Verify access control lists – Grass Valley K2 Summit Storage Area Network v.7.1 User Manual
Page 488

26 October 2009
K2 Storage Area Network Installation and Service Manual
488
Verify Access Control Lists
6. Let the Read test run for 1 minute. Report the min, max and current bandwidth.
7. Configure the Task field to
Unix Write
and Count field to
8
streams.
8. Click
Start Test
.
It might take several minutes to create the test files.
9. After test files are created click
Start Write Test
.
10. Let the Write test run for 1 minute. Report the min, max and current bandwidth.
Verify Access Control Lists
Prerequisites:
• Two domain users
• A correctly configured K2 SAN
• At least one Macintosh SAN client attached
If you are using Access Control Lists on Macintosh OS X and the Windows operating
system, use this task to verify.
1. On the FSM K2 Media Server, do the following:
a. Create a new text file on the V: drive.
b. Right-click on the text file and select
Properties
.
c. Click the
Permissions
tab.
d. Select
Everyone
and then for the
Write
permission select the
Deny
check box.
e. Create a folder on the V: drive.
f. Give full permissions to the first user (designated in this procedure as userA) on
the domain.
g. Give read only permissions to the second user (designated in this procedure as
userB) on the domain.
2. On the Macintosh system, do the following:
a. Login as userA.
b. Right-click on the text file and select
Properties
.
c. Open up
Terminal
and change directory to the volume, as follows:
cd /Volumes/gvfs_hostname
(Where hostname is the name of the primary FSM)
d. Type the following command:
ls –le