Veritas Access Appliance Administrator's Guide

Last Published:
Product(s): Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
  1. Section I. Introducing Access Appliance
    1. Introducing Access Appliance
      1.  
        About Access Appliance
      2.  
        About the Access Appliance Dashboard
      3. Getting started with the Access CLISH
        1.  
          Accessing the Access CLISH
        2.  
          Navigating the Access CLISH
        3.  
          Getting help using the Access CLISH
        4.  
          Displaying the command history
        5.  
          Using the more command
      4.  
        Getting started with Access Appliance APIs
  2. Section II. Configuring Access Appliance
    1. Managing users
      1.  
        About user management
      2.  
        About the naming requirements for adding new users
      3.  
        About the naming requirements when assigning roles to domain users
      4.  
        Adding and removing user roles using GUI
      5.  
        Performing user management using CLISH
    2. Configuring the network
      1.  
        About configuring the Access Appliance network
      2.  
        About bonding Ethernet interfaces
      3.  
        Bonding Ethernet interfaces
      4.  
        Configuring DNS settings
      5.  
        About Ethernet interfaces
      6.  
        Displaying current Ethernet interfaces and states
      7.  
        Configuring IP addresses
      8.  
        Configuring VLAN interfaces
      9.  
        Configuring NIC devices
      10.  
        About configuring routing tables
      11.  
        Configuring routing tables
      12.  
        Changing the firewall settings
      13.  
        Configuring Access Appliance in IPv4 and IPv6 mixed mode
      14.  
        Support for multiple data subnets
    3. Configuring authentication services
      1.  
        About configuring LDAP settings
      2.  
        Configuring LDAP server settings
      3.  
        Administering the Access Appliance cluster's LDAP client
      4.  
        About Active Directory (AD)
      5.  
        Configuring AD server settings
      6.  
        Configuring entries for Access Appliance DNS for authenticating to Active Directory (AD)
      7.  
        Configuring AD/LDAP using the GUI
      8.  
        Configuring the NIS-related settings
      9.  
        Configuring NSS lookup order
      10.  
        Sign-in options for the Access Appliance UI
      11. Configuring user authentication using digital certificates or smart cards
        1.  
          Adding CA certificates for smart card authentication
        2.  
          Deleting CA certificates
  3. Section III. Managing Access Appliance storage
    1. Configuring storage
      1.  
        About storage provisioning and management
      2.  
        About configuring disks
      3.  
        About configuring storage pools
      4.  
        Configuring storage pools
      5.  
        About quotas for usage
      6.  
        Enabling, disabling, and displaying the status of file system quotas
      7.  
        Setting and displaying file system quotas
      8.  
        Setting user quotas for users of specified groups
      9.  
        About quotas for CIFS home directories
      10.  
        Workflow for configuring and managing storage using the Access Appliance CLI
      11.  
        Displaying information for all disk devices associated with the nodes in a cluster
      12.  
        Displaying WWN information
      13.  
        Importing new LUNs forcefully for new or existing pools
      14.  
        Initiating host discovery of LUNs
    2. Managing disks
      1.  
        Adding disks to a storage pool
      2.  
        Removing disks from a storage pool
      3.  
        Viewing information about disks
      4.  
        Accessing disk details
      5.  
        Discovering disks
      6.  
        Formatting a disk
    3. Access Appliance as an iSCSI target
      1.  
        About Access Appliance as an iSCSI target
      2.  
        Managing the iSCSI target service
      3.  
        Managing the iSCSI targets
      4.  
        Managing the LUNs
      5.  
        Managing the mappings with iSCSI initiators
      6.  
        Managing the users
      7.  
        Creating an iSCSI target and provisioning LUNs
  4. Section IV. Managing Access Appliance file access services
    1. Configuring the NFS server
      1.  
        About using the NFS server with Access Appliance
      2.  
        Using the kernel-based NFS server
      3.  
        Accessing the NFS server
      4.  
        Displaying and resetting NFS statistics
      5.  
        Configuring Access Appliance for ID mapping for NFS version 4
      6.  
        Configuring the NFS client for ID mapping for NFS version 4
      7.  
        About authenticating NFS clients
      8. Setting up Kerberos authentication for NFS clients
        1.  
          Adding and configuring Access Appliance to the Kerberos realm
    2. Using Access Appliance as a CIFS server
      1.  
        About configuring Access Appliance for CIFS
      2.  
        About configuring CIFS for standalone mode
      3.  
        Configuring CIFS server status for standalone mode
      4.  
        Changing security settings
      5. About configuring CIFS for Active Directory (AD) domain mode
        1.  
          Joining Access Appliance to Active Directory (AD)
        2.  
          Verifying that Access Appliance has joined Active Directory (AD) successfully
        3.  
          Using multi-domain controller support in CIFS
        4.  
          About leaving an AD domain
        5.  
          Changing domain settings for AD domain mode
        6.  
          Removing the AD interface
      6.  
        Setting NTLM
      7. About setting trusted domains
        1.  
          Specifying trusted domains that are allowed access to the CIFS server
        2.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
        3.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
        4.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
        5.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
        6.  
          About configuring Windows Active Directory as an IDMAP backend for CIFS
        7.  
          Configuring the Active Directory schema with CIFS-schema extensions
        8.  
          Configuring the LDAP client for authentication using the CLI
        9.  
          Setting Active Directory trusted domains
      8.  
        About storing account information
      9.  
        Storing user and group accounts
      10.  
        Reconfiguring the CIFS service
      11.  
        About mapping user names for CIFS/NFS sharing
      12.  
        About the mapuser commands
      13.  
        Adding, removing, or displaying the mapping between CIFS and NFS users
      14.  
        Automatically mapping UNIX users from LDAP to Windows users
      15. About managing home directories
        1.  
          Setting the home directory file systems
        2.  
          Setting up home directories
        3.  
          Displaying home directory usage information
        4.  
          Deleting home directories and disabling creation of home directories
      16. About CIFS clustering modes
        1.  
          About switching the clustering mode
      17. About migrating CIFS shares and home directories
        1.  
          Migrating CIFS shares and home directories from normal to ctdb clustering mode
        2.  
          Migrating CIFS shares and home directories from ctdb to normal clustering mode
      18.  
        Setting the CIFS aio_fork option
      19. About managing local users and groups
        1.  
          Creating a local CIFS user
        2.  
          Configuring a local group
      20.  
        Enabling CIFS data migration
    3. Using Access Appliance as an Object Store server
      1.  
        About the Object Store server
      2.  
        Use cases for configuring the Object Store server
      3.  
        Configuring the Object Store server
      4.  
        About buckets and objects
      5.  
        File systems used for objectstore buckets
      6.  
        Enabling WORM on buckets
      7.  
        S3 with NFS use case
      8.  
        S3 with NSP use case
      9. Configuring the S3 server using GUI
        1.  
          Setting Object Access server default parameters
        2.  
          Setting up the Object Access server group-specific parameters
        3.  
          Viewing information about S3
        4.  
          Provisioning the S3 bucket using GUI
  5. Section V. Managing Access Appliance security
    1. Managing security
      1.  
        Security overview
    2. Setting up FIPS mode
      1.  
        FIPS 140-2 conformance for Access Appliance
      2.  
        Viewing FIPS status for Access Appliance
      3.  
        Enabling FIPS for Access Appliance
      4.  
        To enable FIPS using the command-line interface
    3. Configuring STIG
      1.  
        STIG overview for Access Appliance
      2.  
        Enabling OS STIG hardening for Access Appliance
      3.  
        Viewing STIG status of an Access Appliance
      4.  
        Enabling STIG using the command-line interface
    4. Setting the banner
      1.  
        Managing the login banner using the UI
      2.  
        Managing the banner from the command-line interface
    5. Setting the password policy
      1.  
        Managing the password policy using the UI
      2.  
        Managing the password policy from the command-line interface
    6. Immutability in Access Appliance
      1.  
        Support for immutability in Access Appliance
      2.  
        About lockdown modes
      3.  
