Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Unity™ Family Unisphere® Command Line Interface User Guide

Manage NFS network shares

Network file system (NFS) network shares use the NFS protocol to provide an access point for configured Linux/UNIX hosts, or IP subnets, to access file system storage. NFS network shares are associated with an NFS file system.

Each NFS share is identified by an ID.

The following table lists the attributes for NFS network shares:

Table 1. NFS network share attributes
Attribute Description
ID ID of the share.
Name Name of the share.
Description Brief description of the share.
Local path Name of the path relative to the file system of the directory that the share will provide access to. Default is /root of the file system. A local path must point to an existing directory within the file system.
Export path Export path, used by hosts to connect to the share.
NOTE: The export path is a combination of the network name or IP address of the associated NAS server and the name of the share.
File system ID of the parent file system associated with the NFS share.
Default access Default share access settings for host configurations and for unconfigured hosts that can reach the share. Value is one of the following:
  • ro—Hosts have read-only access to primary storage and snapshots associated with the share.
  • rw—Hosts have read/write access to primary storage and snapshots associated with the share.
  • roroot—Hosts have read-only access to primary storage and snapshots associated with the share, but the root of the NFS client has root access.
  • root—Hosts have read/write root access to primary storage and snapshots associated with the share. This includes the ability to set access controls that restrict the permissions for other login accounts.
  • na—Hosts have no access to the share or its snapshots.
Advanced host management Identifies whether the hosts specified in the host lists are defined using /remote/host objects, such as with their identifier. Values are (case insensitive):
  • yes (default)—Host lists contain the IDs of registered hosts.
  • no—Host lists contain comma-separated strings, with each string defining a hostsname, IP, subnet, netgroup, or DNS domain.
Read-only hosts Comma-separated list of hosts that have read-only access to the share and its snapshots. If advanced host management is enabled, this is a list of the IDs of registered hosts. Otherwise, this is a list of network host names, IPs, subnets, domains, or netgroups.
Read/write hosts Comma-separated list of identifiers of hosts allowed reading data. Otherwise, this is a list of network host names, IPs, subnets, domains, or netgroups.
Read-only root hosts Comma-separated list of hosts that have read-only root access to the share and its snapshots. If advanced host management is enabled, this is a list of the IDs of registered hosts. Otherwise, this is a list of network host names, IPs, subnets, domains, or netgroups.
Root hosts Comma-separated list of hosts that have read-write root access to the share and its snapshots. If advanced host management is enabled, this is a list of the IDs of registered hosts. Otherwise, this is a list of network host names, IPs, subnets, domains, or netgroups.
No access hosts Comma-separated list of hosts that have no access to the share or its snapshots. If advanced host management is enabled, this is a list of the IDs of registered hosts. Otherwise, this is a list of network host names, IPs, subnets, domains, or netgroups.
Allow SUID Specifies whether to allow users to set the setuid and setgid Unix permission bits. Values are (case insensitive):
  • yes (default)—Users can set the setuid and setgid Unix permission bits. This allows users to run the executable with privileges of the file owner.
  • no—Users cannot set the setuid and setgid Unix permission bits.
Anonymous UID (Applies when the host does not have allow root access provided to it.) UID of the anonymous account. This account is mapped to client requests that arrive with a user ID of 0 (zero), which is typically associated with the user name root. The default value is 4294967294 (-2), which is typically associated with the nobody user (root squash).
Anonymous GID (Applies when the host does not have allow root access provided to it.) GID of the anonymous account. This account is mapped to client requests that arrive with a user ID of 0 (zero), which is typically associated with the user name root. The default value is 4294967294 (-2), which is typically associated with the nobody user (root squash).
Creation time Creation time of the share.
Last modified time Last modified time of the share.
Role The specific usage of the file share. Value is one of the following:
  • production—Default for source NAS server.
  • backup—Default for destination NAS server. Automatically set for all shares created on a NAS server that is acting as a replication destination. In other cases production is automatically set as a role for the NFS Share.
Minimum security Specifies a minimal security option that must be provided by the client for an NFS mount operation (in file system tab). Value is one of the following, from lower to higher security level:
  • sys—No server-side authentication (server relies on NFS client authentication). Without a configured secure NFS for the NAS server this setting is default (aka AUTH_SYS security).
  • krb5—Kerberos v5 authentication. Default when secure NFS is configured for the NAS server.
  • krb5i—Kerberos v5 authentication and integrity.
  • krb5p—Kerberos v5 authentication and integrity; encryption is enabled.

Specifying host lists by using a string

If advanced host management is disabled, a host list can contain a combination of network host names, IP addresses, subnets, netgroups, or DNS domains. The following formatting rules apply:

  • An IP address can be an IPv4 or IPv6 address.
  • A subnet can be an IP address/netmask or IP address/prefix length (for example: 168.159.50.0/255.255.255.0 or 168.159.50.0/24).
  • The format of the DNS domain follows the UNIX/Linux format; for example, *.example.com. When specifying wildcards in fully qualified domain names, dots are not included in the wildcard. For example, *.example.com includes one.example.com, but does not include one.two.example.com.
  • To specify that a name is a netgroup name, prepend the name with @. Otherwise, it is considered to be a host name.

If advanced host management is enabled, host lists contain the host IDs of existing hosts. You can obtain these IDs by using the /remote/host command.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\