Data ONTAP® 8.2
File Access and Protocols Management Guide
For 7-Mode
Considerations before configuring file access
File protocols that Data ONTAP supports
How Data ONTAP controls access to files
Authentication-based restrictions
File-based restrictions
How Data ONTAP supports file access using NFS
Enabling or disabling NFS on the storage system
Exporting or unexporting file system paths
Editing the /etc/exports file
Using the exportfs command
Exporting file system paths
Exporting a file system path and adding a corresponding entry to the /etc/exports file
Exporting a file system path without adding a corresponding entry to the /etc/exports file
Exporting all file system paths specified in the /etc/exports file
Unexporting file system paths
Unexporting one file system path
Unexporting all file system paths
Synchronizing the currently exported file system paths with those specified in the /etc/exports file
Enabling and disabling fencing of one or more NFS clients from one or more file system paths
Displaying the actual file system path for an exported file system path
Displaying the export options for a file system path
How the access cache works
Adding entries to the access cache
Removing entries from the access cache
Viewing access cache statistics
Optimizing access cache performance
Setting access cache timeout values
Enabling Kerberos v5 security services for NFS
NFS clients that support Kerberos v5 security services
Configuring Kerberos v5 security services for NFS to use an Active-Directory-based KDC
Configuring Kerberos v5 security services for NFS to use an Active-Directory-based KDC before configuring CIFS
Configuring Kerberos v5 security services for NFS to use an Active-Directory-based KDC after configuring CIFS
Configuring Kerberos v5 security services for NFS to use a UNIX-based KDC
Creating and copying Kerberos configuration files
Enabling Kerberos v5 security services for NFS
Supported client and user principal formats
Debugging mounting problems
Displaying mount service statistics
Tracing mountd requests
Use of hard mounts
Displaying NFS statistics
Controlling NFS requests from nonreserved ports
Enabling or disabling NFSv2
Enabling or disabling NFSv3
Support for VMware vStorage over NFS
Enabling or disabling VMware vStorage over NFS
Displaying statistics for VMware vStorage over NFS
Differences in file system ID handling for NFSv3 and NFSv4
Supporting NFSv4 clients
NFSv4.0 functionality supported by Data ONTAP
Limitations of Data ONTAP support for NFSv4
How the pseudo-fs in NFSv4 affects mountpoints
Enabling or disabling NFSv4.0
Specifying the user ID domain for NFSv4
Managing NFSv4 ACLs
How NFSv4 ACLs work
Benefits of enabling NFSv4 ACLs
Compatibility between NFSv4 ACLs and Windows (NTFS) ACLs
How Data ONTAP uses NFSv4 ACLs to determine whether it can delete a file
Enabling or disabling NFSv4 ACLs
Managing NFSv4 file delegations
How NFSv4 file delegations work
Enabling or disabling NFSv4 read file delegations
Enabling or disabling NFSv4 write file delegations
Displaying NFSv4 open delegation statistics
Displaying NFSv4 open delegation statistics for all clients
Displaying NFSv4 open delegation statistics for a specific client
Displaying NFSv4 open delegation statistics for a vFiler unit
Displaying NFSv4 open delegation statistics for a storage system
Configuring NFSv4 file and record locking
About NFSv4 file and record locking
Specifying the NFSv4 locking lease period
Specifying the NFSv4 locking grace period
How the name server database cache works
Flushing the name server database cache
Differences in NFS user and group ID formats
Allowing or disallowing NFSv4 user and group IDs as numeric strings
Supporting PC-NFS clients
How the pcnfsd daemon works
Enabling or disabling the pcnfsd daemon
Creating PC-NFS user entries in the storage system's local files
How umask works with NFS file permissions
Defining the umask for files and directories that PC-NFS users create
Supporting WebNFS clients
Enabling or disabling the WebNFS protocol
Setting a WebNFS root directory
Specifying the name of the WebNFS root directory
Enabling the WebNFS root directory
Support for NFS over IPv6
Enabling or disabling NFS over IPv6
Textual representation of IPv6 addresses
File access using CIFS
Unsupported Windows features
Configuring CIFS licenses
Connecting the MMC to the storage system
Configuring CIFS on your storage system
Supported CIFS clients and domain controllers
