -manual_caching
– Enable automatic caching of documents cifs shares -change sharename -auto_document_caching
– Enable automatic caching of programs cifs shares -change sharename -auto_program_caching
To increase security: – Disable caching cifs shares -change sharename -nocaching © 2008 NetApp. All rights reserved.
52
SHARE CACHING Client-side caching enables Windows clients to cache files on a share so that the files are available for offline use. Client-side caching can be specified from the storage system or from a Windows 2000, XP, 2003, Vista, or 2008 client. A shared folder caching policy can be set to the following options:
OPTION
DESCRIPTION
no_caching
Disallow Windows clients from caching any files on this share.
manual_caching
Allow s on Windows clients to manually select files to be cached.
auto_document_caching
Allow Windows clients to cache documents on this share. The actual caching behavior depends upon the Windows client.
auto_program_caching
Allow Windows clients to cache programs on this share. The actual caching behavior depends upon the Windows client.
Manual caching is enabled by default for new shares.
6-52
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
SMB g SMB g helps to ensure secure network traffic between clients and storage system. If enabled, the storage system will sign if client requires it. Client SMB policies are set through Security Settings using MMC. The two SMB policies are: – Microsoft Network client: Digitally sign communications (if server agrees) – Microsoft Network client: Digitally sign communications (always) © 2008 NetApp. All rights reserved.
53
SMB G Data ONTAP s Server Message Block (SMB) g when requested by the client. SMB g helps to ensure that network traffic between the storage system and the client has not been compromised by preventing replay attacks (also known as “man in the middle” attacks). When SMB g is enabled on the storage system, it is the equivalent of the Microsoft Network server policy, "Digitally sign communications (if client agrees)." It is not possible to configure the storage system to require SMB g communications from all clients, which is the equivalent of the Microsoft Network server policy, "Digitally sign communications (always)." SMB g is disabled by default on the storage system for performance reasons. A client SMB g policy is set through Security Settings using a Microsoft Management Console (MMC). The two SMB g policies are:
•
Microsoft Network client: Digitally sign communications (if server agrees). This setting controls whether or not the client’s SMB g capability is enabled. It is enabled by default. When this setting is disabled on the client, the client communicates normally with the storage system without SMB g, regardless of the SMB g setting on the storage system.
•
If SMB g is enabled on the storage system, all communications between client and storage system use SMB g.
•
If SMB g is not enabled on the storage system, communications proceed normally without SMB g.
6-53
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Microsoft Network client: Digitally sign communications (always). This setting controls whether the client requires SMB g to communicate with a server. It is disabled by default. When this setting is disabled on the client, SMB g behavior is based on the policy setting for “Digitally sign communications (if server agrees)” and the setting on the storage system.
•
If SMB g is enabled on the storage system, all communications between client and storage system use SMB g.
•
If SMB g is not enabled on the storage system, the client rejects communication with it.
NOTE: If your environment includes Windows clients configured to require SMB g, you must enable SMB g on the storage system. If you do not, the storage system cannot serve data to these systems.
6-54
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
SMB g Configuration Configuring SMB g – options cifs.g.enable [on|off] – Off by default NOTE: Enabling SMB g will significantly impact performance.
Most Windows clients will negotiate SMB g by default if enabled on the server.
© 2008 NetApp. All rights reserved.
SMB G CONFIGURATION
6-55
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
55
Minimum Security Level s can require a certain level to be negotiated between client and a storage system. – options cifs.LMCompatibilityLevel – This option takes values from 1-5: 1. LM, NTLM, NTLMv2 session security, NTLMv2, Kerberos (Default) 2. NTLM, NTLMv2 session security, NTLMv2, Kerberos 3. NTLMv2 session security, NTLMv2, Kerberos 4. NTLMv2, Kerberos 5. Kerberos only
Clients not willing to communicate at the required level are denied.
© 2008 NetApp. All rights reserved.
56
MINIMUM SECURITY LEVEL Windows servers can set policies to define the minimum level of security that they when clients connect. Data ONTAP s can configure the storage system to deny requests from clients that are attempting to use a security level lower than the defined minimum. Data ONTAP 7.3 provides an option that sets the minimum security level similar to the way Microsoft’s registry variable provides this setting: 1 - Accepts LM, NTLM, NTLMv2 session security, NTLMv2, Kerberos. 2 - Accepts NTLM, NTLMv2 session security, NTLMv2, Kerberos. 3 - Accepts NTLMv2 session security, NTLMv2, Kerberos. 4 - Accepts NTLMv2, Kerberos. 5 - Accepts Kerberos only.
When Data ONTAP is processing an NTLM authentication token or a Kerberos ticket from a client, the value of this option will determine if the client request will be allowed or denied. When option cifs.LMCompatibilityLevel is enabled, the following EMS message will be displayed when Data ONTAP rejects an authentication request: rejected
This type of LM/NTLM response is not accepted with current value of\ cifs.LMCompatibilityLevel.
6-56
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
6-57
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
57
Module Summary In this module, you should have learned: Logon/Logoff and file access events may be audited on a storage system Auto home shares allows s to set up home directories without creating individual shares Group Policy Objects allows highly configurable policies with an Active Directory domain Oplocks provide a write-behind, read-ahead mechanism that is usually suitable for most environments Virus scanning allows management of undesirable filesIncrease security by disabling caching, turn on SMB g and set a minimum level of security © 2008 NetApp. All rights reserved.
MODULE SUMMARY
6-58
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
58
Exercise Module 6: Advanced istration Estimate Time: 90 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
6-59
CIFS istration on Data ONTAP 7.3: M06_Advanced
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Performance
NetApp University - Do not distribute or duplicate
MODULE 7: PERFORMANCE
Performance CIFS istration on Data ONTAP 7.3
PERFORMANCE
7-1
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you should be able to: Describe the importance of performance management Capture performance statistics with Data ONTAP commands and other tools Identify factors that affect CIFS performance Identify steps to analyze performance and to resolve performance problems
© 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
7-2
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
Factors
© 2008 NetApp. All rights reserved.
FACTORS
7-3
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
Performance Management What is performance management? Three broad functional categories: monitoring, controlling, and capacity planning – Monitoring tracks activities on the network – Controlling enables performance management to make adjustments to improve network performance – Capacity planning ensures a healthy network that can grow to meet future needs
© 2008 NetApp. All rights reserved.
4
PERFORMANCE MANAGEMENT As storage networks become more complex, the role of the system becomes more challenging. Performance management enables the to proactively identify problem areas before they occur. Performance data can be used to baseline, plan, and determine how critical resources of the system will be utilized. The system resources include memory, central processing unit, disk, network bandwidth, and so on. Performance management includes the monitoring and controlling of system resources so that the system and network can perform at peak efficiency. With performance monitoring, you keep track of system and network traffic based on predetermined settings (baseline). You can monitor events, analyze them, and set thresholds. Storage capacity planning tools assist s in planning ahead for migration of data or acquisition of new storage hardware.
7-4
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Steps in Resolving Performance Problems 1. Identify perceived performance problem 2. Gather data to prove or disprove the existence of the problem 3. If the problem exists, identify and implement configurations that might resolve the issue 4. Test to validate performance with new configurations 5. Repeat as necessary
© 2008 NetApp. All rights reserved.
5
STEPS IN RESOLVING PERFORMANCE PROBLEMS Before analyzing performance data, collect the data based on predefined metrics. Depending on the baseline of your data, set thresholds. Thresholds are limits beyond which error or warning messages are reported to the system . Performance monitoring involves knowing what is expected based on the requirements. It includes identifying the desired metric, checking what is actually in place by collecting current network-device and link-utilization data, analyzing the relevant data, and finally, based on the differential, conducting the necessary workload analysis in accordance with capacity planning documentation created earlier.
7-5
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Factors Affecting CIFS Performance Network Bandwidth, Latency, and Reliability
Multiple Us Memory System Bus
NICs
NVRAM
Disk Controllers
Disk Drives
U Memory Network Network interface System bus Non-volatile random access memory (NVRAM) I/O devices
– Disk controllers – Disks
© 2008 NetApp. All rights reserved.
