Please enter search query.
Search <book_title>...
Veritas Access Appliance Administrator's Guide
Last Published:
2023-10-29
Product(s):
Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
A
- about
- Access Appliance continuous replication, About Access Appliance continuous replication
- Access Appliance episodic replication, About Access Appliance episodic replication
- Active Directory (AD), About Active Directory (AD)
- bonding Ethernet interfaces, About bonding Ethernet interfaces
- buckets and objects, About buckets and objects
- changing share properties, Setting share properties
- configuring Access Appliance for CIFS, About configuring Access Appliance for CIFS
- configuring CIFS for AD domain mode, About configuring CIFS for Active Directory (AD) domain mode
- configuring disks, About configuring disks
- configuring in IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
- configuring routing tables, About configuring routing tables
- configuring storage pools, About configuring storage pools
- Continuous replication failover and failback, Continuous replication failover and failback
- creating and maintaining file systems, About creating and maintaining file systems
- episodic replication job failover and failback, Episodic replication job failover and failback
- Ethernet interfaces, About Ethernet interfaces
- leaving AD domain, About leaving an AD domain
- managing CIFS shares, About managing CIFS shares
- Multi-protocol support for NFS with S3, S3 with NFS use case
- NFS file sharing, About NFS file sharing
- setting trusted domains, About setting trusted domains
- shares, About file sharing protocols
- snapshot schedules, About snapshot schedules
- snapshots, About snapshots
- storage provisioning and management, About storage provisioning and management
- storing account information, About storing account information
- striping file systems, About striping file systems
- the IP addresses for the Ethernet interfaces, About Ethernet interfaces
- About
- concurrent access, About concurrent access
- FastResync, About FastResync
- SNMP notifications, About SNMP notifications
- about Access Appliance
- as an iSCSI target, About Access Appliance as an iSCSI target
- About Configuring
- about maximum IOPS, About managing application I/O workloads using maximum IOPS settings
- about S3
- viewing information, Viewing information about S3
- Access
- accessing the CLISH, Accessing the Access CLISH
- Access Appliance
- about, About Access Appliance
- key features, About Access Appliance
- product documentation, Using the Access Appliance product documentation
- Access Appliance continuous replication
- about, About Access Appliance continuous replication
- description of feature, How Access Appliance continuous replication works
- starting, Starting Access Appliance continuous replication
- Access Appliance episodic replication
- about, About Access Appliance episodic replication
- compression, Replicating compressed data
- scheduling, Scheduling the episodic replication
- starting, Starting Access Appliance episodic replication
- Access Appliance Replication
- description of feature, How Access Appliance Replication works
- Access Appliance to the Kerberos realm
- adding and configuring, Adding and configuring Access Appliance to the Kerberos realm
- accessing
- Access Appliance product documentation, Using the Access Appliance product documentation
- CLISH, Accessing the Access CLISH
- disk details, Accessing disk details
- episodic replication destinations, Accessing file systems configured as episodic replication destinations
- man pages, About accessing the online man pages
- Active Directory
- setting the trusted domains for, Setting Active Directory trusted domains
- Active Directory (AD)
- about, About Active Directory (AD)
- joining Access Appliance to, Joining Access Appliance to Active Directory (AD)
- verifying Access Appliance has joined successfully, Verifying that Access Appliance has joined Active Directory (AD) successfully
- activity
- monitoring, Monitoring command activity
- AD domain mode
- changing domain settings, Changing domain settings for AD domain mode
- configuring CIFS, About configuring CIFS for Active Directory (AD) domain mode
- security settings, Changing domain settings for AD domain mode
- AD interface
- using, Removing the AD interface
- AD trusted domains
- disabling, Setting Active Directory trusted domains
- adding
- a column to a file system, Adding or removing a column from a file system
- a syslog server, Configuring a syslog server
- CIFS share, Setting share properties
- IP address to a cluster, Configuring IP addresses
- mirror to a file system, Adding or removing a mirror from a file system
- VLAN interfaces, Configuring VLAN interfaces
- adding a mapping
- between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
- adding and configuring
- Access Appliance to the Kerberos realm, Adding and configuring Access Appliance to the Kerberos realm
- aio_fork option
- setting, Setting the CIFS aio_fork option
- alerts
- file system removing, Removing file system alerts
- allowing
- specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
- as an iSCSI target
- about Access Appliance, About Access Appliance as an iSCSI target
- Authenticate
- NFS clients, About authenticating NFS clients
