beautypg.com

Verify access control lists – Grass Valley K2 Summit Storage Area Network v.7.1 User Manual

Page 488

background image

26 October 2009

K2 Storage Area Network Installation and Service Manual

488

Verify Access Control Lists

6. Let the Read test run for 1 minute. Report the min, max and current bandwidth.

7. Configure the Task field to

Unix Write

and Count field to

8

streams.

8. Click

Start Test

.

It might take several minutes to create the test files.

9. After test files are created click

Start Write Test

.

10. Let the Write test run for 1 minute. Report the min, max and current bandwidth.

Verify Access Control Lists

Prerequisites:

• Two domain users

• A correctly configured K2 SAN

• At least one Macintosh SAN client attached

If you are using Access Control Lists on Macintosh OS X and the Windows operating
system, use this task to verify.

1. On the FSM K2 Media Server, do the following:

a. Create a new text file on the V: drive.

b. Right-click on the text file and select

Properties

.

c. Click the

Permissions

tab.

d. Select

Everyone

and then for the

Write

permission select the

Deny

check box.

e. Create a folder on the V: drive.

f. Give full permissions to the first user (designated in this procedure as userA) on

the domain.

g. Give read only permissions to the second user (designated in this procedure as

userB) on the domain.

2. On the Macintosh system, do the following:

a. Login as userA.

b. Right-click on the text file and select

Properties

.

c. Open up

Terminal

and change directory to the volume, as follows:

cd /Volumes/gvfs_hostname

(Where hostname is the name of the primary FSM)

d. Type the following command:

ls –le

This manual is related to the following products: