NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment



Similar documents
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01

ONEFS MULTIPROTOCOL SECURITY UNTANGLED

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Using Network Attached Storage with Linux. by Andy Pepperdine

NAStorage. Administrator Guide. How To Use Veritas Backup Exec With. NAStorage

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Inc.

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

Worksheet 3: Distributed File Systems

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Unifying Authorization Models

How to share folders on Windows 7 and Windows 8

Avatier Identity Management Suite

Clustered Data ONTAP 8.2

Distributed File Systems Part I. Issues in Centralized File Systems

How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or

NAS 109 Using NAS with Linux

Chapter 7: Unix Security. Chapter 7: 1

SAMBA VI: As a Domain Controller

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

actinas Cube RDX FAQ

Bitten by The NAS Bug

Lucid Key Server v2 Installation Documentation.

Integrating LANGuardian with Active Directory

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

CA and SSL Certificates

Remote Unix Lab Environment (RULE)

Server Account Management

SYMANTEC BACKUPEXEC2010 WITH StorTrends

Configuration Guide. Follow the simple steps given in this document when you are going to run Lepide Active Directory Cleaner for the first time.

LDAP User Service Guide 30 June 2006

Load Balancing/High Availability Configuration for neoninsight Server

Configuring Sponsor Authentication

Using LDAP Authentication in a PowerCenter Domain

Configuring the Active Directory Plug-in

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network

NETASQ ACTIVE DIRECTORY INTEGRATION

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

Configuring and Using the TMM with LDAP / Active Directory

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Linksys Business Series Network Storage System

Local File Sharing in Linux

How To Use Directcontrol With Netapp Filers And Directcontrol Together

Active Directory Management. Agent Deployment Guide

Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL

Secure Shell Demon setup under Windows XP / Windows Server 2003

Active Directory integration with CloudByte ElastiStor

Active Directory Management. Agent Deployment Guide

StorHouse/CIFS Installation and Configuration Guide

Unit objectives IBM Power Systems

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.

Authentication in a Heterogeneous Environment

Creating an LDAP Directory

WINDOWS 7 & HOMEGROUP

Common Internet File Sharing (CIFS) How-To

Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

TEL 500. Voice Communications. Week 1 Write Up. Session Initiation Protocol Lab. Submitted To: Prof Ronny Bull. By: Sai Sharan Korvi

Quick Start Guide of Hikvision IP Camera & Synology NAS Connection v1.1

Configure NFS Staging for ACS 5.x Backup on Windows and Linux

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Secure Messaging Server Console... 2

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault

How To Set Up Egnyte For Netapp Sync For Netapp

Manual Password Depot Server 8

Procedure to Create and Duplicate Master LiveUSB Stick

Implementing a Weblogic Architecture with High Availability

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Remote Desktop Administration

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

How to Backup XenServer VM with VirtualIQ

Connecting to SQL server

MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative

How To - Implement Single Sign On Authentication with Active Directory

CDEX Checklist for JEDMICS Release 3.2. Prepared by: AMCOM Engineering Data Management System Program Office Redstone Arsenal, Alabama (256)

Managing Access Control in PresSTORE

How To Set Up Chime For A Coworker On Windows (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp

System Security Fundamentals

EMC ViPR Controller. Version 2.4. User Interface Virtual Data Center Configuration Guide REV 01 DRAFT

3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide

SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))

Configuring User Identification via Active Directory

The Web Pro Miami, Inc. 615 Santander Ave, Unit C Coral Gables, FL T: info@thewebpro.com

Configuring Renoir to Drive Simulation on Remote Machines

Operating Systems File system mounting, sharing, and protection. File System Mounting

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

Managing Identities and Admin Access

Windows Logging Configuration: Audit Policy Configuration

Transcription:

NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: support@ingrasys.com

UNIX/LINUX environment Of NAStorage Under Security Policy Start Enable Unix/Linux Network (NFS Protocol) Add UNIX Host IP address into Host List Export a share resource in NFS environment Setting security for share resource in NFS environment For NFS client to access data from NAStorage Multiple UIDs on a particular IP for read/write access to a share resource 1

1. Enable Unix/Linux Network (NFS Protocol) For file accessing, users can access NAStorage via NFS(UNIX/Linux) protocol. You just need to enable Unix/Linux Network(NFS Protocol) for NAStorage. Configuration flow: Network UNIX/Linux Select check box Enable Unix/Linux Network (NFS Protocols) then Apply. Enable Unix/Liunx Network(NFS Protocol),that NAStorage will accept file access via NFS protocol. If you didn t enable Unix/Linux (NFS Protocol), NAStorage won accept file access via NFS protocol. That mean you can t use showmount command to list share resource for NAStorage or use rpcinfo command to check NAStorage nfs service status, you will receive a Port mapper failure message. 2

NAStorage won accept file access via NFS protocol, if you didn t enable Unix/Linux (NFS Protocol). If you disable Unix/Linux (NFS Protocol) for NAStorage, you won t export any share resource in NFS environment, You can t export any share resource in NFS environment, because Unix/Linux (NFS Protocol) is disable 3

2. Add UNIX Host IP address into Host List NAStorage support Local authentication policy for NFS protocol, that means if someone want to mount a share resource from NAStorage, the IP address of the UNIX/Linux host must be add to Local User DataBase first. Configuration flow: Security Manager Account UNIX Host Add Host. The candidates of UNIX hosts, who can access data from NAStorage If you don t add any host IP address in UNIX Host table, the default setting was Specify privileged hosts, that means no any UNIX host can t mount the resource from NAStorage contents, UNIX host only can see the available share resource by using showmount command but doesn t have permission to mount. 4

