﻿<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>VTrak G-Class (NAS Gateway) Articles</title>
    <description>Latest articles happening in the VTrak G-Class (NAS Gateway) category</description>
    <link>https://kb.promise.com</link>
    <item>
      <title>External LDAP Server Configuration</title>
      <description>&lt;p&gt;&lt;strong&gt;Table of Contents&lt;br&gt;&lt;strong&gt;&lt;a href="#A. macOS Open Directory (GUI)" target="_blank" rel="noreferrer, noopener"&gt;A. macOS Open Directory (GUI)&lt;/a&gt;&lt;br&gt;&lt;/strong&gt;&lt;strong&gt;&lt;a href="#B. Windows Active Directory (GUI)" target="_blank" rel="noreferrer, noopener"&gt;B. Windows Active Directory (GUI)&lt;/a&gt;&lt;br&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&lt;a href="#Appendix I - Setup Windows Active Directory with IDMU (Identity Management for UNIX)" target="_blank" rel="noreferrer, noopener"&gt;Appendix I - Setup Windows Active Directory with IDMU (Identity Management for UNIX)&lt;/a&gt;&lt;br&gt;&lt;strong&gt;&amp;nbsp; &lt;a href="#Appendix II - Add the IDMU role to Windows Server (Example illustrated with Windows Server 2008" target="_blank" rel="noreferrer, noopener"&gt;Appendix II - Add the IDMU role to Windows Server (Example illustrated with Windows Server 2008)&lt;/a&gt;&lt;br&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&amp;nbsp; &lt;a href="#Appendix III - Add UNIX Attributes to AD | User and Group" target="_blank" rel="noreferrer, noopener"&gt;Appendix III - Add UNIX Attributes to AD | User and Group&lt;/a&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;strong&gt;&lt;a href="#C. Linux Open LDAP with PDC" target="_blank" rel="noreferrer, noopener"&gt;C. Linux Open LDAP with PDC&lt;/a&gt;&lt;br&gt;&lt;a href="#D. Samba Login Tool Instructions (Only applicable to macOS Open Directory)" target="_blank" rel="noreferrer, noopener"&gt;D. Samba Login Tool Instructions (Only applicable to macOS Open Directory)&lt;/a&gt;&lt;br&gt;&lt;a href="#E. Adding Permissions to the NAS Gateway SMB Share" target="_blank" rel="noreferrer, noopener"&gt;E. Adding Permissions to the NAS Gateway SMB Share&lt;/a&gt;&lt;br&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The purpose of this article is to provide an A-Class SAN administrator the appropriate instructions on binding their&amp;nbsp;&lt;br&gt;A-Class and NASGW to an External LDAP server.&lt;/p&gt;&#xD;
&lt;p&gt;Internal and External LDAP servers cannot be enabled at same time. There are three LDAP statuses:&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;&lt;strong&gt;Internal LDAP enabled&lt;/strong&gt;&amp;nbsp;while&amp;nbsp;&lt;span style="color: #ff0000;"&gt;&lt;strong&gt;External LDAP is disabled&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;strong&gt;Internal LDAP disabled&lt;/strong&gt;&amp;nbsp;while&amp;nbsp;&lt;span style="color: #ff0000;"&gt;&lt;strong&gt;External LDAP is enabled&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;strong&gt;Internal and External LDAP servers are&amp;nbsp;&lt;span style="color: #ff0000;"&gt;both disabled&lt;/span&gt;&lt;br&gt;&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;There are (3) types of External LDAP servers that are supported:&lt;/p&gt;&#xD;
&lt;ul&gt;&#xD;
&lt;li&gt;Windows Active Directory&lt;/li&gt;&#xD;
&lt;li&gt;macOS Open Directory or&amp;nbsp;Linux LDAP without PDC&lt;/li&gt;&#xD;
&lt;li&gt;Linux LDAP with PDC&lt;/li&gt;&#xD;
&lt;/ul&gt;&#xD;
&lt;p&gt;Select &amp;ldquo;Enable External LDAP Server&amp;rdquo; to enable the external LDAP module. If the Internal LDAP module is enabled, it will be disabled when the External LDAP is selected.&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Setting Description&lt;br&gt;&lt;br&gt;&lt;/strong&gt;The table below demonstrates the external LDAP settings in the A-Class GUI.&amp;nbsp;&lt;br&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;Some of the settings are common for all the supported LDAP servers; however, certain settings may not be supported on some of the LDAP servers. For more information, please contact &lt;a href="https://support.promise.com" target="_blank" rel="noreferrer, noopener"&gt;Technical Support&lt;/a&gt;.&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;table&gt;&#xD;
&lt;tbody&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Setting Item&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;SSL&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Possible value: True or False. It should be set to False if LDAP server doesn&amp;rsquo;t support SSL.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;Timeout&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Timeout value in second. Value is from 1 to 30 seconds.&lt;/p&gt;&#xD;
&lt;p&gt;Default is 10 seconds&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;BaseDN&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The BaseDN of LDAP server. If the server is ptu.promise.com, the value shall be &amp;ldquo;dc=ptu,dc=promise,dc=com&amp;rdquo;. Note that there shouldn&amp;rsquo;t have space character in the value.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;Server&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The IP address of LDAP server.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;Port&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The port of LDAP server. Default value is 389&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;SAMBANetBIOSName&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;NetBIOS name for Samba server running in NAS Gateway. Optional value if there isn&amp;rsquo;t NAS gateway configured.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;ServerType&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;LDAP server type. Three types are supported: Windows AD, Mac OD and Linux OpenLDAP.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;Samba NetBIOS&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;This setting is enabled for &amp;ldquo;Linux LDAP with PDC&amp;rdquo; only.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;AnonymousBind&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Possible values: True or False.&lt;/p&gt;&#xD;
&lt;p&gt;True: Bind LDAP server by using anonymous. LDAP server must support it.&lt;/p&gt;&#xD;
&lt;p&gt;False: Don&amp;rsquo;t use anonymous user to bind LDAP server. BindDN (username) and BindPassword must be provided.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;BindDN&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Bind username&lt;/p&gt;&#xD;
&lt;p&gt;When Windows AD is set up, four types of BindDN can be used:&lt;/p&gt;&#xD;
&lt;p&gt;1. &amp;lt;Domain_Name&amp;gt;\&amp;lt;Username&amp;gt;&lt;/p&gt;&#xD;
&lt;p&gt;Such as: example.com\Administrator&lt;/p&gt;&#xD;
&lt;p&gt;2. &amp;lt;Username&amp;gt;@&amp;lt;Domain_Name&amp;gt;&lt;/p&gt;&#xD;
&lt;p&gt;Such as: Administrator@example.com&lt;/p&gt;&#xD;
&lt;p&gt;3. CN=&amp;lt;Username&amp;gt;,CN=users,DC=&amp;lt;Domain_name&amp;gt;&lt;/p&gt;&#xD;
&lt;p&gt;For example:&lt;br&gt;CN=Administrator,CN=users,DC=example,DC=com&lt;/p&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;Note: &amp;ldquo;users&amp;rdquo; must be lower case. &amp;ldquo;Users&amp;rdquo; doesn&amp;rsquo;t work for NAS gateway&lt;/p&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;If Windows AD is on Windows 2000 or earlier version, type #1 is suggested. For other versions, all 3 types can be used.&lt;/p&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;Note: &amp;lt;Username&amp;gt; only doesn&amp;rsquo;t work for NAS gateway. NAS gateway will report &amp;ldquo;LDAP connection failed&amp;rdquo; if type in username only.&lt;/p&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;BindPassword&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Bind password. The password of the username which is used in BindDN&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;UIDAttribute&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Attribute containing the LDAP username.&lt;/p&gt;&#xD;
