Tools for special tasks System administrator tools
Product Manual U7613-J-Z815-6-76
© Siemens Nixdorf Informationssysteme AG 1995 Pfad: D:\O7613e6\u7613e.k07
Options and Parameters:
-d Use default names
<names_file> Input file name (should contain name mappings in names.cfg format).
<lmhosts_file> Output file na me in LMHOSTS format (ready for being imported into a
WINS database).
P lease inspect the list of static NetBIOS name mappings generated by nam es2lm
carefully before using NT WINS manager to import them into a WINS database.
As a rule, you should keep the number of static mappings within WINS as smal l as
possible and use them only for important computers which are not WINS-aware. It
is not recommended to use static mappings for WINS enabled clients.
7.3 System administrator tools
The first section contains an overview how access permissions a re managed in Advanced
Server for UNIX. The following scripts are required by system adm inistrators in different
situations. For example, they can be used for backing up the user’s con figuration and
resources as well as for problem analysis.

7.3.1 Access permissions in Advanced Server for UNIX

Advanced Server for UNIX stores access permissions for files and directories in its ACL
database in the /var/opt/lanman directory. In contr ast to U NIX per mission s, which are st ored
with each file and directory in the file system, permissions are stored centr ally in Advanced
Server for UNIX.
The ACL database stores access permissions for some resources, while other res ources
inherit their permissions from the higher-level directory. The net perms command displays
permissions for all available resources, i.e. either permissions sto red physically in the ACL
database or those inherited from the higher-level directory. If a resource which is not yet
entered in the ACL database is assigned permissions by net perms, the rights currently
inherited are combined with those specified in the command and stored as a physical entry
in the ACL database. If the physical entry is deleted, the inherited permissions are valid
again.
If you are saving files with UNIX tools or copying files under UNIX, the permissi ons are not
saved and copied automatically. Files and directories can be backed up together with the ir
permissions using the NT Backup Tools, for example.
i