5-2 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
Byte-range locks work on portions of a file. Byte-range operations other than reads by
a UNIX-based NFS client fail if the attempted operation is forbidden by the lock. As is
appropriate for NFS, a UNIX-based NFS application might be forbidden to access a
byte-range that is locked by CIFS.
NOTE: There is one exception to the enforcement of locks set by CIFS clients on the
filer. When the filer runs the dump command, it ignores the file lock set by a CIFS cli-
ent that prevents read access to parts of a file or the entire file. Ignoring the read
file lock allows the filer to back up all files.
0DQDJLQJ6\PEROLF/LQNVIRU&,)6$FFHVV
$ERXW6\PEROLF/LQNV
CIFS clients can follow symbolic links, which are created by NFS clients. A symbolic
link is a special file that points to another file or directory. A symbolic link is, in some
respects, like a shortcut in the Windows environment.
There are two kinds of symbolic links: absolute and relative:
Absolute symbolic links begin with a slash (/) and are treated as a path relative to
the root of the file system.
Relative symbolic links begin with a character other than a slash (
/) and are
treated as a path relative to the parent directory of the symbolic link.
&RQWUROOLQJ$FFHVVWR6\PEROLF/LQNV
You can control CIFS access to symbolic links in three ways:
Enabling or disabling symbolic links
Redirecting absolute symbolic links
Preventing or allowing the following of symbolic links that can refer to a directory
higher in the same tree
(QDEOLQJ6\PEROLF/LQNV
When the symbolic links for CIFS feature is enabled, which is the default setting, if
the object being accessed by a CIFS client is an absolute or relative symbolic link, the
filer follows the link under the following conditions:
The ultimate target is in the same share as the symbolic link.
A symbolic link encountered in any path component other than the final one is
always followed.
The final component of a symbolic link is followed only if the operation is to open
an existing file.
Other operations, such as deleting and renaming, result in deleting or renaming
the symbolic link itself rather than the target of the symbolic link.