3 system administrator tools, 1 access permissions in advanced server for un, 1 access permissions in advanced server for unix – Siemens Unix V4.0 User Manual

Page 151: Tools for special tasks system administrator tools, Options and parameters, Use default names, Names_file, Lmhosts_file

Advertising
background image

Tools for special tasks

System administrator tools

Product Manual

U7613-J-Z815-6-76

©

S

iem

e

n

s

N

ix

dor

f

In

fo

rm

at

io

n

s

s

y

s

te

m

e

A

G

1

9

9

5

P

fad

: D:

\O

7

613

e6

\u

761

3e

.k

07

Options and Parameters:

-d

Use default names

<names_file>

Input file name (should contain name mappings in

names.cfg

format).

<lmhosts_file>

Output file name in LMHOSTS format (ready for being imported into a

WINS database).

Please inspect the list of static NetBIOS name mappings generated by names2lm

carefully before using NT WINS manager to import them into a WINS database.

As a rule, you should keep the number of static mappings within WINS as small as
possible and use them only for important computers which are not WINS-aware. It
is not recommended to use static mappings for WINS enabled clients.

7.3 System administrator tools

The first section contains an overview how access permissions are managed in Advanced
Server for UNIX. The following scripts are required by system administrators in different
situations. For example, they can be used for backing up the user’s configuration and
resources as well as for problem analysis.

7.3.1

Access permissions in Advanced Server for UNIX

Advanced Server for UNIX stores access permissions for files and directories in its ACL
database in the

/var/opt/lanman

directory. In contrast to UNIX permissions, which are stored

with each file and directory in the file system, permissions are stored centrally in Advanced
Server for UNIX.

The ACL database stores access permissions for some resources, while other resources
inherit their permissions from the higher-level directory. The

net perms

command displays

permissions for all available resources, i.e. either permissions stored physically in the ACL
database or those inherited from the higher-level directory. If a resource which is not yet
entered in the ACL database is assigned permissions by

net perms

, the rights currently

inherited are combined with those specified in the command and stored as a physical entry
in the ACL database. If the physical entry is deleted, the inherited permissions are valid
again.

If you are saving files with UNIX tools or copying files under UNIX, the permissions are not
saved and copied automatically. Files and directories can be backed up together with their
permissions using the NT Backup Tools, for example.

i

Advertising