Docu41470 - Using EMC Utilities For The CIFS Environment PDF
Docu41470 - Using EMC Utilities For The CIFS Environment PDF
Docu41470 - Using EMC Utilities For The CIFS Environment PDF
Release 7.1
EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
Copyright © 1998 - 2013 EMC Corporation. All rights reserved.
Published February 2013
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION
MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO
THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license.
For the most up-to-date regulatory document for your product line, go to the Technical
Documentation and Advisories section on EMC Powerlink.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on
EMC.com.
All other trademarks used herein are the property of their respective owners.
Corporate Headquarters: Hopkinton, MA 01748-9103
Preface.....................................................................................................5
Chapter 1: Introduction...........................................................................7
System requirements...............................................................................................8
Restrictions...............................................................................................................8
Related information................................................................................................8
Chapter 2: Concepts.............................................................................11
LGDUP....................................................................................................................12
EMCOPY.................................................................................................................12
SHAREDUP............................................................................................................12
EMCACL................................................................................................................12
EMCABE.................................................................................................................12
FSTOOLBOX..........................................................................................................12
Planning considerations.......................................................................................13
Chapter 3: Configuring.........................................................................15
LGDUP....................................................................................................................16
LGDUP command syntax..........................................................................17
LGDUP exit status codes............................................................................18
LGDUP example..........................................................................................19
EMCOPY.................................................................................................................24
EMCOPY command syntax.......................................................................26
EMCOPY exit status codes.........................................................................30
EMCOPY example 1....................................................................................30
EMCOPY example 2....................................................................................31
SHAREDUP............................................................................................................32
Chapter 4: Troubleshooting..................................................................63
EMC E-Lab Interoperability Navigator..............................................................64
VNX user customized documentation...............................................................64
Error messages.......................................................................................................64
EMC Training and Professional Services...........................................................65
Glossary..................................................................................................67
Index.......................................................................................................69
As part of an effort to improve and enhance the performance and capabilities of its product lines,
EMC periodically releases revisions of its hardware and software. Therefore, some functions described
in this document may not be supported by all versions of the software or hardware currently in use.
For the most up-to-date information on product features, refer to your product release notes.
If a product does not function properly or does not function as described in this document, please
contact your EMC representative.
Note: Emphasizes content that is of exceptional importance or interest but does not relate to personal
injury or business/data loss.
Indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
Note: Do not request a specific support representative unless one has already been assigned to
your particular system problem.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications.
Please send your opinion of this document to:
Introduction
System requirements
Table 1 on page 8 describes the EMC® VNX™ series software, hardware, network, and
storage configurations.
Network The CIFS utilities are intended for use on CIFS clients only.
Restrictions
Restrictions are listed in each utility section.
Related information
Specific information related to the features and functionality described in this document is
included in:
VNX wizards
Unisphere software provides wizards for performing setup and configuration tasks. The
Unisphere online help provides more details on the wizards.
Related information 9
Introduction
Concepts
The EMC CIFS utilities include six tools that assist with migrating and
managing CIFS environments from servers by running Microsoft Windows
to VNX. This section provides a brief explanation of each utility and
planning considerations.
Topics included are:
◆ LGDUP on page 12
◆ EMCOPY on page 12
◆ SHAREDUP on page 12
◆ EMCACL on page 12
◆ EMCABE on page 12
◆ FSTOOLBOX on page 12
◆ Planning considerations on page 13
LGDUP
LGDUP replicates the local groups and local users database from a server to a single Data
Mover. The local groups database of the target server can be updated. Prefix the local groups
database to maintain the original user rights when multiple local groups databases reside
on a single Data Mover.
EMCOPY
EMCOPY duplicates a directory tree from one server to another, keeping the security intact,
including access control lists (ACLs) with local groups' access control entries (ACEs). When
copying the local group security entries, EMCOPY first ensures that the local group database
has been replicated on the target server. If not, EMCOPY suggests using LGDUP first. Choose
other options to specify exactly which security properties to replicate during the copy process.
Table 6 on page 26 provides more information.
SHAREDUP
SHAREDUP duplicates the shares from one Windows Server to another with Windows
security intact including ACLs with local groups' ACEs.
EMCACL
EMCACL modifies all the security properties of existing files and directories on VNX. The
user can specify new ACEs (including local groups) and change the owner of the files or
directories.
EMCABE
EMCABE allows a user to enable or disable the access-based enumeration (ABE) feature of
a single share or all the shares of a server. The tool also allows a user to view the current
state of a specified share.
FSTOOLBOX
FSTOOLBOX helps to manage quota entries for a local or a mapped network drive. It allows
a user to list, move, or delete files and directories owned by any user on a specified drive.
Planning considerations
This section describes planning considerations before using one of the utilities.
Note: EMC Professional Services can provide valuable assistance with planning CIFS migrations.
Contact EMC Customer Support Representative for more information.
Backups: Before using any utility, back up the contents (metadata and data) of the Windows
Servers to be moved to VNX.
Storage: Ensure there is enough storage capacity to hold the contents of the Windows Servers.
Map the Windows Servers contents to the Data Movers: Determine through which Data Movers
the contents of the servers are to be accessed before moving files from the Windows Server.
For example, move the local groups database from Windows Server A2 to which Data
Mover?
