Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Reconfiguring the CIFS service
Sometime after you have configured the CIFS service, and used it for a while, you need to change some of the settings. For example, you may want to allow the use of trusted domains or you need to move Access Appliance from one security domain to another. To carry out these changes, set the new settings and then start the CIFS server. As a general rule, you should stop the CIFS service before making the changes.
An example where Access Appliance is moved to a new security domain (while the mode of operation stays unchanged as, AD domain) is referenced below.
This example deals with reconfiguring CIFS. So make sure that if any of the other AD services like DNS or NTP are being used by Access Appliance, that Access Appliance has already been configured to use these services from the AD server belonging to the new domain.
Make sure that the DNS service, NTP service and, if used as an ID mapping store, also the LDAP service, are configured as required for the new domain.
To reconfigure the CIFS service, do the following:
Make sure that the server is not running.
Set the domain user, domain, and domain controller.
Start the CIFS server.
To set the user name, AD domain and AD server
- To set the AD client configuration details, enter the following:
Network> ad set domain domaincontroller workgroup domainuser
You can set the AD client's domain, domain controller, workgroup and domain user. A domain controller can either be an Active Directory server or a Windows NT 4.0 domain controller. A domainuser is the username which is used for authentication in the domain join operation.
To start the CIFS server
- To start the CIFS server, enter the following:
CIFS> server start
- To make sure that the service is running, enter the following:
CIFS> server status
- To find the current settings, enter the following:
CIFS> show