&lt;p&gt;Default values for different LDAP servers:&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac OD: uid&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows AD: uid (Identity Management for UNIX must be installed and UNIX Attributes must be configured)&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux OpenLDAP: uid&lt;/p&gt;&#xD;
&lt;p&gt;Other possible values can be checked on different LDAP server setup:&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows AD: sAMAccountName, cn&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;ObjectClass&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The object class to get user entries from LDAP server.&lt;/p&gt;&#xD;
&lt;p&gt;The below hierarchy of object classes, the value can be user, organizationalPerson or person. Value cannot be top, because top is the root class and cannot be used to filter user.&lt;/p&gt;&#xD;
&lt;p&gt;&lt;em&gt;objectClass: top&amp;nbsp;&lt;br&gt;objectClass: person&amp;nbsp;&lt;br&gt;objectClass: organizationalPerson&lt;br&gt;objectClass: user&lt;/em&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;Default values for different LDAP servers:&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; macOS OD: posixAccount&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows AD: user&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux OpenLDAP: posixAccount&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;GroupIDAttribute&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Attribute containing the LDAP group name.&lt;/p&gt;&#xD;
&lt;p&gt;Default values for different LDAP servers:&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac OD: cn&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows AD: cn&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux OpenLDAP: cn&lt;/p&gt;&#xD;
&lt;p&gt;Other possible values can be checked on different LDAP server setup:&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows AD: sAMAccountName&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;ObjectClass ofGroup&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The object class to get group entries from the LDAP server.&lt;/p&gt;&#xD;
&lt;p&gt;The below hierarchy of object classes, the value can be group. Value cannot be top, because top is the root of the class hierarchy and cannot be used to filter group.&lt;/p&gt;&#xD;
&lt;p&gt;&lt;em&gt;objectClass: top&lt;/em&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;em&gt;objectClass: group&lt;/em&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;Default values for different LDAP servers:&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; macOS OD: posixGroup&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows AD: group&lt;/p&gt;&#xD;
&lt;p&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux OpenLDAP: posixGroup&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;EmailNotification forEvent&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;True: enable email notification for event. New event will be sent to the email address provided by EmailAddrAttribute.&lt;/p&gt;&#xD;
&lt;p&gt;False: disable&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;FullNameAttribute&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The LDAP attribute to get the full name of email recipient.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;EmailAddrAttribute&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The LDAP attribute to get the email address for email notification. With this setting, new events will be sent to the email address automatically.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;Privilege for LDAP Users&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;Default: Use default privilege selected from next item.&lt;/p&gt;&#xD;
&lt;p&gt;Role Mapping: Map LDAP role to subsystem privilege&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
&lt;td width="140"&gt;&#xD;
&lt;p&gt;DefaultPrivilege&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;td width="315"&gt;&#xD;
&lt;p&gt;The default privilege for all LDAP users. Used only when previous setting is select to Default.&lt;/p&gt;&#xD;
&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/tbody&gt;&#xD;
&lt;/table&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="A. macOS Open Directory (GUI)" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;A. macOS Open Directory (GUI)&lt;/strong&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/9dd05041-ab3c-472d-95de-a81900915517_1.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;span style="background-color: #ffff00;"&gt;&lt;strong&gt;Note: The Samba Login Tool &lt;span style="text-decoration: underline;"&gt;is required.&lt;/span&gt; If you don't authenticate your users, the OD users will&amp;nbsp;&lt;span style="text-decoration: underline;"&gt;not&lt;/span&gt;&amp;nbsp;be able to login to the SMB shares on the NAS Gateway.&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;strong&gt;CLI Output&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;pre&gt;&lt;strong&gt;&lt;code&gt;administrator@cli&amp;gt; ldap -v&lt;/code&gt;&lt;/strong&gt;&lt;br&gt;&lt;code&gt;-------------------------------------------------------------------------------&lt;br&gt;ExternalLDAP: Enabled&amp;nbsp;&lt;br&gt;SSL: Disabled Timeout: 10 seconds&lt;br&gt;BaseDN:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;dc=macserver,dc=promise,dc=com&lt;/span&gt;&lt;br&gt;Server:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;192.168.252.159&lt;/span&gt;&amp;nbsp;Port:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;389&lt;/span&gt;&lt;br&gt;SAMBANetBIOSName:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;promise&lt;/span&gt;&lt;br&gt;ServerType:&amp;nbsp;&lt;span style="color: #ff0000; background-color: #ffff00;"&gt;MAC Open Directory or Linux LDAP without PDC&amp;nbsp;&lt;/span&gt;&lt;br&gt;AnonymousBind:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;Disabled&lt;/span&gt;&lt;br&gt;BindDN:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;uid=test,cn=users,dc=macserver,dc=promise,dc=com&lt;/span&gt;&lt;br&gt;BindPassword:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;******&lt;/span&gt;&lt;br&gt;UIDAttribute:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;uid&lt;/span&gt;&lt;br&gt;ObjectClass:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;posixAccount&lt;/span&gt;&lt;br&gt;GroupIDAttribute:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;cn&lt;/span&gt;&lt;br&gt;ObjectClassOfGroup:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;posixGroup&lt;/span&gt;&lt;br&gt;EmailNotificationForEvent: Enabled&lt;br&gt;FullNameAttribute: displayName&lt;br&gt;EmailAddrAttribute: mail&lt;br&gt;RolePolicy: default DefaultPrivilege: View&lt;br&gt;-------------------------------------------------------------------------------&lt;/code&gt;&lt;/pre&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;a id="B. Windows Active Directory (GUI)" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;&lt;strong&gt;B. Windows Active Directory (GUI)&lt;br&gt;&lt;span style="background-color: #ffff00;"&gt;Please make sure that the AD bind account is part of the &lt;span style="color: #ff0000;"&gt;Domain Admins&lt;/span&gt; group or has sufficient privileges to join the Domain. If you use a standard user (with no Domain Admin Privileges), &lt;span style="color: #ff0000;"&gt;the LDAP connection will fail&lt;/span&gt;.