Please enter search query.
Search <book_title>...
Veritas Access Administrator's Guide
Last Published:
2021-04-15
Product(s):
Appliances (Version Not Specified)
Platform: 3340
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring an FTP server
- Using Veritas Access as an Object Store server
- Configuring the NFS server
- Section V. Monitoring and troubleshooting
- Section VI. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VII. Configuring cloud storage
- Section VIII. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Integrating Veritas Access with Data Insight
- Section IX. Managing Veritas Access storage services
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Compressing files
- Section X. Reference
Configuring the Active Directory schema with CIFS-schema extensions
To extend the Active Directory schema with the necessary CIFS-schema extensions
- Login with Schema Admins privileges on the Active Directory Forest Schema Master domain controller.
- Download
ADCIFSSchema.zip
from the Veritas Access server (/opt/VRTSnas/tools/cifs/ADCIFSSchema.zip
) with software such asWinSCP.exe
. - Unzip the file and open each
.ldf
file to perform a search and replace of the string dc=example,dc=com, replacing the string with the top-level domain component (that is, dc=yourdomain,dc=com) values for the AD forest. - Install the schema extensions by executing the
schemaupdate.bat
file from the command prompt.
To validate the schema extensions
- Execute regsvr32 schmmgmt.dll in a command prompt window to install the Active Directory Schema Snap-In on the AD server.
- Enter mmc in Run.
- On the File menu, click Add/Remove Snapin.
- In Available snap-ins, click Active Directory Schema, and then click Add.
- Click OK.
- Click Attributes in the left frame, and try to find uidNumber and gidNumber in the right frame.
Validate that the uidNumber and gidNumber attributes have no minimum or maximum value setting by viewing the properties of the attribute objects.
To create an application partition
- Open a command prompt window on the domain controller that will hold the first replica of the application partition.
- Enter ntdsutil in the command prompt window.
- At the ntdsutil command prompt, enter the following:
domain management
If you are using Windows 2008, change this command to the following:
partition management
- At the domain management command prompt, enter the following:
connection
- At the connection command prompt, enter the following:
connect to server adserver.example.com
- At the connection command prompt, enter the following:
quit
- At the domain management command prompt, enter the following such as:
create nc dc=idmap,dc=example,dc=com null
Example settings:
C:\>ntdsutil ntdsutil: domain management domain management: connection server connections: connect to server adserver.example.com Binding to adserver.example.com ... Connected to adserver.si2m.com using credentials of locally logged on user. server connections: quit domain management: create nc dc=idmap,dc=example,dc=com NULL adding object dc=idmap,dc=example,dc=com domain management: quit ntdsutil: quit Disconnecting from adserver.example.com...
- Once the application partition has been created, open ADSIedit.msc fromRun, then right-click on ADSI Edit in the left frame, and click connect to ... to connect to the application partition using the settings as indicated:
Name
Enter Domain.
Connection Point
Select or enter a Distinguished Name or Naming Context, as in:
dc=idmap,dc=example,dc=com
Computer
Select or enter a domain or server, as in:
adserver.example.com
- Once connected, select the top-level application partition (for example, dc=idmap,dc=example,dc=com) node in the left panel, and right-click to select New then Object from the list, and then select SambaUnixIdPool.
When prompted, enter the following values:
OU attribute
cifsidmap
uidNumber
10000
gidNumber
10000
- Click Finish to complete the configuration.
- Once the ou=cifsidmap,dc=idmap,dc=example,dc=com container has been created, right-click the object, and select properties.
- On the Security tab, click Add, and proceed to add the cifsuser user account, and grant the account Read, Write, Create All Child Objects, and Delete All Child Objects permissions.