No UNIX/Linux host I Every UNIX host can t mount the resource from NAStorage contents if it doesn t specify any privileged host 5

3. Export a share resource in NFS environment NAStorage supports NFS v3 network file protocol. If someone want to export a share resource from NAStorage in NFS environment, just need to enable UNIX/Linux Network (NFS) for share resource. Configuration flow: Security Manager File/Folder click create" enable UNIX/Linux Network (NFS) then Apply. 6

Export a share resource in NFS environment(?) Use showmount command for list the available share resource under NAStorage Available share resource list under NAStorage 7

4. Setting security for share resource in NFS environment NAStorage will trust the UNIX host (mounting volumes from NAStorage) to check UID, GID of logon user with the permission of mounted NAStorage share resource and the files/folders. The permission (Owner User & Group, and access right rwx rwx rwx) configured in NAStorage web admin page will be set as the default permission of mount point while NFS client mounts it. Share Permission: Specify privileged hosts NAStorage will count on the settings here to determine which UNIX hosts can access data from NAStorage with certain read/write permission. Configuration flow: Security Manager Share click Permission" UNIX Host Add UNIX host IP address from left to right window and select the permission then Apply 8

The access permission of this share resource. When NFS client mount this share resource, the permission of mount point will be replaced with this one. NAStorage will count on the settings here to determine which Unix hosts can access data from NAStorage with certain read/write permission. For example,(unix/linux host 192.168.120.198) you assign Read/Write permission for 192.168.120.198 host in NAStorage. Therefore this host can mount the share resource from NAStorage and can also create file/folder in the mount point. This host has Read/Write permission for the share resource point from NAStorage and also can create file/folder in the mount point. 9

You can check this mount point permission already changed to UID:root GID:root Permission:755. If the UNIX host has R/W permission for this share, root user also can issue chown / chmod command to change the owner/permission for this mount point. If you change the permission for this mount point, the admin page share permission will also be change. 10

If you change the permission Read/Write to Read-Only for 192.168.120.198 host, you can mount this share resource but you don t have write permission in the mount point. This host has Read-Only permission for the share resource point from NAStorage and can t create file/folder in the mount point. 11

Share Permission: All hosts are permitted NAStorage will allow set permission (Read-Only/Read-Write) for all hosts, that means if someone wants to share a share resource for all host and assign all host Read-Only/Read-Write permission in NFS environment, just select All host are permitted and assign Read-Only/Read-Write permission. 12

5. For NFS client to access data from NAStorage In UNIX-like network environment, we could use mount command mounting a share resource from NAStorage. (For example, the IP address of NAStorage is 192.168.120.44) First of all, login UNIX/Linux host in Root permission, because only root user can use mount command. Use showmount command to list the available share resource under NAStorage Available share resource list under NAStorage Make an empty directory /nastorage as a mounting point under /root directory. mount point: /root/nastorage; the original permission 755, Use mount command mounting /NFS001 to mounting point /root/nastorage. Please make sure the case sensitive of the share resource, because NFS001 was totally different with nfs001 in NFS file system. The permission (Owner User & Group, and access right rwx rwx rwx) configured in NAStorage web admin page will be set as the default permission of mount point while NFS client mounts it. 13 The permission of mount point /root/nastorage has been changed from 755 to 700.

Change to directory /nastorage and use ls command to see the contents. You will find the contents of /NFS001 already be mounted under /root/nastorage Use mount command to check the all mounting point of this local machine. Use UNIX command: chmod & chown to change file/folder permission Un-mount volume from NAStorage. 14

15

6. Multiple UIDs on a particular IP for read/write access to a share resource. In our NAStorage (NFS environment) design, we just assign UID, GID and Access right to the mounting directory as its default permission. If you want give multiple UIDs has read/write access right, it should be handle by UNIX/Linux machine, not by NAStorage. But anyway, we still make an example for you if you went reach the purpose. First of all, login UNIX/Linux host in Root permission, create a group nasuser. You can check this new group ID (GID) by checking file /etc/group. Great a group(nasuser) and assign ID number 200. Then flied it to NAStorage as below picture. If group "nasuser" ID is 200, type GID "200" and change the default permission 755 to 775,that means this group has read/write permission (group attribute=7) to access share resource. 16

The access permission of this share resource. When NFS client mounts this share resource, the permission of mount point will be replaced with this one. Use mount command mounting a share resource from NAStorage to mounting point /root/nastorage in Unix host. Basically, you will see the permission of the mounting point is 775, UID root, GID nasuser. The permission of mount point /root/nastorage has been changed from 755 to 775. UID root/0, GID nasuser/200. In UNIX host, You can assign the multiple UIDs (base on you want) to GID "nasuser" that mean these UIDs can read/write access to this volume. Because the second bit already change to 7 (755 to 775). 17

Create user (nfs001 nfs002 nfs003) and assign them into nasuser group. Login UNIX/Linux host in these UIDs permission. for example nfs001 user. You will find the contents of /NFS already be mounted under /root/nastorage with UID root GID nasuser 775 permission. That means you have Read/Write permission to access share resource, because you were belong to nasuser group. User nfs001 can Read/Write for this mount point and the create file belong to user nfs001. 18