- authenticating
- NFS clients using Kerberos, Setting up Kerberos authentication for NFS clients
- authentication
- configuring the LDAP client using the CLI, Configuring the LDAP client for authentication using the CLI
B
- best practices
- creating file systems, Best practices for creating file systems
- bind distinguished name
- setting for LDAP server, Configuring LDAP server settings
- bonding
- Ethernet interfaces, Bonding Ethernet interfaces
- bonding Ethernet interfaces
- bringing
- file system online or offline, Bringing the file system online or offline
- buckets and objects
- about, About buckets and objects
C
- cache object
- destroying for an instant rollback, Destroying a cache object of a Access Appliance instant rollback
- cache objects
- listing, Listing cache objects
- changing
- an IP address to online
- on any running node, Configuring IP addresses
- domain settings for AD domain mode, Changing domain settings for AD domain mode
- local CIFS user password, Creating a local CIFS user
- security settings, Changing security settings
- share properties about, Setting share properties
- checking
- and repairing a file system, Checking and repairing a file system
- for stale mirrors on file systems, Checking and resynchronizing stale mirrors
- on the status of the NFS server, Accessing the NFS server
- CIFS
- allowing specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
- configuring schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
- denying specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
- export options, About the CIFS export options
- mapuser commands, About the mapuser commands
- standalone mode, About configuring CIFS for standalone mode
- using multi-domain controller support, Using multi-domain controller support in CIFS
- CIFS aio_fork option
- setting, Setting the CIFS aio_fork option
- CIFS and NFS protocols
- share directories, Sharing directories using CIFS and NFS protocols
- CIFS clustering modes
- CIFS data migration
- enabling, Enabling CIFS data migration
- CIFS home directories
- CIFS operating modes
- CIFS server
- starting, Reconfiguring the CIFS service
- trusted domains that are allowed access, Specifying trusted domains that are allowed access to the CIFS server
- CIFS server status
- standalone mode, Configuring CIFS server status for standalone mode
- CIFS service
- standalone mode, Configuring CIFS server status for standalone mode
- CIFS share
- adding, Setting share properties
- deleting, Deleting a CIFS share
- exporting as a directory, Exporting a directory as a CIFS share
- exporting the same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
- making shadow copy aware, Making a CIFS share shadow copy aware
- modifying, Modifying a CIFS share
- CIFS share and home directory
- migrating from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
- CIFS share for Enterprise Vault with replication
- CIFS share for Enterprise Vault without replication
- CIFS share with continuous replication
- CIFS share with encryption
- creating, Creating a CIFS share with encryption
- CIFS share with episodic replication
- CIFS share with episodic replication and encryption
- CIFS share without replication and encryption
- CIFS shares and home directories
- migrating from ctdb clustering modes, About migrating CIFS shares and home directories
- migrating from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
- CIFS snapshot
- exporting, Exporting a CIFS snapshot
- CIFS/NFS sharing
- mapping user names, About mapping user names for CIFS/NFS sharing
- clearing
- DNS domain names, Configuring DNS settings
- DNS name servers, Configuring DNS settings
- LDAP configured settings, Configuring LDAP server settings
- CLI
- configure and manage storage, Workflow for configuring and managing storage using the Access Appliance CLI
- client configurations
- cluster
- adding an IP address to, Configuring IP addresses
- changing an IP address to online for any running node, Configuring IP addresses
- displaying all the IP addresses for, Configuring IP addresses
- clustering modes
- collect logs
- datacollect, Gathering device logs with the DataCollect command
- columns
- adding or removing, Adding or removing a column from a file system
- command history
- displaying, Displaying the command history
- Command-Line Interface (CLI)
- getting help on how to use, Getting help using the Access CLISH
- communicating
- Concurrent access
- about, About concurrent access
- concurrent access
- NFS and S3, About concurrent access with NFS and S3
- Configure and manage storage
- configuring
- Access Appliance for CIFS, About configuring Access Appliance for CIFS
- AD schema with CIFS-schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
- CIFS for standalone mode, About configuring CIFS for standalone mode
- event notifications, Monitoring alerts , About event notifications
- IP routing, Configuring routing tables
- IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
- job resynchronization, Synchronizing an episodic replication job
- NFS client for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
- NIC devices, Configuring NIC devices
- NSS lookup order, Configuring NSS lookup order
- VLAN interfaces, Configuring VLAN interfaces
- Windows Active Directory as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
