Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Managing the iSCSI targets
To create an iSCSI target
- To create an iSCSI target, enter the following:
Target> iscsi target create target-name
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
To destroy an iSCSI target
- To destroy an iSCSI target, enter the following:
Target> iscsi target destroy target-name
To list all iSCSI targets
- To list all iSCSI targets, enter the following:
Target> iscsi target list
To list the specific iSCSI target
- To list the specific iSCSI target, enter the following:
Target> iscsi target list target-name
To check the status of a specific iSCSI target
- To check the status of a specific iSCSI target, enter the following:
Target> iscsi target status target-name
To add multiple portal addresses to an iSCSI target
- To add multiple portal addresses to an iSCSI target, enter the following:
Target> iscsi target portal add target-name portal-ip
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
portal-ip
The virtual IP through which the target is accessible. You can specify multiple portal addresses that you want to add.
To delete multiple portal addresses from an iSCSI target
- To delete multiple portal addresses from an iSCSI target, enter the following:
Target> iscsi target portal del target-name portal-ip
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
portal-ip
The virtual IP through which the target is accessible. You can specify multiple portal addresses that you want to delete.
To map a file system with a specified iSCSI target
- To map a file system with a specified iSCSI target, enter the following:
Target> iscsi target store add fs-name target-name
fs-name
Name of the file system which is to be mapped to an iSCSI target. LUNs are created as files on this file system.
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.
To remove the file system from a specified iSCSI target
- To remove the file system from a specified iSCSI target, enter the following:
Target> iscsi target store delete fs-name target-name
fs-name
Name of the file system which is to be removed from an iSCSI target.
target-name
Name of the iSCSI target at which SCSI LUNs are available. target-name should conform to the naming rules defined in RFC3721.