Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell FluidFS NAS Solutions Administrator's Guide

NAS Container Security Violation

Description

NAS container security violation.

Cause

Selecting security style for a NAS container dictates the dominant protocol to be used to set permissions on files in this volume. NFS for UNIX security style volumes and CIFS for NTFS security style volumes.

Consequently, this makes some operations invalid:

  • Setting UNIX permissions for a file in an NTFS Security style container.
  • Setting UID/GID ownership for a file in an NTFS Security style container.
  • Setting ACL for a file in a UNIX Security style container.
  • Changing read-only flag for a file in a UNIX Security style container.
  • Setting SID/GSID ownership for a file on UNIX Security style container.

The NAS container security style must reflect the main protocol used to access its files.

Workaround

If a user frequently needs to perform a cross-protocol security related activity, split the data into separate NAS containers based on the main access protocol.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\