Skip to main content
NetApp Knowledge Base

Search

  • Filter results by:
    • View attachments
    Searching in
    About 13 results
    • https://kb.netapp.com/on-prem/ontap/Ontap_OS/OS-KBs/Changing_permissions_on_the_root_of_a_share_removes_inherited_ACEs_on_that_path
      When attempting to edit the permissions on the root of a share, the following error is displayed when the root is inheriting ACEs from its parent: Remotely setting permissions on a folder at the root ...When attempting to edit the permissions on the root of a share, the following error is displayed when the root is inheriting ACEs from its parent: Remotely setting permissions on a folder at the root of a share removes all inherited permissions from the root folder and all subfolders. If 'yes' is selected, all inherited ACEs on the root of the share and any ACEs inherited from the root of the share are removed
    • https://kb.netapp.com/Legacy/ONTAP/7Mode/All_files_folders_Unix_permissions_get_changed_from_777_to_700_after_migration_of_a_NTFS_volume_from_7_Mode
      Applies to ONTAP 9 and above 7MTT Volume Security Style: NTFS Issue After 7MTT migration of a NTFS security style volume, all files/folders Unix permissions get changed from 777 to 700(rwx --- ---) an...Applies to ONTAP 9 and above 7MTT Volume Security Style: NTFS Issue After 7MTT migration of a NTFS security style volume, all files/folders Unix permissions get changed from 777 to 700(rwx --- ---) and NFS user gets permission denied.
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/Unable_able_to_access_root_filesystem__of_share_to_fix_permissions
      Applies to ONTAP 9 Issue Client trying to access share to take ownership and apply permissions fails with error: permission denied
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/NTFS_permissions_on_a_CIFS_share_are_not_taking_effect_on_a_specific_user
      The user who is able to access the CIFS share even though ACL's don't allow access UNIX UID: pcuser <> Windows User: TEST\user1 (Windows Domain User) User is also a member of Everyone, Authenticated U...The user who is able to access the CIFS share even though ACL's don't allow access UNIX UID: pcuser <> Windows User: TEST\user1 (Windows Domain User) User is also a member of Everyone, Authenticated Users, and Network Users Permissions on the share also show no access for this user vserver security trace output for the user in question "Access is allowed because the operation is trusted and no security is configured while opening existing file or directory.
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/NTFS_Traverse_folder_execute_file_not_allowing_to_traverse_the_share
      Applies to ONTAP 9 CIFS Issue NTFS permissions on the share only allow Traverse folder/execute but no Read permissions for given user NTFS permissions on a sub-folder have Read and Modify for the user...Applies to ONTAP 9 CIFS Issue NTFS permissions on the share only allow Traverse folder/execute but no Read permissions for given user NTFS permissions on a sub-folder have Read and Modify for the user Expectation is that the user will be able to traverse the share and have access to their directory However, they get "ACCESS_DENIED"
    • https://kb.netapp.com/on-prem/ontap/da/SAN/SAN-KBs/NTFS_file_system_inconsistency_on_LUN
      Applies to ONTAP (all versions) FC/iSCSI LUNs Microsoft Windows hosts Issue Windows host reports NTFS file system inconsistency on volume mounted from NetApp LUN.
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/secd_nfsAuth_noCifsCred_error_when_accessing_an_NTFS_secured_volume_via_NFS_in_ONTAP
      Applies to ONTAP 9 NTFS security style Issue When attempting to mount or otherwise access data on an NTFS-secured volume via NFS, the operation can hang or report access or permission denied EMS repor...Applies to ONTAP 9 NTFS security style Issue When attempting to mount or otherwise access data on an NTFS-secured volume via NFS, the operation can hang or report access or permission denied EMS reports secd.nfsAuth.noCifsCred for the user's mapping RESULT_ERROR_KERBEROS_CLIENT_REVOKED:7519 maybe in SecD logs as well
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/UNIX_user_cannot_access_NTFS_volume_due_to_name_mapping_failure
      UNIX user from NFS client cannot access data on NTFS security style volume [?] Tue Jul 14 15:03:34 CEST [node-01: secd: secd.nfsAuth.noNameMap:error]:vserver (SVM) Cannot map UNIX name to CIFS name.Er...UNIX user from NFS client cannot access data on NTFS security style volume [?] Tue Jul 14 15:03:34 CEST [node-01: secd: secd.nfsAuth.noNameMap:error]:vserver (SVM) Cannot map UNIX name to CIFS name.Error: Get user credentials procedure failed [ 0] Trying to map 'test' to Windows user 'test' using implicit mapping **[ 11] FAILURE: Name mapping for UNIX user 'test' failed. Name mapping configuration shows that explicit mapping is defined for the same user
    • https://kb.netapp.com/data-mgmt/OTV/VSC_Kbs/Deleting_data_from_NTFS_does_not_free_up_space
      Applies to NTFS VMware ONTAP Issue Deleting data from NTFS located on NFS datastore does not reclaim expected space
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/Unix_root_user_is_unable_to_access_NTFS_volume_in_ONTAP_9
      Error: Get user credentials procedure failed [ 0 ms] Determined UNIX id 0 is UNIX user 'root' [ 0] Trying to map 'root' to Windows user 'root' using implicit mapping [ 1] Using a cached connec...Error: Get user credentials procedure failed [ 0 ms] Determined UNIX id 0 is UNIX user 'root' [ 0] Trying to map 'root' to Windows user 'root' using implicit mapping [ 1] Using a cached connection to fr000-prddc001.eu.els.local [ 2] Could not find Windows name 'root' **[ 2] FAILURE: Name mapping for UNIX user 'root' failed with transient errors.
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-KBs/NFS_mount_of_NTFS_volume_using_root_user_not_working_due_to_name_mapping_failure
      cluster1::> vserver export-policy check-access -vserver vs1 -client-ip 10.22.32.42 -volume vol4 -authentication-method sys -protocol nfs3 -access-type read-write Policy Policy Rule Path Policy Owner O...cluster1::> vserver export-policy check-access -vserver vs1 -client-ip 10.22.32.42 -volume vol4 -authentication-method sys -protocol nfs3 -access-type read-write Policy Policy Rule Path Policy Owner Owner Type Index Access ----------------------------- ---------- --------- ---------- ------ ---------- / default vs1_root volume 1 read /dir1 default vs1_root volume 1 read /dir1/dir2 default vs1_root volume 1 read /dir1/dir2/flex1 data vol4 volume 10 read-write 4 entries were displayed.