Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Configuring the NIS-related settings
Access Appliance supports Network Information Service (NIS), implemented in a NIS server, as an authentication authority. You can use NIS to authenticate computers.
If your environment uses NIS, enable the NIS-based authentication on the Access Appliance cluster.
Note:
IPv6 addresses are not supported for NIS.
To display NIS-related settings
- To display NIS-related settings, enter the following:
Network> nis show [users|groups|netgroups]
users
Displays the NIS users that are available in the Access Appliance cluster's NIS database.
groups
Displays the NIS groups that are available in the Access Appliance cluster's NIS database.
netgroups
Displays the NIS netgroups that are available in the Access Appliance cluster's NIS database.
To set the NIS domain name on all nodes in the cluster
- To set the NIS domain name on the cluster nodes, enter the following:
Network> nis set domainname [domainname]
where domainname is the domain name.
To set NIS server name on all nodes in the cluster
- To set the NIS server name on all cluster nodes, enter the following:
Network> nis set servername servername
where servername is the NIS server name. You can use the server's name or IP address.
To enable NIS clients
- To enable NIS clients, enter the following:
Network> nis enable
To view the new settings, enter the following:
Network> nis show
To disable NIS clients
- To disable NIS clients, enter the following:
Network> nis disable