HP CIFS Server 3.0i Administrator's Guide version A.02.03.03

Step 4: Starting the HP CIFS Server......................................................................................................35
Starting and stopping Daemons Individually.................................................................................36
Configuring Automatic Start at System Boot..................................................................................36
Stopping and Re-starting Daemons to Apply New Settings...........................................................36
Other Samba Configuration Issues.......................................................................................................37
Translate Open-Mode Locks into HP-UX Advisory Locks.............................................................37
Performance Tuning using Change Notify......................................................................................37
Special Concerns when Using HP CIFS Server on a Network File System (NFS) or a Clustered
File System (CFS).............................................................................................................................37
NetBIOS Names Are Not Supported on Port 445...........................................................................38
3 Managing HP-UX File Access Permissions from Windows NT/XP/2000.............39
Introduction..........................................................................................................................................39
UNIX File Permissions and POSIX ACLs.............................................................................................39
Viewing UNIX Permissions From Windows NT............................................................................39
The VxFS POSIX ACL File Permissions..........................................................................................42
Using the NT Explorer GUI to Create ACLs........................................................................................42
POSIX ACLs and Windows 2000/XP Clients........................................................................................45
Viewing UNIX Permissions from Windows 2000/XP Clients.........................................................45
Setting Permissions from Windows 2000/XP Clients......................................................................46
Viewing ACLs from Windows 2000 Clients....................................................................................48
Displaying the Owner of a File........................................................................................................48
HP CIFS Server Directory ACLs and Windows 2000/XP Clients.........................................................48
Directory ACL Types.......................................................................................................................48
Viewing ACLs from Windows 2000 Clients....................................................................................48
Viewing Basic ACLs from Windows 2000 Clients.....................................................................49
Viewing Advanced ACLs from Windows 2000 Clients.............................................................50
Mapping Windows 2000/XP Directory Inheritance Values to POSIX.............................................50
Modifying Directory ACLs From Windows 2000/XP Clients.........................................................51
Removing an ACE entry from Windows 2000/XP clients..........................................................52
Examples...............................................................................................................................52
Adding Directory ACLs From Windows 2000/XP Clients..............................................................54
POSIX Default Owner and Owning Group ACLs..........................................................................56
POSIX ACEs with zero permissions................................................................................................56
In Conclusion........................................................................................................................................56
4 NT Style Domains........................................................................................................57
Introduction..........................................................................................................................................57
Advantages of the Samba Domain Model.......................................................................................57
Primary Domain Controllers...........................................................................................................57
Backup Domain Controllers............................................................................................................58
Advantages of Backup Domain Controllers..............................................................................58
Limitations.................................................................................................................................58
Domain Members............................................................................................................................58
Configure the HP CIFS Server as a PDC...............................................................................................58
Configure the HP CIFS Server as a BDC..............................................................................................59
Promote a BDC to a PDC in a Samba Domain................................................................................60
Domain Member Server........................................................................................................................60
Configure the HP CIFS Server as a Member Server........................................................................60
Join an HP CIFS Server to an NT Domian, Windows 2000/2003 (as a pre-Windows 2000 computer),
or Samba Domain............................................................................................................................62
Step-by-step Procedure..............................................................................................................62
Create the Machine Trust Accounts......................................................................................................62
4 Table of Contents