7 What to Do NextYou can customize the NAS cluster and create additional containers, CIFS shares, and NFS exports. You canalso use snapshots to protect NAS container data.NAS Cluster DocumentationThe Dell EqualLogic Group Manager Administrator's Manual provides detailed NAS cluster information. TheGroup Manager online help describes how to use the Group Manager graphical user interface (GUI) to managea NAS cluster.The Dell EqualLogic Group Manager Administrator's Manual and the Group Manager command line interface(CLI) help describe how to use the CLI to manage a NAS cluster.For information about maintaining NAS cluster hardware, see the FS7600 NAS appliance Hardware Owner'sManual.For the latest information about NAS clusters, see the Dell EqualLogic customer support website.NAS Cluster OperationsYou can optionally perform any of the following operations on a NAS cluster:• Display NAS cluster information—You can display information about a NAS cluster, including the status,space utilization, and network configuration.• Modify the default values for space and permission settings applied to new containers—When you create acontainer, the cluster applies default values for space and permission settings.You can modify the following clusterwide default values for a new container:– Container in-use space warning limit, snapshot reserve percentage, and snapshot in-use space warninglimit– File security style (Mixed, NFTS, or UNIX)– UNIX file permissions and UNIX directory permissions (744 and 755, respectively)• Modify the default value for the guest access setting applied to new CIFS shares—When you create a CIFSshare, the cluster applies a default value for the guest access setting. You can modify the value of theclusterwide default setting to allow or disallow guest access by unknown users.• Modify the default values for permission settings applied to new NFS exports—When you create an NFSexport, the cluster applies default values for settings.You can modify the following clusterwide default values for a new NFS export:– Read-write or read-only permission– Trusted users (All except root, all, or nobody)• Set up local users and groups.• Set up Active Directory for external authentication of Windows users.• Set up NIS or LDAP for external authentication of UNIX users.33