&lt;/span&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/bf16bbdd-c297-471d-b4ce-a8190099f85b_2.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;strong&gt;CLI Output&lt;br&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;pre&gt;&lt;strong&gt;&lt;code&gt;&lt;strong&gt;&lt;code&gt;administrator@cli&amp;gt; ldap -v&lt;/code&gt;&lt;/strong&gt;&lt;/code&gt;&lt;br&gt;&lt;/strong&gt;&lt;code&gt;-------------------------------------------------------------------------------&lt;br&gt;ExternalLDAP: Enabled&lt;br&gt;SSL: Disabled Timeout: 10 seconds&lt;br&gt;BaseDN:&lt;span style="color: #ff0000;"&gt;dc=ptb,dc=local&lt;/span&gt;&lt;br&gt;Server:&lt;span style="color: #ff0000;"&gt;192.168.252.111&lt;/span&gt;&amp;nbsp;Port:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;389&lt;/span&gt;&lt;br&gt;ServerType:&amp;nbsp;&lt;span style="color: #ff0000; background-color: #ffff00;"&gt;Windows Active Directory&lt;/span&gt;&lt;br&gt;DNS:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;192.168.252.111&lt;/span&gt;&lt;br&gt;AnonymousBind:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;Disabled&lt;/span&gt;&lt;br&gt;BindDN:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;ptb\test&lt;/span&gt;&lt;br&gt;BindPassword:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;******&lt;/span&gt;&lt;br&gt;UIDAttribute:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;uid&lt;/span&gt;&amp;nbsp;&lt;br&gt;ObjectClass:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;user&lt;/span&gt;&lt;br&gt;GroupIDAttribute:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;cn&lt;/span&gt;&lt;br&gt;ObjectClassOfGroup:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;group&lt;/span&gt;&lt;br&gt;EmailNotificationForEvent: Enabled&lt;br&gt;FullNameAttribute: displayName&lt;br&gt;EmailAddrAttribute: mail&lt;br&gt;RolePolicy: default DefaultPrivilege: View&lt;br&gt;-------------------------------------------------------------------------------&lt;/code&gt;&lt;/pre&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appendix I - Setup Windows Active Directory with IDMU (Identity Management for UNIX)" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;Appendix I - Setup Windows Active Directory with IDMU (Identity Management for UNIX)&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;p&gt;Windows Active Directory is heavily dependent upon DNS. If a DNS IP address has been established in the A-Class, it is recommended that an administrator configures the DNS server to support AD.&lt;/p&gt;&#xD;
&lt;p&gt;If the A-Class is configured with a Linux DNS server, the administrator should create a DNS zone on the DNS server for the AD domain.&lt;/p&gt;&#xD;
&lt;p&gt;If the A-Class is configured with a Windows DNS server, the administrator can configure AD in following (3) ways:&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Install AD on the DNS server; AD and DNS are on the same server.&lt;/li&gt;&#xD;
&lt;li&gt;Install AD without DNS settings on another server, and use the primary DNS.&lt;/li&gt;&#xD;
&lt;li&gt;Install AD with DNS settings on another machine, create a DNS zone on the DNS server for the AD domain.&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;In order to store UNIX attributes in Active Directory, you must install Active Directory and then add the &amp;ldquo;Identity Management for UNIX&amp;rdquo; role service (this can be downloaded in Server Manager). Once the role service has been installed, the AD schema now includes a partially RFC 2307-compliant set of UNIX attributes. A new tab labeled &amp;ldquo;UNIX Attributes&amp;rdquo; will appear in the properties dialog box for users and groups in Active Directory. Each Active Directory account that will authenticate via Linux must be configured in the new &amp;ldquo;UNIX Attributes&amp;rdquo; tab.&lt;br&gt;&lt;br&gt;&lt;strong&gt;&lt;a id="Appendix II - Add the IDMU role to Windows Server (Example illustrated with Windows Server 2008" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;Appendix II - Add the IDMU role to Windows Server (Example illustrated with Windows Server 2008)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/f3354307-eb78-4e04-a6d3-a819009d70ae_3.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/67aa8393-127e-4639-9a73-a819009d9bdd_4.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;strong&gt;&lt;a id="Appendix III - Add UNIX Attributes to AD | User and Group" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;Appendix III - Add UNIX Attributes to AD | User and Group&lt;/strong&gt;&lt;br&gt;If you don't execute this step, the AD users and groups won't populate in the Folder Share setting when applying permissions for the NAS Gateway SMB share(s).&lt;br&gt;&lt;br&gt;&lt;span style="background-color: #ffff00;"&gt;&lt;strong&gt;Note: The Samba Login Tool is &lt;span style="text-decoration: underline;"&gt;not required &lt;/span&gt;when using Active Directory for authentication.&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/f47ffe78-e943-4d40-a970-a819009e5d4d_5.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/bf775570-752c-4b91-ab91-a819009e6aa3_6.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;a href="https://msdn.microsoft.com/en-us/library/cc731178(v=ws.11).aspx#BKMK_command" target="_blank" rel="noreferrer, noopener"&gt;&amp;gt; Install IDMU for Windows Server 2008/2012&lt;br&gt;&lt;br&gt;&lt;/a&gt;&lt;strong&gt;&lt;a id="C. Linux Open LDAP with PDC" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;C. Linux Open LDAP with PDC&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/12d6e068-81c6-403b-b54b-a819009ffded_7.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;strong&gt;CLI Output&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;pre&gt;&lt;strong&gt;&lt;code&gt;administrator@cli&amp;gt; ldap -v&lt;/code&gt;&lt;/strong&gt;&lt;br&gt;&lt;code&gt;-------------------------------------------------------------------------------&lt;br&gt;ExternalLDAP: Enabled&amp;nbsp;&lt;br&gt;SSL: Disabled Timeout: 10 seconds&lt;br&gt;BaseDN:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;dc=test,dc=com&lt;/span&gt;&lt;br&gt;Server:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;192.168.252.143&lt;/span&gt;&amp;nbsp;Port:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;389&lt;/span&gt;&lt;br&gt;SAMBANetBIOSName:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;test&lt;/span&gt;&lt;br&gt;ServerType:&amp;nbsp;&lt;span style="color: #ff0000; background-color: #ffff00;"&gt;Linux LDAP with PDC&lt;/span&gt;&amp;nbsp;&lt;br&gt;AnonymousBind:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;Disabled&lt;/span&gt;&lt;br&gt;BindDN:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;cn=lily,dc=test,dc=com&lt;/span&gt;&lt;br&gt;BindPassword: ******&lt;br&gt;UIDAttribute:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;uid&lt;/span&gt;&amp;nbsp;&lt;br&gt;ObjectClass:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;posixAccount&lt;/span&gt;&lt;br&gt;GroupIDAttribute:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;cn&lt;/span&gt;&amp;nbsp;&lt;br&gt;ObjectClassOfGroup:&amp;nbsp;&lt;span style="color: #ff0000;"&gt;posixGroup&lt;/span&gt;&lt;br&gt;EmailNotificationForEvent: Enabled&lt;br&gt;FullNameAttribute: displayName&lt;br&gt;EmailAddrAttribute: mail&lt;br&gt;RolePolicy: default DefaultPrivilege: View&lt;br&gt;-------------------------------------------------------------------------------&lt;/code&gt;&lt;/pre&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="D. Samba Login Tool Instructions (Only applicable to macOS Open Directory)" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;D. Samba Login Tool Instructions (Only applicable to macOS Open Directory)&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Using your web browser, enter the&amp;nbsp;&lt;strong&gt;Virtual IP Address&lt;/strong&gt;&amp;nbsp;of the NAS Gateway Cluster to access the Promise NAS Gateway Samba Login Tool.&lt;/li&gt;&#xD;