Group membership and rights: Before using EMC CIFS utilities, the user accounts used for
running the utilities must have certain group memberships and privileges. Unless otherwise
noted, the privileges apply only to the computer running the utilities.
Table 2 on page 13 summarizes the group memberships, access rights, and permissions
required for each utility.
EMCOPY Member of either the Administrators or ◆ Backup files and directories re-
Account Operators group on the source quired on the source.
and target computers. ◆ Restore files and directories re-
quired on the target.
EMCACL Member of the Users group. Backup and restore privileges on the
server where the pathname resides.
FSTOOLBOX Member of the Administrators group. Backup, restore, and security privileges
on the target side.
Planning considerations 13
Concepts
Configuring
LGDUP
LGDUP copies the local groups or local users database from a Windows Server to a Data
Mover. This creates a local groups database on a Data Mover (target server) that otherwise
cannot access domain-based local groups. It also replicates user and group privileges to the
target server:
◆ By default, LGDUP merges the source and target local groups databases.
◆ The -r option replaces the target local groups database with the source local groups
database.
In LGDUP releases prior to LGDUP version 1.06, the -r option erased the local groups
database on the target server.
◆ By using the -p option, local groups databases can be copied from multiple source servers
(incrementally, not simultaneously) to one Data Mover, while leaving the privileges from
each source server intact. It prefixes the local group name by using the format
<source_server_name>_<local_group_name>.
If the -p option is not set, the local groups databases merge, and the privileges from the
source server change.
◆ The user account must be a member of the Administrators or Account Operators local
group on both the source and target servers.
◆ Use an account with generate security audits and manage auditing and security log
privileges to successfully duplicate all the privileges.
◆ LGDUP must be run for each CIFS server (a Data Mover can house several CIFS
servers).
EMCOPY Run LGDUP.exe before EMCOPY.exe EMCOPY with the /lg option does not
with the /lg or /lu option enabled. copy the local group. It copies the se-
curity descriptors intact. The security
descriptors may include rights as-
signed to the local groups and informa-
tion about the local group.
If using the /lg option with EMCOPY,
the local group must reside on the
target server to guarantee the security
information copies intact.
SHAREDUP Run LGDUP.exe before SHAREDUP does not copy the local
SHAREDUP.exe with the /SD option groups database. If using the /SD op-
enabled. tion, the local groups database must
reside on the target server because
the security descriptor on shares can
include rights for the local groups.
Table 4 on page 17 lists the required arguments and options for LGDUP.
Command/Option Description
Copies the local groups database from a Windows Server to VNX, where:
C:\>LGDUP.exe [-r]
[-p] [-s] [-v] [-u] <source> is the NetBIOS name of the source Windows Server.
[-1[+] <target> is the NetBIOS name of the target server.
<logFile>] [-nopriv]
\\<source>\\<target>
Note: For NetBIOS server names, place two slashes (\\) before the source
and target names.
-r Replaces the target local groups database with the source local groups
database. Without this option, LGDUP merges the contents of each local
groups database.
LGDUP 17
Configuring
Command/Option Description
-p Adds a prefix to the local group name on the target server in the following
format:
<source_server_name> _<local_group_name>
Note: Use this option when maintaining the privledges from the source
server when migrating multiple source servers to a single target server.
-s Does not set or add any number of local groups on the first resolve error.
LGDUP stops adding members to a local group on the first resolve error.
-v Sets verbose mode. This displays all the information in detail for each ex-
ecuted operation from the utility, including:
Note: If this option is not set, only concise informative messages and errors
are displayed.
LGDUP returns an encoding status to indicate whether an error occured in the command
execution. A nonzero status code indicates an error occured during the command execution.
The status code is stored in the errorlevel variable of the batch caller file. Table 5 on page
18 lists the exit status codes.
0 No error.
1 Usage error.
LGDUP example
This example shows how to copy a local group database from one CIFS server to another,
replacing the existing local group database and setting verbose mode.
Action
To copy a local group database from one CIFS server to a Data Mover, replace the local group database, prefix it, and
set verbose mode, use this command syntax:
C:\>LGDUP.exe-r -p -v \\<source> \\<target>
Example:
LGDUP 19
Configuring
Output
LGDUP 1.0.7
Users:
Ordinary users
Gusts:
Users granted guest access to the computer
Power users:
Members can share directories
Account operators:
Account operators of the machine
Backup Operators:
Members can bypass file security to backup files
Replicator:
Support file replication in a domain
NT1_WINS Users:
Members who have view-only access to the WINS Server
Backup Operators:
Backup Operators can override security restrictions for the sole purpose
of backing up or restoring files
Guests:
Guests have the same access as members of the Users group by default,
except for the Guest account which is further restricted
Power Users:
Power Users possess most administrative powers with some restrictions.
Thus, Power Users can run legacy applications in addition to certified
applications
Replicator:
Supports file replication in a domain
Output
Users:
Users are prevented from making accidental or intentional system-wide
changes. Thus, Users can run certified applications, but not most legacy
applications
LG1:
test1
LG2:
test2
WINS Users:
Members who have view-only access to the WINS Server
---
Duplicate Guests...
WARNING: Member(s) of dm2\Guests have been removed.
LGDUP 21
Configuring
Output
---
Duplicate Power Users...
WARNING: Member(s) of dm2\Power Users have been removed.
---
Duplicate Replicator...
