Please enter search query.
Search <book_title>...
Veritas Access Appliance Administrator's Guide
Last Published:
2023-10-29
Product(s):
Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
About the mapuser commands
The CIFS> mapuser commands are used to add, remove, or display the mapping between CIFS and NFS users.
Typically, a CIFSusername is a user coming from an AD server (with a specified domainname), or a locally created CIFS user on this system (local). An NFSusername is a user coming from a locally-created CIFS user on this system, or from a NIS/LDAP server configured in the network section.
Note:
To make sure user mappings work correctly with a NIS/LDAP server, Network> nsswitch settings may need to be adjusted in the Network> nsswitch section. You may need to move the position of ldap or nis in the Network> nsswitch section, depending on which name service is being used first.