        Selecting or changing the lockdown mode
      4.  
        Accessing the root shell in lockdown mode
      5.  
        Configuring immutability using GUI
  6. Section VI. Monitoring and troubleshooting
    1. Configuring event notifications and audit logs
      1.  
        About troubleshooting
      2.  
        Monitoring command activity
      3.  
        Monitoring alerts
      4. About alert management
        1.  
          Viewing information about alert management
        2.  
          Managing alerts
      5.  
        Monitoring events
      6.  
        Viewing reports
      7.  
        Viewing cluster storage usage
      8.  
        Viewing file system usage
      9.  
        About event notifications
      10.  
        About severity levels and filters
      11.  
        About SNMP notifications
      12.  
        Configuring a syslog server
      13.  
        Displaying events on the console
    2. Appliance log files
      1.  
        About appliance log files
      2. Gathering device logs with the DataCollect command
        1.  
          Collecting default and additional diagnostic logs
      3.  
        Downloading logs using the Log Transfer Console
      4.  
        Forwarding logs to an external server
  7. Section VII. Provisioning and managing Access Appliance file systems
    1. Creating and maintaining file systems
      1.  
        About creating and maintaining file systems
      2.  
        About encryption at rest
      3. Considerations for creating a file system
        1.  
          Best practices for creating file systems
        2.  
          Choosing a file system layout type
        3.  
          Determining the initial extent size for a file system
        4.  
          About striping file systems
        5.  
          About FastResync
        6.  
          About fsck operation
        7.  
          Enabling WORM on a file system
        8.  
          Setting retention in files
        9.  
          Setting WORM over NFS
        10.  
          Manually setting WORM-retention on a file over CIFS
        11. About managing application I/O workloads using maximum IOPS settings
          1.  
            Setting the maximum IOPS
      4.  
        Creating a file system
      5.  
        Bringing the file system online or offline
      6.  
        Listing all file systems and associated information
      7. Modifying a file system
        1.  
          Adding or removing a mirror from a file system
        2.  
          Adding or removing a column from a file system
        3.  
          Increasing the size of a file system
        4.  
          Decreasing the size of a file system
      8. Managing a file system
        1.  
          Defragmenting a file system
        2.  
          Checking and repairing a file system
        3.  
          Configuring FastResync for a file system
        4.  
          Disabling the FastResync option for a file system
        5.  
          Checking and resynchronizing stale mirrors
        6.  
          Setting file system alerts
        7.  
          Displaying file system alert values
        8.  
          Removing file system alerts
      9.  
        Destroying a file system
      10.  
        Upgrading disk layout versions
  8. Section VIII. Provisioning and managing Access Appliance shares
    1. Creating shares for applications
      1.  
        About file sharing protocols
      2.  
        About concurrent access
      3.  
        Sharing directories using CIFS and NFS protocols
      4.  
        Sharing a file system as a CIFS home directory
      5.  
        About concurrent access with NFS and S3
    2. Creating and maintaining NFS shares
      1.  
        About NFS file sharing
      2. About the NFS shares
        1.  
          Creating an NFS share with continuous replication
        2.  
          Creating an NFS share with episodic replication
        3.  
          Creating an NFS share with encryption
        4.  
          Creating an NFS share with episodic replication and encryption
        5.  
          Creating an NFS share without replication and encryption
      3.  
        Displaying file systems and snapshots that can be exported
      4.  
        Exporting an NFS share
      5.  
        Displaying exported directories
      6.  
        About managing NFS shares using netgroups
      7.  
        Unexporting a directory or deleting NFS options
      8.  
        Exporting an NFS share for Kerberos authentication
      9.  
        Mounting an NFS share with Kerberos security from the NFS client
      10.  
        Exporting an NFS snapshot
    3. Creating and maintaining CIFS shares
      1.  
        About managing CIFS shares
      2. About the CIFS shares
        1.  
          Creating a CIFS share with continuous replication
        2.  
          Creating a CIFS share with episodic replication
        3.  
          Creating a CIFS share with encryption
        4.  
          Creating a CIFS share with episodic replication and encryption
        5.  
          Creating a CIFS share without replication and encryption
      3.  
        Exporting a directory as a CIFS share
      4.  
        Configuring a CIFS share as secondary storage for an Enterprise Vault store
      5.  
        Exporting the same file system/directory as a different CIFS share
      6.  
        About the CIFS export options
      7.  
        Setting share properties
      8.  
        Displaying CIFS share properties
      9.  
        Hiding system files when adding a CIFS normal share
      10.  
        Allowing specified users and groups access to the CIFS share
      11.  
        Denying specified users and groups access to the CIFS share
      12.  
        Exporting a CIFS snapshot
      13.  
        Deleting a CIFS share
      14.  
        Modifying a CIFS share
      15.  
        Making a CIFS share shadow copy aware
      16. About managing CIFS shares for Enterprise Vault
        1.  
          Creating a CIFS share for Enterprise Vault with replication
        2.  
          Creating a CIFS share for Enterprise Vault without replication
    4. Integrating Access Appliance with Data Insight
      1.  
        Access Appliance integration with Data Insight
  9. Section IX. Managing Access Appliance storage services
    1. Configuring episodic replication
      1.  
        About Access Appliance episodic replication
      2.  
        How Access Appliance Replication works
      3.  
        Starting Access Appliance episodic replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file systems to replicate
      6.  
        Setting up files to exclude from an episodic replication unit
      7.  
        Scheduling the episodic replication
      8.  
        Defining what to replicate
      9.  
        About the maximum number of parallel episodic replication jobs
      10.  
        Managing an episodic replication job
      11.  
        Replicating compressed data
      12.  
        Displaying episodic replication job information and status
      13.  
        Synchronizing an episodic replication job
      14.  
        Behavior of the file systems on the episodic replication destination target
      15.  
        Accessing file systems configured as episodic replication destinations
      16. Episodic replication job failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
    2. Configuring continuous replication
      1.  
        About Access Appliance continuous replication
      2. How Access Appliance continuous replication works
        1.  
          How data flows in continuous replication synchronous mode
        2.  
          How data flows in continuous replication asynchronous mode
      3.  
        Starting Access Appliance continuous replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file system to replicate
      6.  
        Managing continuous replication
      7.  
        Displaying continuous replication information and status
      8.  
        Unconfiguring continuous replication
      9.  
        Preserving the file system on the destination cluster
      10. Continuous replication failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
      11.  
        Addition of multiple file systems to a Replicated Volume Group
    3. Using snapshots
      1.  
        About snapshots
      2.  
        Enabling WORM on storage snapshots
      3.  
        Creating snapshots
      4.  
        Displaying snapshots
      5.  
        Managing disk space used by snapshots
      6.  
        Bringing snapshots online or taking snapshots offline
      7.  
        Restoring a snapshot
      8.  
        About snapshot schedules
      9.  
        Configuring snapshot schedules
      10.  
        Managing automated snapshots
    4. Using instant rollbacks
      1.  
        About instant rollbacks
      2.  
        Creating a space-optimized rollback
      3.  
        Creating a full-sized rollback
      4.  
        Listing Access Appliance instant rollbacks
      5.  
        Restoring a file system from an instant rollback
      6.  
        Refreshing an instant rollback from a file system
      7.  
        Bringing an instant rollback online
      8.  
        Taking an instant rollback offline
      9.  
        Destroying an instant rollback
      10.  
        Creating a shared cache object for Access Appliance instant rollbacks
      11.  
        Listing cache objects
      12.  
        Destroying a cache object of a Access Appliance instant rollback
  10. Section X. Reference
    1. Appendix A. Access Appliance documentation
      1.  
        Using the Access Appliance product documentation
      2.  
        About accessing the online man pages
  11.  
    Index