WARNING: Member(s) of dm2\Replicator have been removed.
---
Duplicate Users...
WARNING: Member(s) of dm2\Users have been removed.
---
Duplicate LG1...
Create NT1_LG1...
OK
Output
*---
Duplicate LG2...
Create NT1_LG2...
OK
---
Duplicate WINS Users...
---
Get accounts for "SeTakeOwnerShipPrivilege" from \\NT1...
OK
Grant "SeTakeOwnerShipPrivilege" on \\dm2 to...
S-1-5-20-220 \\BUILTIN\Administrators...OK
---
Get accounts for "SeBackupPrivilege" from \\NT1...
OK
Grant "SeBackupPrivilege" on \\dm2 to...
S-1-5-20-227 \\BUILTIN\Backup Operators...OK
S-1-5-20-220 \\BUILTIN\Administrators...OK
---
Get accounts for "SeRestorePrivilege" from \\NT1...
OK
Grant "SeRestorePrivilege" on \\dm2 to...
S-1-5-20-227 \\BUILTIN\Backup Operators...OK
S-1-5-20-220 \\BUILTIN\Administrators...OK
---
Get accounts for "SeChangeNotifyPrivilege" from \\NT1...
OK
LGDUP 23
Configuring
Output
---
Get accounts for "SeAuditPrivilege" from \\NT1...
OK
Grant "SeAuditPrivilege" on \\dm2 to...
S-1-5-15-28a68b82-2c1234eb-3f32a78a-455 \\ABCD3\admin...OK
S-1-5-15-237abd17-ae2ae01d-be8ef665-1f4 \\NT1\Administrator...OK
---
Get accounts for "SeIncreaseQuotaPrivilege" from \\NT1..
OK
Grant "SeIncreaseQuotaPrivilege" on \\dm2 to...
S-1-5-20-220 \\BUILTIN\Administrators...OK
---
Get accounts for "SeSecurityPrivilege" from \\NT1..
OK
Grant "SeSecurityPrivilege" on \\dm2 to...
S-1-5-20-220 \\BUILTIN\Administrators...OK
************************************************************************
***********************************************************************
EMCOPY
EMCOPY lets you copy a file or directory (and included subdirectories) from and to an
NTFS partition, keeping security the same on the copy as on the original.
EMCOPY allows you to back up the file and directory security—ACLs, owner information,
and audit information—from a source directory to a destination directory without copying
the file data.
EMCOPY, however, does not copy the local groups database from one computer to another.
You must use LGDUP first to copy the local groups database. Therefore, when the /lg or /lu
option is specified, EMCOPY initially verifies that all of the source server’s local groups
exist on the target server. Even if one group is missing, EMCOPY stops and notifies you to
use LGDUP first, as described in LGDUP on page 16.
◆ User account should have the appropriate privileges, which bypass access checking,
to back up and restore files and directories. These are required to restore a directory
that you do not own.
◆ User account must be a member of the Backup Operators group.
◆ User account must be a member of the Administrators or Account Operators group
on both the source and destination computers.
◆ User account must have the Change Audit privilege to copy ACLs.
◆ Source and destination fields for the EMCOPY command must be directories.
◆ Privileges can be set by using Active Directory Users and Computers (ADUC) from
a domain controller in Windows environments, and from the Data Mover Security
Management Console for Windows 2000 environments. These privileges must be set
on both the source and the target server. If they are not, access can be denied, especially
on files that include denied ACEs in their ACL.
◆ Decrypt any encrypted directories or files before using EMCOPY. Otherwise the
computer running Windows 2000 used as the EMCOPY console should be a Microsoft
recovery agent or file owner to copy the encrypted files and directories to VNX.
Windows 2000 help provides more information on recovery agents.
EMCOPY 25
Configuring
Table 6 on page 26 lists the required variables and the options for EMCOPY.
Command/Option Description
Copies a file or directory (and included subdirectories) from and to an NTFS
C:\>EMCOPY.exe
partition, keeping security the same on the copy as on the original, where:
<source>
<destination> <source> is the path to the source directory.
[file [<file> ] ...]
<destination> is the path to the destination directory.
<file> is a name of the file being copied. To copy a list of files, you can
specify wildcard characters. For example, to copy only matched files in all
scanned directories, type the following as the file list:
*.cpp *.h
Note: EMCOPY copies all files when the file argument is omitted.
/nosec Disables the copy of the security descriptor properties of the file or directory.
By default, DACLs are replicated on the created file or directory.
Note: This option takes priority over the default on the /o, /a, /lg,
and /i options.
/o Copies the file’s (or directory’s) owner.Without this option, the user account
used for the copy becomes the file/directory owner on the target server.
Note: The user account must also have granted the manage audits and
security log privilege on both the source and destination clients before this
option is enabled.
/lu Enables the copy of local user security entries when asked to
copy the security information. Without this option, local user
entries are ignored.
/create Creates a file of zero length, rather than copying the data.
/d Copies only the files with the LAST MODIFICATION time later
than the existing target copy.
Note: Use this option to copy only those files created on the
source directory to update a destination directory.
EMCOPY 27
Configuring
/sd Preserves the copied file’s security in the copy. If any error
occurs during the security setting, the target file is deleted or
erased:
/l Lists only the files that should be copied without actually dupli-
cating any files.
