Mounting NFS from a Windows 2003 server

Posted on 2005-05-09
Last Modified: 2007-11-27
I want to mount a network connection in an AS400. The server would be a Windows 2003 (the path is \\Server2003\Freigabe ), and I want to mount this path in the as400. In this netwotk connection, the AS400 will find some files that are needed for an application.
I have tried with the command MOUNT, but I cannot make it work.
Any idea.

Question by:jaimosky
    LVL 14

    Expert Comment

    have you created a share on the AS/400?
    You can do this via Ops Nav


    Author Comment

    I have created the object in the AS400.
    Why should I share this object? I want to mount on this object, not to share the object.
    Do I need a NFS Server on the Windows 2003 Server 'to share' with the As400?
    LVL 14

    Expert Comment

    sorry I mis-read the question

    LVL 3

    Expert Comment

    The best way is to run the NFS server on the Widows server.
    Then issue the MOUNT command with TYPE(*NFS) from the as400.

    Let me know if you need any more details.
    LVL 26

    Accepted Solution


    There's some confusion because the question title mentions <NFS> but your question text refers to Win2003. I haven't seen NFS used much with Windows servers. Normally, the standard Windows networking is what's used, not NFS.

    Do you have a specific reason to enable NFS on a Windows server? (I've only seen it done once.) What NFS provider are you using? (Hmmm... does Win2003 have native NFS???)  I used AccessNSF in one case in order to get around some Windows cross-domain authorization issues for a customer.

    In any case, yes, on your AS/400, you would use MOUNT/UNMOUNT or ADDMFS/RMVMSF in order to mount a remote NFS export over a directory on your AS/400.

    Note that userid/password can be tricky. The userid/password might need to match. I haven't researched whether or not a server authentication entry can be used to avoid this.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    After several days of searching and hunting for limited documentation, I wanted to share this guide to hopefully save someone the hassle of trying to figure this out on their own. I have tested this on Xendesktop 7.1 and PS 4.5 running simultaneous…
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    Need more eyes on your posted question? Go ahead and follow the quick steps in this video to learn how to Request Attention to your question. *Log into your Experts Exchange account *Find the question you want to Request Attention for *Go to the e…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now