6
FACTORS AFFECTING CIFS PERFORMANCE The following factors affect the performance of your Network File System (NFS) environment: SYSTEM U
The U speed directly affects the rate at which the system can process NFS requests and responses. MEMORY
Since memory can be used to cache file attributes and file data, slow performance may often be attributed to the amount of memory; however, you need to check memory requirements for your configuration before adding memory to your system. SYSTEM BUS
Since all traffic among the U, interface cards, memory, and disk goes through the system bus, no amount of memory increase or disk increase will compensate for slow system bus performance. Systems are usually configured to match the system bus. NETWORK
Current IP network technology has several speed alternatives. Common choices are 100 Mb (megabit), 1000 Mbit/1 Gb, and 10 Gb. Before deploying a gigabit network, you will need to a high-speed network interface card (NIC) and a gigabit-capable switching infrastructure. Gigabit deployment continues to become cheaper and easier as the required components become commodities. Gigabit Ethernet typically provides the physical transport and datalink layer. The Gigabit Ethernet driver can play an important role in network performance;
7-6
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
therefore, the latest version of the Ethernet driver is always recommended for highest performance. The first step in configuring Gigabit Ethernet for any type of deployment is to isolate the NFS data network for a specific workload from the general purpose network. This reduces network congestion and provides better data security. Isolating the network can be accomplished by various means, including physical network isolation or virtual LAN-based isolation. The following table compares the theoretical bandwidth limits of various connection technologies. The table also lists average latency (in milliseconds) to transfer 64 kB (kilobytes) of data. Connection Technology
Theoretical Bandwidth
Latency for 64 kB Transfer
10 Mbit Ethernet
1.25 MB/sec
50 ms
100 Mbit Ethernet
12.5 MB/sec
5 ms
1 Gb Ethernet
125 MB/sec
0.5 ms (500µs)
1 Gb Fibre Channel
125 MB/sec
0.5 ms (500µs)
SCSI-3
160 MB/sec
0.4 ms (400µs)
10 Gb Ethernet
1.25 GB/sec
0.048 ms (48µs)
High-speed storage infrastructures can also be deployed with such technologies as 1Gb Fibre Channel or SCSI-3. An NFS infrastructure that delivers similar performance requires the bandwidth associated with Gigabit Ethernet. Gigabit Ethernet technology is available for all UNIX systems. Enterprise applications that require high performance should always be deployed with gigabit technology. Gigabit components are available from the platform vendor. In addition, this technology is provided by a number of third-party vendors. NetApp® storage systems currently 100 Mb, 1 Gb, and 10Gb Ethernet infrastructures.
7-7
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Data Collection
© 2008 NetApp. All rights reserved.
DATA COLLECTION
7-8
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
8
Data Collection Data ONTAP commands – – – – – – – – –
sysstat netstat ifstat Covered in Data ONTAP Fundamentals course stats statit netdiag cifs stat cifs top pktt
External tools – perfstat – sio © 2008 NetApp. All rights reserved.
9
DATA COLLECTION The following Data ONTAP® tools can be used to collect performance data: •
The sysstat, netstat, ifstat, stats, statit, netdiag, cifs stat, and cifs top commands are bundled with Data ONTAP for collecting and/or performance data.
•
The packet trace (pktt) utility is also used to gather network traffic information for further analysis by NetApp personnel.
The external tools are available for at the NOW™ (NetApp on the Web) site.
7-9
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs stat Command Overview cifs stat has two main forms – If interval is specified, command continues displaying a summary of CIFS activity until interrupted Information is for the preceding interval (in seconds), with header line repeated periodically The interval must be >= 1
– If interval is not specified, command displays counts and percentages of all CIFS operations as well as a number of internal statistics that may be of use when diagnosing performance and other problems
Statistics displayed are cumulative for all clients by default. – If the cifs.per_client_stats.enable option is on, a subset of clients may be selected using the -u option, the -h option, or both © 2008 NetApp. All rights reserved.
10
CIFS STAT COMMAND OVERVIEW The cifs stat command has two main forms. If you specify the interval, the command continues to display a summary of CIFS activity until interrupted. The information is for the preceding interval seconds. (The header line is periodically repeated.) The interval must be >= 1. If you do not specify the interval, the command displays counts and percentages of all CIFS operations as well as a number of internal statistics that may be of use when diagnosing performance and other problems. By default, the statistics displayed are cumulative for all clients. However, if the cifs.per_client_stats.enable option is on, a subset of the clients may be selected using the -u option, the -h option, or both.
7-10
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs stat Options -u <> – If per-client stats are being gathered, selects a to match for stats reporting
-h
– If per-client stats are being gathered, specifies a host to match for stats reporting
-v [v] – If per-client stats are being reported using the -u or -h options, the -v option shows the count of the number of matching clients prior to the stats themselves
-c – Displays counts and percentages for non_blocking CIFS operations as well as block_ing, which is the default
-z – Zeroes all CIFS operation counters, including per-client counters, if any © 2008 NetApp. All rights reserved.
11
CIFS STAT OPTIONS -u <> If per-client stats are being gathered, this selects a to match for stats reporting. More than one -u <> option may be supplied. If more than one client matches the , the values reported are the sum of all matching clients. The specified may have a domain, which restricts matching to that domain, or the domain may be "*" or left blank to match any domain. The may be specified, or may be "*" to match any . -h
If per-client stats are being gathered, this specifies a host to match for stats reporting. More than one -h
option may be supplied. If more than one client matches the host, the values reported are the sum of all matching clients. The host may be an IP address in dot notation, or it may be any hostname found using the Domain Name System (DNS), if a DNS is enabled on the storage system. -v [v] If per-client stats are being reported using the -u or -h options, it may be desirable to know which clients contributed to the total stats being reported. If -v is given, the count of the number of matching clients is printed prior to the stats themselves. If -vv is given, the actual matching clients are also printed prior to printing the stats themselves. -c Displays counts and percentages for non_blocking CIFS operations as well as block_ing, which is the default. This option is not available in combination with the per-client options.
7-11
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
-z Zeroes all CIFS operation counters, including per-client counters, if any. EXAMPLE system> cifs stat 10 GetAttr
Read
Write
Lock
Open/Cl
Direct
Other
175
142
3
70
115
642
50
0
0
0
0
18
0
0
0
3
8
0
0
10
0
0
0
0
6
0
0
1
0
0
0
0
0
0
0
NOTES If vFiler™ volumes are licensed, the per- statistics are only available when in a vFiler context. That means when using the -u <> or -h
options with the cifs stat command, it must be invoked using vfiler run, even for the hosting storage system. For example, system> vfiler run vfiler0 cifs stat -h 10.10.20.23 -u *\tom 1
7-12
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs top Command Overview Displays CIFS client activity based on different criteria – Can display clients that are generating large amounts of load, as well as identify clients that are behaving suspiciously – Default output—a sorted list of clients, number of I/Os, "suspicious" events, number and size of READ and WRITE requests, IP address, and client . Statistics normalized to values per second
Syntax: cifs top [-s <sort>] [-n <maxclients>] [-a
] [-v] © 2008 NetApp. All rights reserved.
13
CIFS TOP COMMAND OVERVIEW The cifs top command is used to display CIFS client activity based on a number of different criteria. It can display which clients are generating large amounts of load, as well as help identify clients that may be behaving suspiciously. The default output is a sorted list of clients, one per line, showing the number of I/Os, number of and sizes of READ and WRITE requests, the number of "suspicious" events, and the IP address and of the client. The statistics are normalized to values per second. A single client may have more than one entry if it is multiplexing multiple s on a single connection, as is frequently the case when a Windows Terminal Server connects to the storage system. This command relies on data collected when the cifs.per_client_stats.enable option is "on," so it must be used in conjunction with that option. s should be aware that there is overhead associated with collecting the per-client stats. This overhead may noticeably affect the storage system performance. OPTIONS -s <sort> Specifies how the client stats are to be sorted. Possible values of <sort> are ops, reads, writes, ios, and suspicious. These values may be abbreviated to the first character, and the default is ops. They are interpreted as follows: ops Sort by number of operations per second of any type. reads Sort by kilobytes per second of data sent in response to read requests.
7-13
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
writes Sort by kilobytes per second of data written to the storage system. ios Sort by the combined total of reads plus writes for each client. suspicious Sort by the number of "suspicious" events sent per second by each client. "Suspicious" events are any of the following, which are typical of the patterns seen when viruses or other badly behaved software or s are attacking a system: ACCESS_DENIED returned for FindFirst ACCESS_DENIED returned for Open/CreateFile ACCESS_DENIED returned for DeleteFile SUCCESS returned for DeleteFile SUCCESS returned for TruncateFile -n <maxclients> Specifies the maximum number of top clients to display, default is 20. -a
Specifies how the statistics are to be averaged for display. Possible values of
are smooth, now, and total. These values may be abbreviated to the first character, and the default is smooth. They are interpreted as follows: smooth Use a smoothed average which is weighted towards recent behavior but takes into previous history of the client. now Use a one-second sample taken immediately. No history is taken into . total Use the total count of each statistic divided by the total time since sampling started. If the -v option is also used, the totals are given without dividing by the sample time. -v Specifies that detailed statistics are to be given, similar to those for the cifs stat command. These stats include the sample time and the counters used to calculate the usage. As mentioned above, in the case of total averaging, a dump of the raw stats is produced in a form suitable for input to scripts. EXAMPLE cifs top -n 3 -s w ops/s
reads(n, KB/s) writes(n, KB/s) suspect/s
IP
Name
263 |
29
215 |
137
627 |
0 | 10.56.10.120
ENGR\varun
248 |
27
190 |
126
619 |
1 | 10.56.10.120
ENGR\jill
246 |
26
195 |
125
616 |
19 | 10.56.12.118
MKTG\bob
If vFiler volumes are licensed, the per- statistics are only available when in a vFiler context. This means the cifs top command must be invoked in a vFiler context (for example, using vfiler run), even for the hosting storage system. For example, system> vfiler run vfiler0 cifs top
7-14
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
pktt Overview Overview – Data ONTAP utility for packet capture – Captures data for further analysis by personnel Syntax – pktt start
|all [-d dir] [-m pklen] [-b bsize] [-i ipaddr –i ….] Starts packet tracing
– pktt dump [
|all [-d dir]] | [
[-f file]] Writes data from memory to file (disk)
– pktt stop
|all
Stops packet tracing
Optional commands – pktt pause
|all – pktt status [
|all] [-v] – pktt delete [filename.trc]+ – pktt list © 2008 NetApp. All rights reserved.