If the /secfix option is also specified, the /l option com-
pares (and does not change) the Windows security of the
source and the destination files or directories. In this case, the
/o and /a options specify the owner and audit properties
comparison. When differences occur, the properties of both
the source and destination files or directories are printed.
/log:<filename> Creates and names a new file and redirects console messages
to it.
/nocase Creates all file and directory names with lowercase charac-
ters.
EMCOPY 29
Configuring
0 No error.
1 Mismatch error — A directory was not created because a file with the same name
exists.
EMCOPY example 1
This example shows how to copy one directory with all its contents and its owner to a
different directory on a Data Mover.
Action
To copy the source directory to the destination directory, copy the source directory’s owner and all the source directory’s
subdirectories, use this command syntax:
C:\>EMCOPY.exe <source> <destination>/o /s
Example:
C:\>EMCOPY.exe c:\source\ g:\destination /o /s
Output Note
DACLs are also duplicated. By default, the DACLs are copied
EMCOPY 02.04b when the /NOSEC option is not set. The owner attribute of
Copyright (C) 2001, All Rights the directories and files is also duplicated. The command
Reserved, output includes the list of files and a summary that includes
by EMC Corporation, Hopkinton, MA
Date: 10/24/2001 12:10:26 the number of files, directories, bytes copied, and an error
Source path: c:\source count.
Desti. path: g:\destination
Files: *.*
List/Modify/Create options:
Security options: /o
Retry options: /r:1000000 /w:30
Server SRC: NTSERVER1 4.0
Server DEST:DM12_ANA0 4.1
Getting local group(s) from
\\NTSERVER1
Processing the copy from c:\source
to g:\destination...
c:\source\folder1\ ->
g:\destination\folder1
c:\source\folder1\ text1.txt ->
g:\destination\folder1\tetx1.txt
c:\source\folder1\ text2.txt ->
g:\destination\folder1\text2.txt
---
---
Summary results:
File(s) copied: 67
Directory(ies) created: 4
Security Descriptor Setting done: 71
Amount of copied bytes: 3 MB
(3864591 Bytes)
EMCOPY example 2
Action
To copy the source directory to the destination directory including the local groups security entries, use this command
syntax:
C:\>EMCOPY.exe <source> <destination>/o /s /lg
Example:
C:\>EMCOPY.exe c:\source\ g:\destination /o /s /lg
EMCOPY 31
Configuring
Output Note
You must use LGDUP before by using EMCOPY with the
EMCOPY 02.04b /lg option.
Copyright (C) 2001, All Rights
Reserved,
by EMC Corporation, Hopkinton, MA
Date: 10/24/2001 12:10:26
Source path: c:\
Desti. path: g:\
Files: *.*
List/Modify/Create options:
Security options: /o /lg
Retry options: /r:1000000 /w:30
Server SRC: NTSERVER1 4.0
Server DEST:DM12_ANA0 4.1
Getting local group(s) from
\\NTSERVER1
Processing the copy from c:\ to
g:\...
c:\source\folder1\ ->
g:\destination\folder1
c:\source\folder1\ text1.txt ->
g:\dest\folder1\text1.txt
c:\source\folder2\abc2.txt ->
g:\dest\folder2\abc2.txt
d:\ntusrmap\ver0\usrmap.db ->
g:\ntusrmap\ver0\usrmap.db
d:\ntusrmap\ver0\usrmap.exe ->
g:\ntusrmap\ver0\usrmap.exe
d:\ntusrmap\ver0\usrmap.log ->
g:\ntusrmap\ver0\usrmap.log
---
---
Summary results:
File(s) copied: 67
Directory(ies) created: 4
Security Descriptor Setting done: 71
Amount of copied bytes: 3 MB
SHAREDUP
SHAREDUP allows CIFS shares to be copied from one CIFS file server to another. Use it to
duplicate many shares. By using the /SD option, you can duplicate the ACLs for the shares
if there are local groups or local users in the ACL. The SIDs will be translated to the target
equivalent local group/user SID.
◆ Before using the SHAREDUP with the /SD option, use LGDUP to ensure all local
groups of the source server are on the target server.
◆ A share cannot be created on a nonexistent directory.
◆ The newrootpath and subdirectories must exist.
◆ SHAREDUP does not duplicate system shares.
Table 8 on page 33 lists the required variables and the options for SHAREDUP.
Command/Option Description
Copies CIFS shares from one server running Windows
C:\>SHARDUP.exe \\<source> \\<tar
to another, primarily when there are many shares to copy,
get>
where:
<srcdrive>
\\<source> = the NetBIOS name of the source.
SHAREDUP 33
Configuring
Command/Option Description
/FO+:<outputFile> Concatenates several drive letters for the same source
and target servers in a single file.
/LOG:<path> Sets the log filename to the path. Erases the file.
/LOG+:<path> Sets the log filename to the path. Appends to the file.
SHAREDUP returns an encoding status to indicate whether an error occurred in the command
execution. A nonzero status code indicates an error occurred during command execution.
The status code is stored in the errorlevel variable of the batch caller file. Table 9 on page
34 lists the exit status codes.
