Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Getting help using the Access CLISH
Access Appliance provides the following features to help you when you enter commands on the command line:
Auto-completion
The following keys both perform auto-completion for the current command line. If the command prefix is not unique, then the bell rings and a subsequent repeat of the key displays possible completions.
[enter] - Auto-completes, syntax-checks then executes a command. If there is a syntax error, then the offending part of the command line is highlighted and explained.
[space] - Auto-completes, or if the command is already resolved inserts a space.
Command-line help
Type a question mark at the command line to display context-sensitive Help. This is either a list of possible command completions with summaries, or the full syntax of the current command. A subsequent repeat of this key, when a command has been resolved, displays a detailed reference.
Keyboard shortcut keys
Move the cursor within the command line or delete text from the command line.
Command-line manual pages
Type man and the name of the command.
Error reporting
The ^ (caret) indicates a syntax error occurred in the preceding command statement. The location of a caret in the command statement indicates the location of the syntax error.
Escape sequences
Substitute the command line for a previous entry.
Table: Conventions used in the Access online command-line man pages
Symbol | Description |
---|---|
| (pipe) | Indicates you must choose one of elements on either side of the pipe. |
[ ] (brackets) | Indicates that the element inside the brackets is optional. |
{ } (braces) | Indicates that the element inside the braces is part of a group. |
< > | Indicates a variable for which you need to supply a value. |
Table: Access command-line keyboard shortcut keys for deletions
Shortcut key | Description |
---|---|
[CTRL-C] | Delete the whole line. |
[CTRL-U] | Delete up to the start of the line from the current position. |
[CTRL-W] | Delete one word to the left from the current position. |
[ALT-D] | Delete one word to the right from the current position. |
[CTRL-D] | Delete the character to the right on the insertion point. |
[CTRL-K] | Delete all the characters to the right of the insertion point. |
[CTRL-T] | Swap the last two characters. |
[backspace] | Delete the character to the left of the insertion point. |
[Del] | Delete one character from the current position. |
Table: Escape sequences
Escape sequence | Description |
---|---|
!! | Substitute the last command line. |
!N | Substitute the Nth command line (you can find the Nth command from using the history command). |
!-N | Substitute the command line entered N lines before (the number is relative to the command you are entering). |
Note:
Most of the Access Appliance commands are executed asynchronously, so control may be returned to the command prompt before the operation is fully completed. For critical commands, you should verify the status of the command before proceeding. For example, after starting a CIFS service, verify that the service is online.