15
PKTT OVERVIEW The start subcommand is used to start tracing (or to restart if it has been paused). The packet trace data is stored in “tdump” format in a circular buffer in memory. The displaying of flags is optional, and can be done as follows: -d dir Allows you to specify the path to an existing directory in which the trace data file will be written. The file will always have the name “*.trc” where “*” is the interface name (e.g., e4, fa3, etc.). If this option is missing, the trace data will only be collected in memory, and after the buffer fills, new packets will replace existing packets. However, it is always possible to dump the contents of the buffer at any time using the pktt dump command. Note that when writing trace data to disk, if the file system cannot keep up with the network traffic, you may not log all packets. This will show up in the “dropped” counts when looking at the status. Also that logging all traffic may generate a heavy write load on the storage system, which may bog it down. If possible, use the IP filter to reduce the amount of data to log. Note that the default value of the -b flag is too small when logging to disk if there is a lot of traffic. You should set -b to 128 KB or larger. -s size Allows you to set the maximum size of the trace file. If this is not specified, the file can grow to 32 GB, so you are advised to set it to a reasonable value if you think there is a chance you might forget you have left the trace going. This parameter is only useful in conjunction with the -d option. After the maximum size has been reached, packets continue to be logged to the buffer, but not to the disk. -v This causes the pktt status -v information to be displayed as tracing starts. 7-15
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
-m pklen Sets the length at which packets will be truncated. The default is 1,500 bytes, which results in full packets for Ethernet. Note that in 5.3, the default of 1,500 is incorrect for Ethernet. You must override with -m 1514 to get the full packets. It is sometimes useful to limit the data stored when every byte of the packet is not critical. However, for many debugging tasks it is useful to have the entire packet. In cases where the packet size can be larger than 1,500, you may want to specify a larger maximum. However, many of the decoders refuse to deal with packets larger than 1,500 bytes so you should only specify a larger value if that seems critical to finding a problem. -b bsize Sets the buffer size, which may be specified as a number with an optional trailing “k” or “m” multiplier. The default is 32 KB, which should be large enough to find “packet of death” bugs and similar problems. You should use a value of at least 128 KB when using the -d option. The value may range from 8 KB to 128 MB, but only in the most exceptional cases would it be necessary to increase the size beyond 1–2 MB. In cases where the network is very busy and it is not practical to log all the traffic to disk, you may need to use a larger buffer. Important Note: Do not specify a value larger than 3 MB. -i ipaddr [-i ipaddr] This allows limited filtering capability. Up to four IP addresses may be specified, which causes only traffic to or from any of those IP addresses to be logged. This will prevent logging of any non-IP (for example, Address Resolution Protocol [ARP]/Reverse Address Resolution Protocol [RARP]) traffic. EXAMPLES OF PKTT
pktt start fa3 -d / -s 100m -b 128k This starts capturing traffic on the “fa3” interface, writing to a file called “/fa3.trc,” which will be allowed to grow to a maximum size of 100 MB with a 128 KB buffer. pktt start el10 -d /home -m 10k -b 1m -i ehost1 -i ehost2 This starts capturing traffic to and from the hosts ehost1 and ehost2, and storing the traces in the file /home/el10.trc. Up to 10 KB of each packet will be stored in a 1 MB buffer. pktt start all -b 128k -i 172.20.4.1 All interfaces will start capturing traffic to and from the specified IP address. This is a quick way to look at traffic if you are not sure which interface to use but you want to see the packets from one or more IP addresses. pktt pause The pause subcommand is used to temporarily stop capturing traffic from one or all interfaces. If any unwritten data is in the trace buffer it will be flushed to disk. Use pktt start without any options to restart a paused interface.
7-16
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
pktt dump The dump subcommand causes the contents of the packet trace buffer to be written to a file. If the “-d [dir]” option is used, the file will be written to that directory, otherwise it will be written to the root directory of the root volume. The name of the file is always .trc and the contents are in tdump format. If a file by that name already exists it will be overwritten. pktt stop This causes all tracing to stop on the named interface or all interfaces. If any unwritten data is in the trace buffer it will be flushed to disk. If you have not dumped the trace data, and you were not tracing to a disk file, the trace data will be lost. This action is not confirmed, so be careful when using this command. pktt status This can be used to display the buffer and file status of an existing trace. Using pktt status -v will give you full tracing status for all interfaces. This can be used to display the buffer and file status of an existing trace. NOTE 1: Each of the above subcommands must be followed by an interface name or the word all. NOTE 2: The recommended naming convention to be used when storing packet trace files is illustrated by the following example: •
e9_20060607_131233.trc
•
lo_20060607_131233.trc
In the first example above:
7-17
Name Fragment
Description
e9
port number
2006
year
06
month
07
date
13
hour
12
minute
33
seconds
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
External Tools
© 2008 NetApp. All rights reserved.
EXTERNAL TOOLS
7-18
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
18
Capturing CIFS Packets pktt trace saved in tdump format – Reference www.tdump.org
Use a tdump-compliant program to review the packet trace – Such as Ethereal - see www.ethereal.com
Alternatively, convert pktt trace to Netmoncompliant format using – Capconv utility – see http://now.netapp.com/NOW//tools/capconv/ – Netmon-compliant packet analyzers such as Windows Netmon
© 2008 NetApp. All rights reserved.
19
CAPTURING CIFS PACKETS In addition to the pktt utility, the above tools enable you to capture CIFS packets, format them, and send them out for analysis and troubleshooting.
7-19
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
perfstat Overview Data collection tool with several key properties: – Captures all needed performance information with one command – Captures information from host(s) and storage system(s) – Captures all information simultaneously for crosscorrelation – Operates on all host platforms and storage system platforms
perfstat comes in exactly two flavors: – Unix/Linux version (perfstat.sh) – Windows version (perfstat.exe)
ed platforms: – Unix: AIX, HP-UX, Linux, OSF1, Solaris, FreeBSD – Windows: 2000/XP/2003 /2008 © 2008 NetApp. All rights reserved.
20
PERFSTAT OVERVIEW The perfstat tool is the following version: •
A command line .exe version for Windows® platforms
The tool is used for isolating performance bottlenecks. It is the preferred method for collecting performance statistics on NetApp storage systems. Using a single command, the system is able to gather all data needed to isolate performance problems on both the storage system and host data. Since it is constantly being updated, the latest version of the perfstat script, you should obtain the latest version from the NOW site, on the “Tools and Utilities” page at http://now.netapp.com/NOW//tools/perfstat Before using perfstat, you must have: •
root access to the system
•
rsh access to the system from the host running perfstat
•
rsh access to any host systems to be monitored
7-20
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
PARTIAL OUTPUT
*------------- Perfstat v6.35 -------------* APP_NAME,
default,
BEGIN,
default,
CONF_ONLY,
"FALSE“
default,
DEBUG,
default,
END,
FILER_TARGETS,
"FALSE”
set,
DO_HOST,
"na20“
default,
HOST_TARGETS,
"TRUE“
default,
ITERATIONS,
set,
ITER_INTERVAL,
"“
"12“
default,
FILER_,
"0”
default,
default,
RAMRUN,
"FALSE“ "FALSE”
default,
SSH,
"“
"root”
"FALSE”
default,
"FALSE”
APP_PARAM,
default,
"“
PERF_ONLY,
default,
"FALSE“
QUIET,
default,
ROOT_CMD, TIME,
default, set,
PRETEND, LOGS,
"FALSE” "”
"10”
default, default,
"FALSE” "FALSE”
PROFILES,
default,
"FALSE”
EXCLUDE,
default,
"FALSE”
STUTTER_STATIT,
7-21
default,
"TRUE”
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
perfstat Options
Options -f -c -h -t -a -p -l -F -v -r -q -x -b -e
system_name
time appname –o [:]
rootcommand
Name of system under test Configuration data recorded only Comma-separated list of hostnames Time to collect histogram data options Optional application to test Capture performance data only name and to use Storage system only; don’t capture host data Print version info only Run a root command on the host Quiet mode; no console output Print commands Begin capture End capture
Syntax: perfstat options > output_file © 2008 NetApp. All rights reserved.