What the cifs setup command does
Requirements for the CIFS server name
Setting up your system initially
Specifying WINS servers
Changing the storage system domain
Changing protocol modes
Effects of changing an NTFS-only storage system to a multiprotocol storage system
Effects of changing a multiprotocol storage system to an NTFS-only storage system
Specifying Windows user account names
Support for the Windows "Owner Rights" security principal
Considerations when reconfiguring CIFS
Reconfiguring CIFS on your storage system
Configuring SMB on your storage system
Support for the SMB 1.0 protocol
Support for the SMB 2.0 protocol
Support for the SMB 2.1 protocol
When to enable the SMB 2.0 and SMB 2.1 protocols
Enabling or disabling SMB 2.x
SMB 2.x and durable handles
Monitoring durable handle status
Support for SMB signing
How client SMB signing policies affect communications with the storage system
Performance impact of SMB signing
Enabling SMB signing
Enforcing the requirement for clients to sign SMB 2.x messages
Managing shares
What you need to know when creating a share
Recovering from issues when ending a share comment with a backslash
Share naming conventions
Creating a CIFS share from the MMC on a Windows client
Sharing a folder using the Share a Folder wizard
Creating a CIFS share from the Data ONTAP command line
About the forcegroup option
Displaying and changing the properties of a share
Displaying and changing the properties of a share from the MMC on a Windows client
Displaying the properties of a share from the Data ONTAP command line
Changing the properties of a share from the Data ONTAP command line
Enabling or disabling boundary checking for symbolic links from a share
Enabling or disabling widelinks from a share
Specifying permissions for newly created files and directories in a share
Enabling or disabling browsing
Enabling or disabling virus scanning
Enabling or disabling caching
Setting client-side caching properties for a share
About access-based enumeration
Enabling or disabling access-based enumeration
Executing access-based enumeration commands from a Windows client
Deleting a share
Deleting a share from the MMC
Deleting a share from the Data ONTAP command line
Managing access control lists
How Data ONTAP uses share-level ACLs
How ACL inheritance works
Displaying and changing a share-level ACL
Adding a user or group to a share-level ACL from the MMC on a Windows client
Displaying and changing a share-level ACL from the MMC on a Windows client
Removing a user or group from a share-level ACL using the MMC on a Windows client
Changing a share-level ACL from the Data ONTAP command line
Removing a user or group from a share-level ACL using the Data ONTAP command line
Specifying whether NFSv3 and NFSv4 clients display Windows ACL permissions based on minimum or maximum access
Displaying and changing a file-level ACL
Specifying how group IDs work with share-level ACLs
Managing home directories
About home directories on the storage system
How Data ONTAP matches a directory with a user
How symbolic links work with home directories
Specifying home directory paths
Displaying the list of home directory paths
Specifying the naming style of home directories
Creating directories in a home directory path (domain-naming style)
Creating directories in a home directory path (non-domain-naming style)
Creating subdirectories in home directories when a home directory path extension is used
Syntax for specifying a home directory using a UNC name
Enabling users to access other users’ home directories
Accessing your CIFS home directory using a share alias
Enabling or disabling widelinks from a share
Disabling home directories
Using BranchCache to cache CIFS share content at a branch office
Supported BranchCache caching modes
BranchCache terminology
How Data ONTAP implements BranchCache
How BranchCache clients retrieve cached content
Network protocol support requirements
Data ONTAP and Windows hosts version requirements
Configuring BranchCache
Configuring BranchCache on the storage system
Where to get information about configuring BranchCache at the branch office
Enabling BranchCache caching on a CIFS share
Considerations when enabling BranchCache on a share
Creating a BranchCache enabled CIFS share
Modifying an existing CIFS share to enable BranchCache
How Data ONTAP manages BranchCache hashes
Displaying BranchCache hash statistics
