Veritas Access Administrator's Guide
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring an FTP server
- Using Veritas Access as an Object Store server
- Configuring the NFS server
- Section V. Monitoring and troubleshooting
- Section VI. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VII. Configuring cloud storage
- Section VIII. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Integrating Veritas Access with Data Insight
- Section IX. Managing Veritas Access storage services
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Compressing files
- Section X. Reference
Configuring the iSCSI targets
To display the iSCSI targets
- To display the iSCSI targets, enter the following:
Storage> iscsi target list
To display the iSCSI target details
- To display the iSCSI target details, enter the following:
Storage> iscsi target listdetail target
where target is the name of the node you want to display the details for.
This list also shows targets discovered at discovery-address, not only manually added targets.
To add an iSCSI target
- To add an iSCSI target, enter the following:
Storage> iscsi target add target-name portal-address
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
portal-address
The location where the target is accessible.
You can specify either an IPv4 address or an IPv6 address.
To delete an iSCSI target
- To delete an iSCSI target, enter the following:
Storage> iscsi target del target-name {discovery-address|portal-address}
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
discovery-address
Target address at which an initiator can request a list of targets using a SendTargets text request as specified in iSCSI protocol of RFC3720. If no port is specified with the discovery address, default port 3260 is used.
portal-address
The location where the target is accessible.
To login to an iSCSI target
- To log in to an iSCSI target, enter the following:
Storage> iscsi target login target-name {discovery-address | portal-address}
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
discovery-address
Target address at which an initiator can request a list of targets using a SendTargets text request as specified in iSCSI protocol of RFC3720. If no port is specified with the discovery address, default port 3260 is used.
portal-address
The location where the target is accessible.
To logout from an iSCSI target
- To logout from an iSCSI target, enter the following:
Storage> iscsi target logout target-name {discovery-address | portal-address}
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
discovery-address
Target address at which an initiator can request a list of targets using a SendTargets text request as specified in iSCSI protocol of RFC3720. If no port is specified with the discovery address, default port 3260 is used.
portal-address
The location where the target is accessible.
To rescan targets for new LUNs
- To rescan a target for a new LUN, enter the following:
Storage> iscsi target rescan target-name
where target-name is the name of the iSCSI target that you want to rescan.
You can use the Storage> iscsi target rescan command for both static targets and discovered targets.