22
PERFSTAT OPTIONS The format of the basic perfstat command is as follows: perfstat [-b|e|c] [-f filername] [-h hostname] What follows is a list of some of the perfstat options. For the complete list, refer to the NOW site on the “Tools and Utilities” page. Option
Definition
-b -e -c
Begins sampling and returns prompt immediately Ends sampling—used in conjunction with -b Captures configuration info only, no performance data
-f filername Name of storage system (server) -h hostname Name of host system (client) -t time
Sample time per iteration (in minutes), with a default of 2
NOTE: -t option is only needed with the -b option. perfstat Example perfstat -f filer1 -h host1 -t 5 -i 12 > perfstat.$date.out Where -f is the storage system (server), -h the host (client), -t sample period, -i number of iterations. Please do not use the perfstat -b and perfstat -e option. Typically NetApp will request the perfstat; and sample time and iteration will be provided. 7-22
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
sio Utility Overview – – – –
Acronym for simulated I/O General-purpose load generator Allows for different block size read and write ops Performs synchronous I/Os to the specified file(s) – Collects basic statistics
Syntax sio Read% Rand% Blk_Size File_Size Seconds Thread Filename [Filename]
© 2008 NetApp. All rights reserved.
24
SIO UTILITY Simulated I/O (sio) is a general purpose I/O load generator. It performs synchronous I/Os to the specified file(s). The main purpose is to generate various I/O loads while collecting some basic statistics. In general, sio allows the to control: •
Read/write mix
•
Random or sequential I/O patterns
•
Access in various block sizes
•
Access over a variable amount of file space (starting at offset 0)
•
Adjustable run time (in seconds)
•
Single or multiple concurrent threads performing I/O
•
Access to one or more files or devices (for example, raw devices)
•
After completing the specified workload, sio generates several basic statistics:
•
I/Os completed per second
•
kBps transferred
•
Total I/Os completed over the measured interval
The sio command is meant to enable I/O performance testing without having to create large application structures (such as databases). For example, sio can “approximate” a workload similar to that of TPC-C by specifying (for instance) a 2-to-1 read/write ratio, of 4 kB transfer sizes, with the appropriate number of threads. While the emulation is not exact, the approximation provides valuable insight into I/O subsystem performance.
7-23
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
BUILD REQUIREMENTS •
AIX™, Linux®—gcc
•
HP-UX™, Solaris™—cc
•
Windows—Visual C++
Installation sio_ntap.tar.gz and unpack it using gzip and tar, then use the appropriate binary for the desired client system. View the REE if you wish to build a binary from the provided source. The parameters used with sio are as follows: Parameter
Definition
Read % Rand % Blk_Size
Percentage of accesses that are reads (versus writes) Percentage of accesses that are random (versus sequential) Size of I/O requests that are issued Size of area to be accessed in the file(s) (can be <= actual file size; same for all files) Run time (specified in seconds), minimum of 10 seconds (60 or more recommended) Number of concurrent threads issuing I/Os Device to access. May be file (foo.out) or device (/dev/dsk/etc). Multiple devices can be specified. I/O is distributed evenly and randomly across the devices.
FileSize Seconds Threads Filename(s)
INPUT EXAMPLES
100% random reads of 512-byte transfers to filename1, running for 60 seconds with one thread, accessing 1 MB of the file: •
sio 100 100 512 1m 60 1 filename1
Half-reads, half-writes of random 4 KB I/Os, filename1, 10 seconds, two threads, 20 MB of file accessed: •
sio 50 100 4k 20m 10 2 filename1
Sequential writes of 64 KB I/Os for 60 seconds against filename1 with one thread, 10 MB of file accessed: •
sio 0 0 64k 10m 60 1 filename1
100% random reads of 512-byte transfers to filename1, filename2, filename3, running for 60 seconds with 32 threads, accessing 1 GB of each of the files: •
7-24
sio 100 100 512 1g 60 1 filename1 filename2 filename3
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Resources
© 2008 NetApp. All rights reserved.
RESOURCES
7-25
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
27
CIFS References Education – Fundamentals of Performance Analysis
Data ONTAP Manual page reference under http://now.netapp.com/NOW/main/tatools.shtml NetApp library at http://www.netapp.com/library/ Tech Talk online events at http://www.netapp.com/news/techtalk/
© 2008 NetApp. All rights reserved.
CIFS REFERENCES
7-26
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
28
Module Summary
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
7-27
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
29
Module Summary In this module, you should have learned to: Describe the importance of performance management Capture performance statistics with Data ONTAP commands and other tools Identify factors that affect CIFS performance Identify steps to analyze performance and to resolve performance problems
© 2008 NetApp. All rights reserved.
MODULE SUMMARY
7-28
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
30
Exercise Module 7: Performance Estimated Time: 60 minutes
EXERCISE Please refer to your Exercise Guide for more instruction.
7-29
CIFS istration on Data ONTAP 7.3: M07_Performance
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Troubleshooting
NetApp University - Do not distribute or duplicate
MODULE 8: TROUBLESHOOTING
Troubleshooting CIFS istration on Data ONTAP 7.3
TROUBLESHOOTING
8-1
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Module Objectives By the end of this module, you should be able to: Describe NT LAN Manager (NTLM) authentication process and communication Describe Kerberos authentication process and communication Follow a methodology for resolving communication errors when a client attempts to access data on a storage system Identify troubleshooting tools Describe typical cifs setup problem and solution scenarios Describe cifs setup best practices Locate documentation for problem resolution © 2008 NetApp. All rights reserved.
MODULE OBJECTIVES
8-2
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
2
NTLM
© 2008 NetApp. All rights reserved.
NTLM
8-3
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
3
NTLM Communication Windows generally authenticates s using – NT LAN Manager (NTLM), or – Kerberos
NTLM is a challenge-response authentication protocol. – Three-way handshake – Then set to DC for approval
1. Negotiate 4. Request 2. Challenge 5. Accepted/Denied 3. Response Client
Storage System
Domain Controller
© 2008 NetApp. All rights reserved.
4
NTLM COMMUNICATION In this module, we will discuss the NT LAN Manager (NTLM) and Kerberos authentication protocols. NTLM provides a basic mechanism for authenticating a client to a server based on a three-way handshake used primarily to provide compatibility with versions of Windows earlier than Windows 2000. 1. The attempt to start a NTLM communication begins by negotiating with the storage system. This is a request to begin the authentication handshake. At this point the receiver of the negotiate message doesn't know who the request is coming from,only that a response needs to be generated to complete the handshake. 2. The response is a challenge by the storage system. The challenge is a NONCE—essentially a 64-bit number generated by the server and guaranteed only to be used once. The client will use this to identify itself without sending its clear text credentials. 3. The client now needs to send a response to the challenge. To form this response, the is used as a cryptographic key to encrypt the NONCE. This is sent back to the storage system. 4. The NTLM challenge from step 2 and the response from step 3, along with the name, is then sent to domain controller for authentication. 5. If the domain controller calculates the same NTLM Challenge Response as sent by the storage based upon the domain controller’s copy of the client’s hashed , then a successful response will be sent to back to storage system. Otherwise, the challenge response is denied. 8-4
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Kerberos
© 2008 NetApp. All rights reserved.
KEBEROS
8-5
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
5
Kerberos Security Protocol In Windows 2000 (or later) Active Directory domains, everyone (if at all possible) should use Kerberos-based authentication because it is more secure. – Kerberos V5 is an Internet standard security protocol for handling authentication of a or system identity.
The following slides describe in detail how Kerberos-based authentication works to create secure communications.
© 2008 NetApp. All rights reserved.
6
KERBEROS SECURITY PROTOCOL In Windows 2000 (or later) Active Directory domains, everyone (if at all possible) should use Kerberos-based authentication because it is more secure. Kerberos V5 is an Internet standard security protocol for handling authentication of a or system identity. The following slides describe in detail how Kerberos-based authentication works to create secure communications.
8-6
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
How Kerberos Works Sharing a Secret: How Kerberos Works Requests ticket to TGS
SK1 TGT
Auth
Creates session key1, ticket-granting ticket
Client
Server authenticates client
1. Authentication exchange
Kerberos authentication server
The client asks the authentication server for a ticket to the ticket-granting server (TGS). The authentication server looks up the client in its database, then generates a session key (SK1) for use between the client and the TGS. Kerberos encrypts the SK1 using the client’s secret key. The authentication server also uses the TGS’s secret key (known only to the authentication server and the TGS) to create and send the a ticket-granting ticket. (TGT).
© 2008 NetApp. All rights reserved.