0 No error.
1 Syntax error.
3 Duplication error.
SHAREDUP 35
Configuring
SHAREDUP example
Action
To duplicate all the shares, including security properties, from the source to the destination server, prefix the created
shares with the source server name, use this command syntax:
C:\>SHAREDUP.exe \\<source> \\<target> <srcdrive>/P<newrootpath> /PREFIX /r /sd
Example:
C:\>SHAREDUP.exe \\NT1 \\dm2 D: /P \fs2 /PREFIX /r /sd
Output
---
Creating share "\\dm2\NT1_share3"
to export directory "C:\abcd\top\share3"...
-> OK
---
Creating share "\\dm2\NT1_share1"
to export directory "C:\abcd\top\share1"...
-> OK
---
Creating share "\\dm2\NT1_share2"
to export directory "C:\abcd\top\share2"...
-> OK
***********************************************************************
Summary results:
Number of share(s) successfully duplicated: 3
Number of error(s): 0
EMCACL
EMCACL allows the ACLs of files or directories to be displayed and edited. It can also be
used to change the owner of files or directories. User entries supplied in the command line
can be local groups or local users of the server where the pathname is located.
◆ Enclose user/account names that include spaces in quotation marks. For example,
"domain account".
◆ Use wildcard characters to specify more than one file or directory in a command.
◆ Specify more than one user in a command (except for the /o option).
◆ Combine access rights.
◆ The ACL for a directory includes ACEs that control whether new files or directories
created in that directory inherit the directory’s user privileges.
◆ User account should have the appropriate privileges, which bypass access checking,
to back up and restore files and directories. These is required to restore a directory
that you do not own.
◆ User account must be a member of the Backup Operators group.
◆ User account must be a member of the Administrators or Account Operators group
on both the source and destination computers.
◆ User account must have the Change Audit privilege to copy ACLs.
Table 10 on page 37 lists the required variables and the options for EMCACL.
Command/Option Description
Displays and edits ACLs for files and directories, and
C:\>EMCACL.exe <pathname>
changes file and directory owners, where:
<pathname> is the path to the target file or directory.
EMCACL 37
Configuring
Command/Option Description
When specified with at least one of the following options:
/O, /G, /R, /P, or /D, the /T option changes the ACLs
of the files in the specified directory and all subdirectories.
The values for the perm and spec options are as fol-
lows. In this list, Special access means single type ac-
cess, such as Read, Write, and others:
R= Read (equivalent to E + X)
C= Change (write)
F= Full control (R + C + P + O + D)
P= Change permissions (Special access) — allows
modification of only the ACL content of a file or directory
O= Take ownership (Special access)
X= Execute (Special access)
E= Read (Special access)
W= Write (Special access)
D= Delete (Special access)
Command/Option Description
flag is present, new files within the parent directory
do not inherit the user privileges of the directory itself.
◆ If the T flag is omitted, the new files inherit the ACEs
of the parent directory.
/P <user>:perm [; [T] spec] ] Replaces the specified user’s access rights. The values
for perm and spec are the same as those listed for
the /G option.
EMCACL returns an encoding status to indicate whether an error occurred in the command
execution. A nonzero status code indicates an error occurred during command execution.
The status code is stored in the errorlevel variable of the batch caller file. Table 11 on page
39 lists the exit status codes.
0 No error.
2 Given path not found - The pathname argument is incorrect or not found.
EMCACL 39
Configuring
EMCACL example
Action
To print the ACL for all the files or directories in the current directory and its subdirectories, use this command syntax:
C:\>EMCACL.exe <pathname>*.* /T
Example:
C:\>EMCACL.exe \\NT1\Draft\*.txt /t
Output
EMCACL 01.05
\\NT1\Draft\
Owner:"UNIX UID=0x0 ''"
Group:"UNIX GID=0x0 '_c'"
DACL count:5
"BUILTIN\Administrators": Allowed FULL:EWXPOD (0x001F01FF)
Flags:OI,CI
"Power Users": Allowed FULL:EWXPOD (0x001F01FF) Flags:OI,CI,IO
S-1-5-20-225 : Allowed CHGE:EWXD (0x001301BF) Flags:OI,CI
"SYSTEM" : Allowed FULL:EWXPOD (0x001F01FF) Flags:OI,CI
"Everyone" : Allowed FULL:EWXPOD (0x001F01FF) Flags:OI,CI
\\NT1\Draft\r1.txt
Owner:”Domain A\administrator"
Group:"Domain A\Users"
DACL count:5
"BUILTIN\Administrators": Allowed FULL:EWXPOD (0x001F01FF)
"BUILTIN\Administrators": Allowed FULL:EWXPOD (0x001F01FF) Flags:IA
S-1-2-34-567 : Allowed CHGE:EWXD (0x001301BF) Flags:IA
"SYSTEM" : Allowed FULL:EWXPOD (0x001F01FF) Flags:IA
"Everyone" : Allowed FULL:EWXPOD (0x001F01FF) Flags:IA
\\NT1\Draft\r2.txt
Owner:"Domain A\administrator"
Group:"Domain A\Users"
DACL count:6
"NT1\EDCBA_[b]" : Allowed READ:EX (0x001200A9)
"BUILTIN\Administrators": Allowed FULL:EWXPOD (0x001F01FF)
"BUILTIN\Administrators": Allowed FULL:EWXPOD (0x001F01FF) Flags:IA
S-1-2-34-567 : Allowed CHGE:EWXD (0x001301BF) Flags:IA
"SYSTEM" : Allowed FULL:EWXPOD (0x001F01FF) Flags:IA
"Everyone" : Allowed FULL:EWXPOD (0x001F01FF) Flags:IA
EMCABE
The EMCABE command-line tool enables ABE, disables ABE, and displays the ABE status
of a remote Data Mover’s shares. The EMCABE tool works with both Windows 2000 and
Windows Server 2003 clients. It is enabled by default for Windows Server 2008. EMCABE
command-line tool also supports Windows Server 2012.
