HP CIFS Server 3.0g Administrator's Guide verison A.02.03.01

Step 4: Starting the HP CIFS Server......................................................................................................39
Starting and stopping Daemons Individually.................................................................................40
Configuring Automatic Start at System Boot..................................................................................40
Stopping and Re-starting Daemons to Apply New Settings...........................................................40
Other Samba Configuration Issues.......................................................................................................41
Translate Open-Mode Locks into HP-UX Advisory Locks.............................................................41
Performance Tuning using Change Notify......................................................................................41
Special Concerns when Using HP CIFS Server on a Network File System (NFS) or a Clustered
File System (CFS).............................................................................................................................41
NetBIOS Names Are Not Supported on Port 445...........................................................................42
3 Managing HP-UX File Access Permissions from Windows NT/XP/2000.............43
Introduction..........................................................................................................................................43
UNIX File Permissions and POSIX ACLs.............................................................................................43
Viewing UNIX Permissions From Windows NT............................................................................43
The VxFS POSIX ACL File Permissions..........................................................................................46
Using the NT Explorer GUI to Create ACLs........................................................................................46
POSIX ACLs and Windows 2000/XP Clients........................................................................................49
Viewing UNIX Permissions from Windows 2000/XP Clients.........................................................49
Setting Permissions from Windows 2000/XP Clients......................................................................50
Viewing ACLs from Windows 2000 Clients....................................................................................52
Displaying the Owner of a File........................................................................................................52
HP CIFS Server Directory ACLs and Windows 2000/XP Clients.........................................................52
Directory ACL Types.......................................................................................................................52
Viewing ACLs from Windows 2000 Clients....................................................................................52
Viewing Basic ACLs from Windows 2000 Clients.....................................................................53
Viewing Advanced ACLs from Windows 2000 Clients.............................................................54
Mapping Windows 2000/XP Directory Inheritance Values to POSIX.............................................54
Modifying Directory ACLs From Windows 2000/XP Clients.........................................................55
Removing an ACE entry from Windows 2000/XP clients..........................................................56
Examples...............................................................................................................................56
Adding Directory ACLs From Windows 2000/XP Clients..............................................................58
POSIX Default Owner and Owning Group ACLs..........................................................................60
POSIX ACEs with zero permissions................................................................................................60
In Conclusion........................................................................................................................................60
4 NT Style Domains........................................................................................................61
Introduction..........................................................................................................................................61
Advantages of the Samba Domain Model.......................................................................................61
Primary Domain Controllers...........................................................................................................61
Backup Domain Controllers............................................................................................................62
Advantages of Backup Domain Controllers..............................................................................62
Limitations.................................................................................................................................62
Domain Members............................................................................................................................62
Configure the HP CIFS Server as a PDC...............................................................................................62
Configure the HP CIFS Server as a BDC..............................................................................................63
Promote a BDC to a PDC in a Samba Domain................................................................................64
Domain Member Server........................................................................................................................64
Configure the HP CIFS Server as a Member Server........................................................................64
Join an HP CIFS Server to an NT Domian, Windows 2000/2003 (as a pre-Windows 2000 computer),
or Samba Domain............................................................................................................................66
Step-by-step Procedure..............................................................................................................66
Create the Machine Trust Accounts......................................................................................................66
4 Table of Contents