Displaying hash statistics by file size
Displaying number of hashes flushed
Changing the BranchCache server secret key
What happens when you disable BranchCache on the storage system
Disabling BranchCache on the storage system
Disabling BranchCache on an existing CIFS share
Managing local users and groups
Managing local users
When you should create local user accounts
Displaying the storage system's authentication method
Limitations of local user accounts
Adding, displaying, and removing local user accounts
Managing local groups
Adding, displaying, and removing local groups from the Data ONTAP command line
Adding a local group from the MMC on a Windows client
Adding users to a local group from the MMC on a Windows client
Removing a local group using the MMC on a Windows client
How SnapMirror works with local groups
Applying Group Policy Objects
Requirements for using GPOs with storage systems
Associating the storage system with a different OU
Enabling or disabling GPO support on a storage system
Managing GPOs on the storage system
Creating File System security GPOs
Displaying current GPOs and their effects
Updating GPO settings
Troubleshooting GPO update problems
About startup and shutdown scripts on a storage system
About the /etc/ad directory
Configuration requirements for Data ONTAP pathnames
Improving client performance with opportunistic and lease oplocks
Write cache data-loss considerations when using oplocks
How lease oplocks provide enhanced locking
Enabling or disabling oplocks and lease oplocks on the storage system
Enabling or disabling oplocks and lease oplocks on a qtree
Monitoring lease oplock status
Changing the delay time for sending oplock breaks
Managing authentication and network services
Understanding authentication issues
About UNIX authentication
About Windows workgroup authentication
Kerberos authentication for CIFS
Setting the storage system's minimum security level
Preventing Kerberos passive replay attacks
Selecting domain controllers and LDAP servers
Understanding the domain controller discovery process
Ensuring successful authentication with Windows Server 2008 R2 domain controllers
Specifying a list of preferred domain controllers and LDAP servers
Deleting servers from the preferred domain controller list
Displaying a list of preferred domain controllers and LDAP servers
Reestablishing the storage system connection with a domain
Using null sessions to access storage in non-Kerberos environments
How the storage system provides null session access
Granting null users access to file system shares
Using machine accounts to access storage in Kerberos environments
Preventing machine accounts from accessing data
Creating NetBIOS aliases for the storage system
Creating NetBIOS aliases from the command line
Creating NetBIOS aliases in the /etc/cifs_nbalias.cfg file
Displaying the list of NetBIOS aliases
Disabling NetBIOS over TCP
Monitoring CIFS activity
Different ways to specify a user
Displaying a summary of session information
Timing out idle sessions
Tracking statistics
Viewing specific statistics
Saving and reusing statistics queries
CIFS resource limitations
Managing CIFS services
Disconnecting clients using the MMC
Disconnecting a selected user from the command line
Disabling CIFS for the entire storage system
Specifying which users receive CIFS shutdown messages
Restarting CIFS service
Sending a message to users on a storage system
Displaying and changing the description of the storage system
Changing the storage system computer account password
Changing the storage system computer account password manually
Configuring the storage system for automatic computer account password changes
About file management using Windows administrative tools
Troubleshooting access control problems
Adding permission tracing filters
Removing permission tracing filters
Displaying permission tracing filters
Finding out why Data ONTAP allowed or denied access
Using FPolicy
Introduction to FPolicy
What FPolicy is
How FPolicy works
FPolicy work flowchart
FPolicy in the storage environment
What the multiple server configuration feature is
Limitations of FPolicy
Use of FPolicy within Data ONTAP
What native file blocking is
How to use native file blocking
Configuring native file blocking
Events monitored through CIFS
Events monitored through NFS
How to work with FPolicy
How to set up FPolicy
Enabling or disabling the FPolicy feature
Creating a file policy
