[root@dev ~]# mount.cifs //192.168.9.155/APP /mnt/APP/ -o user=administrator,pass=dsff#$TTT
在检查帐号密码权限无问题时,请在命令后加上sec=ntlm 认证即可。
如果还不行,加上提交格式 iocharset=utf8
另外还有读写权限的问题,记得要加上uid以及gid参数
mount.cifs //192.168.9.155/APP /mnt/APP/ -o user=administrator,pass=dsff#$TTT,gid="",uid="",sec=ntlm
- sec=
- Security mode. Allowed values are:
- ¡¤ none - attempt to connection as a null user (no name)
- ¡¤ krb5 - Use Kerberos version 5 authentication
- ¡¤ krb5i - Use Kerberos authentication and forcibly enable packet signing
- ¡¤ ntlm - Use NTLM password hashing
- ¡¤ ntlmi - Use NTLM password hashing and force packet signing
- ¡¤ ntlmv2 - Use NTLMv2 password hashing
- ¡¤ ntlmv2i - Use NTLMv2 password hashing and force packet signing
- ¡¤ ntlmssp - Use NTLMv2 password hashing encapsulated in Raw NTLMSSP message
- ¡¤ ntlmsspi - Use NTLMv2 password hashing encapsulated in Raw NTLMSSP message, and force
- packet signing
- The default in mainline kernel versions prior to v3.8 was sec=ntlm. In v3.8, the default
- was changed to sec=ntlmssp.
- If the server requires signing during protocol negotiation, then it may be enabled
- automatically. Packet signing may also be enabled automatically if it's enabled in
- /proc/fs/cifs/SecurityFlags.