- Configuring
- Object Store server, Configuring the Object Store server
- Configuring Access Appliance
- ID mapping for NFS version 4, Configuring Access Appliance for ID mapping for NFS version 4
- configuring CIFS share
- secondary storage for an Enterprise Vault store, Configuring a CIFS share as secondary storage for an Enterprise Vault store
- configuring disks
- about, About configuring disks
- configuring Ethernet interfaces
- about, About Ethernet interfaces
- configuring routing tables
- configuring storage pools
- Configuring the Object Store server
- Considerations
- creating a file system, Considerations for creating a file system
- continuous replication
- display status, Displaying continuous replication information and status
- setting up file system, Setting up the file system to replicate
- unconfiguring, Unconfiguring continuous replication
- Continuous replication failover and failback
- converting
- existing file system into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
- creating
- CIFS share for Enterprise Vault with replication, Creating a CIFS share for Enterprise Vault with replication
- CIFS share for Enterprise Vault without replication, Creating a CIFS share for Enterprise Vault without replication
- CIFS share with continuous replication, Creating a CIFS share with continuous replication
- CIFS share with encryption, Creating a CIFS share with encryption
- CIFS share with episodic replication, Creating a CIFS share with episodic replication
- CIFS share with episodic replication and encryption, Creating a CIFS share with episodic replication and encryption
- CIFS share without replication and encryption, Creating a CIFS share without replication and encryption
- full-sized rollback, Creating a full-sized rollback
- iSCSI target, Creating an iSCSI target and provisioning LUNs
- local CIFS group, Configuring a local group
- local CIFS user, Creating a local CIFS user
- mirrored file systems, Creating a file system
- mirrored-stripe file systems, Creating a file system
- NFS share with continuous replication, Creating an NFS share with continuous replication
- NFS share with encryption, Creating an NFS share with encryption
- NFS share with episodic replication, Creating an NFS share with episodic replication
- NFS share with episodic replication and encryption, Creating an NFS share with episodic replication and encryption
- NFS share without replication and encryption, Creating an NFS share without replication and encryption
- shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
- simple file systems, Creating a file system
- snapshot schedules, Configuring snapshot schedules
- snapshots, Creating snapshots
- space-optimized instant rollbacks, Creating a space-optimized rollback
- storage pools, Configuring storage pools, Adding disks to a storage pool
- striped file systems, Creating a file system
- striped-mirror file systems, Creating a file system
- Creating a file system
- considerations, Considerations for creating a file system
- creating and maintaining file systems
- creating file systems
- best practices, Best practices for creating file systems
- ctdb clustering mode
- about, About CIFS clustering modes
- directory-level share support, Exporting a directory as a CIFS share
- switching the clustering mode, About switching the clustering mode
- current Ethernet interfaces and states
D
- data flow
- continuous replication synchronous mode, How data flows in continuous replication synchronous mode
- Data Insight
- integrating Access Appliance, Access Appliance integration with Data Insight
- datacollect
- device logs, Gathering device logs with the DataCollect command
- decreasing
- size of a file system, Decreasing the size of a file system
- defining
- what to replicate, Defining what to replicate
- defrag, Defragmenting a file system
- defragmenting
- file systems, Defragmenting a file system
- deleting
- CIFS share, Deleting a CIFS share
- home directories, Deleting home directories and disabling creation of home directories
- home directory of given user, Deleting home directories and disabling creation of home directories
- local CIFS group, Configuring a local group
- local CIFS user, Creating a local CIFS user
- NFS options, Unexporting a directory or deleting NFS options
- route entries from routing tables of nodes in cluster, Configuring routing tables
- snapshot schedules, Managing automated snapshots
- syslog server, Configuring a syslog server
- VLAN interfaces, Configuring VLAN interfaces
- denying
- specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
- description of Access Appliance continuous replication, How Access Appliance continuous replication works
- description of Access Appliance Replication, How Access Appliance Replication works
- destroying
- a file system, Destroying a file system
- cache object of an instant rollback, Destroying a cache object of a Access Appliance instant rollback
- instant rollbacks, Destroying an instant rollback
- snapshots, Managing disk space used by snapshots
- storage pools, Configuring storage pools
- directories
- displaying exported, Displaying exported directories
- unexporting the share, Unexporting a directory or deleting NFS options
- directory-level share support
- ctdb clustering mode, Exporting a directory as a CIFS share