A

about
Access Appliance continuous replication, About Access Appliance continuous replication
Access Appliance episodic replication, About Access Appliance episodic replication
Active Directory (AD), About Active Directory (AD)
bonding Ethernet interfaces, About bonding Ethernet interfaces
buckets and objects, About buckets and objects
changing share properties, Setting share properties
configuring Access Appliance for CIFS, About configuring Access Appliance for CIFS
configuring CIFS for AD domain mode, About configuring CIFS for Active Directory (AD) domain mode
configuring disks, About configuring disks
configuring in IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
configuring routing tables, About configuring routing tables
configuring storage pools, About configuring storage pools
Continuous replication failover and failback, Continuous replication failover and failback
creating and maintaining file systems, About creating and maintaining file systems
episodic replication job failover and failback, Episodic replication job failover and failback
Ethernet interfaces, About Ethernet interfaces
leaving AD domain, About leaving an AD domain
managing CIFS shares, About managing CIFS shares
Multi-protocol support for NFS with S3, S3 with NFS use case
NFS file sharing, About NFS file sharing
setting trusted domains, About setting trusted domains
shares, About file sharing protocols
snapshot schedules, About snapshot schedules
snapshots, About snapshots
storage provisioning and management, About storage provisioning and management
storing account information, About storing account information
striping file systems, About striping file systems
the IP addresses for the Ethernet interfaces, About Ethernet interfaces
About
concurrent access, About concurrent access
FastResync, About FastResync
SNMP notifications, About SNMP notifications
about Access Appliance
as an iSCSI target, About Access Appliance as an iSCSI target
About Configuring
network, About configuring the Access Appliance network
about maximum IOPS, About managing application I/O workloads using maximum IOPS settings
about S3
viewing information, Viewing information about S3
Access
accessing the CLISH, Accessing the Access CLISH
Access Appliance
about, About Access Appliance
key features, About Access Appliance
product documentation, Using the Access Appliance product documentation
Access Appliance continuous replication
about, About Access Appliance continuous replication
description of feature, How Access Appliance continuous replication works
starting, Starting Access Appliance continuous replication
Access Appliance episodic replication
about, About Access Appliance episodic replication
compression, Replicating compressed data
scheduling, Scheduling the episodic replication
starting, Starting Access Appliance episodic replication
Access Appliance Replication
description of feature, How Access Appliance Replication works
Access Appliance to the Kerberos realm
adding and configuring, Adding and configuring Access Appliance to the Kerberos realm
accessing
Access Appliance product documentation, Using the Access Appliance product documentation
CLISH, Accessing the Access CLISH
disk details, Accessing disk details
episodic replication destinations, Accessing file systems configured as episodic replication destinations
man pages, About accessing the online man pages
Active Directory
setting the trusted domains for, Setting Active Directory trusted domains
Active Directory (AD)
about, About Active Directory (AD)
joining Access Appliance to, Joining Access Appliance to Active Directory (AD)
verifying Access Appliance has joined successfully, Verifying that Access Appliance has joined Active Directory (AD) successfully
activity
monitoring, Monitoring command activity
AD domain mode
changing domain settings, Changing domain settings for AD domain mode
configuring CIFS, About configuring CIFS for Active Directory (AD) domain mode
security settings, Changing domain settings for AD domain mode
AD interface
using, Removing the AD interface
AD trusted domains
disabling, Setting Active Directory trusted domains
adding
a column to a file system, Adding or removing a column from a file system
a syslog server, Configuring a syslog server
CIFS share, Setting share properties
IP address to a cluster, Configuring IP addresses
mirror to a file system, Adding or removing a mirror from a file system
VLAN interfaces, Configuring VLAN interfaces
adding a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
adding and configuring
Access Appliance to the Kerberos realm, Adding and configuring Access Appliance to the Kerberos realm
aio_fork option
setting, Setting the CIFS aio_fork option
alerts
file system removing, Removing file system alerts
allowing
specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
as an iSCSI target
about Access Appliance, About Access Appliance as an iSCSI target
Authenticate
NFS clients, About authenticating NFS clients
authenticating
NFS clients using Kerberos, Setting up Kerberos authentication for NFS clients
authentication
configuring the LDAP client using the CLI, Configuring the LDAP client for authentication using the CLI