7
HOW KERBEROS WORKS 1. Authentication exchange • •
The client asks the authentication server for a ticket to the ticket-granting server (TGS). The authentication server looks up the client in its database, authenticates the client, and then generates a session key (SK1) for use between the client and the TGS. Kerberos encrypts the SK1 using the client’s secret key. The authentication server also uses the TGS’s secret key (known only to the authentication server and the TGS) to create and send the a ticket-granting ticket (TGT). NOTE: In the slide, Auth is the authenticator, SK1 is the session key, and TGT is the ticket.
8-7
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
How Kerberos Works (Cont.) Sharing a Secret: How Kerberos Works Requests ticket to target server: Target server name, TGT and authenticator SK2 TK-TS
Auth
TGT
Creates session key2, issues session ticket for target server
Client
Server authenticates client
2. Ticket-granting service exchange
Ticketgranting server
The client decrypts the message and recovers the session key, then uses it to create an authenticator containing the ’s name, IP address and a time stamp. The client sends this authenticator (Auth), along with the TGT, to the TGS, requesting access to the target server. The TGS decrypts the TGT, then uses the SK1 inside the TGT to decrypt the authenticator. It verifies information in the authenticator, the ticket, the client’s network address, and the time stamp. If everything matches, it lets the request proceed. Then the TGS creates a new session key (SK2) for the client and target server to use, encrypts it using SK1 and send it to the client. The TGS also sends a new ticket containing the client’s name, network address, a time stamp, and an expiration time for the ticket–all encrypted with the target server’s secret key–and the name of the server. © 2008 NetApp. All rights reserved.
8
HOW KERBEROS WORKS (CONT.) 2. Ticket-granting service exchange The client decrypts the message and recovers the session key and then uses it to create an authenticator containing the ’s name, IP address, and a time stamp. The client sends this authenticator (Auth), along with the TGT, to the TGS and requests access to the target server. The TGS decrypts the TGT and then uses the SK1 inside the TGT to decrypt the authenticator. It verifies information in the authenticator, the ticket, the client’s network address, and the time stamp. If everything matches, it lets the request proceed and the server authenticates the client. Then the TGS creates a new session key (SK2) for the client and target server to use, encrypts it using SK1, and sends it to the client. The TGS also sends a new ticket containing the client’s name, network address, a time stamp, and an expiration time for the ticket—all encrypted with the target server’s secret key—and the name of the server.
8-8
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
How Kerberos Works (Cont.) Sharing a Secret: How Kerberos Works Requests access; sends session ticket from TGS
SK2 Auth
Client
Auth
TK-TS
Returns message with the time stamp plus 1, encrypted with SK2, thereby authenticating the target server to the client
Server authenticates client
Target server
3. Client and target server exchange The client decrypts the message and gets the SK2. Finally ready to approach the target server, the client creates a new authenticator encrypted with SK2. The client sends the session ticket (already encrypted with the target server’s secret key) and the encrypted authenticator. Because the authenticator contains plaintext encrypted with SK2, it proves that the client knows the key. The encrypted time stamp prevents an eavesdropper from recording both the ticket and authenticator and replaying them later. The target server decrypts and checks the ticket, authenticator, client address, and time stamp. For applications that require two-way authentication, the target server returns a message consisting of the time stamp plus 1, encrypted with SK2. This proves to the client that the server actually knew its own secret key and thus could decrypt the ticket and the authenticator. © 2008 NetApp. All rights reserved.
9
HOW KERBEROS WORKS (CONT.) 3. Client and target server exchange The client decrypts the message and gets the SK2. Finally ready to approach the target server, the client creates a new authenticator encrypted with SK2. The client requests access to the target server and sends the session ticket (already encrypted with the target server’s secret key) and the encrypted authenticator. Because the authenticator contains plain text encrypted with SK2, it proves that the client knows the key. The encrypted time stamp (TS) prevents an eavesdropper from recording both the ticket and authenticator and replaying them later. The target server decrypts and checks the ticket, authenticator, client address, and time stamp. The target server authenticates the client. For applications that require two-way authentication, the target server returns a message consisting of the time stamp plus 1, encrypted with SK2. This proves to the client that the server actually knows its own secret key and thus could decrypt the ticket and the authenticator. 8-9
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
How Kerberos Works (Cont.) Sharing a Secret: How Kerberos Works SK2
SK2
Target server
Client
4. Secure communications The target server knows that the client is who he claims to be, and the two now share an encryption key for secure communications. Because only the client and target server share this key, they can assume that a recent message encrypted in that key originated with the other party.
KEY:
Auth
Authenticator
SK1
Session Key
TGT
Ticket
© 2008 NetApp. All rights reserved.
10
HOW KERBEROS WORKS (CONT.) 4. Secure communications The target server knows that the client is who the client claims to be, and the two now share an encryption key for secure communications. Because only the client and target server share this key, they can assume that a recent message encrypted in that key originated with the other party.
8-10
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Authentication Scenario
© 2008 NetApp. All rights reserved.
AUTHENTICATION SCENARIO
8-11
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
11
Authentication Scenario 1. In a domain environment, a Windows client requests session authentication with a storage system.
3. The domain controller (DC) authenticates or indicates not exist.
2. The storage system goes to the domain controller to authenticate the .
5. Storage system maps NT () to a UNIX name.
6. The storage system compares NT info with the share ACL.
4. If the DC indicates guest access, the storage system cannot allow guest access unless cifs.guest_ is set.
7. The storage system compares the NT info with the file ACL or the mapped UNIX with UNIX file permissions.
8. If the has access to both the share and the file, then the storage system grants access.
© 2008 NetApp. All rights reserved.
12
AUTHENTICATION SCENARIO The following slides show the steps for a multiprotocol security troubleshooting scenario where a Windows client requests access to data on a storage system in a domain environment. Each step is then examined separately to look at the potential points of failure (issues) and the tools or steps that are useful to resolve the failure. 1. In a domain environment, a Windows client requests session authentication with a storage system. 2. The storage system goes to the domain controller to authenticate the . 3. The domain controller authenticates or indicates does not exist. 4. If the domain controller indicates does not exist, the storage system cannot allow guest access unless cifs.guest_ is set. 5. The storage system maps the NT () to a UNIX name. 6. The storage system compares the NT information with share access control list (ACL). 7. The storage system compares the NT information with file ACL or the mapped UNIX with the UNIX file permissions. 8. If the has access to both the share and the file, then the storage system grants access.
8-12
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: Client Communication 1. In a domain environment, a Windows client requests session authentication with the storage system. Potential Issue: “Network failed or is slow.” Check the following: – – – –
system> ifstat system> netdiag system> ping C:\> tracert
© 2008 NetApp. All rights reserved.
13
ISSUE: CLIENT COMMUNICATION 1. In a domain environment, a Windows client requests session authentication with the storage system. Potential Issue: “Network failed or is slow.” Check the following: •
system> ifstat The ifstat command displays statistics about packets received and sent on all or a specified network interface.
•
system> netdiag The netdiag command analyzes the statistics continuously gathered by the network protocol code, performs various tests (if required), displays the results of analysis, and suggests remedial actions if problems are encountered.
•
system> ping The ping command sends ICMP ECHO_REQUEST packets to network hosts to elicit an ICMP ECHO_RESPONSE from the specified host or gateway.
•
C:\> tracert The Windows tracert command visually displays a network packet being sent and received and the number of hops required for the packet to reach its destination.
8-13
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: Client Communication (Cont.) Potential Issue: “Domain controller does not authenticate the .” – Check the access to other servers in the domain.
Potential Issue: “Windows client cannot ‘find’ the storage system.” – If using DNS, try pinging the storage system by name. C:\> ping system_name
© 2008 NetApp. All rights reserved.
ISSUE: CLIENT COMMUNICATION (CONT.)
8-14
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
14
Issue: Client Communication (Cont.) If using WINS, run the nbtstat command. system> nbtstat – The nbtstat command displays information about the NetBIOS over T connection. NOTE: If you change the domain controller IP address in DNS, be sure to change the domain controller IP address in WINS.
© 2008 NetApp. All rights reserved.
ISSUE: CLIENT COMMUNICATION (CONT.)
8-15
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
15
Issue: DC Authentication 2. Storage system goes to the domain controller to authenticate the Windows client Potential Issue: Firewall prevents communications between storage system and DC – If using SMB over T/IP Windows 2000 and later – Requires T port 445
– If using SMB over NetBIOS over T/IP – – – –
Pre-Windows 2000 Requires: UDP port 137 & 138 T port 139
© 2008 NetApp. All rights reserved.
16
ISSUE: DC AUTHENTICATION 2. The storage system goes to the domain controller to authenticate the Windows client . •
Potential Issue: Firewall prevents storage system and DC communications • SMB directly over T/IP, which is available in Windows 2000 and later requires only T port 445. • SMB over NetBIOS over T/IP, which is required in all pre-Windows 2000 servers and clients; requires UDP port 137 and 138 along with T port 139. See http://.microsoft.com/kb/832017 for more information about the appropriate communication ports.
NOTE: It is not possible to remap these ports on the storage system. If you have a firewall that only accepts traffic from certain ports, you will need to set up port forwarding to adequately establish communication.
8-16
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: DC Authentication (Cont.) Potential Issue: “Communication from storage system to domain controller fails or trust across multiple domains fails.” – Perform the following steps: a) system> cifs domaininfo – This provides information about domain and known domain controllers. – If you receive an error and want more verbose output, then go to step b.
© 2008 NetApp. All rights reserved.
ISSUE: DC AUTHENTICATION (CONT.)
8-17
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
17
Issue: DC Authentication (Cont.) b)
Set the following option on: system> options cifs.trace_dc_connection on –
When this option is on, the storage system logs all DC address discovery and connection activities. system> cifs resetdc
–
This command tells the storage system to disconnect from the domain controller and then establish a new CIFS connection with the DC. (The steps are being logged with the cifs_trace_dc_connection option.)
c)
d)
Check the trace output on the console or logged output in /etc/messages file to find the problem.
© 2008 NetApp. All rights reserved.
18
ISSUE: DC AUTHENTICATION (CONT.) b) Set the following option on: system> options cifs.trace_dc_connection on When this option is on, the storage system logs all DC address discovery and connection activities. c) system> cifs resetdc This command tells the storage system to disconnect from the domain controller and then establish a new CIFS connection with the DC. (The steps are being logged with the cifs_trace_dc_connection option.) d) Check the trace output on the console or logged output in /etc/messages file to find the problem. The following is sample output when running the cifs resetdc command with the cifs.trace_dc_connection option set on. system> options cifs.trace_dc_connection on system> cifs resetdc
8-18
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Disconnecting from domain FILER2K3MIX... Reconnecting to domain FILER2K3MIX... Tue Jul 11 08:32:19 CEST [cifs.server.infoMsg:info]: CIFS: Warning for server \\ FILER2K3MIXDC01: Connection terminated. Tue Jul 11 08:32:19 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: Trac eDC- Starting DC address discovery for FILER2K3MIX. Tue Jul 11 08:32:19 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: Trac eDC- Filer is not a member of a site. Tue Jul 11 08:32:19 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: Trac eDC- Found 1 addresses using generic DNS query. Tue Jul 11 08:32:19 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: Trac eDC- DC address discovery for FILER2K3MIX complete. 1 unique addresses found. Tue Jul 11 08:32:19 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: Trac eDC- Connection with \\FILER2K3MIXDC01 established. Reconnection succeeded Tue Jul 11 08:32:19 CEST [auth.ldap.trace.LDAPConnection.statusMsg:info]: AUTH: TraceLDAPServer- Starting AD LDAP server address discovery for FILER2K3MIX.NGSLA BHD.EUROPE.NETAPP.COM. Tue Jul 11 08:32:19 CEST [auth.ldap.trace.LDAPConnection.statusMsg:info]: AUTH: TraceLDAPServer- Found 1 AD LDAP server addresses using generic DNS query. Tue Jul 11 08:32:19 CEST [auth.ldap.trace.LDAPConnection.statusMsg:info]: AUTH: TraceLDAPServer- AD LDAP server address discovery for FILER2K3MIX.NGSLABHD.EUROPE.NETAPP.COM complete. 1 unique addresses found.
8-19
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: DC Authentication (Cont.) 3. Domain controller authenticates Windows client or indicates does not exist Potential Issue: “Authentication result is not what was expected.” Check the details of the mapping.
–
system> options cifs.trace_ on
–
This option gives verbose output in mapping the to its ultimate identity.
system> cifs sessions –s winname
The cifs sessions –s winname command where winname can be a Windows name or SID, displays the current mappings for the Windows .
© 2008 NetApp. All rights reserved.
20
ISSUE: DC AUTHENTICATION (CONT.) 3. Domain controller authenticates Windows client or indicates does not exist. •
Potential Issue: “Authentication result is not what was expected.” Check the details of the mapping. • •
system> options cifs.trace_ on This option gives verbose output in mapping the to its ultimate identity. system> cifs sessions –s winname The cifs sessions –s winname command where winname can be a Windows name or SID, displays the current mappings (credentials) for the Windows .
The following are cifs.trace_ examples: •
A trace for a attempt by a from a non-trusted domain and there is no guest :
system> Tue Jul 11 08:35:11 CEST [auth.trace.authenticate.Accepted:info]: AUTH: by NULL from 10.10.10.22 accepted.
8-20
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Tue Jul 11 08:35:11 CEST [auth.trace.authenticate.TraceIP:info]: AUTH: attempt by winguy of domain TEASTDOM from client machine windows-xp (10.10.10.22). Tue Jul 11 08:35:11 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: TraceDCattempting authentication with domain controller \\FILER2K3MIXDC01. Tue Jul 11 08:35:11 CEST [auth.trace.authenticate.Rejected:info]: AUTH: attempt by rejected by the domain controller with error 0xc0000064: DC indicates is not from a trusted domain. Tue Jul 11 08:35:11 CEST [auth.trace.authenticate.TraceMsg:info]: AUTH: from 10.10.10.22 rejected because guest not set. •
A trace after the guest is enabled (set to pc):
system*> options cifs.guest_ pc system*> Tue Jul 11 08:59:17 CEST [auth.trace.authenticate.Accepted:info]: AUTH: by NULL from 10.10.10.22 accepted. Tue Jul 11 08:59:17 CEST [auth.trace.authenticate.TraceIP:info]: AUTH: attempt by winguy of domain TESTDOM from client machine windows-xp (10.10.10.22). Tue Jul 11 08:59:17 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: TraceDCattempting authentication with domain controller \\FILER2K3MIXDC01. Tue Jul 11 08:59:17 CEST [auth.trace.authenticate.Rejected:info]: AUTH: attempt by rejected by the domain controller with error 0xc0000064: DC indicates is not from a trusted domain. Tue Jul 11 08:59:17 CEST [auth.trace.authenticate.Accepted:info]: AUTH: by winguy from 10.10.10.22 accepted.
8-21
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
There is no obvious message logged showing that this has been mapped to pc. The last line of output simply shows that the was accepted by the storage system after the domain controller indicated that the was not from a trusted domain. This is a clue to the mapping. What you can do is check the output of the command cifs sessions, which shows the mapped details and the fact that this is the guest . system*> cifs sessions Server s as SYSTEM in Windows 2000 domain FILER2K3MIX. Root volume language is not set. Use vol lang. Selected domain controller \\FILER2K3MIXDC01 for authentication. ========================================== PC ()
#shares #files
winguy (TESTDOM\winguy - pc[guest]) A trace showing an error when an attempt is made to map the to pc ( that it is the to be used for guests), but the customer has deleted pc from /etc/wd file: system*> Tue Jul 11 09:07:50 CEST [auth.trace.authenticate.Accepted:info]: AUTH: by NULL from 10.10.10.22 accepted. Tue Jul 11 09:07:50 CEST [auth.trace.authenticate.TraceIP:info]: AUTH: attempt by winguy of domain TESETDOM from client machine windows-xp (10.10.10.22). Tue Jul 11 09:07:50 CEST [auth.dc.trace.DCConnection.statusMsg:info]: AUTH: TraceDCattempting authentication with domain controller \\FILER2K3MIXDC01. Tue Jul 11 09:07:50 CEST [auth.trace.authenticate.Rejected:info]: AUTH: attempt by rejected by the domain controller with error 0xc0000064: DC indicates is not from a trusted domain. Tue Jul 11 09:07:50 CEST [auth.mapNTToUnix.failed:error]: AUTH: Error mapping NT winguy to Unix : 0xc0000001 (Unix name not valid). is rejected.
8-22
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: If Does Not Exist… 4. If the domain controller indicates the does not exist, the storage system cannot allow guest access unless the cifs.guest_ is set. –
–
Potential Issue: “Guest access is denied.” Set the guest to a desired name (_name): system> options cifs.guest_ _name The configured name () specifies the UNIX ID, group ID, and group set. An example of a name is “pc” The cifs.guest_ is for an unauthenticated Windows . Note: The default mapping for a UNIX that specifies an NT (_name) can be set with: system> options wafl_default_nt_ _name
© 2008 NetApp. All rights reserved.
23
ISSUE: IF DOES NOT EXIST 4. If the domain controller indicates that the does not exist, the storage system cannot allow guest access unless the cifs.guest_ is set. •
Potential Issue: “Guest access is denied.” •
Set the guest to a desired name (_name): system> options cifs.guest_ <>
•
The configured name () specifies the UNIX ID (UID), group ID (GID), and group set. An example of a name is “pc.” The cifs.guest is for an unauthenticated Windows (for example, from an untrusted domain). The name for this must also be in the /etc/wd file.
If an unauthenticated Windows is given the cifs.guest_, then it is mapped to a UNIX name with a UID and GID. If the unauthenticated Windows wants to access an NTFS file, the does not have any group rights (because the is unauthenticated), so the ’s authorization is limited to accessing files that are available to “everyone.” If the wants to access a UNIX file, then the UID and GID of the cifs.guest_ are used.