&lt;li&gt;You can retrieve the Virtual IP Address of the cluster by going to&amp;nbsp;&lt;strong&gt;NAS Gateway &amp;gt; Detail&lt;/strong&gt;.&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/1d7a1ca4-2436-4b45-9b38-a819007ef851_virtual.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Enter the user's credentials that you will be authenticating and Login:&lt;br&gt;&lt;strong&gt;If you don&amp;rsquo;t execute this step, your Open Directory users &lt;span style="text-decoration: underline; color: #ff0000;"&gt;will not&lt;/span&gt; be able to access the SMB share.&lt;/strong&gt;&amp;nbsp;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/903c9bb8-9bfa-4e48-b54f-a819007f53e3_10.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;li&gt;You will receive a message stating that the user has been successfully authenticated.&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/c0c17a4c-1cc0-4989-a111-a819007fa664_11.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="E. Adding Permissions to the NAS Gateway SMB Share" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;E. Adding Permissions to the NAS Gateway SMB Share&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Go to NAS Gateway &amp;gt; Mount Point.&lt;/li&gt;&#xD;
&lt;li&gt;Click the gear and select&lt;strong&gt;&amp;nbsp;&lt;strong&gt;Folder Share:&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/c304b669-492c-4dac-a5cc-a8190080929f_14.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;li&gt;You can set permissions by User or Group.&lt;br&gt;A. User = Read-Write Example:&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/9ee462cf-2222-4839-a70b-a8190080ddeb_15.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;B. Group = Read-Write Permission Example&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/c4fab915-ba2c-4d3a-9918-a8190081198a_16.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Click&amp;nbsp;&lt;strong&gt;Submit&lt;/strong&gt;&amp;nbsp;to save the changes and you will receive the following notification message:&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/fae49804-667d-4033-b174-a8190081a2a8_17.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Related Articles:&lt;/strong&gt;&lt;br&gt;&lt;a href="/thread/disable-smb-signing-on-os-x-10-11-5-10-12-x/" target="_blank" rel="noreferrer, noopener"&gt;Disable SMB Signing on OS X (10.11.5 &amp;gt; 10.12.x)&lt;/a&gt;&lt;br&gt;&lt;a href="/thread/unable-to-save-file-on-the-nasgw-from-a-file-created-by-a-fc-client-internal-external-ldap-configurations/" target="_blank" rel="noreferrer, noopener"&gt;Unable to Save File on the NASGW from a File Created by a FC Client - Internal/External LDAP Configurations&lt;br&gt;&lt;/a&gt;&lt;a href="https://promise.com/DownloadFile.aspx?DownloadFileUID=4662" target="_blank" rel="noreferrer, noopener"&gt;VTrak G-Class NAS Gateway Firmware Release Notes&lt;/a&gt;&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Contact Promise Technology Support&lt;/strong&gt;&lt;br&gt;Need more help? Save time by starting your support request online and a technical support agent will be assigned to your case.&lt;br&gt;&lt;br&gt;&lt;a href="https://support.promise.com/" target="_blank" rel="noreferrer, noopener"&gt;Promise Technology Technical Support &amp;gt;&lt;/a&gt;&lt;/p&gt;</description>
      <pubDate>2017-10-27T10:36:12.4930000</pubDate>
      <link>https://kb.promise.com/thread/external-ldap-server-configuration/</link>
    </item>
    <item>
      <title>Internal LDAP Server Configuration</title>
      <description>&lt;p&gt;&lt;strong&gt;Table of Contents&lt;br&gt;&lt;strong&gt;&lt;a href="#A. Enable Internal LDAP" target="_blank" rel="noreferrer, noopener"&gt;A. Enable Internal LDAP&lt;/a&gt;&lt;br&gt;&lt;strong&gt;&lt;a href="#B. Create Internal LDAP Users and Groups" target="_blank" rel="noreferrer, noopener"&gt;B. Create Internal LDAP Users and Groups&lt;/a&gt;&lt;br&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;a href="#C. Add the Internal LDAP User to the Samba User List" target="_blank" rel="noreferrer, noopener"&gt;C. Add the Internal LDAP User to the Samba User List&lt;/a&gt;&lt;br&gt;&lt;a href="#D. Default Folder Anonymous Permissions" target="_blank" rel="noreferrer, noopener"&gt;D. Default Folder Anonymous Permissions&lt;br&gt;&lt;/a&gt;&lt;a href="#E. Adding Permissions to the NAS Gateway SMB Share" target="_blank" rel="noreferrer, noopener"&gt;E. Adding Permissions to the NAS Gateway SMB Share&lt;/a&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The purpose of this article is to provide an A-Class SAN administrator the appropriate instructions on&amp;nbsp;using the Promise Internal LDAP server module.&lt;/p&gt;&#xD;
&lt;p&gt;Internal and External LDAP servers cannot be enabled at same time. There are three LDAP statuses:&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;&lt;strong&gt;Internal LDAP enabled&lt;/strong&gt; while &lt;span style="color: #ff0000;"&gt;&lt;strong&gt;External LDAP is disabled&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;strong&gt;Internal LDAP disabled&lt;/strong&gt; while &lt;span style="color: #ff0000;"&gt;&lt;strong&gt;External LDAP is enabled&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;strong&gt;Internal and External LDAP servers are &lt;span style="color: #ff0000;"&gt;both disabled&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;&lt;a id="A. Enable Internal LDAP" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;A. Enable Internal LDAP&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Go to the Administration tab and go to LDAP Settings.&lt;/li&gt;&#xD;
&lt;li&gt;Select&amp;nbsp;&lt;strong&gt;Enable Internal LDAP Server&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/216bf912-80e8-491a-b3bf-a819007d8b18_1.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/8b57163f-33b6-42eb-8ae7-a819007da13f_2.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="B. Create Internal LDAP Users and Groups" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;B. Create Internal LDAP Users and Groups&lt;/strong&gt;&lt;br&gt;In the A-Class GUI, if the internal LDAP is enabled, the administrator can create LDAP users and groups under tab "User Management" and "Group Management" respectively.&lt;/p&gt;&#xD;
&lt;p&gt;Create Internal&amp;nbsp;&lt;strong&gt;LDAP Group&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Click "Add LDAP Group" under the gear icon in tab "Group Management"&lt;/li&gt;&#xD;
&lt;li&gt;Input the Group Name in popup window.&lt;/li&gt;&#xD;
