This section describes how to share namespaces in CIFS mode so that users can access the namespaces.
You are not advised to enable the CIFS protocol for a namespace in Case-sensitive mode.
If the preceding scenarios have no impact on services or the impact is acceptable, before creating a CIFS share, you are advised to choose the Case-sensitive mode, enable the recycle bin function of the namespace, and set a proper retention period to reduce the probability of data loss caused by abnormal client behaviors.
If you cannot evaluate the impact on services, contact technical support engineers.
The Create CIFS Share page is displayed on the right.
Table 1 describes the related parameters.
Parameter |
Description |
|---|---|
Share Name |
Indicates the name of the CIFS share, which is used by users to access shared resources. [Value range]
|
Namespace |
Indicates the namespace for which you want to create a CIFS share.
NOTE:
If the selected namespace is the secondary resource in a remote replication pair, data in the namespace is probably being modified when it is accessed. Before performing this operation, confirm that the application allows possible data inconsistency. |
Dtree |
Indicates the dtree for which you want to create a CIFS share. If you do not select a dtree, the CIFS share is created for the entire namespace. |
The description can be left blank or contain up to 255 characters.
The Add User or User Group page is displayed.
The value can be Everyone, Local Windows authentication user, Local Windows authentication user group, AD domain user, or AD domain user group.
change namespace general name=Namespace name unix_permissions=777
change dtree general dtree_name=Dtree name file_system_id=Namespace ID unix_permissions=777
Table 2 describes the permissions.
Permission |
Forbidden |
Read-Only |
Read/Write |
Full Control |
|---|---|---|---|---|
Viewing files and subdirectories |
Xa |
√b |
√ |
√ |
Viewing file contents |
X |
√ |
√ |
√ |
Running executable files |
X |
√ |
√ |
√ |
Adding files or subdirectories |
X |
-c |
√ |
√ |
Modifying file contents |
X |
- |
√ |
√ |
Deleting files and subdirectories |
X |
- |
√ |
√ |
Renaming |
X |
- |
√ |
√ |
Changing ACL permissions of files or directories |
X |
- |
- |
√ |
a: Users do not have the permission. b: Users have the permission. c: The specified permission is not involved. |
||||
The system adds the selected users or user groups to the Permission list.