Enabling the file policy
Specifying mandatory file screening
Displaying information for a file policy
Displaying information for all file policies
Disabling a file policy
Destroying a file policy
Stopping server screening for disconnected CIFS requests
Setting server timeout
Setting request screening timeout
Enabling or disabling multiple open instances of the SMB named pipe
Events screened for NFS and CIFS clients
What a file or directory event is
What file open request monitoring is
Configuring FPolicy to monitor file open operations through the CLI
Configuring FPolicy to monitor file open operations through ONTAPI
Registering FPolicy for monitoring file open requests
What file create request monitoring is
Configuring FPolicy to monitor file create operations through the CLI
Configuring FPolicy to monitor file create operations through ONTAPI
Registering FPolicy for monitoring file create requests
What file close request monitoring is
Configuring FPolicy to monitor file close operations through the CLI
Configuring FPolicy to monitor file close operations through ONTAPI
Registering FPolicy for monitoring file close requests
What file rename request monitoring is
Configuring FPolicy to monitor file rename operations through the CLI
Configuring FPolicy to monitor file rename operations through ONTAPI
Registering FPolicy to monitor file rename requests
What file delete request monitoring is
Configuring FPolicy to monitor file delete operations through CLI
Configuring FPolicy to monitor file delete operations through ONTAPI
Registering FPolicy for monitoring file delete requests
What file write request monitoring is
Configuring FPolicy to monitor file write operations through the CLI
Configuring FPolicy to monitor file write operations through ONTAPI
Registering FPolicy to monitor file write requests
What file read request monitoring is
Configuring FPolicy to monitor file read operations through the CLI
Configuring FPolicy to monitor file read operations through ONTAPI
Registering FPolicy to monitor file read requests
What link request monitoring is (for NFS only)
Configuring FPolicy to monitor file link operations through the CLI
Configuring FPolicy to monitor file link operations through ONTAPI
Registering FPolicy to monitor file link requests
What symlink (symbolic link) request monitoring is (for NFS only)
Configuring FPolicy to monitor file symlink operations through the CLI
Configuring FPolicy to monitor file symlink operations through ONTAPI
Registering FPolicy to monitor file symlink requests
What directory delete request monitoring is
Configuring FPolicy to monitor directory delete operations through the CLI
Configuring FPolicy to monitor directory delete operations through ONTAPI
Registering FPolicy to monitor directory delete requests
What directory rename request monitoring is
Configuring FPolicy to monitor directory rename operations through CLI
Configuring FPolicy to monitor directory rename operations through ONTAPI
Registering FPolicy to monitor directory rename requests
What directory create request monitoring is
Configuring FPolicy to monitor directory create operations through the CLI
Configuring FPolicy to monitor directory create operations through ONTAPI
Registering FPolicy to monitor directory create requests
What file lookup request monitoring is (for NFS only)
Configuring FPolicy to monitor file lookup operations through the CLI
Configuring FPolicy to monitor file lookup operations through ONTAPI
Registering FPolicy to monitor file lookup requests
What getattr request monitoring is (for NFS only)
Configuring FPolicy to monitor get attributes operations through CLI
Configuring FPolicy to monitor get attributes operations through ONTAPI
Registering FPolicy to monitor get attributes requests
What setattr request monitoring is
Configuring FPolicy to monitor set attributes operations through the CLI
Configuring FPolicy to monitor set attributes operations through ONTAPI
Registering FPolicy to monitor set attributes requests
What screening by volume is
Wildcard information for screening with volumes
How to display the list of volumes
Displaying volumes using the show command
Displaying volumes using the eval command
How to add volumes to the list
Adding volumes to the include list
Adding volumes to the exclude list
How to remove volumes from the list
Removing volumes from the include list
Removing volumes from the exclude list