B

best practices
creating file systems, Best practices for creating file systems
bind distinguished name
setting for LDAP server, Configuring LDAP server settings
bonding
Ethernet interfaces, Bonding Ethernet interfaces
bonding Ethernet interfaces
about, About bonding Ethernet interfaces
bringing
file system online or offline, Bringing the file system online or offline
buckets and objects
about, About buckets and objects

C

cache object
destroying for an instant rollback, Destroying a cache object of a Access Appliance instant rollback
cache objects
listing, Listing cache objects
changing
an IP address to online
on any running node, Configuring IP addresses
domain settings for AD domain mode, Changing domain settings for AD domain mode
local CIFS user password, Creating a local CIFS user
security settings, Changing security settings
share properties about, Setting share properties
checking
and repairing a file system, Checking and repairing a file system
for stale mirrors on file systems, Checking and resynchronizing stale mirrors
on the status of the NFS server, Accessing the NFS server
CIFS
allowing specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
configuring schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
denying specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
export options, About the CIFS export options
mapuser commands, About the mapuser commands
standalone mode, About configuring CIFS for standalone mode
using multi-domain controller support, Using multi-domain controller support in CIFS
CIFS aio_fork option
setting, Setting the CIFS aio_fork option
CIFS and NFS protocols
share directories, Sharing directories using CIFS and NFS protocols
CIFS clustering modes
about, About configuring Access Appliance for CIFS
CIFS data migration
enabling, Enabling CIFS data migration
CIFS home directories
quotas, About quotas for CIFS home directories
CIFS operating modes
about, About configuring Access Appliance for CIFS
CIFS server
starting, Reconfiguring the CIFS service
trusted domains that are allowed access, Specifying trusted domains that are allowed access to the CIFS server
CIFS server status
standalone mode, Configuring CIFS server status for standalone mode
CIFS service
standalone mode, Configuring CIFS server status for standalone mode
CIFS share
adding, Setting share properties
deleting, Deleting a CIFS share
exporting as a directory, Exporting a directory as a CIFS share
exporting the same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
making shadow copy aware, Making a CIFS share shadow copy aware
modifying, Modifying a CIFS share
CIFS share and home directory
migrating from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
CIFS share for Enterprise Vault with replication
creating, Creating a CIFS share for Enterprise Vault with replication
CIFS share for Enterprise Vault without replication
creating, Creating a CIFS share for Enterprise Vault without replication
CIFS share with continuous replication
creating, Creating a CIFS share with continuous replication
CIFS share with encryption
creating, Creating a CIFS share with encryption
CIFS share with episodic replication
creating, Creating a CIFS share with episodic replication
CIFS share with episodic replication and encryption
creating, Creating a CIFS share with episodic replication and encryption
CIFS share without replication and encryption
creating, Creating a CIFS share without replication and encryption
CIFS shares and home directories
migrating from ctdb clustering modes, About migrating CIFS shares and home directories
migrating from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
CIFS snapshot
exporting, Exporting a CIFS snapshot
CIFS/NFS sharing
mapping user names, About mapping user names for CIFS/NFS sharing
clearing
DNS domain names, Configuring DNS settings
DNS name servers, Configuring DNS settings
LDAP configured settings, Configuring LDAP server settings
CLI
configure and manage storage, Workflow for configuring and managing storage using the Access Appliance CLI
client configurations
displaying, Administering the Access Appliance cluster's LDAP client
LDAP server, Administering the Access Appliance cluster's LDAP client
cluster
adding an IP address to, Configuring IP addresses
changing an IP address to online for any running node, Configuring IP addresses
displaying all the IP addresses for, Configuring IP addresses
clustering modes
ctdb, About CIFS clustering modes
collect logs
datacollect, Gathering device logs with the DataCollect command
columns
adding or removing, Adding or removing a column from a file system
command history
displaying, Displaying the command history
Command-Line Interface (CLI)
getting help on how to use, Getting help using the Access CLISH
communicating
source and destination clusters, Setting up communication between the source and the destination clusters, Setting up communication between the source and the destination clusters
Concurrent access
about, About concurrent access
concurrent access
NFS and S3, About concurrent access with NFS and S3
Configure and manage storage
CLI, Workflow for configuring and managing storage using the Access Appliance CLI
configuring
Access Appliance for CIFS, About configuring Access Appliance for CIFS
AD schema with CIFS-schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
CIFS for standalone mode, About configuring CIFS for standalone mode
event notifications, Monitoring alerts , About event notifications
IP routing, Configuring routing tables
IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
job resynchronization, Synchronizing an episodic replication job
NFS client for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
NIC devices, Configuring NIC devices
NSS lookup order, Configuring NSS lookup order
VLAN interfaces, Configuring VLAN interfaces
Windows Active Directory as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
Configuring
Object Store server, Configuring the Object Store server
Configuring Access Appliance
ID mapping for NFS version 4, Configuring Access Appliance for ID mapping for NFS version 4
configuring CIFS share
secondary storage for an Enterprise Vault store, Configuring a CIFS share as secondary storage for an Enterprise Vault store
configuring disks
about, About configuring disks
configuring Ethernet interfaces
about, About Ethernet interfaces
configuring routing tables
about, About configuring routing tables
configuring storage pools
about, About configuring storage pools
Configuring the Object Store server
use case, Use cases for configuring the Object Store server
Considerations
creating a file system, Considerations for creating a file system
continuous replication
display status, Displaying continuous replication information and status
setting up file system, Setting up the file system to replicate
unconfiguring, Unconfiguring continuous replication
Continuous replication failover and failback
about, Continuous replication failover and failback
converting
existing file system into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
creating
CIFS share for Enterprise Vault with replication, Creating a CIFS share for Enterprise Vault with replication
CIFS share for Enterprise Vault without replication, Creating a CIFS share for Enterprise Vault without replication
CIFS share with continuous replication, Creating a CIFS share with continuous replication
CIFS share with encryption, Creating a CIFS share with encryption
CIFS share with episodic replication, Creating a CIFS share with episodic replication
CIFS share with episodic replication and encryption, Creating a CIFS share with episodic replication and encryption
CIFS share without replication and encryption, Creating a CIFS share without replication and encryption
full-sized rollback, Creating a full-sized rollback
iSCSI target, Creating an iSCSI target and provisioning LUNs
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
mirrored file systems, Creating a file system
mirrored-stripe file systems, Creating a file system
NFS share with continuous replication, Creating an NFS share with continuous replication
NFS share with encryption, Creating an NFS share with encryption
NFS share with episodic replication, Creating an NFS share with episodic replication
NFS share with episodic replication and encryption, Creating an NFS share with episodic replication and encryption
NFS share without replication and encryption, Creating an NFS share without replication and encryption
shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
simple file systems, Creating a file system
snapshot schedules, Configuring snapshot schedules
snapshots, Creating snapshots
space-optimized instant rollbacks, Creating a space-optimized rollback
storage pools, Configuring storage pools, Adding disks to a storage pool
striped file systems, Creating a file system
striped-mirror file systems, Creating a file system
Creating a file system
considerations, Considerations for creating a file system
creating and maintaining file systems
about, About creating and maintaining file systems
creating file systems
best practices, Best practices for creating file systems
ctdb clustering mode
about, About CIFS clustering modes
directory-level share support, Exporting a directory as a CIFS share
switching the clustering mode, About switching the clustering mode
current Ethernet interfaces and states
displaying, Displaying current Ethernet interfaces and states