- disabling
- AD trusted domains, Setting Active Directory trusted domains
- creation of home directories, Deleting home directories and disabling creation of home directories
- DNS settings, Configuring DNS settings
- FastResync option, Disabling the FastResync option for a file system
- LDAP clients
- configurations, Administering the Access Appliance cluster's LDAP client
- NIS clients, Configuring the NIS-related settings
- NTLM, Setting NTLM
- quota limits used by snapshots, Managing disk space used by snapshots
- disk layout versions
- upgrading, Upgrading disk layout versions
- Disk quotas
- CIFS, About quotas for usage
- file systems, About quotas for usage
- usage, About quotas for usage
- disks
- accessing details about, Accessing disk details
- viewing information about, Viewing information about disks
- displaying
- all the IP addresses for cluster, Configuring IP addresses
- command history, Displaying the command history
- current Ethernet interfaces and states, Displaying current Ethernet interfaces and states
- DNS settings, Configuring DNS settings
- events on the console, Displaying events on the console
- exported directories, Displaying exported directories
- file system alert values, Displaying file system alert values
- file systems that can be exported, Displaying file systems and snapshots that can be exported
- home directory usage information, Displaying home directory usage information
- information for all disk devices for the nodes in a cluster, Displaying information for all disk devices associated with the nodes in a cluster
- LDAP client configurations, Administering the Access Appliance cluster's LDAP client
- LDAP configured settings, Configuring LDAP server settings
- list of syslog servers, Configuring a syslog server
- local CIFS group, Configuring a local group
- local CIFS user, Creating a local CIFS user
- NFS statistics, Displaying and resetting NFS statistics
- NIS-related settings, Configuring the NIS-related settings
- NSS configuration, Configuring NSS lookup order
- routing tables of the nodes in the cluster, Configuring routing tables
- share properties, Displaying CIFS share properties
- snapshot quotas, Managing disk space used by snapshots
- snapshot schedules, Configuring snapshot schedules
- snapshots, Displaying snapshots
- snapshots that can be exported, Displaying file systems and snapshots that can be exported
- values of the configured syslog server, Configuring a syslog server
- VLAN interfaces, Configuring VLAN interfaces
- displaying a mapping
- between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
- displaying WWN information, Displaying WWN information
- DNS
- domain names
- clearing, Configuring DNS settings
- name servers
- clearing, Configuring DNS settings
- specifying, Configuring DNS settings
- settings
- disabling, Configuring DNS settings
- displaying, Configuring DNS settings
- enabling, Configuring DNS settings
- domain
- setting, Reconfiguring the CIFS service
- setting user name, Reconfiguring the CIFS service
- domain controller
- setting, Reconfiguring the CIFS service
- domain name
- for the DNS server
- setting, Configuring DNS settings
E
- enabling
- CIFS data migration, Enabling CIFS data migration
- DNS settings, Configuring DNS settings
- FastResync for a file system, Configuring FastResync for a file system
- LDAP client configurations, Administering the Access Appliance cluster's LDAP client
- NIS settings, Configuring the NIS-related settings
- NTLM, Setting NTLM
- quota limits used by snapshots, Managing disk space used by snapshots
- enabling, disabling, and displaying
- file system quotas, Enabling, disabling, and displaying the status of file system quotas
- encryption
- Enterprise Vault store
- configuring CIFS share as secondary storage, Configuring a CIFS share as secondary storage for an Enterprise Vault store
- episodic replication destination file system behavior
- episodic replication destinations
- episodic replication job
- displaying status, Displaying episodic replication job information and status
- enabling compression, Replicating compressed data
- managing, Managing an episodic replication job
- show job, Displaying episodic replication job information and status
- episodic replication jobs
- maximum number of parallel, About the maximum number of parallel episodic replication jobs
- episodic replication unit
- setting up files to exclude, Setting up files to exclude from an episodic replication unit
- Ethernet interfaces
- bonding, Bonding Ethernet interfaces
- event notifications
- configuring, Monitoring alerts , About event notifications
- events
- displaying on the console, Displaying events on the console
- monitoring, Monitoring events
- excluding directories and files
- export options
- exporting
- an NFS share, Exporting an NFS share
- CIFS snapshot, Exporting a CIFS snapshot
- directory as a CIFS share, Exporting a directory as a CIFS share
- NFS snapshot, Exporting an NFS snapshot
- same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
- exporting for Kerberos authentication
F
- failover and failback
- about, Continuous replication failover and failback
- about episodic replication, Episodic replication job failover and failback
- FastResync
- about, About FastResync
- file system
