3 system administrator tools, 1 access permissions in advanced server for un, 1 access permissions in advanced server for unix – Siemens Unix V4.0 User Manual
Page 151: Tools for special tasks system administrator tools, Options and parameters, Use default names, Names_file, Lmhosts_file
Tools for special tasks
System administrator tools
Product Manual
U7613-J-Z815-6-76
©
S
iem
e
n
s
N
ix
dor
f
In
fo
rm
at
io
n
s
s
y
s
te
m
e
A
G
1
9
9
5
P
fad
: D:
\O
7
613
e6
\u
761
3e
.k
07
Options and Parameters:
-d
Use default names
Input file name (should contain name mappings in
names.cfg
format).
Output file name in LMHOSTS format (ready for being imported into a
WINS database).
Please inspect the list of static NetBIOS name mappings generated by names2lm
carefully before using NT WINS manager to import them into a WINS database.
As a rule, you should keep the number of static mappings within WINS as small as
possible and use them only for important computers which are not WINS-aware. It
is not recommended to use static mappings for WINS enabled clients.
7.3 System administrator tools
The first section contains an overview how access permissions are managed in Advanced
Server for UNIX. The following scripts are required by system administrators in different
situations. For example, they can be used for backing up the user’s configuration and
resources as well as for problem analysis.
7.3.1
Access permissions in Advanced Server for UNIX
Advanced Server for UNIX stores access permissions for files and directories in its ACL
database in the
/var/opt/lanman
directory. In contrast to UNIX permissions, which are stored
with each file and directory in the file system, permissions are stored centrally in Advanced
Server for UNIX.
The ACL database stores access permissions for some resources, while other resources
inherit their permissions from the higher-level directory. The
net perms
command displays
permissions for all available resources, i.e. either permissions stored physically in the ACL
database or those inherited from the higher-level directory. If a resource which is not yet
entered in the ACL database is assigned permissions by
net perms
, the rights currently
inherited are combined with those specified in the command and stored as a physical entry
in the ACL database. If the physical entry is deleted, the inherited permissions are valid
again.
If you are saving files with UNIX tools or copying files under UNIX, the permissions are not
saved and copied automatically. Files and directories can be backed up together with their
permissions using the NT Backup Tools, for example.
i