&lt;li&gt;Click the Save button.&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/95132f57-af85-47ff-8cd4-a819007dd2a6_3.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/1ab632be-1b4e-444a-834d-a819007e0244_4.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/2185b7bc-f783-4592-99d3-a819007e10e9_5.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Create Internal LDAP User&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Click "Add New User" under the gear icon in tab "User Management"&lt;/li&gt;&#xD;
&lt;li&gt;Select&amp;nbsp;&lt;strong&gt;Internal LDAP&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Input the user&amp;rsquo;s name&amp;nbsp;&lt;br&gt;(This will automatically update the Display Name and Surname)&lt;/li&gt;&#xD;
&lt;li&gt;Enter the user&amp;rsquo;s password.&lt;/li&gt;&#xD;
&lt;li&gt;Click the Save button.&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/d7f411f1-5878-4a3f-a74b-a819007e9255_7.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/511d0ffd-44dd-479e-ab78-a819007e9f82_8.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/f1fe2e70-c082-4b9d-9b3e-a819007eb675_9.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="C. Add the Internal LDAP User to the Samba User List" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;C. Add the Internal LDAP User to the Samba User List&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Using your web browser, enter the&amp;nbsp;&lt;strong&gt;Virtual IP Address&lt;/strong&gt;&amp;nbsp;of the NAS Gateway Cluster to access the Promise NAS Gateway Samba Login Tool.&lt;/li&gt;&#xD;
&lt;li&gt;You can retrieve the Virtual IP Address of the cluster by going to&amp;nbsp;&lt;strong&gt;NAS Gateway &amp;gt; Detail&lt;/strong&gt;.&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/1d7a1ca4-2436-4b45-9b38-a819007ef851_virtual.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Enter the user's credentials that you will be authenticating and Login:&lt;br&gt;&lt;span style="background-color: #ffff00;"&gt;&lt;strong&gt;If you don&amp;rsquo;t execute this step, your Internal LDAP users will not be able to access the SMB share.&lt;/strong&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/903c9bb8-9bfa-4e48-b54f-a819007f53e3_10.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;span style="background-color: #ffff00;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;You will receive a message stating that the user has been successfully authenticated.&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/c0c17a4c-1cc0-4989-a111-a819007fa664_11.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="D. Default Folder Anonymous Permissions" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;D. Default Folder Anonymous Permissions&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Go to the &lt;strong&gt;NAS Gateway&lt;/strong&gt; tab and go the &lt;strong&gt;Detail&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Ensure that the Default Folder Anonymous Permissions is set to: &lt;strong&gt;No Anonymous User&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Click the pencil edit icon set the &lt;strong&gt;No Anonymous User&lt;/strong&gt; permission and click Save:&lt;strong&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/a302c958-c2bc-45e7-9657-a81900800e01_12.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/0a6a6138-cc86-4dc4-82e9-a81900805676_13.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;&lt;strong&gt;&lt;a id="E. Adding Permissions to the NAS Gateway SMB Share" target="_blank" rel="noreferrer, noopener"&gt;&lt;/a&gt;E. Adding Permissions to the NAS Gateway SMB Share&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Go to NAS Gateway &amp;gt; Mount Point.&lt;/li&gt;&#xD;
&lt;li&gt;Click the gear and select&lt;strong&gt; &lt;strong&gt;Folder Share:&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/c304b669-492c-4dac-a5cc-a8190080929f_14.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/li&gt;&#xD;
&lt;li&gt;You can set permissions by User or Group.&lt;br&gt;A. User = Read-Write Example:&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/9ee462cf-2222-4839-a70b-a8190080ddeb_15.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;br&gt;B. Group = Read-Write Permission Example&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/c4fab915-ba2c-4d3a-9918-a8190081198a_16.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;li&gt;Click &lt;strong&gt;Submit&lt;/strong&gt; to save the changes and you will receive the following notification message:&lt;br&gt;&lt;img src="/content/uploads/0b23a434-480a-428a-b594-a812011e2660/fae49804-667d-4033-b174-a8190081a2a8_17.jpg?width=690&amp;amp;upscale=false" alt=""&gt;&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Related Articles:&lt;/strong&gt;&lt;br&gt;&lt;a href="/thread/disable-smb-signing-on-os-x-10-11-5-10-12-x/" target="_blank" rel="noreferrer, noopener"&gt;Disable SMB Signing on OS X (10.11.5 &amp;gt; 10.12.x)&lt;/a&gt;&lt;br&gt;&lt;a href="/thread/unable-to-save-file-on-the-nasgw-from-a-file-created-by-a-fc-client-internal-external-ldap-configurations/" target="_blank" rel="noreferrer, noopener"&gt;Unable to Save File on the NASGW from a File Created by a FC Client - Internal/External LDAP Configurations&lt;br&gt;&lt;/a&gt;&lt;a href="https://promise.com/DownloadFile.aspx?DownloadFileUID=4662" target="_blank" rel="noreferrer, noopener"&gt;VTrak G-Class NAS Gateway Firmware Release Notes&lt;/a&gt;&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Contact Promise Technology Support&lt;/strong&gt;&lt;br&gt;Need more help? Save time by starting your support request online and a technical support agent will be assigned to your case.&lt;br&gt;&lt;br&gt;&lt;a href="https://support.promise.com/" target="_blank" rel="noreferrer, noopener"&gt;Promise Technology Technical Support &amp;gt;&lt;/a&gt;&lt;/p&gt;</description>
      <pubDate>2017-10-27T08:17:01.2370000</pubDate>
      <link>https://kb.promise.com/thread/internal-ldap-server-configuration/</link>
    </item>
    <item>
      <title>Unable to Save File on the NASGW from a File Created by a FC Client - Internal/External LDAP Configurations</title>
      <description>&lt;p class="p1"&gt;&lt;span class="s1"&gt;By default in OS X, you will see that that each folder you create on the FC client will result with permissions in correlation with the &lt;code&gt;umask 022&lt;/code&gt; when you create a directory &lt;code&gt;[777 &amp;ndash; 22 = 755]&lt;/code&gt;.&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;strong&gt;[Creating folder on the A-Class with Squash_All]&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="s1"&gt;iPhilBendeck:iPhilClass philbendeck$ mkdir Test_Phil&lt;br&gt;&lt;/span&gt;&lt;span class="s1"&gt;iPhilBendeck:iPhilClass philbendeck$ ls -la | grep Test_Phil&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span class="s1"&gt;drwxr-xr-x &amp;nbsp; 2 philbendeck&amp;nbsp; staff&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 4096 Apr 28 17:02 Test_Phil&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;In the first column, you will see the file permissions. A &amp;ldquo;d&amp;rdquo; in front denotes that the name on that line is a directory (folder) and a dash (-) in front denotes that it&amp;rsquo;s a file. There are 9 other characters after that. Break up those 9 characters into 3 groups, and you'll get the permissions for each user group (user, group, and world).