8-23
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
The option cifs.guest_ enables a to get access to a storage system provided in which the storage system either: •
Uses a domain controller for authentication and the is not in a trusted domain, or
•
Uses the /etc/wd file or the NIS database for authentication and the has no entry in the /etc/wd file or the NIS database
NOTE: The default mapping for a UNIX that specifies an NT (_name) can be set with: system> options wafl_default_nt_
8-24
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: Map NT to UNIX 5. Storage system maps NT () to a UNIX name Potential Issue: “The NT does not map or the UNIX name does not exist.” – Check for the existence of the UNIX name in the /etc/wd file system> rdfile /etc/wd Edit the /etc/wd file when necessary. If using an NIS server: – system> nis info – Check the status of NIS – system> options nis.group_update_schedule © 2008 NetApp. All rights reserved.
25
ISSUE: MAP NT TO UNIX 5. The storage system maps NT () to a UNIX name. •
Potential Issue: “The NT does not map or the UNIX name does not exist.” Check for the existence of the UNIX name in the /etc/wd file. •
system> rdfile /etc/wd Edit the /etc/wd file when necessary.
•
If using an NIS server: •
system> nis info The nis info command displays the status of the NIS client and slave services along with the domain name and the last time the local group cache was updated.
•
Check the status of NIS. system> options nis.group_update_schedule Make sure NIS updates are available.
The options nis.group_update_schedule command specifies the hours of the day when the local NIS group cache has to be updated. If you do not cache the NIS group, performance is impacted.
8-25
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: Map NT to UNIX (Cont.) Potential Issue: “The NT does not map or the UNIX name does not exist.” (Cont.) – Check the mapping for NT and UNIX name system> rdfile /etc/map.cfg Edit the /etc/map.cfg file when necessary and be sure to use the proper syntax system> wcc -S
and wwc -u
mappings with the wcc command
© 2008 NetApp. All rights reserved.
ISSUE: MAP NT TO UNIX (CONT.)
8-26
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
26
Issue: Checking Share Permissions 6. Storage system compares NT information with the share ACL Potential Issue: “ does not have access to the share.” – Check the share-level ACL. – system> cifs shares The CLI is the best way to check the ACLs. – C:\> Use the Computer Management GUI (Windows 2000 or later) to view the shares. The Windows client must have rights to connect to the storage system. © 2008 NetApp. All rights reserved.
27
ISSUE: CHECKING SHARE PERMISSIONS 6. The storage system compares NT information with the share ACL. •
Potential Issue: “ does not have access to the share.” Check the share-level ACL. •
system> cifs shares
•
C:\> Use the Computer Management GUI (Windows 2000 or later) to view the shares. The Windows client must have rights to connect to the storage system.
The cifs shares command displays one or more shares, edits one or more shares, creates a share, deletes a share, or displays a total summary of the shares.
8-27
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Issue: Checking File Permissions 7. Storage system compares NT info with file ACL or mapped UNIX with UNIX file permissions
Potential Issue: “ does not have access to a file.” – Check the security style.
system> qtree status If the qtree has the wrong security style, use: –
system> qtree security
[ntfs|unix|mixed]
Check the NT ACL information. – Right click Properties -> Security tab – Use fsecurity command Check the UNIX file permissions. – unix_client> ls –l Use only if qtree status is “UNIX” or “mixed”
© 2008 NetApp. All rights reserved.
ISSUE: CHECKING FILE PERMISSIONS
8-28
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
28
Issue: Checking File Permissions (Cont.) Resolving denial or unexpected accepted file access can be difficult – Usually only a general “Access Denied” error occurs – Error could be a result of many problems
Two tools to help resolve the problem: – Data ONTAP® sectrace command – Microsoft’s cacls.exe command
© 2008 NetApp. All rights reserved.
29
CHECKING FILE PERMISSIONS (CONT.) In the past, when s suspected permission problems, they relied solely on NetApp to help them trace the source of the problem. The Data ONTAP® sectrace command allows s to quickly find the source of access problems. s use the sectrace command with a filter to trace access and incoming requests. The filter is based on a path, an IP address of the client, or the UNIX or Windows name. The access decisions to grant or deny the request are recorded in an EMS message.
8-29
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
sectrace Command s can set a storage system to display file access denials or acceptances. – Traces appear on the console.
To configure: – sectrace add -ip 10.0.0.2 -a -ip filters the report to only traffic coming from this client. -a adds acceptance information, default is only denial information. Other possible filters: – -nt – -unix – -path © 2008 NetApp. All rights reserved.
30
SECTRACE COMMAND To configure sectrace, use the add method along with the optional switches: •
-ip switch filters the report to only network traffic coming from a particular client machine.
•
-a switch includes not just denial information but adds file access granted information
•
-nt switch limits the information in the trace report to a particular Window
•
-unix switch limits the information in the trace report to a particular unix . You can provide a UID or name.
•
-path switch limits the information in the trace report to a particular path.
8-30
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
sectrace Command (Cont.) To display configured traces: – sectrace show [filter_index] Displays all or a single trace report
– Example: system> sectrace show Sectrace filter: 1 Number of trace Hits: 338 reports since added IP Addr: 10.0.0.2 Trace DENY and ALLOW events
© 2008 NetApp. All rights reserved.
SECTRACE COMMAND (CONT.)
8-31
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
31
sectrace Command (Cont.) Trace Report example:
Access allowed because 'Execute' permission (0x20) is granted on requested path (Access allowed because the is root) - Status: 1:8796095119360:0:0 - 10.254.134.39 NT name: DEVELOPMENT\_jdoe - UNIX name: root(0) - - Path: /vol/vol0/home/
To get more details, use: system> sectrace print-status 1:8796095119360:0:0 Access allowed because 'Traverse' permission is granted on requested path. – Access allowed because the is root.
© 2008 NetApp. All rights reserved.
sectrace COMMAND (CONT.)
8-32
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
32
sectrace Command (Cont.) To turn off the trace report: – sectrace delete <[filter_index] | all>
that trace reports should only be used when troubleshooting file permissions. Turn it off when you are not using it.
© 2008 NetApp. All rights reserved.
sectrace COMMAND (CONT.)
8-33
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
33
Microsoft Tool Microsoft provides a command that shows access control list information. – cacls.exe
Example: C:\> cacls file1.pdf C:\file1.pdf NETAPP\1:R NT AUTHORITY\SYSTEM:F BUILTIN\s:F
Rights: – – – –
R = Read W = Write C = Change (read/write) F = Full control
© 2008 NetApp. All rights reserved.
34
MICROSOFT TOOL Microsoft provides a tool for analyzing access control list information. This command is cacls.exe.
8-34
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Authentication Success 8. If has access to both the share and file, storage system grants the access to the data Success
© 2008 NetApp. All rights reserved.
AUTHENTICATION SUCCESS
8-35
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
35
CISF Setup Scenarios
© 2008 NetApp. All rights reserved.
CIFS SETUP SCENARIOS
8-36
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
36
cifs setup Scenarios The following scenarios show common cifs setup problems and their solutions. 1. DNS disabled 2. DNS enabled, but domain short name is not resolvable 3. Time synchronization differs more than 5 minutes 4. Incorrect domain controller IP address
© 2008 NetApp. All rights reserved.
cifs setup SCENARIOS
8-37
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
37
cifs setup: DNS Disabled system> cifs setup ... Selection (1-4)? [1]: 1 In order to operate correctly within an Active Directory based Windows domain, CIFS must use the DNS resolver service. That service is currently not configured on the filer. You must either configure DNS resolver services or choose a different authentication style. Do you want to configure the filer's DNS resolver service? [y]: What is the filer's DNS domain name? []: *** *** *** ***
CIFS cannot an Active Directory-based domain when the filer's DNS resolver service is not available. You must choose a different authentication style to continue.
NOTE: The cifs setup script is clever enough to help you through this mistake. © 2008 NetApp. All rights reserved.
38
cifs setup: DNS DISABLED Note that the storage system was previously a member of a Windows-style workgroup that did not require the DNS resolver service, so DNS is disabled. To resolve the problem, enter the DNS domain name and IP addresses for the DNS name servers.
The cifs setup script is clever enough to help you through this mistake, as shown in the following slide.
8-38
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs setup: DNS Disabled (Cont.) (1)Active Directory domain authentication (Active Directory domains only) (2)Windows NT 4 domain authentication (Windows NT or Active Directory domains) (3)Windows Workgroup authentication using the filer's local s (4)/etc/wd and/or NIS/LDAP authentication Selection (1-4)? [1]: 1 In order to operate correctly within an Active Directory based Windows domain, CIFS must use the DNS resolver service. That service is currently not configured on the filer. You must either configure DNS resolver services or choose a different authentication style. Do you want to configure the filer's DNS resolver service? [y]: What is the filer's DNS domain name? []: ngslabhd.europe.netapp.com
© 2008 NetApp. All rights reserved.
cifs setup: DNS DISABLED (CONT.)