EMCABE is similar to the Windows ABECMD tool with one additional option that displays
the ABE status of a share, as listed in Table 12 on page 41. EMCABE is also run from the
Windows command prompt.
Table 12 on page 41 lists the required variables and options for EMCABE.
Command/Option Description
Enables and displays ABE and displays the status of
C:\>EMCABE [/E | /D | /G]
ABE, where:
[/T <servername>]
[/A | /S <sharename>] <servername>= the name of the server.
[/?] <sharename>= the name of the share.
EMCABE 41
Configuring
Command/Option Description
EMCABE example 1
Action
To enable ABE on a share, use this command syntax:
C:\>EMCABE /E /T\\<servername>/S<sharename>
where:
<servername>= name of the server
Example:
C:\>EMCABE /E /T \\winserver /S ufs2
Output
EMCABE 01.00
EMCABE example 2
Action
To enable ABE on all shares of a CIFS server, use this command syntax:
C:\>EMCABE/E /T\\<servername> /A
where:
<servername>= name of the CIFS server
Action
Example:
C:\>EMCABE /E /T \\winserver1 /A
Output
EMCABE 01.00
Copyright (C) 2005, All Rights Reserved,
by EMC Corporation, Hopkinton MA.
EMCABE example 3
Action
To display the ABE status of all shares on a CIFS server, use this command syntax:
C:\>EMCABE /G /T\\<servername>/A
where:
<servername>= the name of the CIFS server
Example:
C:\>EMCABE /G /T \\winserver1 /A
Output
EMCABE 01.00
FSTOOLBOX
FSTOOLBOX is a tool to help manage quota entries for a local or mapped network drive. It
allows a user to list, move, or delete whole files and directories owned by a given user on
a specified drive.
EMCABE 43
Configuring
Command/Option Description
FSTOOLBOX is a tool that allows an administrator to
C:\>FSTOOLBOX <drive>: [info]
list, move, or delete files and directories, where:
[list domain\name]
[EnumAllFiles domain\name] [re <drive> = the name of the drive (local or network).
moveAllFiles domain\name] [remove
Quota domain\name] [removeFile
sAndQuota domain\name] [ChangeOwner
domain\oldowner domain\newowner]
[moveUserTree domain\name target
path]
EnumAllFiles domain\name Enumerates all the user files and directories given a
domain\name or a SID value.
removeAllFiles domain\name Deletes all the user files and directories given a do-
main\name or a SID value.
Command/Option Description
removeFilesAndQuota Deletes all the user files and directories and removes
domain\name the quota entry given a domain\name or a SID value.
FSTOOLBOX example
The following example shows how to use fstoolbox.exe in a scenario where an administrator
wants to view the disk usage of a user, move that user’s files and directories, then remove
the quota entry of the user:
1. View the quota setting of a drive by using this command syntax:
C:\>FSTOOLBOX <drive>:info
where:
<drive>= letter of the drive
Example:
To view the quota setting of drive g:, type:
C:\>FSTOOLBOX g: info
Output:
FSTOOLBOX 45
Configuring
FSTOOLBOX 01.02
2. View the disk usage for a specified user by using this command syntax:
C:\>FSTOOLBOX <drive>: list <domain\name>
where:
<drive>= letter of the drive
<domain\name>= domain and name of the specified user
Example:
To view the disk usage for user dw2k3\admu1, type:
C:\>FSTOOLBOX g: list dw2k3\admu1
Output:
FSTOOLBOX 01.02
where:
<drive>= letter of the drive
<domain\name>= domain and name of the specified user
Example:
To list all of the files and directories owned by dw2k3\admu1, type:
Output:
FSTOOLBOX 01.02
where:
<drive>= letter of the drive
<domain\olduser>= domain and name of the user
<domain\newuser>= domain and name of the new user
Example:
To change the owner from dw2k3\admu1 to dw2k3\stdu1, type:
C:\>FSTOOLBOX g: changeowner dw2k3\admu1 dw2k3\stdu1
Output:
FSTOOLBOX 01.02
FSTOOLBOX 47
Configuring
5. Verify there are no files or directories owned by a specified user by using this command
syntax:
C:\>FSTOOLBOX <drive>: enumallfiles<domain\user>
where:
<drive>= letter of the drive
<domain\user>= domain and username of the specified user
Example:
To list all of the files and directories owned by dw2k3\admu1, type:
C:\>FSTOOLBOX g: enumallfiles dw2k3\admu1
Output:
FSTOOLBOX 01.02
where:
<drive>= letter of the drive
<domain\user>= domain and username of the specified user
<directory>= name of the destination directory
Example:
To move the files and directories of dw2k3\stdu1 from drive g: to c:\move_tree, type:
C:\>FSTOOLBOX g: moveusertree dw2k3\stdu1 c:\move_tree
Output:
FSTOOLBOX 01.02
G:\myfile
G:\myfile\Speech
G:\myfile\Speech\spchtel.dll
G:\myfile\Speech\speech.cnt
G:\myfile\Speech\speech.dll
G:\myfile\Speech\speech.GID
G:\myfile\Speech\speech.hlp
G:\myfile\Speech\vcauto.tlb
G:\myfile\Speech\vcmd.exe
Summary results:
File(s) copied: 7
Directory(ies) created: 2
Security Descriptor Setting(s) done: 9
Amount copied byte(s) : 2 MB (2 387 579 Byte(s))
where:
<drive>= letter of the drive
<domain\user>= domain and username of the specified user
Example:
To verify that there are no files or directories owned by dw2k3\stdu1, type:
C:\>FSTOOLBOX g: enumallfiles dw2k3\stdu1
Output:
FSTOOLBOX 01.02
FSTOOLBOX 49
Configuring
where:
<drive>= letter of the drive
<domain\user>= domain and username of the specified user
Example:
To remove the quota entry of dw2k3\stdu1, type:
C:\>FSTOOLBOX g: removequota dw2k3\stdu1
Output:
FSTOOLBOX 01.02
Note: EMC Customer Support Representatives offer custom migration solutions for CIFS data migration
requirements. If you need experienced help in conducting a more complex migration, contact your
local EMC Customer Support Representative.
