Start a Conversation

Unsolved

This post is more than 5 years old

1318

January 5th, 2010 07:00

Security Confusion on NAS Shares

Our W2K admins are having issues trying to set security on NAS shares..they want certain shares to be accessible to only select people but they seem to get locked out and have issues with inheritance or something...is there a admin account for NAS ..does the NAS have to see our domain or something..I am SAN person so do not get involved in the W2K side of things..

scott

147 Posts

January 5th, 2010 07:00

Hi Scott,

in order to get help I think you need be more specific on what your config is (standalone vs. domain-joined, localusers) and what tools your Windows guys are using and what errors they get.

In general if a Celerra CIFS server is joined to the domain the domain administrator group is automatically put into the Celerra local Administrators group and anyone in there can use Windows Tools like MMC to manage the shares.

Unless you specifically created the CIFS server with local users enabled (non-default) there is no CIFS admin account on the Celerra.

Rainer

2 Intern

 • 

20.4K Posts

January 5th, 2010 07:00

most likely your CIFS server is joined to your active directory. Domain Admins group gets automatically added to the local Administrators group on the server but you can add additional AD account later on. People in Administrators groups have the rights to create shares/ set share/ntfs permissions, just like your regular windows box. Can you get more details what's not working for them ?

139 Posts

January 5th, 2010 07:00

Celerra doesn't have an admin account that connects it to the Windows AD. When you create a CIFS server, you can join it to your domain or leave it stand alone. When you join it to your domain it behaves just like any other server/workstation on your domain (minus the GUI and hardware).

105 Posts

January 5th, 2010 08:00

They figured out they were not using MMC or managing from another W2K host and thus have to be admin on DC..

No Events found!

Top