D

data flow
continuous replication synchronous mode, How data flows in continuous replication synchronous mode
Data Insight
integrating Access Appliance, Access Appliance integration with Data Insight
datacollect
device logs, Gathering device logs with the DataCollect command
decreasing
size of a file system, Decreasing the size of a file system
defining
what to replicate, Defining what to replicate
defrag, Defragmenting a file system
defragmenting
file systems, Defragmenting a file system
deleting
CIFS share, Deleting a CIFS share
home directories, Deleting home directories and disabling creation of home directories
home directory of given user, Deleting home directories and disabling creation of home directories
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
NFS options, Unexporting a directory or deleting NFS options
route entries from routing tables of nodes in cluster, Configuring routing tables
snapshot schedules, Managing automated snapshots
syslog server, Configuring a syslog server
VLAN interfaces, Configuring VLAN interfaces
denying
specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
description of Access Appliance continuous replication, How Access Appliance continuous replication works
description of Access Appliance Replication, How Access Appliance Replication works
destroying
a file system, Destroying a file system
cache object of an instant rollback, Destroying a cache object of a Access Appliance instant rollback
instant rollbacks, Destroying an instant rollback
snapshots, Managing disk space used by snapshots
storage pools, Configuring storage pools
directories
displaying exported, Displaying exported directories
unexporting the share, Unexporting a directory or deleting NFS options
directory-level share support
ctdb clustering mode, Exporting a directory as a CIFS share
disabling
AD trusted domains, Setting Active Directory trusted domains
creation of home directories, Deleting home directories and disabling creation of home directories
DNS settings, Configuring DNS settings
FastResync option, Disabling the FastResync option for a file system
LDAP clients
configurations, Administering the Access Appliance cluster's LDAP client
NIS clients, Configuring the NIS-related settings
NTLM, Setting NTLM
quota limits used by snapshots, Managing disk space used by snapshots
disk layout versions
upgrading, Upgrading disk layout versions
Disk quotas
CIFS, About quotas for usage
file systems, About quotas for usage
usage, About quotas for usage
disks
accessing details about, Accessing disk details
viewing information about, Viewing information about disks
displaying
all the IP addresses for cluster, Configuring IP addresses
command history, Displaying the command history
current Ethernet interfaces and states, Displaying current Ethernet interfaces and states
DNS settings, Configuring DNS settings
events on the console, Displaying events on the console
exported directories, Displaying exported directories
file system alert values, Displaying file system alert values
file systems that can be exported, Displaying file systems and snapshots that can be exported
home directory usage information, Displaying home directory usage information
information for all disk devices for the nodes in a cluster, Displaying information for all disk devices associated with the nodes in a cluster
LDAP client configurations, Administering the Access Appliance cluster's LDAP client
LDAP configured settings, Configuring LDAP server settings
list of syslog servers, Configuring a syslog server
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
NFS statistics, Displaying and resetting NFS statistics
NIS-related settings, Configuring the NIS-related settings
NSS configuration, Configuring NSS lookup order
routing tables of the nodes in the cluster, Configuring routing tables
share properties, Displaying CIFS share properties
snapshot quotas, Managing disk space used by snapshots
snapshot schedules, Configuring snapshot schedules
snapshots, Displaying snapshots
snapshots that can be exported, Displaying file systems and snapshots that can be exported
values of the configured syslog server, Configuring a syslog server
VLAN interfaces, Configuring VLAN interfaces
displaying a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
displaying WWN information, Displaying WWN information
DNS
domain names
clearing, Configuring DNS settings
name servers
clearing, Configuring DNS settings
specifying, Configuring DNS settings
settings
disabling, Configuring DNS settings
displaying, Configuring DNS settings
enabling, Configuring DNS settings
domain
setting, Reconfiguring the CIFS service
setting user name, Reconfiguring the CIFS service
domain controller
setting, Reconfiguring the CIFS service
domain name
for the DNS server
setting, Configuring DNS settings