How to specify or replace a list of volumes
Setting the include volumes list
Setting the exclude volumes list
How to reset the volumes in a list
Resetting the include volumes list
Resetting the exclude volumes list
What screening by extension is
Wildcard information for screening with extensions
How to display the list of extensions
Displaying the list of extensions in the include list
Displaying the list of extensions in the exclude list
How to add extensions to the list
Adding extensions to the include list
Adding extensions to the exclude list
How to remove extensions from the list
Removing extensions from the include list
Removing extensions from an exclude list
How to set or replace a list of extensions
Setting the include extensions list
Setting the exclude extensions list
How to reset the extensions in the list
Resetting the include extensions list
Resetting the exclude extensions list
How to manage the file screening server
Displaying the file screening server information
Disabling the connection
What secondary servers are
Assigning secondary servers list
Removing all secondary servers
How to monitor operations using FPolicy
Adding operations to the monitor list
Removing operations from the monitor list
Setting or replacing the list of monitored operations
What the different CLI commands are
FAQs, error messages, warning messages, and keywords
Frequently asked questions (FAQs)
General FAQs
Access rights and permissions FAQs
Performance FAQs
File screening FAQs
FPolicy server FAQs
FPolicy error messages
fpolicy.fscreen.server.connectError severity="ERR"
fpolicy.fscreen.server.closeError severity="ERR"
fpolicy.fscreen.server.requestError severity="ERR"
fpolicy.fscreen.server.requestRejected severity="ERR"
fpolicy.fscreen.server.pingRejected severity="ERR"
fpolicy.fscreen.server.completionUnexpectedState severity="ERR"
fpolicy.fscreen.server.requestStatusError severity="ERR"
fpolicy.fscreen.server.connecting.internalError severity="ERR"
fpolicy.fscreen.server.connecting.privError severity="ERR"
fpolicy.fscreen.cfg.pCreateErr severity="ERR"
fpolicy.fscreen.request.pathError severity="ERR"
fpolicy.fscreen.server.requestTO severity="ERR"
fpolicy.server.fqdn.unavail severity="ERR"
FPolicy warning messages
fpolicy.fscreen.server.connectedNone severity="WARNING"
fpolicy.fscreen.server.completionRequestLost severity="WARNING"
fpolicy.fscreen.server.completionInconsistent severity="WARNING"
fpolicy.fscreen.server.connecting.badOperationList severity="WARNING"
fpolicy.fscreen.server.connecting.badParameter severity="WARNING"
fpolicy.srv.conn.badOptParam severity="WARNING"
fpolicy.fscreen.cfg.pCreateInfo severity="WARNING"
fpolicy.fscreen.server.droppedConn severity="WARNING"
fpolicy.fscreen.vol.i2p.off severity="WARNING"
fpolicy.fscreen.server.unexpectedFileDataResponse severity="WARNING"
Keywords list for screening operations
Support for CIFS over IPv6
Enabling or disabling CIFS over IPv6
Listing IPv4 or IPv6 CIFS sessions
Listing cumulative IPv4 or IPv6 CIFS sessions
File sharing between NFS and CIFS
NFS and CIFS file naming dependencies
Characters a file name can use
Case-sensitivity of a file name
Creating lowercase file names
How Data ONTAP creates file names
Controlling the display of dot files from CIFS clients
Enabling file name character translation between UNIX and Windows
Character restrictions
Clearing a character mapping from a volume
About file locking between protocols
Breaking locks
Breaking locks on a specified file
Breaking locks on a specified host
Breaking locks for a specified lock owner
Breaking locks based on a specified protocol
Breaking NLM locks on a specified IP network family
How Data ONTAP treats read-only bits
Deleting files with the read-only bit set
Managing UNIX credentials for CIFS clients
How CIFS users obtain UNIX credentials
Ensuring that only intended CIFS users receive UNIX credentials
Specifying entries in the /etc/usermap.cfg file
About the IP_qualifier field
About the Windows_name field
About the direction field
About the UNIX_name field
How Data ONTAP interprets domain names in /etc/usermap.cfg
Examples of usermap.cfg entries
Guidelines for mapping user names
Recommended entries for increased security
Restricting NFS access to mapped users or clients
Mapping a Windows account to root
Mapping UNIX names to UIDs and GIDs
Enabling or disabling the default UNIX user account
Enabling or disabling the Windows guest user account
