Veritas Access Appliance Command Reference Guide

Last Published:
Product(s): Appliances (7.4.3)
Platform: Veritas 3340,Access Appliance OS
  1. Overview
    1.  
      Scope of the Veritas Access Command Reference Guide
    2.  
      Where to find the documentation
    3.  
      Using the Access Appliance shell menu
  2. Appendix A. Main > Appliance
    1.  
      Appliance > Status
  3. Appendix B. Main > Manage > Cluster
    1.  
      Cluster > Configure
  4. Appendix C. Main > Manage > Software
    1.  
      Manage > Software > Cancel
    2.  
      Manage > Software > Delete
    3.  
      Manage > Software > Download
    4.  
      Manage > Software > DownloadProgress
    5.  
      Manage > Software > Install
    6.  
      Manage > Software > List
    7.  
      Manage > Software > Readme
    8.  
      Manage > Software > Rollback
    9.  
      Manage > Software > Share
    10.  
      Manage > Software > UpgradeStatus
  5. Appendix D. Main > Manage > Storage
    1.  
      Manage > Storage > Show
    2.  
      Manage > Storage > Scan
    3.  
      Manage > Storage > Erase
  6. Appendix E. Main > Monitor
    1.  
      Monitor > Beacon
    2.  
      Monitor > MemoryStatus
    3.  
      Monitor > NetworkStatus
    4.  
      Monitor > SDCS
    5.  
      Monitor > Top
    6.  
      Monitor > Uptime
    7.  
      Monitor > Who
    8.  
      Monitor > Hardware
  7. Appendix F. Main > Network
    1.  
      Network > Configure
    2.  
      Network > Date
    3.  
      Network > DNS
    4.  
      Network > Gateway
    5.  
      Network > Hostname
    6.  
      Network > Hosts
    7.  
      Network > IPv4
    8.  
      Network > IPv6
    9.  
      Network > NetStat
    10.  
      Network > NTPServer
    11.  
      Network > Ping
    12.  
      Network > Proxy
    13.  
      Network > SetProperty
    14.  
      Network > Show
    15.  
      Network > TimeZone
    16.  
      Network > TraceRoute
    17.  
      Network > Unconfigure
  8. Appendix G. Main > Settings
    1.  
      Settings > Password
    2.  
      Settings > Alerts > CallHome
    3.  
      Settings > Alerts > Email
    4.  
      Settings > Alerts > Hardware
    5.  
      Settings > Alerts > SNMP
    6.  
      Settings > LogForwarding
    7.  
      Security > Certificates > DeviceCertificate > Export
    8.  
      Security > Certificates > DeviceCertificate > Import
  9. Appendix H. Main > Support
    1.  
      Support > Cleanup > ResetDIMMErrors
    2.  
      Support > Collect
    3.  
      Support > DataCollect
    4.  
      Support > FactoryReset
    5.  
      Support > InfraServices
    6.  
      Support > IPMI
    7.  
      Support > LogBrowser
    8.  
      Support > Logs
    9.  
      Support > Maintenance
    10.  
      Support > RAID
    11.  
      Support > Reboot
    12.  
      Support > Services
    13.  
      Support > Shutdown
    14.  
      Support > Storage Reset
    15.  
      Support > Test

Name

Main > Manage > Cluster > Configure — Configure the Access cluster on the appliance.

SYNOPSIS

Configure

DESCRIPTION

Use this command to configure the Access cluster on the appliance from the current node.

Note the following before you run the command:

  • The Access cluster configuration is only allowed to run from one node. Make sure that the Access cluster configuration process is not already ongoing on the current node or other nodes.

  • Make sure that you have the node management IP addresses of the appliance nodes for clustering.

  • Make sure that you have sufficient physical and virtual IP addresses for the cluster configuration. The IP addresses need not be contiguous.

  • Disk-based fencing is configured when you configure the cluster. You cannot change the configured fencing.

Do not run the Configure on the current node in the following scenarios:

  • When the cluster configuration process is already running on another node of the Access appliance.

  • When the node has been factory reset without resetting the storage, and the Access cluster remains on the other node.

  • When the node is an unconfigured node that is used to replace a faulty node in an Access cluster.

OPTIONS

Configure

Use the command to configure the Access cluster on the appliance.