Skip to main content

Creating security trace filters

You can create security trace filters that detect SMB/CIFS and NFS client operations on storage virtual machines (SVMs)and trace all access checks matching the filter. You can use the results from security traces to validate your configuration or to troubleshoot access issues.

There are two required parameters for the vserver security trace filter create command:

Required parametersDescription
-vserver vserver_name SVM name

The name of the SVM that contains the files or folders on which you want to apply the security trace filter.

-index index_numberFilter index number

The index number you want to apply to the filter. You are limited to a maximum of 10 trace filters per SVM. The allowed values for this parameter are 1 through 10.

A number of optional filter parameters enable you to customize the security trace filter so that you can narrow down the results produced by the security trace:

Filter parameterDescription
-client-ip IP_AddressThis filter specifies the IP address from which the user is accessing the SVM.
-path pathThis filter specifies the path on which to apply the permission trace filter. The value for -path can use either of the following formats:
  • The complete path, starting from the root of the share or export
  • A partial path, relative to the root of the share

You must use NFS style directory other-style directory separators in the path value.

-windows-name win_user_nameYou can specify either the Windows user name whose access requests you want to trace. The user name variable is case insensitive. You cannot specify both a Windows user name and other user name in the same filter.
Note
Even though you can trace SMB/CIFS and NFS access events, the mapped UNIX user and the mapped UNIX users' groups might be used when performing access checks on mixed or UNIX security-style data.
-trace-allow {yes|no}Tracing for deny events is always enabled for a security trace filter. You can optionally trace allow events. To trace allow events, you set this parameter to yes.
-enabled {enabled|disabled}You can enable or disable the security trace filter. By default, the security trace filter is enabled.
-time-enabled integerYou can specify a timeout for the filter, after which it is disabled.
  1. Create a security trace filter: vserver security trace filter create -vserver vserver_name -index index_numberfilter_parameters

    filter_parameters is a list of optional filter parameters.

    For more information, see the man pages for the command.

  2. Verify the security trace filter entry: vserver security trace filter show -vserver vserver_name -index index_number

Examples

The following command creates a security trace filter for any user accessing a file with a share path \\server\share1\dir1\dir2\file.txt from the IP address 10.10.10.7. The filter uses a complete path for the -path option. The client's IP address used to access data is 10.10.10.7. The filter times out after 30 minutes:

cluster1::> vserver security trace filter create -vserver vs1 -index 1 -path /dir1/dir2/file.txt -time-enabled 30 -client-ip 10.10.10.7
cluster1::> vserver security trace filter show -index 1
Vserver Index Client-IP Path Trace-Allow Windows-Name
-------- ----- ----------- ---------------------- ----------- -------------
vs1 1 10.10.10.7 /dir1/dir2/file.txt no -

The following command creates a security trace filter using a relative path for the -path option. The filter traces access for a Windows user named joe. Joe is accessing a file with a share path \\server\share1\dir1\dir2\file.txt. The filter traces allow and deny events:

cluster1::> vserver security trace filter create -vserver vs1 -index 2 -path /dir1/dir2/file.txt -trace-allow yes -windows-name mydomain\joe

cluster1::> vserver security trace filter show -vserver vs1 -index 2
Vserver: vs1
Filter Index: 2
Client IP Address to Match: -
Path: /dir1/dir2/file.txt
Windows User Name: mydomain\joe
Trace Allow Events: yes
Filter Enabled: enabled
Minutes Filter is Enabled: 60