- converting into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
- file system alert values
- displaying, Displaying file system alert values
- file system alerts
- removing, Removing file system alerts
- setting, Setting file system alerts
- file system quotas
- enabling, disabling, and displaying, Enabling, disabling, and displaying the status of file system quotas
- setting and displaying, Setting and displaying file system quotas
- file systems
- adding a mirror to, Adding or removing a mirror from a file system
- bringing online or offline, Bringing the file system online or offline
- checking and repairing, Checking and repairing a file system
- checking for stale mirrors, Checking and resynchronizing stale mirrors
- creating, Creating a file system
- decreasing the size of, Decreasing the size of a file system
- defragmenting, Defragmenting a file system
- destroying, Destroying a file system
- disabling FastResync option, Disabling the FastResync option for a file system
- enabling FastResync, Configuring FastResync for a file system
- increasing the size of, Increasing the size of a file system
- listing with associated information, Listing all file systems and associated information
- removing a mirror from, Adding or removing a mirror from a file system
- restoring from an instant rollback, Restoring a file system from an instant rollback
- that can be exported
- types of layout, Choosing a file system layout type
- filter
- firewall setting, Changing the firewall settings
- forcefully
- importing new LUNs for new or existing pools, Importing new LUNs forcefully for new or existing pools
- fsck
- about, About fsck operation
G
- group membership
- managing, Creating a local CIFS user
H
- hiding
- system files when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
- history command
- home directories
- setting up, Setting up home directories
- home directory file systems
- home directory of given user
- home directory usage information
- displaying, Displaying home directory usage information
- hostname or IP address
- setting for LDAP server, Configuring LDAP server settings
- how to use
- Command-Line Interface (CLI), Getting help using the Access CLISH
I
- ID mapping for NFS version 4
- configuring Access Appliance, Configuring Access Appliance for ID mapping for NFS version 4
- importing
- new LUNs forcefully for new or existing pools, Importing new LUNs forcefully for new or existing pools
- increasing
- size of a file system, Increasing the size of a file system
- initiating host discovery of LUNs, Initiating host discovery of LUNs
- instant rollbacks
- about, About instant rollbacks
- bringing online, Bringing an instant rollback online
- creating a shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
- creating full-sized, Creating a full-sized rollback
- creating space-optimized, Creating a space-optimized rollback
- destroying, Destroying an instant rollback
- listing, Listing Access Appliance instant rollbacks
- refreshing from a file system, Refreshing an instant rollback from a file system
- restoring a file system from, Restoring a file system from an instant rollback
- taking offline, Taking an instant rollback offline
- integrating Access Appliance with Data Insight, Access Appliance integration with Data Insight
- IP addresses
- adding to a cluster, Configuring IP addresses
- displaying for the cluster, Configuring IP addresses
- modifying, Configuring IP addresses
- removing from the cluster, Configuring IP addresses
- IP addresses for the Ethernet interfaces
- about, About Ethernet interfaces
- IP routing
- configuring, Configuring routing tables
- iSCSI target
- iSCSI target service
- managing, Managing the iSCSI target service
- iSCSI targets
- managing, Managing the iSCSI targets
J
- job resynchronization
- configuring, Synchronizing an episodic replication job
- joining
- Access Appliance to Active Directory (AD), Joining Access Appliance to Active Directory (AD)
K
- Kerberos authentication
- authenticating NFS clients, Setting up Kerberos authentication for NFS clients
- Kerberos realm
- adding and configuring Access Appliance for, Adding and configuring Access Appliance to the Kerberos realm
- Kerberos share
- mounting from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
- Kernel-based
- NFS server, Using the kernel-based NFS server
L
- layouts
- types of file system, Choosing a file system layout type
- LDAP
- before configuring, About configuring LDAP settings
- LDAP client
- configuring for authentication using the CLI, Configuring the LDAP client for authentication using the CLI
- LDAP password hash algorithm
- setting password for, Configuring LDAP server settings
- LDAP server
- clearing configured settings, Configuring LDAP server settings
- disabling client configurations, Administering the Access Appliance cluster's LDAP client
- displaying client configurations, Administering the Access Appliance cluster's LDAP client
- displaying configured settings, Configuring LDAP server settings
- enabling client configurations, Administering the Access Appliance cluster's LDAP client
- setting over SSL, Configuring LDAP server settings
- setting port number, Configuring LDAP server settings
- setting the base distinguished name, Configuring LDAP server settings
