NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
|
|
|
- Arron Green
- 10 years ago
- Views:
Transcription
1 NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version /01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc.
2 UNIX/LINUX environment Of NAStorage Under Security Policy Start Enable Unix/Linux Network (NFS Protocol) Add UNIX Host IP address into Host List Export a share resource in NFS environment Setting security for share resource in NFS environment For NFS client to access data from NAStorage Multiple UIDs on a particular IP for read/write access to a share resource 1
3 1. Enable Unix/Linux Network (NFS Protocol) For file accessing, users can access NAStorage via NFS(UNIX/Linux) protocol. You just need to enable Unix/Linux Network(NFS Protocol) for NAStorage. Configuration flow: Network UNIX/Linux Select check box Enable Unix/Linux Network (NFS Protocols) then Apply. Enable Unix/Liunx Network(NFS Protocol),that NAStorage will accept file access via NFS protocol. If you didn t enable Unix/Linux (NFS Protocol), NAStorage won accept file access via NFS protocol. That mean you can t use showmount command to list share resource for NAStorage or use rpcinfo command to check NAStorage nfs service status, you will receive a Port mapper failure message. 2
4 NAStorage won accept file access via NFS protocol, if you didn t enable Unix/Linux (NFS Protocol). If you disable Unix/Linux (NFS Protocol) for NAStorage, you won t export any share resource in NFS environment, You can t export any share resource in NFS environment, because Unix/Linux (NFS Protocol) is disable 3
5 2. Add UNIX Host IP address into Host List NAStorage support Local authentication policy for NFS protocol, that means if someone want to mount a share resource from NAStorage, the IP address of the UNIX/Linux host must be add to Local User DataBase first. Configuration flow: Security Manager Account UNIX Host Add Host. The candidates of UNIX hosts, who can access data from NAStorage If you don t add any host IP address in UNIX Host table, the default setting was Specify privileged hosts, that means no any UNIX host can t mount the resource from NAStorage contents, UNIX host only can see the available share resource by using showmount command but doesn t have permission to mount. 4
6 No UNIX/Linux host I Every UNIX host can t mount the resource from NAStorage contents if it doesn t specify any privileged host 5
7 3. Export a share resource in NFS environment NAStorage supports NFS v3 network file protocol. If someone want to export a share resource from NAStorage in NFS environment, just need to enable UNIX/Linux Network (NFS) for share resource. Configuration flow: Security Manager File/Folder click create" enable UNIX/Linux Network (NFS) then Apply. 6
8 Export a share resource in NFS environment(?) Use showmount command for list the available share resource under NAStorage Available share resource list under NAStorage 7
9 4. Setting security for share resource in NFS environment NAStorage will trust the UNIX host (mounting volumes from NAStorage) to check UID, GID of logon user with the permission of mounted NAStorage share resource and the files/folders. The permission (Owner User & Group, and access right rwx rwx rwx) configured in NAStorage web admin page will be set as the default permission of mount point while NFS client mounts it. Share Permission: Specify privileged hosts NAStorage will count on the settings here to determine which UNIX hosts can access data from NAStorage with certain read/write permission. Configuration flow: Security Manager Share click Permission" UNIX Host Add UNIX host IP address from left to right window and select the permission then Apply 8
10 The access permission of this share resource. When NFS client mount this share resource, the permission of mount point will be replaced with this one. NAStorage will count on the settings here to determine which Unix hosts can access data from NAStorage with certain read/write permission. For example,(unix/linux host ) you assign Read/Write permission for host in NAStorage. Therefore this host can mount the share resource from NAStorage and can also create file/folder in the mount point. This host has Read/Write permission for the share resource point from NAStorage and also can create file/folder in the mount point. 9
11 You can check this mount point permission already changed to UID:root GID:root Permission:755. If the UNIX host has R/W permission for this share, root user also can issue chown / chmod command to change the owner/permission for this mount point. If you change the permission for this mount point, the admin page share permission will also be change. 10
12 If you change the permission Read/Write to Read-Only for host, you can mount this share resource but you don t have write permission in the mount point. This host has Read-Only permission for the share resource point from NAStorage and can t create file/folder in the mount point. 11
13 Share Permission: All hosts are permitted NAStorage will allow set permission (Read-Only/Read-Write) for all hosts, that means if someone wants to share a share resource for all host and assign all host Read-Only/Read-Write permission in NFS environment, just select All host are permitted and assign Read-Only/Read-Write permission. 12
14 5. For NFS client to access data from NAStorage In UNIX-like network environment, we could use mount command mounting a share resource from NAStorage. (For example, the IP address of NAStorage is ) First of all, login UNIX/Linux host in Root permission, because only root user can use mount command. Use showmount command to list the available share resource under NAStorage Available share resource list under NAStorage Make an empty directory /nastorage as a mounting point under /root directory. mount point: /root/nastorage; the original permission 755, Use mount command mounting /NFS001 to mounting point /root/nastorage. Please make sure the case sensitive of the share resource, because NFS001 was totally different with nfs001 in NFS file system. The permission (Owner User & Group, and access right rwx rwx rwx) configured in NAStorage web admin page will be set as the default permission of mount point while NFS client mounts it. 13 The permission of mount point /root/nastorage has been changed from 755 to 700.