&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span class="s1"&gt;A &amp;ldquo;r&amp;rdquo; denotes read permissions, a &amp;ldquo;w&amp;rdquo; denotes write permissions, and a &amp;ldquo;x&amp;rdquo; denotes execute permissions. If there is a dash where a character should be, then that denotes that a particular file permission doesn&amp;rsquo;t exist.&amp;nbsp;&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Let&amp;rsquo;s take this for example:&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;1. Created a folder on the A-Class = Test_Phil and re-shared the folder via SMB (NASGW)&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;- Permissions from FC Directory Creation&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p2"&gt;&lt;code&gt;&lt;span class="s1"&gt;drwxr-xr-x &amp;nbsp; 2 philbendeck&amp;nbsp; staff&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 4096 Apr 28 17:02 Test_Phil&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;2. Since the NASGW doesn&amp;rsquo;t support extendedACLs, the NASGW can only inherit and respect POSIX Permissions. When you execute permissions via Folder Share on the NASGW, it&amp;rsquo;s parsing and writing the allowed users to access the SMB share via the smb.conf file stored on the NASGW. These permissions in the smb.conf only grant access to the SMB share(s). Once you have established a connection to the SMB share, there is no permission or ACL that defines the LDAP user you used to authenticate; hence, establishes its permissions rights with the &lt;strong&gt;World &lt;/strong&gt;user group permissions [R/W] to allow the user to read and write data.&amp;nbsp;&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Therefore, when you create a folder on the SAN via FC, it's automatically going to write folders/files with the umask that the machine is configured with.&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;I created two folders one on FC client and one from the SMB client.&lt;strong&gt; &lt;br&gt;&lt;br&gt;[FC = FC_DIR]&lt;br&gt;[SMB = SMB_DIR]&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p2"&gt;&lt;code&gt;&lt;span class="s1"&gt;drwxr-xr-x &amp;nbsp; 2 philbendeck&amp;nbsp; 1000 &amp;nbsp; 4096 Apr 28 18:36 FC_DIR&lt;br&gt;&lt;/span&gt;&lt;span class="s1"&gt;drwxrwxrwx &amp;nbsp; 2 2002 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 3000 &amp;nbsp; 4096 Apr 28 18:35 SMB_DIR&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;If you notice that when I created the folder on the SAN Volume, it gave the folder&amp;nbsp;&lt;strong&gt;drwxr-xr-x&lt;/strong&gt; meaning that when the SMB user wants to write to that folder, they will not be able to since the POSIX UID/GID are completely different and&amp;nbsp; the NAS user will rely on the the R/W properties of the &lt;strong&gt;World&lt;/strong&gt; user group. If you notice, that only the character&lt;strong&gt; x&lt;/strong&gt; for the &lt;strong&gt;World&lt;/strong&gt; user group is enabled for the FC_DIR directory.&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;When I created the folder on the SMB share, it created the folder [SMB_DIR] with &lt;strong&gt;drwxrwxrwx &lt;/strong&gt;allowing everyone to R/W when they access the SAN volume via FC. NASGW is designed to always write files to the FS with 777 permissions. Keep in mind that the NASGW is also a FC Linux client.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;What&amp;rsquo;s the solution?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;- Changing the umask of the OS X FC clients with 000 umask&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Apple published a well written document that should illustrate on how to change this with each specific OS X build.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p3"&gt;&lt;span class="s2"&gt;&lt;a href="https://support.apple.com/en-us/HT201684" target="_blank" rel="noreferrer, noopener"&gt;https://support.apple.com/en-us/HT201684&lt;br&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="s2"&gt;&lt;a href="https://en.wikipedia.org/wiki/Umask" target="_blank" rel="noreferrer, noopener"&gt;https://en.wikipedia.org/wiki/Umask&lt;/a&gt;&lt;/span&gt;&lt;span class="s1"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;There are several customers that have found this as a feasible workaround. Once you change the umask on the OS X client, you will be able to R/W simultaneously&amp;nbsp;across SMB and FC.&lt;br&gt;&lt;br&gt;If you have any questions or concerns, please open a support request via&amp;nbsp;&lt;a href="https://support.promise.com/" target="_blank" rel="noreferrer, noopener"&gt;https://support.promise.com&lt;/a&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <pubDate>2016-10-18T17:15:14.4030000</pubDate>
      <link>https://kb.promise.com/thread/unable-to-save-file-on-the-nasgw-from-a-file-created-by-a-fc-client-internal-external-ldap-configurations/</link>
    </item>
    <item>
      <title>Disable SMB Signing on OS X (10.11.5 &amp;gt; 10.12.x)</title>
      <description>&lt;p&gt;SMB Signing has been enabled by default by Apple&amp;nbsp;dating back since the release&amp;nbsp;of OS X 10.11.5 (15F34).&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;SMB Signing digitally signs at the packet level of the SMB communication. This enables the receiver of the packets to confirm the point of origination and it&amp;rsquo;s authenticity. This security mechanism helps avoid issues like tampering and &amp;ldquo;man in the middle&amp;rdquo; attacks. As long as you're on a secure network, this should not be an issue. In addition, this causes slow performance and will not allow you to connect via SMB to the NAS Gateway. We also recommend you to disable SMB signing on clients that access a Vess R2600 to gain better performance on your macOS 10.11.5 - 10.13.4 clients.&lt;/p&gt;&#xD;
&lt;p&gt;&lt;strong&gt;Issues:&lt;/strong&gt;&lt;/p&gt;&#xD;
&lt;ol&gt;&#xD;
&lt;li&gt;Unable to mount volume using the SMB protocol with the NAS Gateway G1100.&lt;/li&gt;&#xD;
&lt;li&gt;Authentication rejected with Internal and External LDAP users and only cifs:// allows mount and authentication.&lt;/li&gt;&#xD;
&lt;li&gt;Slow performance via SMB with the Vess R2000 series.&lt;/li&gt;&#xD;
&lt;/ol&gt;&#xD;
&lt;p&gt;To disable SMB signing which is enabled by default on macOS versions 10.11.5 -10.13.4, execute the instructions below by creating a &lt;strong&gt;nsmb.conf&lt;/strong&gt; file:&lt;/p&gt;&#xD;
&lt;pre&gt;&lt;code&gt;sudo -s&lt;br&gt;echo "[default]" &amp;gt;&amp;gt; /etc/nsmb.conf&lt;br&gt;echo signing_required=no &amp;gt;&amp;gt; /etc/nsmb.conf&lt;br&gt;exit&lt;/code&gt;&lt;/pre&gt;&#xD;
&lt;div&gt;&amp;nbsp;To check that it properly wrote the nsmb.conf file:&lt;/div&gt;&#xD;
&lt;pre&gt;cat /etc/nsmb.conf&lt;br&gt;[default]&lt;br&gt;signing_required=no&lt;/pre&gt;&#xD;
&lt;div&gt;&amp;nbsp;Check if SMB signing is disabled on your share after you remount the SMB volume:&lt;/div&gt;&#xD;
&lt;pre&gt;&lt;strong&gt;#Display stats for a specific SMB share&lt;/strong&gt;&lt;br&gt;smbutil statshares -m /Volumes/SMB_Volume_Name&lt;br&gt;&lt;br&gt;&lt;strong&gt;#Display stats on all mounted SMB shares&lt;/strong&gt;&lt;br&gt;smbutil statshares -a  &lt;/pre&gt;&#xD;