Assign the user account (NEWUSER) for the migration to the Domain Administrators group,
and assign the appropriate rights to the user account to run the utilities. The user account
performing these tasks must be a member of the Administrators group:
1. Select Start ➤ Programs ➤ Administrative Tools (Common) ➤ Active Directory Users and
Computers.
2. On the User menu, select Select Domains. The Select Domain dialog box appears.
3. Double-click the source domain, where source is the source computer running Windows.
The selected domain information appears in the Select Domain dialog box.
4. In the Groups pane, double-click Administrators.
In the local groups pane, add NEWUSER where NEWUSER is the user account that
conducts migration.
Note: NEWUSER is used for illustrative purposes. Select whichever user is appropriate.
6. In the Active Directory Users and Computers dialog box, click the username of the user
account to conduct the migration.
Click Add. Click OK.
The Active Directory Users and Computers dialog box returns as the active window.
7. On the Policies menu, click User Rights. The User Rights Policy dialog box appears.
8. From the Rights drop-down list, select the right to add. Click Add.
The rights are:
•
Back up files and directories
•
Generate security audits
•
Manage auditing and security log
•
Restore files and directories
The Add Users and Groups dialog box appears.
9. In the Names pane, select the user to which you want to assign the right. Click Add. Click
OK.
Repeat steps 8 and 9 for each right.
10. Repeat steps 3 through 9 for the target domain, where the target is VNX.
Log in as a NEWUSER
6. Type the password in the Password text box and click OK.
The operating system starts up.
Action
To create a file system, use this command syntax:
$ nas_fs -name <name> -create <volume_name>
Example:
$ nas_fs -name ufs1 -create mtv1
Output
id = 18
name = ufs1
acl = 0
in_use = False
type = uxfs
volume = mtv1
rw_servers=
ro_servers=
symm_devs = 002806000209-006, 002806000209-007, 002806000209-
008, 002806000209-009
disks = d3,d4,d5,d6
Create a mount point specifying the name of the Data Mover and path of the mount point
created.
Action
To create a mount point, use this command syntax:
$ server_mountpoint <movername> -create /<pathname>
Example:
$ server_mountpoint server_2 -create /ufs1
Output
server_2: done
Mount the file system specifying the name of the Data Mover, name of the file system to
mount, and the name of the mount point.
Action
To mount a file system, use this command syntax:
$ server_mount <movername> <fs_name> /<mount_point>
Example:
$ server_mount server_2 ufs1 /ufs1
Output
server_2: done
Export the root share specifying the name of the Data Mover, name of the share, and path
of the mount point created.
Action
To export the root share, use this command syntax:
$ server_export <mover_name> -Protocol cifs -name <sharename> /<pathname>
Example:
$ server_export server_2 -Protocol cifs -name share1 /ufs1
Output
server_2: done
Use LGDUP to duplicate the local groups database from the source Windows computer to
the Data Mover.
Action
To copy the local groups database from the source server to the target server, replace any existing local groups database
on the target server, and prefix the source database, use this command syntax:
C:\>LGDUP.exe -r -p -v \\<source>\\<target>
Example:
C:\>LGDUP.exe -r -p -v \\NT1 \\dm_2
Output Notes
Refer to the LGDUP example on page 19. ◆ By adding a prefix to the local groups database for the
source, you can add additional databases and maintain
the original rights from each source.
◆ LGDUP does not migrate unknown accounts or user
accounts that are local to the source server, such as the
local administrator account.
Use EMCOPY to copy the source directory and files to the Data Mover.
Action
To copy the source directory on the source to the destination directory on the target server, copy the source directory's
owner, audit information, and all the source directory's subdirectories; and update the destination files to Windows security,
use this command syntax:
C:\>EMCOPY.exe <source> <destination> /o /a /lg /s
Example:
C:\>EMCOPY.exe C:\source g:\destination /o /a /lg /s
Output Note
The DACLs are also duplicated. By default, the DACLs are
EMCOPY 02.04b copied when the /NOSEC switch is not set. The owner at-
Copyright (C) 2001, All Rights tribute of the directories and files is also duplicated. The
Reserved, command output includes the list of files and a summary that
by EMC Corporation, Hopkinton, MA
includes the number of files, directories, and bytes copied,
Date: 10/24/2001 12:10:26
Source path: c:\source and an error count.