E

enabling
CIFS data migration, Enabling CIFS data migration
DNS settings, Configuring DNS settings
FastResync for a file system, Configuring FastResync for a file system
LDAP client configurations, Administering the Access Appliance cluster's LDAP client
NIS settings, Configuring the NIS-related settings
NTLM, Setting NTLM
quota limits used by snapshots, Managing disk space used by snapshots
enabling, disabling, and displaying
file system quotas, Enabling, disabling, and displaying the status of file system quotas
encryption
KMS, About encryption at rest
Enterprise Vault store
configuring CIFS share as secondary storage, Configuring a CIFS share as secondary storage for an Enterprise Vault store
episodic replication destination file system behavior
about, Behavior of the file systems on the episodic replication destination target
episodic replication destinations
accessing, Accessing file systems configured as episodic replication destinations
episodic replication job
displaying status, Displaying episodic replication job information and status
enabling compression, Replicating compressed data
managing, Managing an episodic replication job
show job, Displaying episodic replication job information and status
episodic replication jobs
maximum number of parallel, About the maximum number of parallel episodic replication jobs
episodic replication unit
setting up files to exclude, Setting up files to exclude from an episodic replication unit
Ethernet interfaces
bonding, Bonding Ethernet interfaces
event notifications
configuring, Monitoring alerts , About event notifications
events
displaying on the console, Displaying events on the console
monitoring, Monitoring events
excluding directories and files
setting up, Setting up files to exclude from an episodic replication unit
export options
CIFS, About the CIFS export options
exporting
an NFS share, Exporting an NFS share
CIFS snapshot, Exporting a CIFS snapshot
directory as a CIFS share, Exporting a directory as a CIFS share
NFS snapshot, Exporting an NFS snapshot
same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
exporting for Kerberos authentication
NFS share, Exporting an NFS share for Kerberos authentication

F

failover and failback
about, Continuous replication failover and failback
about episodic replication, Episodic replication job failover and failback
FastResync
about, About FastResync
file system
converting into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
file system alert values
displaying, Displaying file system alert values
file system alerts
removing, Removing file system alerts
setting, Setting file system alerts
file system quotas
enabling, disabling, and displaying, Enabling, disabling, and displaying the status of file system quotas
setting and displaying, Setting and displaying file system quotas
file systems
adding a mirror to, Adding or removing a mirror from a file system
bringing online or offline, Bringing the file system online or offline
checking and repairing, Checking and repairing a file system
checking for stale mirrors, Checking and resynchronizing stale mirrors
creating, Creating a file system
decreasing the size of, Decreasing the size of a file system
defragmenting, Defragmenting a file system
destroying, Destroying a file system
disabling FastResync option, Disabling the FastResync option for a file system
enabling FastResync, Configuring FastResync for a file system
increasing the size of, Increasing the size of a file system
listing with associated information, Listing all file systems and associated information
removing a mirror from, Adding or removing a mirror from a file system
restoring from an instant rollback, Restoring a file system from an instant rollback
that can be exported
displayed, Displaying file systems and snapshots that can be exported
types of layout, Choosing a file system layout type
filter
about, Monitoring alerts , About severity levels and filters
firewall setting, Changing the firewall settings
forcefully
importing new LUNs for new or existing pools, Importing new LUNs forcefully for new or existing pools
fsck
about, About fsck operation

G

group membership
managing, Creating a local CIFS user

H

hiding
system files when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
history command
using, Displaying the command history
home directories
setting up, Setting up home directories
home directory file systems
setting, Setting the home directory file systems
home directory of given user
deleting, Deleting home directories and disabling creation of home directories
home directory usage information
displaying, Displaying home directory usage information
hostname or IP address
setting for LDAP server, Configuring LDAP server settings
how to use
Command-Line Interface (CLI), Getting help using the Access CLISH

I

ID mapping for NFS version 4
configuring Access Appliance, Configuring Access Appliance for ID mapping for NFS version 4
importing
new LUNs forcefully for new or existing pools, Importing new LUNs forcefully for new or existing pools
increasing
size of a file system, Increasing the size of a file system
initiating host discovery of LUNs, Initiating host discovery of LUNs
instant rollbacks
about, About instant rollbacks
bringing online, Bringing an instant rollback online
creating a shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
creating full-sized, Creating a full-sized rollback
creating space-optimized, Creating a space-optimized rollback
destroying, Destroying an instant rollback
listing, Listing Access Appliance instant rollbacks
refreshing from a file system, Refreshing an instant rollback from a file system
restoring a file system from, Restoring a file system from an instant rollback
taking offline, Taking an instant rollback offline
integrating Access Appliance with Data Insight, Access Appliance integration with Data Insight
IP addresses
adding to a cluster, Configuring IP addresses
displaying for the cluster, Configuring IP addresses
modifying, Configuring IP addresses
removing from the cluster, Configuring IP addresses
IP addresses for the Ethernet interfaces
about, About Ethernet interfaces
IP routing
configuring, Configuring routing tables
iSCSI target
creating, Creating an iSCSI target and provisioning LUNs
iSCSI target service
managing, Managing the iSCSI target service
iSCSI targets
managing, Managing the iSCSI targets

J

job resynchronization
configuring, Synchronizing an episodic replication job
joining
Access Appliance to Active Directory (AD), Joining Access Appliance to Active Directory (AD)

K

Kerberos authentication
authenticating NFS clients, Setting up Kerberos authentication for NFS clients
Kerberos realm
adding and configuring Access Appliance for, Adding and configuring Access Appliance to the Kerberos realm
Kerberos share
mounting from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
Kernel-based
NFS server, Using the kernel-based NFS server

L

layouts
types of file system, Choosing a file system layout type
LDAP
before configuring, About configuring LDAP settings
LDAP client
configuring for authentication using the CLI, Configuring the LDAP client for authentication using the CLI
LDAP password hash algorithm
setting password for, Configuring LDAP server settings
LDAP server
clearing configured settings, Configuring LDAP server settings
disabling client configurations, Administering the Access Appliance cluster's LDAP client
displaying client configurations, Administering the Access Appliance cluster's LDAP client
displaying configured settings, Configuring LDAP server settings
enabling client configurations, Administering the Access Appliance cluster's LDAP client
setting over SSL, Configuring LDAP server settings
setting port number, Configuring LDAP server settings
setting the base distinguished name, Configuring LDAP server settings
setting the bind distinguished name, Configuring LDAP server settings
setting the hostname or IP address, Configuring LDAP server settings
setting the root bind DN, Configuring LDAP server settings
setting the users, groups, and netgroups base DN, Configuring LDAP server settings
leaving
AD domain, About leaving an AD domain
listing
all file systems and associated information, Listing all file systems and associated information
cache objects, Listing cache objects
free space for storage pools, Configuring storage pools
instant rollbacks, Listing Access Appliance instant rollbacks
storage pools, Configuring storage pools
local CIFS groups
creating, Configuring a local group
deleting, Configuring a local group
displaying, Configuring a local group
local CIFS user
creating, Creating a local CIFS user
deleting, Creating a local CIFS user
displaying, Creating a local CIFS user
local CIFS user password
changing, Creating a local CIFS user
local user and groups
managing, About managing local users and groups
log files
introduction, About appliance log files
LUNs
initiating host discovery, Initiating host discovery of LUNs
managing, Managing the LUNs
provisioning, Creating an iSCSI target and provisioning LUNs

