Skip to content

Commit 23f309f

Browse files
committed
edits
1 parent 5ecdf10 commit 23f309f

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

articles/storage/files/encryption-in-transit-for-nfs-shares.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -150,14 +150,14 @@ sudo yum install -y aznfs
150150
### Step 2: Mount the NFS file share
151151

152152
To mount the NFS file share **with TLS encryption**:
153-
153+
154154
1. Create a directory on your client.
155155

156156
```bash
157157
sudo mkdir -p /mount/<storage-account-name>/<share-name>
158158
```
159159

160-
1. Mount the NFS share by using the following cmdlet. Replace `<storage-account-name>` with the name of your storage account and replace `<share-name>` with the name of your file share.
160+
2. Mount the NFS share by using the following cmdlet. Replace `<storage-account-name>` with the name of your storage account and replace `<share-name>` with the name of your file share.
161161

162162
```bash
163163
sudo mount -t aznfs <storage-account-name>.file.core.windows.net:/<storage-account-name>/<share-name> /mount/<storage-account-name>/<share-name> -o vers=4,minorversion=1,sec=sys,nconnect=4
@@ -189,10 +189,10 @@ It indicates that the client is connected through the local port 127.0.0.1, not
189189

190190
To check if traffic to the NFS server is encrypted, use the `tcpdump` command to capture packets on port 2049.
191191

192-
193192
```bash
194193
sudo tcpdump -i any port 2049 -w nfs_traffic.pcap
195194
```
195+
196196
When you open the capture in Wireshark, the payload will appear as "Application Data" instead of readable text.
197197

198198
:::image type="content" source="./media/encryption-in-transit-nfs-shares/wireshark-capture.png" alt-text="Diagram showing the Wireshark screen to test if EiT is applied." lightbox="./media/encryption-in-transit-nfs-shares/wireshark-capture.png":::
@@ -205,14 +205,16 @@ When you open the capture in Wireshark, the payload will appear as "Application
205205
A **non-TLS (notls) mount** operation might fail if a previous **TLS-encrypted** mount to the same server was terminated before completing successfully. Although the *aznfswatchdog* service automatically cleans up stale entries after a timeout, attempting a new non-TLS mount before cleanup completes can fail.
206206

207207
To resolve this issue, remount the share using the clean option, which immediately clears any stale entries:
208+
208209
```bash
209210
sudo mount -t aznfs <storage-account-name>.file.core.windows.net:/<storage-account-name>/<share-name> /mount/<storage-account-name>/<share-name> -o vers=4,minorversion=1,sec=sys,nconnect=4,notls,clean
210211
```
212+
211213
If mounting issues continue, check the log files for more troubleshooting details:
212-
214+
213215
- **Mount Helper and Watchdog Logs**: `/opt/microsoft/aznfs/data/aznfs.log`
214216
- **Stunnel Logs**: `/etc/stunnel/microsoft/aznfs/nfsv4_fileShare/logs`
215-
217+
216218
## See also
217219

218220
- [Azure Storage encryption for data at rest](/azure/storage/common/storage-service-encryption)

0 commit comments

Comments
 (0)