8-39
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
39
cifs setup: DNS Disabled (Cont.) What are the IPv4 address(es) of your authoritative DNS name server(s)? [10.64.25.91]: Would you like to specify additional DNS name servers? [y]: What are the IPv4 address(es) of your authoritative DNS name server(s)? [10.64.25.92]: Would you like to specify additional DNS name servers? [n]: ... system> Tue May 16 05:40:43 GMT [cifs.startup.local.succeeded:info]: CIFS: CIFS local server is running.
Success © 2008 NetApp. All rights reserved.
cifs setup: DNS DISABLED (CONT.)
8-40
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
40
cifs setup: Domain too Short system> cifs setup ... Selection (1-4)? [1]: 1 In order to operate correctly within an Active Directory based Windows domain, CIFS must use the DNS resolver service. That service is currently not configured on the filer. You must either configure DNS resolver services or choose a different authentication style. Do you want to configure the filer's DNS resolver service? [y]: What is the filer's DNS domain name? []: ngslabhd.europe.netapp.com What are the IPv4 address(es) of your authoritative DNS name server(s)? [10.64.25.91]: Would you like to specify additional DNS name servers? [y]: What are the IPv4 address(es) of your authoritative DNS name server(s)? [10.64.25.92]:
© 2008 NetApp. All rights reserved.
cifs setup: DOMAIN TOO SHORT
8-41
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
41
cifs setup: Domain too Short (Cont.) Would you like to specify additional DNS name servers? [n]: What is the name of the Active Directory domain? [ngslabhd.europe.netapp.com]: filer2k3mix Note: DNS name too short *** CIFS Setup cannot find a necessary DNS service ***(SRV)record for the specified domain. *** The"_ldap._t.FILER2K3MIX" service cannot be *** found using DNS as currently configured. (1) Enter a different Active Directory domain name (2) Reconfigure DNS and try again (3) Exit CIFS Setup Selection (1-3)? [1]:
© 2008 NetApp. All rights reserved.
cifs setup: DOMAIN TOO SHORT (CONT.)
8-42
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
42
cifs setup: Domain too Short (Cont.) What is the name of the Active Directory domain? []: filer2k3mix.ngslabhd.europe.netapp.com
NOTE: Provide Fully Qualified Domain Name (FQDN) In order to create an Active Directory machine for the filer, you must supply the name and of a Windows with sufficient privileges to add computers to the FILER2K3MIX.NGSLABHD.EUROPE.NETAPP.COM domain. ... system> Tue May 16 06:32:12 GMT [cifs.startup.local.succeeded:info]: CIFS: CIFS local server is running.
Success
© 2008 NetApp. All rights reserved.
43
cifs setup: DOMAIN TOO SHORT (CONT.) To resolve the problem, use the Fully Qualified Domain Name (FQDN) when the Active Directory domain name is entered.
8-43
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs setup: Time Sync system> cifs setup ... Selection (1-4)? [1]: 1 What is the name of the Active Directory domain? []: FILER2K3MIX.NGSLABHD.EUROPE.NETAPP.COM In order to create an Active Directory machine for the filer, you must supply the name and of a Windows with sufficient privileges to add computers to the FILER2K3MIX.NGSLABHD.EUROPE.NETAPP.COM domain. Enter the name of the Windows [
[email protected]]: for
[email protected]: Could not authenticate with domain controller: Filer and Domain controller clocks are more than 5 minutes apart. Filer and Domain Controller times must be synchronized in Windows 2000 domains. © 2008 NetApp. All rights reserved.
cifs setup: TIME SYNC
8-44
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
44
cifs setup: Time Sync (Cont.) CIFS - unable to to domain as
[email protected]. Please try again (Ctrl-C to exit). Enter the name of the Windows [
[email protected]]: system>
Use date command or setup NTP services the timezone with timezone command Storage system and DC must be in sync within 5 minutes When in sync, rerun cifs setup © 2008 NetApp. All rights reserved.
45
cifs setup: TIME SYNC (CONT.) A quick fix to resolve this problem is to use the date command on the storage system and change the storage-system time to match the domain-controller time. If the storage-system time differs more than 30 minutes from the time server, then you must use the date command to reset the storage-system time.
8-45
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
cifs setup: Incorrect DC IP system> cifs setup ... Selection (1-4)? [1]: 1 What is the name of the Active Directory domain? [ngslabhd.europe.netapp.com]:filer2k3mix.ngslabhd.europe.netapp .com In order to create an Active Directory machine for the filer, you must supply the name and of a Windows with sufficient privileges to add computers to the FILER2K3MIX.NGSLABHD.EUROPE.NETAPP.COM domain. Enter the name of the Windows [
[email protected]]: for
[email protected]: Could not authenticate with domain controller: KRB5 error code 68.
© 2008 NetApp. All rights reserved.
cifs setup: INCORRECT DC IP
8-46
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
46
cifs setup: Incorrect DC IP (Cont.) CIFS - unable to to domain as
[email protected]. Please try again (Ctrl-C to exit). Enter the name of the Windows [
[email protected]]: for
[email protected]: Could not authenticate with domain controller: KRB5 error code 68. CIFS - unable to to domain as
[email protected]. Please try again (Ctrl-C to exit).
© 2008 NetApp. All rights reserved.
cifs setup: INCORRECT DC IP (CONT.)
8-47
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
47
cifs setup: Incorrect DC IP (Cont.) Enter the name of the Windows [
[email protected]. COM]: system> [Ctrl-C is typed to exit cifs setup.] system> cifs prefdc print Preferred DC ordering per domain: FILER2K3MIX:1. 10.64.21.95 Incorrect DC IP address
© 2008 NetApp. All rights reserved.
cifs setup: INCORRECT DC IP (CONT.)
8-48
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
48
cifs setup: Incorrect DC IP (Cont.) Incorrect IP address: cifs prefdc add <domain_name>
To resolve this problem: 1. cifs prefdc delete <domain_name> 2. cifs prefdc add <domain_name>
© 2008 NetApp. All rights reserved.
cifs setup: INCORRECT DC IP (CONT.)
8-49
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
49
Best Practices
© 2008 NetApp. All rights reserved.
BEST PRACTICES
8-50
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
50
Best Practices Configure NTP to same time sources as DCs Active Directory is dependent on DNS – Configure DNS to find:
Active Directory domain controllers LDAP servers Kerberos servers Kwd (Kerberos ) servers
© 2008 NetApp. All rights reserved.
BEST PRACTICES
8-51
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
51
Best Practices (Cont.) If possible, eliminate WINS – Avoids conflicting with DNS
Prefer to bind to a local or nearest possible DC / LDAP service whenever appropriate If sites have been implemented, storage system with a site that has high-bandwidth connections – Better performance
© 2008 NetApp. All rights reserved.
BEST PRACTICES (CONT.)
8-52
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
52
Module Summary
© 2008 NetApp. All rights reserved.
8-53
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
53
Module Summary In this module, you should have learned: A multiprotocol scenario is complex but with a proper understanding any difficulties can be avoided. Several issues may come up during CIFS setup; each can be avoided with proper planning.
© 2008 NetApp. All rights reserved.
MODLUE SUMMARY
8-54
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
54
Exercise Module 8: Troubleshooting
EXERCISE Please refer to your Exercise Guide for more instruction.
8-55
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
Check Your Understanding When communication from a storage system to a domain controller fails or trust across multiple domains fails, what steps are useful to resolve the problem? When the NT does not map or the UNIX name does not exist, what steps are useful to resolve the problem? When the does not have access to the share, what steps are useful to resolve the problem?
© 2008 NetApp. All rights reserved.
CHECK YOUR UNDERSTANDING
8-56
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
56
Check Your Understanding When the storage system and the Active Directory domain controller time clocks differ more than 5 minutes, what steps are useful to resolve the problem? During cifs setup, if you enter the short name for the Active Directory domain, what error occurs and how do you resolve the problem?
© 2008 NetApp. All rights reserved.
CHECK YOUR UNDERSTANDING
8-57
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
57
Additional Resources Education • • • •
NFS istration on Data ONTAP 7.3 SAN istration on Data ONTAP 7.3 NetApp Protection Software istration Performance Analysis on Data ONTAP 7.3
Web sites • NOW™ (NetApp on the Web) • NetApp (www.netapp.com)
© 2008 NetApp. All rights reserved.
ADDITIONAL RESOURCES
8-58
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate
64 64
Thank You! Please fill out an evaluation.
THANK YOU!
8-59
CIFS istration for Data ONTAP 7.3: M08_Troubleshooting
© 2008 NetApp. This material is intended for training use only. Not authorized for re-production purposes.
NetApp University - Do not distribute or duplicate