M

man pages
how to access, About accessing the online man pages
managing
CIFS shares, About managing CIFS shares
continuous replication, Managing continuous replication
group membership, Creating a local CIFS user
home directories, About managing home directories
iSCSI target service, Managing the iSCSI target service
iSCSI targets, Managing the iSCSI targets
local users and groups, About managing local users and groups
LUNs, Managing the LUNs
mappings with iSCSI initiators, Managing the mappings with iSCSI initiators
users, Managing the users
managing NFS shares
using netgroups, About managing NFS shares using netgroups
mapping
of UNIX users from LDAP to Windows users, Automatically mapping UNIX users from LDAP to Windows users
mappings with iSCSI initiators
managing, Managing the mappings with iSCSI initiators
mapuser commands
about, About the mapuser commands
maximum IOPS
setting, Setting the maximum IOPS
maximum number
parallel episodic replication jobs, About the maximum number of parallel episodic replication jobs
migrating
CIFS share and home directory from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
CIFS shares and home directories, About migrating CIFS shares and home directories
CIFS shares and home directories from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
mirrored file systems
creating, Creating a file system
mirrored-stripe file systems
creating, Creating a file system
modifying
an IP address, Configuring IP addresses
CIFS share, Modifying a CIFS share
snapshot schedules, Configuring snapshot schedules
monitoring
activity, Monitoring command activity
events, Monitoring events
more command
using, Using the more command
mounting
NFS share from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
mounting snapshots, Bringing snapshots online or taking snapshots offline
Multi-protocol support for NFS with S3
limitations, S3 with NFS use case

N

naming requirement for new users, About the naming requirements for adding new users
navigating CLISH
Access, Navigating the Access CLISH
NFS client
configuring for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
NFS clients
authenticating, About authenticating NFS clients
NFS file sharing
about, About NFS file sharing
NFS options
deleting, Unexporting a directory or deleting NFS options
NFS server
about, About using the NFS server with Access Appliance
checking on the status, Accessing the NFS server
kernel-based, Using the kernel-based NFS server
starting, Accessing the NFS server
stopping, Accessing the NFS server
NFS share
exporting, Exporting an NFS share
exporting for Kerberos authentication, Exporting an NFS share for Kerberos authentication
NFS share with continuous replication
creating, Creating an NFS share with continuous replication
NFS share with encryption
creating, Creating an NFS share with encryption
NFS share with episodic replication
creating, Creating an NFS share with episodic replication
NFS share with episodic replication and encryption
creating, Creating an NFS share with episodic replication and encryption
NFS share without replication and encryption
creating, Creating an NFS share without replication and encryption
NFS shares
managing using netgroups, About managing NFS shares using netgroups
NFS snapshot
exporting, Exporting an NFS snapshot
NFS statistics
displaying, Displaying and resetting NFS statistics
resetting, Displaying and resetting NFS statistics
NIC devices
configuring, Configuring NIC devices
NIS
clients
disabling, Configuring the NIS-related settings
enabling, Configuring the NIS-related settings
domain name
setting on all the nodes of cluster, Configuring the NIS-related settings
related settings
displaying, Configuring the NIS-related settings
server name
setting on all the nodes of cluster, Configuring the NIS-related settings
node
in a cluster
displaying information for all disk devices, Displaying information for all disk devices associated with the nodes in a cluster
NSS
displaying configuration, Configuring NSS lookup order
lookup order
configuring, Configuring NSS lookup order
NTLM
disabling, Setting NTLM
enabling, Setting NTLM

O

object server, About the Object Store server
object server group-specific parameters
setting up, Setting up the Object Access server group-specific parameters
Object Store server
configuring, Configuring the Object Store server
objectstore buckets, File systems used for objectstore buckets
offline
taking an instant rollback offline, Taking an instant rollback offline
online
bringing an instant rollback online, Bringing an instant rollback online

Q

quota commands
setting and displaying file system quotas, Setting and displaying file system quotas
quota limits
enabling or disabling snapshot, Managing disk space used by snapshots
quotas
CIFS home directories, About quotas for CIFS home directories
setting user quotas for users of specified groups, Setting user quotas for users of specified groups

R

refreshing
instant rollbacks from a file system, Refreshing an instant rollback from a file system
removing
a column from a file system, Adding or removing a column from a file system
IP address from the cluster, Configuring IP addresses
mirror from a file system, Adding or removing a mirror from a file system
snapshot schedules, Managing automated snapshots
removing a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
renaming
storage pools, Configuring storage pools
replicating file systems
setting up, Setting up the file systems to replicate
resetting
NFS statistics, Displaying and resetting NFS statistics
restoring
a file system from an instant rollback, Restoring a file system from an instant rollback
snapshots, Restoring a snapshot
resynchronizing
stale mirrors on file systems, Checking and resynchronizing stale mirrors
route entries
deleting from routing tables, Configuring routing tables
routing tables
of the nodes in the cluster
displaying, Configuring routing tables

