This section describes how to share namespaces in CIFS mode so that users can access the namespaces.
The Create CIFS Share page is displayed on the right.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Share Name |
Name of the share, to be used by users to access shared resources. [Value range]
|
Namespace |
Namespace for which you want to create a CIFS share.
NOTE:
If the selected namespace is the secondary resource in a remote replication pair, data in the namespace is probably being modified when it is accessed. Before performing this operation, confirm that the application allows possible data inconsistency. |
Dtree |
Dtree for which you want to create a CIFS share. If you do not select a dtree, the CIFS share is created for the entire namespace. |
Table 2 describes related parameters.
Parameter |
Description |
|---|---|
Description |
Description of the CIFS share.
NOTE:
The description can be left blank or contain up to 255 characters. |
Create Default ACL |
Determine whether to add a default ACL. This function creates a default ACL (full control rights to everyone; applied to the current directory, its subdirectories, and files in them) for a shared CIFS root directory if the directory has no ACL. You can change the default ACL in follow-up operations. To retain the UNIX mode bits, disable this function. |
Notify |
After this function is enabled, a client's modification operations on a directory, such as adding a directory, adding a file, modifying the directory, and modifying a file, can be detected by other clients that are accessing this directory or the parent directory of this directory. Results of the modification operations are displayed after the page is automatically refreshed. |
Continuously Available |
This option is used to enable or disable the SMB Failover feature.
NOTE:
The SMB Failover feature takes effect only after you enable the Oplock configuration item and run command change service cifs smb_global_ca_enable= yes on the CLI to enable the SMB service continuity function for tenants. |
SMB3 Encryption |
Determine whether to enable SMB3 encryption. After this function is enabled, the system encrypts the share to ensure data security, but performance deteriorates.
NOTICE:
|
Unencrypted Client Access |
After this function is enabled, clients that do not have encryption capabilities can access the share.
NOTICE:
|
Oplock |
Opportunistic locking (oplock) is a mechanism used to improve client access efficiency and locally buffer files before they are sent to shared storage. This function is not recommended in the following scenarios:
NOTE:
Oplock for a share takes effect only when both oplock for the account and oplock for the share are enabled. |
Lease |
Lease allows a client to lock a file using a lease key, and the file locking can be canceled by the server.
NOTE:
|
ABE |
Access-based enumeration. Enabling this function hides files and folders that users do not have permissions to access.
NOTE:
SMB2 and SMB3 support the ABE function, but SMB1 does not. |
Show Previous Version |
After the function of displaying previous versions is enabled, a client can display previous versions and supports version rollback. |
The Add User or User Group page is displayed.
The value can be Everyone, Local Windows authentication user, Local Windows authentication user group, AD domain user, or AD domain user group.
change namespace general name=Namespace name unix_permissions=777
change dtree general dtree_name=Dtree name file_system_id=Namespace ID unix_permissions=777
Table 3 describes related permissions.
Permission |
Forbidden |
Read-Only |
Read/Write |
Full Control |
|---|---|---|---|---|
Viewing files and subdirectories |
Xa |
√b |
√ |
√ |
Viewing file contents |
X |
√ |
√ |
√ |
Running executable files |
X |
√ |
√ |
√ |
Adding files or subdirectories |
X |
-c |
√ |
√ |
Modifying file contents |
X |
- |
√ |
√ |
Deleting files and subdirectories |
X |
- |
√ |
√ |
Renaming |
X |
- |
√ |
√ |
Changing ACL permissions of files or directories |
X |
- |
- |
√ |
a: Users do not have the permission. b: Users have the permission. c: The specified permission is not involved. |
||||
When a share is created for the audit log namespace, you cannot set the permission to Read/Write and Full control.
The system adds the selected users or user groups to the Permission list.