Desti. path: g:\
Files: *.*
List/Modify/Create options:
Security options: /o /lg
Retry options: /r:1000000 /w:30
Server SRC: NTSERVER1 4.0
Server DEST:DM12_ANA0 4.1
Getting local group(s) from
\\NTSERVER1
Processing the copy from c:\ to
g:\...
c:\source\folder1\ ->
g:\destination\folder1
c:\source\folder1\ text1.txt ->
g:\destination\folder1\tetx1.txt
c:\source\folder2\abc2.txt ->
g:\destination\folder2\abc2.txt
d:\ntusrmap\ver0\usrmap.db ->
g:\ntusrmap\ver0\usrmap.db
d:\ntusrmap\ver0\usrmap.exe ->
g:\ntusrmap\ver0\usrmap.exe
d:\ntusrmap\ver0\usrmap.log ->
g:\ntusrmap\ver0\usrmap.log
---
---
Summary results:
File(s) copied: 67
Directory(ies) created: 4
Security Descriptor Setting done: 71
Amount of copied bytes: 3 MB
Use SHAREDUP to duplicate the shares from the source to the destination server.
Action
Note: Prior to this procedure, target directories for the shares must be copied to the Data Mover by using EMCOPY as
described in Copy the directory to the Data Mover on page 59.
To duplicate all shares from the source to the destination server and prefix share names on the destination server, use
this command syntax:
C:\>SHAREDUP.exe \\<source> \\<target> <srcdrive> /p <newrootpath>/PREFIX /r
/sd
Example:
C:\>SHAREDUP.exe \\NT1 \\EMC1 D: /p /mountfs1 /PREFIX /r /sd
Output
---
Creating share "\\dm2\NT1_share3"
to export directory "C:\abcd\top\share3"...
-> OK
---
Creating share "\\dm2\NT1_share1"
to export directory "C:\abcd\top\share1"...
-> OK
---
Creating share "\\dm2\NT1_share2"
to export directory "C:\abcd\top\share2"...
-> OK
***********************************************************************
Summary results:
Number of share(s) successfully duplicated: 3
Number of error(s): 0
After the migration is completed, repeat the tasks Copy the local groups database on page
58, Copy the directory to the Data Mover on page 59, and Duplicate the shares on page 60
with the next server running Windows. Attempt to access the files from VNX.
2. To delete the compname from the CIFS configuration of the Data Mover, type:
$ server_cifs server_2 -delete compname=W2kTemp
3. To add the compname back to the CIFS configuration of the Data Mover as a NetBIOS
name, type:
$ server_cifs server_2 add NetBIOS=W2kTemp,domain=abc,interface=fsn01
5. To delete the renamed NetBIOS name in step 4 from the CIFS configuration, type:
$ server_cifs server_2 delete NetBIOS=W2kProd
6. To add the new compname to the CIFS configuration and active directory (AD) domain,
type:
$ server_cifs server_2 add compname=W2kProd,domain=abc.com,interface=fsn01
7. To join the new compname to the CIFS configuration and AD domain, type:
$ server_cifs server_2 Join compname=W2kProd,domain=abc.com,admin=Administrator
Troubleshooting
Error messages
All event, alert, and status messages provide detailed information and recommended actions
to help you troubleshoot the situation.
To view message details, use any of these methods:
◆ Unisphere software:
• Right-click an event, alert, or status message and select to view Event Details, Alert
Details, or Status Details.
◆ CLI:
• Use this guide to locate information about messages that are in the earlier-release
message format.
• Use the text from the error message's brief description or the message's ID to search
the Knowledgebase on EMC Online Support. After logging in to EMC Online Support,
locate the applicable Support by Product page, and search for the error message.
NTFS
NTFS is the standard file system of Windows NT, including its later versions. NTFS supersedes
the FAT file system as the preferred file system for Microsoft Windows. NTFS has several
improvements over FAT such as improved support for metadata and the use of advanced data
structures to improve performance, reliability, and disk space utilization, plus additional
extensions such as security access control lists (ACLs) and file system journaling.
E LGDUP (continued)
requirements and limitations 16
EMC E-Lab Navigator 64
EMCABE
command syntax 41 M
concepts 12 messages, error 64
example 42, 43 Migrate EMC utilities
requirements and limitations 41 after migration is completed 61
EMCACL assign user account 52
command syntax 37 copy directory to Data Mover 59
concepts 12 copy local groups database 58
example 40 create a file system 54
exit status codes 39 create a mount point 55
requirements and limitations 37 duplicate shares 60
EMCOPY export the root share 57
command syntax 26 log in as a new user 53
concepts 12 mount the file system 56
example 30, 31
exit status codes 30
requirements and limitations 25 P
error messages 64
Planning considerations
backups 13
F group membership and rights 13
map to Data Movers 13
FSTOOLBOX storage 13
command syntax 44
concepts 12
example 45 R
requirements and limitations 44
Related information 8
Restrictions 8
L
LGDUP S
command syntax 17
concepts 12 SHAREDUP
dependencies 16 command syntax 33
example 19 concepts 12
exit status codes 18 example 36