&lt;pre&gt;=====================================================================================&lt;br&gt;SHARE                         ATTRIBUTE TYPE                VALUE&lt;br&gt;=====================================================================================&lt;br&gt;SD01 &lt;br&gt;                              SERVER_NAME                   10.0.0.140&lt;br&gt;                              USER_ID                       501&lt;br&gt;                              SMB_NEGOTIATE                 AUTO_NEGOTIATE&lt;br&gt;                              SMB_VERSION                   SMB_3.0&lt;br&gt;                              SMB_SHARE_TYPE                DISK&lt;br&gt;                              SIGNING_SUPPORTED             TRUE&lt;br&gt;                              EXTENDED_SECURITY_SUPPORTED   TRUE&lt;br&gt;                              LARGE_FILE_SUPPORTED          TRUE&lt;br&gt;                              CLIENT_REQUIRES_SIGNING       TRUE&lt;br&gt;                              FILE_IDS_SUPPORTED            TRUE&lt;br&gt;                              DFS_SUPPORTED                 TRUE&lt;br&gt;                              MULTI_CREDIT_SUPPORTED        TRUE&lt;br&gt;                              ENCRYPTION_SUPPORTED          TRUE&amp;nbsp;&lt;/pre&gt;&#xD;
&lt;pre&gt;If the &lt;strong&gt;SIGNING_ON&lt;/strong&gt; variable is still outputted via &lt;code&gt;smbutil statshares -a&lt;/code&gt;, &lt;br&gt;that means it's still enabled.&lt;/pre&gt;&#xD;
&lt;pre&gt;This variable should &lt;strong&gt;not&lt;/strong&gt; show up after you have disabled SMB signing.&lt;br&gt;             SIGNING_ON&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; TRUE&lt;/pre&gt;&#xD;
&lt;div&gt;&lt;hr&gt;&lt;strong&gt;Related Article:&lt;br&gt;&lt;br&gt;Article from Apple (HT205926)&lt;/strong&gt;&lt;br&gt;&lt;a href="https://support.apple.com/en-us/HT205926" target="_blank" rel="noreferrer, noopener"&gt;Turn off packet signing for SMB 2 and SMB 3 connections&lt;br&gt;&lt;br&gt;&lt;/a&gt;&lt;hr&gt;&lt;strong&gt;Contact Promise Technology Support&lt;/strong&gt;&lt;/div&gt;&#xD;
&lt;div&gt;Need more help? Save time by starting your support request online and a technical support agent will be assigned to your case.&lt;br&gt;&lt;br&gt;&lt;a href="https://support.promise.com/" target="_blank" rel="noreferrer, noopener"&gt;Promise Technology Technical Support &amp;gt;&lt;/a&gt;&lt;/div&gt;</description>
      <pubDate>2016-10-07T23:46:42.9400000</pubDate>
      <link>https://kb.promise.com/thread/disable-smb-signing-on-os-x-10-11-5-10-12-x/</link>
    </item>
    <item>
      <title>If there are multiple G1100 NAS Gateways (NAS Gateway Cluster) connected to the AClass SAN, the ﬁrmware update process will only update the ﬁrst G1100</title>
      <description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&#xD;
&lt;h4&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Workaround:&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&#xD;
&#xD;
&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Upgrading additional NAS Gateways must be done manually.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;strong&gt;- Note - The upcoming SR1.1 firmware release will address this issue.&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;For additional information or assistance, please visit kb.promise.com or contact PROMISE technical support at support.promise.com &lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&amp;nbsp;&#xD;
&#xD;
&lt;h4&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Manual NAS Gateway firmware update:&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&#xD;
&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;strong&gt;First, download NAS Gateway firmware from the PROMISE Download center&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Point a browser to &lt;/span&gt;&lt;/span&gt;&#xD;
&lt;a href="http://www.promise.com/us/Support/downloadcenter" target="_blank" rel="noreferrer, noopener"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;http://www.promise.com/us/Support/downloadcenter&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Click the VTrak logo&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Then click G1100 NAS Gateway. It is below the VTrak A-Class logo&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;/blockquote&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;img src="/Uploads/Images/10440/10440-01.jpg" alt=""&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;strong&gt;Locate and download the VTrak G-Class NAS Gateway SR1(v01.11.0000.00) firmware:&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;To ﬁlter the available categories, Uncheck All Categories and only select the Firmware check-box.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;/blockquote&gt;&#xD;
&#xD;
&lt;blockquote style="font-size: 13.3333px; border: none; padding: 0px;"&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Click on &lt;strong&gt;English &lt;/strong&gt;to start the file download&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;/blockquote&gt;&#xD;
&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;img src="/Uploads/Images/10440/10440-02.jpg" alt=""&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;strong&gt;Get the NAS Gateway IP address:&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&#xD;
&lt;blockquote style="font-size: 13.3333px; border: none; padding: 0px;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;After downloading the firmware file (it will have a .upg extension) log into the VTrak A-Class management interface. &lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&#xD;
&lt;blockquote style="font-size: 13.3333px; border: none; padding: 0px;"&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;This will be the virtual IP address assigned to the VTrak A-Class.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Next, click on the &lt;strong&gt;NAS Gateway&lt;/strong&gt; tab.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&#xD;
&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;img style="width: 500px; height: 334px;" src="/Uploads/Images/10440/10440-03.jpg" alt=""&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Expand the NASGW Cluster tree and select the ﬁrst G1100 node and locate the Metadata IP address.&lt;br&gt;Record the Metadata IP address of the first node. You will need it later in the firmware update process.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&amp;nbsp;&lt;/blockquote&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Next, select the second G1100 node and locate the Metadata IP address.&lt;br&gt;Once again, record the Metadata IP address for the second node.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&amp;nbsp;&lt;/blockquote&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Open up a web browser session (Firefox, Chrome, or Safari)&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&amp;nbsp;&lt;/blockquote&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;strong&gt;Update the firmware:&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Next, browse to &lt;strong style="font-size: 10pt;"&gt;https://XXX.XXX.XXX/upload_fw.php&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;blockquote style="border: none; padding: 0px;"&gt;&#xD;
&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;(where XXX.XXX.XXX is the NAS Gateway Metadata Node IP address recorded earlier)&lt;/span&gt;&lt;/span&gt;&#xD;
&#xD;
&lt;/blockquote&gt;&#xD;
&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;After this web page loads, accept the SSL certificate. This will open the FAE Firmware Upgrade page.&lt;/span&gt;&lt;/span&gt;&#xD;
&#xD;
&lt;/blockquote&gt;&#xD;