- setting the bind distinguished name, Configuring LDAP server settings
- setting the hostname or IP address, Configuring LDAP server settings
- setting the root bind DN, Configuring LDAP server settings
- setting the users, groups, and netgroups base DN, Configuring LDAP server settings
- leaving
- AD domain, About leaving an AD domain
- listing
- all file systems and associated information, Listing all file systems and associated information
- cache objects, Listing cache objects
- free space for storage pools, Configuring storage pools
- instant rollbacks, Listing Access Appliance instant rollbacks
- storage pools, Configuring storage pools
- local CIFS groups
- creating, Configuring a local group
- deleting, Configuring a local group
- displaying, Configuring a local group
- local CIFS user
- creating, Creating a local CIFS user
- deleting, Creating a local CIFS user
- displaying, Creating a local CIFS user
- local CIFS user password
- changing, Creating a local CIFS user
- local user and groups
- managing, About managing local users and groups
- log files
- introduction, About appliance log files
- LUNs
- initiating host discovery, Initiating host discovery of LUNs
- managing, Managing the LUNs
- provisioning, Creating an iSCSI target and provisioning LUNs
M
- man pages
- how to access, About accessing the online man pages
- managing
- CIFS shares, About managing CIFS shares
- continuous replication, Managing continuous replication
- group membership, Creating a local CIFS user
- home directories, About managing home directories
- iSCSI target service, Managing the iSCSI target service
- iSCSI targets, Managing the iSCSI targets
- local users and groups, About managing local users and groups
- LUNs, Managing the LUNs
- mappings with iSCSI initiators, Managing the mappings with iSCSI initiators
- users, Managing the users
- managing NFS shares
- using netgroups, About managing NFS shares using netgroups
- mapping
- of UNIX users from LDAP to Windows users, Automatically mapping UNIX users from LDAP to Windows users
- mappings with iSCSI initiators
- mapuser commands
- about, About the mapuser commands
- maximum IOPS
- setting, Setting the maximum IOPS
- maximum number
- parallel episodic replication jobs, About the maximum number of parallel episodic replication jobs
- migrating
- CIFS share and home directory from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
- CIFS shares and home directories, About migrating CIFS shares and home directories
- CIFS shares and home directories from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
- mirrored file systems
- creating, Creating a file system
- mirrored-stripe file systems
- creating, Creating a file system
- modifying
- an IP address, Configuring IP addresses
- CIFS share, Modifying a CIFS share
- snapshot schedules, Configuring snapshot schedules
- monitoring
- activity, Monitoring command activity
- events, Monitoring events
- more command
- using, Using the more command
- mounting
- NFS share from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
- mounting snapshots, Bringing snapshots online or taking snapshots offline
- Multi-protocol support for NFS with S3
- limitations, S3 with NFS use case
N
- naming requirement for new users, About the naming requirements for adding new users
- navigating CLISH
- Access, Navigating the Access CLISH
- NFS client
- configuring for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
- NFS clients
- authenticating, About authenticating NFS clients
- NFS file sharing
- about, About NFS file sharing
- NFS options
- NFS server
- about, About using the NFS server with Access Appliance
- checking on the status, Accessing the NFS server
- kernel-based, Using the kernel-based NFS server
- starting, Accessing the NFS server
- stopping, Accessing the NFS server
- NFS share
- exporting, Exporting an NFS share
- exporting for Kerberos authentication, Exporting an NFS share for Kerberos authentication
- NFS share with continuous replication
- NFS share with encryption
- creating, Creating an NFS share with encryption
- NFS share with episodic replication
- NFS share with episodic replication and encryption
- NFS share without replication and encryption
- NFS shares
- managing using netgroups, About managing NFS shares using netgroups
- NFS snapshot
- exporting, Exporting an NFS snapshot
- NFS statistics
- displaying, Displaying and resetting NFS statistics
- resetting, Displaying and resetting NFS statistics
- NIC devices
- configuring, Configuring NIC devices
- NIS
- clients
- disabling, Configuring the NIS-related settings
- enabling, Configuring the NIS-related settings
- domain name
- setting on all the nodes of cluster, Configuring the NIS-related settings
- related settings
- displaying, Configuring the NIS-related settings
- server name
- setting on all the nodes of cluster, Configuring the NIS-related settings
- node
- in a cluster
- displaying information for all disk devices, Displaying information for all disk devices associated with the nodes in a cluster
- NSS
- displaying configuration, Configuring NSS lookup order
- lookup order
- configuring, Configuring NSS lookup order
- NTLM
- disabling, Setting NTLM
- enabling, Setting NTLM
O
- object server, About the Object Store server
- object server group-specific parameters
- Object Store server
