2-iv CLI Storage-Management Guide
Configuration Instructions................................................................................. 2-5
Adapting Storage to User Demands ......................................................................... 2-6
Migration for Capacity ...................................................................................... 2-7
Configuration Instructions.......................................................................... 2-8
Migration for Class of Storage: File-Placement Policy..................................... 2-8
Configuration Instructions........................................................................ 2-11
Controlling Costs.................................................................................................... 2-11
Chapter 3
Preparing for CIFS Authentication
Concepts and Terminology ....................................................................................... 3-2
Adding a Proxy User ................................................................................................ 3-2
Specifying the Windows Domain...................................................................... 3-3
Removing the Windows Domain ............................................................... 3-3
Specifying the Username and Password............................................................ 3-4
Removing the Username and Password ..................................................... 3-4
Listing All Proxy Users..................................................................................... 3-5
Showing One Proxy User........................................................................... 3-5
Removing a Proxy User..................................................................................... 3-6
Configuring the NTLM Authentication Server ........................................................ 3-6
Listing NTLM Authentication Servers.............................................................. 3-7
Displaying Detailed Server Status.............................................................. 3-8
Adding an Active-Directory Forest (Kerberos)...................................................... 3-10
Identifying the Forest Root.............................................................................. 3-10
Adding a Redundant Forest Root ............................................................. 3-11
Removing a DC for the Forest Root......................................................... 3-11
Identifying a Dynamic-DNS Server ................................................................ 3-12
Removing a Name Server ........................................................................ 3-13
Adding a Child Domain................................................................................... 3-14
Removing a Child Domain....................................................................... 3-16
Adding a Tree Domain .................................................................................... 3-17
Removing a Tree Domain ........................................................................ 3-18
Establishing Forest-to-Forest Trust ................................................................. 3-18
Dissolving a Forest-to-Forest Trust.......................................................... 3-19
Showing All Active-Directory Forests............................................................ 3-19
Showing One Active-Directory Forest..................................................... 3-21
Comentarios a estos manuales