Installation manual

2-vi CLI Storage-Management Guide
Removing a Permit Rule .......................................................................... 4-17
Changing the Anonymous User ID ................................................................. 4-18
Changing the Anonymous Group ID ....................................................... 4-18
Reverting to the Default Group ID ................................................... 4-18
Reverting to the Default User ID ............................................................. 4-19
Adding a Deny Rule ........................................................................................ 4-19
Removing a Deny Rule ............................................................................ 4-20
Changing Rule Order....................................................................................... 4-20
Adding a Description....................................................................................... 4-22
Removing the Description........................................................................ 4-22
Removing an Access List ................................................................................ 4-23
Chapter 5
Examining Filers
Examining CIFS Shares............................................................................................ 5-4
Using Proxy-User Credentials........................................................................... 5-6
Showing the Physical Paths for CIFS Shares.................................................... 5-8
Focusing on One Share............................................................................................. 5-9
Showing Connectivity Only ................................................................................... 5-10
Showing Capabilities Only.............................................................................. 5-11
Showing Shares Only ...................................................................................... 5-12
Showing Time Settings.................................................................................... 5-13
Showing CIFS Attributes........................................................................................ 5-13
Probing for CIFS Security ...................................................................................... 5-14
Chapter 6
Adding an External Filer
Providing the Filers IP Address............................................................................... 6-2
Providing a Secondary Address (UDP only)..................................................... 6-2
Removing a Secondary Address ................................................................ 6-3
Ignoring a Directory ................................................................................................. 6-3
Re-Instating a Directory .................................................................................... 6-4
Adding a Description (optional) ............................................................................... 6-5