Table of ContentsLibraryView in Frames

Options that help maintain security

Several options are available to help you maintain storage system security.

Option Description
trusted.hosts Specifies up to five hosts that are allowed Telnet, RSH and administrative HTTP (FilerView) access to the storage system for administrative purposes. The default is set to an asterisk (*), which allows access to all storage systems. This value is ignored for Telnet access if the telnet.access option is set. It is also ignored for administrative HTTP access if the httpd.admin.access option is set.
telnet.access Controls which hosts can access the storage system through a Telnet session for administrative purposes. You can restrict Remote Shell access to the storage system by specifying host names, IP addresses, or network interface names. If this value is set, the trusted.hosts option is ignored for Telnet.
rsh.access Controls which hosts can access the storage system through a Remote Shell session for administrative purposes. You can restrict Remote Shell access to the storage system by specifying host names, IP addresses, or network interface names.
nfs.mount_rootonly Controls whether the storage system’s volumes can be mounted from NFS clients only by the root user on privileged ports (ports 1 through 1,023) or by all users on all ports. This option is applicable only if the NFS protocol is licensed.
wafl.root_only_chown Controls whether all users or only the root user can change directory and file ownership. This option is applicable only if the NFS protocol is licensed.
cifs.restrict_anonymous Controls whether anonymous CIFS users can look up CIFS shares, users, or groups on a storage system. This option is applicable only if the CIFS protocol is licensed.

For more information about the options in this table, see the na_protocolaccess(8) man page.