15 Change to directory /nastorage and use ls command to see the contents. You will find the contents of /NFS001 already be mounted under /root/nastorage Use mount command to check the all mounting point of this local machine. Use UNIX command: chmod & chown to change file/folder permission Un-mount volume from NAStorage. 14
16 15
17 6. Multiple UIDs on a particular IP for read/write access to a share resource. In our NAStorage (NFS environment) design, we just assign UID, GID and Access right to the mounting directory as its default permission. If you want give multiple UIDs has read/write access right, it should be handle by UNIX/Linux machine, not by NAStorage. But anyway, we still make an example for you if you went reach the purpose. First of all, login UNIX/Linux host in Root permission, create a group nasuser. You can check this new group ID (GID) by checking file /etc/group. Great a group(nasuser) and assign ID number 200. Then flied it to NAStorage as below picture. If group "nasuser" ID is 200, type GID "200" and change the default permission 755 to 775,that means this group has read/write permission (group attribute=7) to access share resource. 16
18 The access permission of this share resource. When NFS client mounts this share resource, the permission of mount point will be replaced with this one. Use mount command mounting a share resource from NAStorage to mounting point /root/nastorage in Unix host. Basically, you will see the permission of the mounting point is 775, UID root, GID nasuser. The permission of mount point /root/nastorage has been changed from 755 to 775. UID root/0, GID nasuser/200. In UNIX host, You can assign the multiple UIDs (base on you want) to GID "nasuser" that mean these UIDs can read/write access to this volume. Because the second bit already change to 7 (755 to 775). 17
19 Create user (nfs001 nfs002 nfs003) and assign them into nasuser group. Login UNIX/Linux host in these UIDs permission. for example nfs001 user. You will find the contents of /NFS already be mounted under /root/nastorage with UID root GID nasuser 775 permission. That means you have Read/Write permission to access share resource, because you were belong to nasuser group. User nfs001 can Read/Write for this mount point and the create file belong to user nfs
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
NAStorage. Administrator Guide. How To Use Veritas Backup Exec With. NAStorage
NAStorage Administrator Guide How To Use Veritas Backup Exec With NAStorage Version 1.00 05/28/2003 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. Veritas Backup Exec Software The NAS server
Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1
Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be
Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc.
Insecure IP Storage Networks Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc. BlackHat 2004 Agenda Insecure Network Attached Storage (NAS) Introduction NAS Protocols NAS Attacks Conclusion
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
Worksheet 3: Distributed File Systems
Worksheet 3 Distributed File Systems Name Class Please complete this worksheet and print it out. Author J.Jackson Objectives This exercise aims to investigate network file structures using various tools.
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Unifying Authorization Models
Unifying Authorization Models Merging /etc/group and 'Domain Users' Gerald Carter Centeris [email protected] http://www.samba.org/ Slide 1 Copyright G. Carter, 2006 Outline http://samba.org/~jerry/slides/lwny07_2up.pdf
How to share folders on Windows 7 and Windows 8
How to share folders on Windows 7 and Windows 8 1. Goto Control Panel / Network and Sharing / Advanced sharing options 2. Turn on file and printer sharing in (current profile) 3. Turn off [Password protected
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Clustered Data ONTAP 8.2
Updated for 8.2.1 Clustered Data ONTAP 8.2 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
Distributed File Systems Part I. Issues in Centralized File Systems
Distributed File Systems Part I Daniel A. Menascé File Naming Issues in Centralized File Systems c:\courses\cs571\procs.ps (MS-DOS) /usr/menasce/courses/cs571/processes.ps (UNIX) File Structure bitstream
How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or
Clustered Data ONTAP 8.3 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
NAS 109 Using NAS with Linux
NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
SAMBA VI: As a Domain Controller
Page 1 of 8 DocIndex Search Main - DocIndex - Connectivity SAMBA VI: As a Domain Controller Running A Linux Primary Domain Controller Joining Windows Machines To The Domain Making Your Life Easier Going
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
actinas Cube RDX FAQ
actinas Cube RDX FAQ 2011-05-31 www.actidata.com actinas Cube RDX FAQ - 1 - May 31, 2011 Overview of actinas Cube Storage Structure Software RAID: 1. Physical Disk Drives The HDDs 2. RAID Is a group of
Bitten by The NAS Bug
Bitten by The NAS Bug A Step-By-Step Guide to Converting and Using an Old Computer as a Workgroup File S Using the NASLite Network Attached Storage S Operating System TABLE OF CONTENTS Introduction...
