Table Of Contents - HP NetStorage 6000 Manual

File sharing security
Hide thumbs Also See for NetStorage 6000:
Table of Contents

Advertisement

1
Introduction __________________________________________________ 4
2
Security on UNIX Networks ______________________________________ 4
2.1
General Overview _ ____ ___ ____ ___ ______ ________ _______ _______ 4
2.2
Restricting User Access __ ___ ____ ___ ______ ________ _______ _______ 5
2.3
Restricting Host Access __ ___ ____ ___ ______ ________ _______ _______ 6
2.4
Considerations for the HP NetStorage 6000 ___ ________ _______ _______ 6
2.4.1
Trusted Hosts __________________________________________________________ 6
2.4.2
The /etc Directory ______________________________________________________ 7
2.4.3
The /etc/approve File ___________________________________________________ 7
3
Security on Windows Networks ___________________________________ 8
3.1
General Overview _ ____ ___ ____ ___ ______ ________ _______ _______ 8
3.2
Share Level Security ____ ___ ____ ___ ______ ________ _______ _______ 9
3.3
User Level Security _ ____ ___ ____ ___ ______ ________ _______ _______ 9
3.3.1
NT Domains __________________________________________________________ 10
3.3.2
User Authentication _____________________________________________________ 12
3.3.3
Password Maintenance and Encryption _____________________________________ 13
3.3.4
Security Descriptors_____________________________________________________ 14
3.4
Considerations for the HP NetStorage 6000 ___ ________ _______ ______ 16
3.4.1
Share Level Security ____________________________________________________ 16
3.4.2
User Level Security _____________________________________________________ 16
3.4.3
DOS attributes ________________________________________________________ 17
4
4.1
General Overview _ ____ ___ ____ ___ ______ ________ _______ ______ 17
5
File Sharing Configuration ______________________________________ 18
5.1
File Volume Permissions __ ___ ____ ___ ______ ________ _______ ______ 18
5.2
Mapping Strategies ____ ___ ____ ___ ______ ________ _______ ______ 19
5.2.1
User Mapping_________________________________________________________ 20
5.2.2
Group Mapping_______________________________________________________ 20
6
Mapping Clients _____________________________________________ 20
6.1
Mapping Files ____ ____ ___ ____ ___ ______ ________ _______ ______ 21
6.2
Establishing a Windows Client ____ ___ ______ ________ _______ ______ 22
6.3
Establishing a UNIX Client ___ ____ ___ ______ ________ _______ ______ 24
Copyright © 2000 Hewlett-Packard Company
All Rights Reserved

Table of Contents

Page 2 of 28

Advertisement

Table of Contents
loading

This manual is also suitable for:

Surestore netstorage 6000

Table of Contents