- configuring, Configuring the Object Store server
- objectstore buckets, File systems used for objectstore buckets
- offline
- taking an instant rollback offline, Taking an instant rollback offline
- online
- bringing an instant rollback online, Bringing an instant rollback online
P
- planned failback
- process overview, Overview of the planned failback process , Overview of the planned failback process
- planned failover
- process overview, Overview of the planned failover process , Overview of the planned failover process
- preserving
- snapshot schedules, Managing automated snapshots
- Private network
- provisioning
- Public network
Q
- quota commands
- setting and displaying file system quotas, Setting and displaying file system quotas
- quota limits
- enabling or disabling snapshot, Managing disk space used by snapshots
- quotas
- CIFS home directories, About quotas for CIFS home directories
- setting user quotas for users of specified groups, Setting user quotas for users of specified groups
R
- refreshing
- instant rollbacks from a file system, Refreshing an instant rollback from a file system
- removing
- a column from a file system, Adding or removing a column from a file system
- IP address from the cluster, Configuring IP addresses
- mirror from a file system, Adding or removing a mirror from a file system
- snapshot schedules, Managing automated snapshots
- removing a mapping
- between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
- renaming
- storage pools, Configuring storage pools
- replicating file systems
- setting up, Setting up the file systems to replicate
- resetting
- NFS statistics, Displaying and resetting NFS statistics
- restoring
- a file system from an instant rollback, Restoring a file system from an instant rollback
- snapshots, Restoring a snapshot
- resynchronizing
- stale mirrors on file systems, Checking and resynchronizing stale mirrors
- route entries
- deleting from routing tables, Configuring routing tables
- routing tables
- of the nodes in the cluster
- displaying, Configuring routing tables
S
- scheduling
- episodic replication, Scheduling the episodic replication
- security
- standalone mode, Configuring CIFS server status for standalone mode
- security settings
- AD domain mode, Changing domain settings for AD domain mode
- changing, Changing security settings
- setting
- aio_fork option, Setting the CIFS aio_fork option
- base distinguished name for the LDAP server, Configuring LDAP server settings
- bind distinguished name for LDAP server, Configuring LDAP server settings
- domain, Reconfiguring the CIFS service
- domain controller, Reconfiguring the CIFS service
- domain name for the DNS server, Configuring DNS settings
- domain user name, Reconfiguring the CIFS service
- file system alerts, Setting file system alerts
- filter of the syslog server, Configuring a syslog server
- home directory file systems, Setting the home directory file systems
- IDMAP backend to ad for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
- IDMAP backend to hash for accessing CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
- IDMAP backend to ldap for trusted domain access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
- IDMAP backend to rid for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
- LDAP server hostname or IP address, Configuring LDAP server settings
- LDAP server over SSL, Configuring LDAP server settings
- LDAP server port number, Configuring LDAP server settings
- LDAP users, groups, and netgroups base DN, Configuring LDAP server settings
- maximum IOPS, Setting the maximum IOPS
- NIS domain name on all the nodes of cluster, Configuring the NIS-related settings
- prior to configuring LDAP, About configuring LDAP settings
- retention, Setting retention in files
- root bind DN for the LDAP server, Configuring LDAP server settings
- severity of the syslog server, Configuring a syslog server
- the NIS server name on all the nodes of cluster, Configuring the NIS-related settings
- trusted domains, About setting trusted domains
- trusted domains for the Active Directory, Setting Active Directory trusted domains
- user quotas for users of specified groups, Setting user quotas for users of specified groups
- WORM over NFS, Setting WORM over NFS
- WORM-retention over CIFS, Manually setting WORM-retention on a file over CIFS
- setting up
- home directories, Setting up home directories
- object server group-specific parameters, Setting up the Object Access server group-specific parameters
- replicating file systems, Setting up the file systems to replicate
- setting up an episodic replication unit
- to exclude directories and files, Setting up files to exclude from an episodic replication unit
- severity levels
- shadow copy
- making a CIFS share aware, Making a CIFS share shadow copy aware
- share directories
- CIFS and NFS protocols, Sharing directories using CIFS and NFS protocols
- share properties
- displaying, Displaying CIFS share properties
- shared cache object
- shares
- about, About file sharing protocols
- showing
- snapshot schedules, Managing automated snapshots
- snapshot schedules
- about, About snapshot schedules
- creating, Configuring snapshot schedules
- deleting, Managing automated snapshots
- displaying, Configuring snapshot schedules
- modifying, Configuring snapshot schedules