S

scheduling
episodic replication, Scheduling the episodic replication
security
standalone mode, Configuring CIFS server status for standalone mode
security settings
AD domain mode, Changing domain settings for AD domain mode
changing, Changing security settings
setting
aio_fork option, Setting the CIFS aio_fork option
base distinguished name for the LDAP server, Configuring LDAP server settings
bind distinguished name for LDAP server, Configuring LDAP server settings
domain, Reconfiguring the CIFS service
domain controller, Reconfiguring the CIFS service
domain name for the DNS server, Configuring DNS settings
domain user name, Reconfiguring the CIFS service
file system alerts, Setting file system alerts
filter of the syslog server, Configuring a syslog server
home directory file systems, Setting the home directory file systems
IDMAP backend to ad for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
IDMAP backend to hash for accessing CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
IDMAP backend to ldap for trusted domain access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
IDMAP backend to rid for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
LDAP server hostname or IP address, Configuring LDAP server settings
LDAP server over SSL, Configuring LDAP server settings
LDAP server port number, Configuring LDAP server settings
LDAP users, groups, and netgroups base DN, Configuring LDAP server settings
maximum IOPS, Setting the maximum IOPS
NIS domain name on all the nodes of cluster, Configuring the NIS-related settings
prior to configuring LDAP, About configuring LDAP settings
retention, Setting retention in files
root bind DN for the LDAP server, Configuring LDAP server settings
severity of the syslog server, Configuring a syslog server
the NIS server name on all the nodes of cluster, Configuring the NIS-related settings
trusted domains, About setting trusted domains
trusted domains for the Active Directory, Setting Active Directory trusted domains
user quotas for users of specified groups, Setting user quotas for users of specified groups
WORM over NFS, Setting WORM over NFS
WORM-retention over CIFS, Manually setting WORM-retention on a file over CIFS
setting up
home directories, Setting up home directories
object server group-specific parameters, Setting up the Object Access server group-specific parameters
replicating file systems, Setting up the file systems to replicate
setting up an episodic replication unit
to exclude directories and files, Setting up files to exclude from an episodic replication unit
severity levels
about, Monitoring alerts , About severity levels and filters
shadow copy
making a CIFS share aware, Making a CIFS share shadow copy aware
share directories
CIFS and NFS protocols, Sharing directories using CIFS and NFS protocols
share properties
displaying, Displaying CIFS share properties
shared cache object
creating, Creating a shared cache object for Access Appliance instant rollbacks
shares
about, About file sharing protocols
showing
snapshot schedules, Managing automated snapshots
snapshot schedules
about, About snapshot schedules
creating, Configuring snapshot schedules
deleting, Managing automated snapshots
displaying, Configuring snapshot schedules
modifying, Configuring snapshot schedules
preserving, Managing automated snapshots
removing, Managing automated snapshots
showing, Managing automated snapshots
snapshots
about, About snapshots
creating, Creating snapshots
destroying, Managing disk space used by snapshots
displaying, Displaying snapshots
displaying quotas, Managing disk space used by snapshots
enabling or disabling quota limits, Managing disk space used by snapshots
mounting, Bringing snapshots online or taking snapshots offline
restoring, Restoring a snapshot
that can be exported
displayed, Displaying file systems and snapshots that can be exported
unmounting, Bringing snapshots online or taking snapshots offline
SNMP notifications
about, About SNMP notifications
source and destination clusters
communicating, Setting up communication between the source and the destination clusters, Setting up communication between the source and the destination clusters
specifying
DNS name servers, Configuring DNS settings
SSL
setting the LDAP server for, Configuring LDAP server settings
standalone mode
CIFS server status, Configuring CIFS server status for standalone mode
CIFS service, Configuring CIFS server status for standalone mode
security, Configuring CIFS server status for standalone mode
starting
Access Appliance continuous replication, Starting Access Appliance continuous replication
Access Appliance episodic replication, Starting Access Appliance episodic replication
CIFS server, Reconfiguring the CIFS service
NFS server, Accessing the NFS server
stopping
NFS server, Accessing the NFS server
storage pools
creating, Configuring storage pools, Adding disks to a storage pool
destroying, Configuring storage pools
listing, Configuring storage pools
listing free space, Configuring storage pools
renaming, Configuring storage pools
storage provisioning and management
about, About storage provisioning and management
storing
account information, About storing account information
user and group accounts in LDAP, Storing user and group accounts
user and group accounts locally, Storing user and group accounts
striped file systems
creating, Creating a file system
striped-mirror file systems
creating, Creating a file system
striping file systems
about, About striping file systems
switching
ctdb clustering mode, About switching the clustering mode
syslog server
adding, Configuring a syslog server
deleting, Configuring a syslog server
displaying the list of, Configuring a syslog server
displaying the values of, Configuring a syslog server
setting the filter of, Configuring a syslog server
setting the severity of, Configuring a syslog server
system files
hiding when adding a CIFS normal share, Hiding system files when adding a CIFS normal share

T

troubleshooting
about, About troubleshooting
trusted domains
allowing access to CIFS when setting an IDMAP backend to ad, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
allowing access to CIFS when setting an IDMAP backend to hash, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
allowing access to CIFS when setting an IDMAP backend to ldap, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
allowing access to CIFS when setting an IDMAP backend to rid, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
specifying which are allowed access to the CIFS server, Specifying trusted domains that are allowed access to the CIFS server

U

unexporting
share of exported directory, Unexporting a directory or deleting NFS options
UNIX users from LDAP to Windows users
automatic mapping of, Automatically mapping UNIX users from LDAP to Windows users
unmounting snapshots, Bringing snapshots online or taking snapshots offline
unplanned failback
process overview, Overview of the unplanned failback process , Overview of the unplanned failback process
unplanned failover
process overview, Overview of the unplanned failover process , Overview of the unplanned failover process
upgrading
disk layout versions, Upgrading disk layout versions
Use case
configuring the Object Store server, Use cases for configuring the Object Store server
user and group accounts in LDAP
storing, Storing user and group accounts
user and group accounts locally
storing, Storing user and group accounts
user names
mapping for CIFS/NFS sharing, About mapping user names for CIFS/NFS sharing
users
managing, Managing the users
using
AD interface, Removing the AD interface
history command, Displaying the command history
more command, Using the more command
multi-domain controller support in CIFS, Using multi-domain controller support in CIFS
Using NFS Server, About using the NFS server with Access Appliance

V

verifying
Access Appliance has joined Active Directory (AD), Verifying that Access Appliance has joined Active Directory (AD) successfully
viewing
information about disks, Viewing information about disks
viewing information
about S3, Viewing information about S3
VLAN
adding interfaces, Configuring VLAN interfaces
configuring interfaces, Configuring VLAN interfaces
deleting interfaces, Configuring VLAN interfaces
displaying interfaces, Configuring VLAN interfaces

W

what to replicate
defining, Defining what to replicate
Windows Active Directory
configuring as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
workflow
object server, About the Object Store server
WORM over NFS
setting, Setting WORM over NFS
WORM-retention over CIFS
setting, Manually setting WORM-retention on a file over CIFS
WWN information
displaying, Displaying WWN information