&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;img src="/Uploads/Images/10440/10440-05.jpg" alt=""&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Click on &lt;strong style="font-size: 10pt;"&gt;Choose File&lt;/strong&gt; and select the SR1 firmware (it will have the .upg extension) downloaded earlier.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Once the file is selected, it will be listed beside &lt;strong&gt;Filename&lt;/strong&gt;.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Click &lt;strong&gt;Submit &lt;/strong&gt;to start the firmware update.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;Repeat the same steps for the second NAS Gateway node.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;br&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;You will see a successful firmware update message once the update is complete.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;br&gt;&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;After success, each NAS Gateway node will restart on its own.&lt;/span&gt;&lt;/span&gt;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;strong&gt;- Please allow 5 minutes per node to rejoin the NASGW cluster&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;If the firmware update is successful, and after each node reboots, you will see both NASGW G1100 with a green operational status icon.&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;&lt;img src="/Uploads/Images/10440/10440-06.png" alt=""&gt;&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&lt;span style="font-size: 12px;"&gt;&lt;span style="font-family: tahoma, geneva, sans-serif;"&gt;If you need further assistance, please contact PROMISE technical support at support.promise.com&lt;/span&gt;&lt;/span&gt;&#xD;
&amp;nbsp;&#xD;
&amp;nbsp;</description>
      <pubDate>2015-11-10T14:54:45.0000000</pubDate>
      <link>https://kb.promise.com/thread/if-there-are-multiple-g1100-nas-gateways-nas-gateway-cluster-connected-to-the-aclass-san-the-%ef%ac%81rmware-update-process-will-only-update-the-%ef%ac%81rst-g1100/</link>
    </item>
    <item>
      <title>In the NAS G1100 when clicking the “Folder Share” refresh settings, AD Group and Users do not get populated.</title>
      <description>&lt;div&gt;&lt;span&gt;&lt;h4&gt;Configure LDAP settings correctly via the A-Class GUI using the following Active Directory parameters:&lt;/h4&gt;&lt;/span&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;blockquote style="margin: 0px 0px 0px 40px; border: none; padding: 0px;"&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Response TimeOut: 10 sec&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;LDAD Server &amp;lt;IP Address&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;LDAP Port 389&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Server Type: Windows Active Directory&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;DNS: 10.0.0.76&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Base DN: dc=aclass,dc=test,dc=com&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Anonymous bind: unchecked&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Bind DN: aclass\administrator&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Bind Password: (password)&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;UID Attribute: cn&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Object Class: user&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Group ID Attribute: cn&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;Object Class of Group&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face="Courier New"&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;h4&gt;Be sure your AD server has "&lt;strong&gt;Identity Management for UNIX&lt;/strong&gt;" service installed.&lt;/h4&gt;&lt;/span&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;&lt;img src="/Uploads/Images/10436/10436-01.jpg" style="font-size: 10pt; width: 500px; height: 320px;"&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;In order to store UNIX attributes in Active Directory, you must add the "&lt;strong&gt;Identity Management for UNIX&lt;/strong&gt;" Role Service; this will provide a partial RFC 2307-compliant set of UNIX attributes.  A new tab labeled "&lt;strong&gt;UNIX Attributes&lt;/strong&gt;" will appear in the properties dialog box for Users and Groups in Active Directory, and each Active Directory account that will authenticate via Linux must be configured in this tab.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;img src="/Uploads/Images/10436/10436-02.jpg" style="width: 500px; height: 367px;"&gt;&lt;/span&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Once "&lt;strong&gt;Identity Management for UNIX&lt;/strong&gt;" service is installed, reboot your AD server. &lt;/div&gt;&lt;div&gt;After the reboot the UID/GID will be assigned to Users and Groups. &lt;/div&gt;&lt;div&gt;The NAS G1100 will now display the Users and Groups correctly.&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;If still unable to see Users and Groups, be sure to refresh settings in the page.&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;</description>
      <pubDate>2015-10-14T14:47:12.0000000</pubDate>
      <link>https://kb.promise.com/thread/in-the-nas-g1100-when-clicking-the-folder-share-refresh-settings-ad-group-and-users-do-not-get-populated/</link>
    </item>
    <item>
      <title>What is the the maximum power consumption for the VTrak G1100 NAS Gateway?</title>
      <description>&lt;p class="MsoPlainText"&gt;Maximum usage during power up:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;113.5 Watts&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;Maximum usage while powered on with no load:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;85.8 Watts&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;Typical power use during normal operations:&lt;/p&gt;&lt;p class="MsoPlainText"&gt;70 Watts to 80 Watts&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;&lt;p class="MsoPlainText"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <pubDate>2015-04-16T14:47:59.0000000</pubDate>
      <link>https://kb.promise.com/thread/what-is-the-the-maximum-power-consumption-for-the-vtrak-g1100-nas-gateway/</link>
    </item>
    <item>
      <title>NAS Gateway Node FC HBA Replacement</title>
      <description>&lt;p&gt;This document explains how to replace a NAS Gateway Fibre Channel HBA. This procedure must be conducted with the consultation and approval of Promise Technical Support or Promise Field Applications Personal.&lt;/p&gt;&lt;p&gt;Please follow link below:&lt;/p&gt;&lt;a href="https://www.dropbox.com/sh/lh1slarqzjuq3u4/AABC9SIQ_IgfRhu24RGuJTqoa/NAS%20Gateway%20Node%20FC%20HBA%20Replacement.pdf?dl=0" target="_blank" rel="noreferrer, noopener"&gt;NAS Gateway Node FC HBA Replacement&lt;/a&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <pubDate>2015-02-13T11:38:03.0000000</pubDate>
      <link>https://kb.promise.com/thread/nas-gateway-node-fc-hba-replacement/</link>
    </item>
    <item>
      <title>NAS Gateway Node Replacement</title>
      <description>&lt;p&gt;This document explains how to replace a NAS Gateway.&lt;/p&gt;&lt;p&gt;See PDF in the link below:&lt;/p&gt;&lt;br&gt;&lt;a href="https://www.dropbox.com/sh/lh1slarqzjuq3u4/AABrOxVH4ZwLAL7qrV1O8PI_a/NAS%20Gateway%20Dual%20Node%20Replacement.pdf?dl=0" target="_blank" rel="noreferrer, noopener"&gt;NAS Gateway Node FC HBA Replacement.pdf&lt;/a&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <pubDate>2015-02-13T11:28:08.0000000</pubDate>
      <link>https://kb.promise.com/thread/nas-gateway-node-replacement/</link>
    </item>
  </channel>
</rss>