Lucid Key Server v2 Installation Documentation. www.lucidcentral.org
Lucid Key Server v2 Installation Documentation Contents System Requirements...2 Web Server...3 Database Server...3 Java...3 Tomcat...3 Installation files...3 Creating the Database...3 Step 1: Create the
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
CA and SSL Certificates
1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Server Account Management
Server Account Management Setup Guide Contents: About Server Account Management Setting Up and Running a Server Access Scan Addressing Server Access Findings View Server Access Scan Findings Act on Server
SYMANTEC BACKUPEXEC2010 WITH StorTrends
SYMANTEC BACKUPEXEC2010 WITH StorTrends 1 Index 1. Introduction 3 2. Test Environment 3 3. System Requirement 4 4. Storage Requirement 4 5. Installation of Symantec Backup EXEC 2010 4 6. Installing Backup
Configuration Guide. Follow the simple steps given in this document when you are going to run Lepide Active Directory Cleaner for the first time.
Configuration 2015 Guide Follow the simple steps given in this document when you are going to run Lepide Active Directory Cleaner for the first time. Configuration Guide for the Lepide Active Directory
LDAP User Service Guide 30 June 2006
LDAP User Service Guide 30 June 2006 This documents usage of the LDAP User Service for NiagaraAX version 3.1. INSTALLATION... 2 PALETTE... 3 LDAPUSERSERVICE... 3 ACTIVEDIRECTORYSERVICE... 3 KEY CONCEPTS...
Load Balancing/High Availability Configuration for neoninsight Server
Load Balancing/High Availability Configuration for neoninsight Server Introduction: This document provides details on the configuration and the components used for a two node load balancing system with
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Configuring the Active Directory Plug-in
Wazza s QuickStart Configuring the Active Directory Plug-in Mac OS X 10.3.4 Background Using the Mac OS X 10.3.x built-in Active Directory (AD) plug-in, Mac users can authenticate with a Windows Active
Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network
Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
Linksys Business Series Network Storage System
Linksys Business Series Network Storage System Getting Started Guide GETTING STARTED GUIDE Linksys Business Series Network Storage System Models NSS4000 and NSS6000 Series 2007-2008 Copyright 2007-2008,
Local File Sharing in Linux
Local File Sharing in Linux Would you like to share files among multiple users on the same Linux system? Surprisingly, this is trickier to accomplish than it appears, so here is a method that works. The
How To Use Directcontrol With Netapp Filers And Directcontrol Together
Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl
Active Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep
Integrating Lustre with User Security Administration LAD 15 // Chris Gouge // 2015 Sep Topics User Security in Linux POSIX Permissions The Requirement for Upcall in Lustre Upcall Utilities Overview Upcall
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...
EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL
White Paper EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL Abstract This paper explains how the unified security model of EMC Isilon OneFS 6.5.5 resolves mismatches between the permissions
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
Active Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
StorHouse/CIFS Installation and Configuration Guide
StorHouse/CIFS Installation and Configuration Guide Publication Number 007-6328-001 Release 2.0 November 19, 2013 2013 Silicon Graphics International Corp. All Rights Reserved; provided portions may be
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
Authentication in a Heterogeneous Environment
Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation [email protected]
Creating an LDAP Directory
Systems and Network Management 1 Background Creating an LDAP Directory The ldap protocol is a standard for network directories. Some proprietary directory servers have been based on ldap, for example,
WINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
Common Internet File Sharing (CIFS) How-To
Common Internet File Sharing (CIFS) How-To Author: MaxGen Date: April 30, 2005 Introduction For those looking for another option besides NFS for recording movies to another PC on the network, there is
Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
Ciphermail Gateway Separate Front-end and Back-end Configuration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction
TEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi
TEL 500 Voice Communications Week 1 Write Up Session Initiation Protocol Lab Submitted To: Prof Ronny Bull By: Sai Sharan Korvi Date: 09/10/2014 ABSTRACT: Softphone is usually a software which can be used
Quick Start Guide of Hikvision IP Camera & Synology NAS Connection v1.1
Quick Start Guide of Hikvision IP Camera & Synology NAS Connection v1.1 Index 1. Adding DS112j to DS-2CD2112-I5 via NFS Mount Type... 4 2. Notes of using NFS mount type on DS112j... 7 3. Adding DS112j
Configure NFS Staging for ACS 5.x Backup on Windows and Linux
Configure NFS Staging for ACS 5.x Backup on Windows and Linux Document ID: 119030 Contributed by Piotr Borowiec and Aditya Ganjoo, Cisco TAC Engineers. Jul 21, 2015 Contents Introduction Prerequisites
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
EVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Procedure to Create and Duplicate Master LiveUSB Stick
Procedure to Create and Duplicate Master LiveUSB Stick A. Creating a Master LiveUSB stick using 64 GB USB Flash Drive 1. Formatting USB stick having Linux partition (skip this step if you are using a new
Implementing a Weblogic Architecture with High Availability
Implementing a Weblogic Architecture with High Availability Contents 1. Introduction... 3 2. Topology... 3 2.1. Limitations... 3 2.2. Servers diagram... 4 2.3. Weblogic diagram... 4 3. Components... 6
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Remote Desktop Administration
Remote Desktop Administration What is it? Remote Desktop Administration allows a user with appropriate privileges to connect to his/her computer at Rice from another computer, similar to the way one may
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
How to Backup XenServer VM with VirtualIQ
How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes
Connecting to SQL server
Micromedia International Technical study Author: Pierre Chevrier Number of pages: 17 Company: Micromedia International Date: 24/08/2011 Réf. : ETT_20110624_000001.docx Connecting to SQL server This document
MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative
MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative Author : admin Last 10+ years I worked on GNU / Linux as Desktop. Last 7 years most of my SSH connections
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
CDEX Checklist for JEDMICS Release 3.2. Prepared by: AMCOM Engineering Data Management System Program Office Redstone Arsenal, Alabama (256) 876-8251
CDEX Checklist for JEDMICS Release 3.2 Prepared by: AMCOM Engineering Data Management System Program Office Redstone Arsenal, Alabama (256) 876-8251 Revision History: 10 May 2002 1. Purpose During JEDMICS
Managing Access Control in PresSTORE
Managing Access Control in PresSTORE This article describes the functions to limit access for users in PresSTORE and discusses some scenarios as examples how to to configure non-administrator restore functions.
How To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp
INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
EMC ViPR Controller. Version 2.4. User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 DRAFT
EMC ViPR Controller Version 2.4 User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 DRAFT Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published November,
3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide
3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide Hello and welcome to our guide on how to set up a 3CX IP PBX for use with Twilio s Elastic SIP Trunking service. This guide covers the
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0)) Yuichi Nakamura July 3, 2006 Contents 1 What is RBAC 2 1.1 Overview............................... 2 1.2 How RBAC works in SELinux....................
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
The Web Pro Miami, Inc. 615 Santander Ave, Unit C Coral Gables, FL 33134 6505. T: 786.273.7774 [email protected] www.thewebpro.
615 Santander Ave, Unit C Coral Gables, FL 33134 6505 T: 786.273.7774 [email protected] www.thewebpro.com for v.1.06 and above Web Pro Manager is an open source website management platform that is easy
Configuring Renoir to Drive Simulation on Remote Machines
1. Introduction Configuring Renoir TM to Drive Simulation On Remote Machines As a major feature and enhancement of Renoir2000, designers now can run ModelSim compilation and simulation on local machine,
Operating Systems. 07.02 File system mounting, sharing, and protection. File System Mounting
07.02 File system mounting, sharing, and protection emanuele lattanzi isti information science and technology institute 1/15 File System Mounting A file system must be mounted before it can be accessed
White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Windows Logging Configuration: Audit Policy Configuration
Windows Logging Configuration: Audit Policy Configuration Windows Auditing Windows audit policy requires computer level and in some cases object level configuration. At the computer level, Windows has