- preserving, Managing automated snapshots
- removing, Managing automated snapshots
- showing, Managing automated snapshots
- snapshots
- about, About snapshots
- creating, Creating snapshots
- destroying, Managing disk space used by snapshots
- displaying, Displaying snapshots
- displaying quotas, Managing disk space used by snapshots
- enabling or disabling quota limits, Managing disk space used by snapshots
- mounting, Bringing snapshots online or taking snapshots offline
- restoring, Restoring a snapshot
- that can be exported
- unmounting, Bringing snapshots online or taking snapshots offline
- SNMP notifications
- about, About SNMP notifications
- source and destination clusters
- specifying
- DNS name servers, Configuring DNS settings
- SSL
- setting the LDAP server for, Configuring LDAP server settings
- standalone mode
- CIFS server status, Configuring CIFS server status for standalone mode
- CIFS service, Configuring CIFS server status for standalone mode
- security, Configuring CIFS server status for standalone mode
- starting
- Access Appliance continuous replication, Starting Access Appliance continuous replication
- Access Appliance episodic replication, Starting Access Appliance episodic replication
- CIFS server, Reconfiguring the CIFS service
- NFS server, Accessing the NFS server
- stopping
- NFS server, Accessing the NFS server
- storage pools
- creating, Configuring storage pools, Adding disks to a storage pool
- destroying, Configuring storage pools
- listing, Configuring storage pools
- listing free space, Configuring storage pools
- renaming, Configuring storage pools
- storage provisioning and management
- storing
- account information, About storing account information
- user and group accounts in LDAP, Storing user and group accounts
- user and group accounts locally, Storing user and group accounts
- striped file systems
- creating, Creating a file system
- striped-mirror file systems
- creating, Creating a file system
- striping file systems
- about, About striping file systems
- switching
- ctdb clustering mode, About switching the clustering mode
- syslog server
- adding, Configuring a syslog server
- deleting, Configuring a syslog server
- displaying the list of, Configuring a syslog server
- displaying the values of, Configuring a syslog server
- setting the filter of, Configuring a syslog server
- setting the severity of, Configuring a syslog server
- system files
- hiding when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
T
- troubleshooting
- about, About troubleshooting
- trusted domains
- allowing access to CIFS when setting an IDMAP backend to ad, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
- allowing access to CIFS when setting an IDMAP backend to hash, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
- allowing access to CIFS when setting an IDMAP backend to ldap, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
- allowing access to CIFS when setting an IDMAP backend to rid, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
- specifying which are allowed access to the CIFS server, Specifying trusted domains that are allowed access to the CIFS server
U
- unexporting
- share of exported directory, Unexporting a directory or deleting NFS options
- UNIX users from LDAP to Windows users
- automatic mapping of, Automatically mapping UNIX users from LDAP to Windows users
- unmounting snapshots, Bringing snapshots online or taking snapshots offline
- unplanned failback
- process overview, Overview of the unplanned failback process , Overview of the unplanned failback process
- unplanned failover
- process overview, Overview of the unplanned failover process , Overview of the unplanned failover process
- upgrading
- disk layout versions, Upgrading disk layout versions
- Use case
- configuring the Object Store server, Use cases for configuring the Object Store server
- user and group accounts in LDAP
- storing, Storing user and group accounts
- user and group accounts locally
- storing, Storing user and group accounts
- user names
- mapping for CIFS/NFS sharing, About mapping user names for CIFS/NFS sharing
- users
- managing, Managing the users
- using
- AD interface, Removing the AD interface
- history command, Displaying the command history
- more command, Using the more command
- multi-domain controller support in CIFS, Using multi-domain controller support in CIFS
- Using NFS Server, About using the NFS server with Access Appliance
V
- verifying
- Access Appliance has joined Active Directory (AD), Verifying that Access Appliance has joined Active Directory (AD) successfully
- viewing
- information about disks, Viewing information about disks
- viewing information
- about S3, Viewing information about S3
- VLAN
- adding interfaces, Configuring VLAN interfaces
- configuring interfaces, Configuring VLAN interfaces
- deleting interfaces, Configuring VLAN interfaces
- displaying interfaces, Configuring VLAN interfaces
W
- what to replicate
- defining, Defining what to replicate
- Windows Active Directory
- configuring as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
- workflow
- object server, About the Object Store server
- WORM over NFS
- setting, Setting WORM over NFS
- WORM-retention over CIFS
- WWN information
- displaying, Displaying WWN information