[NetApp] Microsoft Windows Server 2012 use NFSv3 mount volume ,error “Network error – 53”

因客戶反應今日Windows Server 2012 R2 用NFSv3 掛載 NetApp FAS2552A 有錯誤訊息 “Network error – 53 "

當下確認幾點 :

1. Client with storage eachother ping > OK

2. confirm create temporary LIFs role belong ‘Data’

3.confirm SVMs options allowed-protocols have ‘nfs’

4.confirm export-policy & export-policy rule is OK

5.confirm Cluster-Mode ONTAP over than 8.3.x (PS: C-mode 8.3.1 just support NFSv3)

最後都沒問題原來是有幾個參數需調整這樣Windows NFSv3 mount才能運作

solution

step01.

::> set -privilege diagnostic

step02.

::*>vserver nfs show -vserver {SVM} -fields v3-ms-dos-client,enable-ejukebox,v3-connection-drop

(註)

v3-ms-dos-client (預設 disabled)

enable-ejukebox (預設 true)

v3-connection-drop (預設 enabled)

step03.

vserver nfs modify -vserver {SVM} -v3-ms-dos-client enabled -enable-ejukebox false -v3-connection-drop disabled

step04.

*Windows Client*

mount -o mtype=hard \\NetApp-NFS-LIF-IP\Volume Z:\

大功告成囉^O^

 

 

(CVE) CPU 重大漏洞 Meltdown & Specture

# CVE-2017-5754 (Meltdown)
# CVE-2017-5715 and CVE-2017-5753 (Spectre)

各媒體都說英特爾但不只有它們..還有AMD , Nvidia

 

特別整理維護會用到需修正各家產品(hardware / software)

目前Intel官方釋出有影響如下:

Description:

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Affected products:

For non-Intel based systems please contact your system manufacturer or microprocessor vendor (AMD, ARM, Qualcomm, etc.) for updates.

The following Intel-based platforms are impacted by this issue. Intel may modify this list at a later time. Please check with your system vendor or equipment manufacturer for more information regarding updates for your system.

  • Intel® Core™ i3 processor (45nm and 32nm)
  • Intel® Core™ i5 processor (45nm and 32nm)
  • Intel® Core™ i7 processor (45nm and 32nm)
  • Intel® Core™ M processor family (45nm and 32nm)
  • 2nd generation Intel® Core™ processors
  • 3rd generation Intel® Core™ processors
  • 4th generation Intel® Core™ processors
  • 5th generation Intel® Core™ processors
  • 6th generation Intel® Core™ processors
  • 7th generation Intel® Core™ processors
  • 8th generation Intel® Core™ processors
  • Intel® Core™ X-series Processor Family for Intel® X99 platforms
  • Intel® Core™ X-series Processor Family for Intel® X299 platforms
  • Intel® Xeon® processor 3400 series
  • Intel® Xeon® processor 3600 series
  • Intel® Xeon® processor 5500 series
  • Intel® Xeon® processor 5600 series
  • Intel® Xeon® processor 6500 series
  • Intel® Xeon® processor 7500 series
  • Intel® Xeon® Processor E3 Family
  • Intel® Xeon® Processor E3 v2 Family
  • Intel® Xeon® Processor E3 v3 Family
  • Intel® Xeon® Processor E3 v4 Family
  • Intel® Xeon® Processor E3 v5 Family
  • Intel® Xeon® Processor E3 v6 Family
  • Intel® Xeon® Processor E5 Family
  • Intel® Xeon® Processor E5 v2 Family
  • Intel® Xeon® Processor E5 v3 Family
  • Intel® Xeon® Processor E5 v4 Family
  • Intel® Xeon® Processor E7 Family
  • Intel® Xeon® Processor E7 v2 Family
  • Intel® Xeon® Processor E7 v3 Family
  • Intel® Xeon® Processor E7 v4 Family
  • Intel® Xeon® Processor Scalable Family
  • Intel® Xeon Phi™ Processor 3200, 5200, 7200 Series
  • Intel® Atom™ Processor C Series
  • Intel® Atom™ Processor E Series
  • Intel® Atom™ Processor A Series
  • Intel® Atom™ Processor x3 Series
  • Intel® Atom™ Processor Z Series
  • Intel® Celeron® Processor J Series
  • Intel® Celeron® Processor N Series
  • Intel® Pentium® Processor J Series
  • Intel® Pentium® Processor N Series

Reference:

  1. 英特爾、ARM與AMD相繼回應重大記憶體洩露漏洞
  2. Intel ID: INTEL-SA-00088
  3. T客邦 Windows用戶請注意!避免Intel漏洞,微軟釋出安全更新KB4056892請盡快安裝
  4. iLOG 微軟針對各版本Windows釋出修補CPU Meltdown漏洞
  5. 10個Q&A快速認識Meltdown與Spectre兩大CPU漏洞攻擊(內含各廠商修補進度大整理)