Managing the SID-to-name map cache
Enabling or disabling the SID-to-name map cache
Changing the lifetime of SID-to-name mapping entries
Clearing all or part of the SID-to-name map cache
Using LDAP services
Configuring LDAP services
Specifying the general search base and scope
Overriding general base and scope values for user password, group, and netgroup lookups
Specifying LDAP servers
Specifying preferred LDAP servers
Enabling or disabling LDAP
Enabling or disabling SSL for LDAP traffic
Installing a root certificate for SSL for LDAP traffic
Adding the ldap entry to the /etc/nsswitch.conf file
Specifying the administrative user name
Specifying the administrative password
Specifying the LDAP port
LDAP server option precedence
Managing client authentication and authorization
Enabling LDAP-based UNIX client authentication
Enabling LDAP-based Windows client authentication
Enabling LDAP authorization for NFS file access from Windows clients
Enabling LDAP authorization for NTFS or mixed file system access from UNIX clients
Managing LDAP user-mapping services
Specifying base and scope values for user-mapping
Managing Active Directory LDAP servers
Using Active Directory LDAP servers
Requirements for Active Directory LDAP servers
Enabling Active Directory LDAP lookup services
Monitoring Active Directory LDAP server connections
Troubleshooting Active Directory LDAP server connections
About Active Directory LDAP server connection pooling and selection
LDAP server authentication limitations
Managing LDAP schema
About the default schema
Modifying the custom schema options to match your LDAP schema
Enabling Storage-Level Access Guard using the fsecurity command
About the fsecurity command
Generating and editing the job definition file
Managing the job definition file with the secedit utility
Managing the job definition file with a text editor
Specifying job definition file elements
Creating a security job and applying it to the storage object
Checking the status of or canceling a security job
Displaying the security settings on files and directories
Removing the Storage-Level Access Guard
Auditing system access events
About auditing
Events that Data ONTAP can audit
Configuring system event auditing
Setting SACLs
Configuring Data ONTAP for CIFS auditing
Configuring Data ONTAP for NFS auditing
Specifying NFS audit events
How the filter file controls NFS audit events
Enabling NFS auditing
Configuring Live View
Saving and clearing audit events
Where Data ONTAP logs audit event information
Size and format of the internal and external log files
Data ONTAP event log updates
Specifying the external event log location
Saving audit events to the event log manually
Automatic saving of audit events
Enabling automatic saves based on internal log file size
Enabling automatic saves based on a time interval
Specifying counter extensions
Specifying timestamp extensions
Specifying the maximum number of automatically saved files
Specifying the maximum size of the cifsaudit.alf file
SNMP traps for auditing events
Clearing the cifsaudit.alf file
Viewing and understanding event detail displays
Ways to view and display audit events
Viewing real-time audit events with Live View
Viewing static event log files
Windows file access detail displays
UNIX file access detail displays
Unsuccessful file access and lost record event detail displays
Controlling CIFS access to symbolic links
Enabling CIFS clients to follow symbolic links
Specifying how CIFS clients interact with symbolic links
Why you should avoid symbolic links to files
About Map entries
About widelink entries
About disabling share boundary checking for symbolic links
Redirecting absolute symbolic links
Creating Map entries
Creating Widelink entries
How the storage system uses Map and Widelink entries
Optimization of NFS directory access for CIFS clients
Creating new directories in Unicode format
Converting existing directories to Unicode format
Preventing CIFS clients from creating uppercase file names
Accessing CIFS files from NFS clients
Adding mapping entries to the WAFL credential cache
Deleting mapping entries from the WAFL credential cache
Setting how long mapping entries are valid
Monitoring WAFL credential cache statistics
Managing mapping inconsistencies
Tracing CIFS logins
Tracing domain controller connections
Allowing CIFS clients without UNIX "execute" permissions to run .dll and .exe files
How file editing with Windows applications affects UNIX permissions
File access using FTP
Managing FTP
Enabling or disabling the FTP server
Enabling or disabling the TFTP server
Enabling or disabling FTP file locking
Specifying the FTP authentication style
Limitations of the NTLM authentication style
Enabling or disabling the bypassing of FTP traverse checking
Restricting FTP access
Blocking specific FTP users
Restricting FTP users to a specific directory
Restricting FTP users to their home directories or a default directory
Managing FTP log files
How the FTP server manages its log files
The /etc/log/ftp.xfer log file format
The /etc/log/ftp.cmd log file format
Viewing an FTP log file
Specifying the maximum number of FTP log files
Specifying the maximum size of the current FTP log files
Viewing SNMP traps that the FTP server generates
SNMP traps that the FTP server generates
Starting and configuring SNMP on the storage system
Viewing SNMP traps on a UNIX client
Viewing FTP statistics
Resetting FTP statistics
Specifying the maximum number of FTP connections
Specifying the maximum number of TFTP connections
Setting the FTP connection threshold
Specifying the TCP window size for FTP operations
Specifying the FTP idle timeout
Managing anonymous FTP access
Enabling or disabling anonymous FTP access
Specifying the user name for anonymous FTP users
Specifying the home directory for anonymous FTP users
Managing the Secure File Transfer Protocol (SFTP)
About SFTP
Limitations of Data ONTAP support for SFTP
Enabling or disabling SFTP
Enabling or disabling SFTP file locking
SFTP authentication styles
Specifying the SFTP authentication style
Enabling or disabling SFTP bypass traverse checking
Enabling or disabling SFTP user home directory restrictions
Specifying the SFTP override path for user home directories
Enabling or disabling the overriding of UNIX permissions
Managing SFTP log files
Enabling or disabling SFTP log files
Specifying the maximum number of SFTP log files
Specifying the maximum size of the current SFTP log files
Viewing SFTP statistics
Resetting SFTP statistics
Specifying the maximum number of SFTP connections
Specifying the SFTP idle timeout value
Managing FTP over SSL (FTPS)
Differences between implicit and explicit FTPS
Enabling or disabling explicit FTPS
Allowing or preventing the opening of explicit FTPS data connections in secure mode
Enabling or disabling implicit FTPS
Managing FTP over IPv6
Enabling or disabling FTP over IPv6
Viewing FTP over IPv6 statistics
File access using HTTP
Managing the Data ONTAP HTTP server
Enabling or disabling the Data ONTAP HTTP server
Enabling or disabling the bypassing of HTTP traverse checking
Specifying the root directory for the Data ONTAP HTTP server
Specifying the maximum size of the log file for the Data ONTAP HTTP server
Testing the Data ONTAP HTTP server
Specifying how the Data ONTAP HTTP server maps MIME content types to file name extensions
Specifying how the Data ONTAP HTTP server translates HTTP requests
How the Data ONTAP HTTP server translations file works
Adding a map rule
Adding a redirect rule
Adding a pass rule
Adding a fail rule
Configuring MIME Content-Type values
Maintaining security for the Data ONTAP HTTP server
Using HTTP options to restrict access
Using an HTTP virtual firewall
Protecting web pages
Basic authentication
NTLM authentication for directory security
Editing the /etc/httpd.access file
Creating and editing the httpd.passwd file
Creating and editing the httpd.group file
Configuring HTTP virtual hosting
Displaying HTTP server statistics
Request statistics
Detailed statistics
Error statistics
Service statistics
Timeout statistics
Resetting statistics for the Data ONTAP HTTP server
Viewing HTTP server connection information
Changing the /etc/log/httpd.log file format
Purchasing and connecting a third-party HTTP server to your storage system
Support for HTTP and HTTPS over IPv6
Enabling or disabling HTTP and HTTPS over IPv6
Listing HTTP connections over IPv4 or IPv6
File access using WebDAV
Understanding WebDAV
Managing the Data ONTAP WebDAV server
Enabling or disabling the Data ONTAP WebDAV server
Pointing a WebDAV client to a home directory
Purchasing and connecting a third-party WebDAV server to your storage system
Event log and audit policy mapping
Event Log mapping values
Audit mapping values
Glossary
Copyright information
Trademark information
How to send your comments