Please enter search query.
 
              Search <book_title>...
            
 
          Veritas Access Appliance Administrator's Guide
                Last Published: 
				2022-12-07
                
              
              
                Product(s): 
				Appliances (7.4.3)
                 
              
              
                Platform: Veritas 3340,Access Appliance OS
              
            - Section I. Introducing Access Appliance
 - Section II. Configuring Access Appliance
- Managing users
 - Configuring the network
- About configuring the Access Appliance network
 - About bonding Ethernet interfaces
 - Bonding Ethernet interfaces
 - Configuring DNS settings
 - About Ethernet interfaces
 - Displaying current Ethernet interfaces and states
 - Configuring IP addresses
 - Configuring VLAN interfaces
 - Configuring NIC devices
 - About configuring routing tables
 - Configuring routing tables
 - Changing the firewall settings
 - Configuring Access Appliance in IPv4 and IPv6 mixed mode
 - Support for multiple data subnets
 
 - Configuring authentication services
- About configuring LDAP settings
 - Configuring LDAP server settings
 - Administering the Access Appliance cluster's LDAP client
 - About Active Directory (AD)
 - Configuring AD server settings
 - Configuring entries for Access Appliance DNS for authenticating to Active Directory (AD)
 - Configuring AD/LDAP using the GUI
 - Configuring the NIS-related settings
 - Configuring NSS lookup order
 
 
 - Section III. Managing Access Appliance storage
- Configuring storage
- About storage provisioning and management
 - About configuring disks
 - About configuring storage pools
 - Configuring storage pools
 - About quotas for usage
 - Enabling, disabling, and displaying the status of file system quotas
 - Setting and displaying file system quotas
 - Setting user quotas for users of specified groups
 - About quotas for CIFS home directories
 - Workflow for configuring and managing storage using the Access Appliance CLI
 - Displaying information for all disk devices associated with the nodes in a cluster
 - Displaying WWN information
 - Importing new LUNs forcefully for new or existing pools
 - Initiating host discovery of LUNs
 - Formatting or reinitializing a disk
 - Removing a disk
 
 - Managing disks
 - Configuring ISCSI
 - Access Appliance as an iSCSI target
- About Access Appliance as an iSCSI target
 - Managing the iSCSI target service
 - Managing the iSCSI targets
 - Managing the LUNs
 - Managing the mappings with iSCSI initiators
 - Managing the users
 - Creating an iSCSI target and provisioning LUNs
 - Adding an initiator for an iSCSI target
 - Removing an initiator for an iSCSI target
 - Adding portal IPs for an iSCSI target
 - Setting up authentication for an iSCSI target
 - Viewing the list of initiators for an iSCSI target
 - Viewing the portal IPs for an iSCSI target
 - Removing portal IPs for an iSCSI target
 - Removing authentication settings for an iSCSI target
 - Removing an iSCSI target
 - Removing the file system store for an iSCSI target
 - Viewing the list of LUNs for an iSCSI target
 - Creating a LUN for an iSCSI target
 - Increasing the size of a LUN for an iSCSI target
 - Reducing the size of a LUN for an iSCSI target
 - Removing a LUN for an iSCSI target
 - Cloning a LUN for an iSCSI target
 - Creating a snapshot of a LUN for an iSCSI target
 - Viewing the list of snapshots for an iSCSI target
 - Removing a LUN snapshot
 - Restoring a LUN snapshot
 
 
 - Configuring storage
 - Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- About using the NFS server with Access Appliance
 - Using the kernel-based NFS server
 - Accessing the NFS server
 - Displaying and resetting NFS statistics
 - Configuring Access Appliance for ID mapping for NFS version 4
 - Configuring the NFS client for ID mapping for NFS version 4
 - About authenticating NFS clients
 - Setting up Kerberos authentication for NFS clients
 
 - Using Access Appliance as a CIFS server
- About configuring Access Appliance for CIFS
 - About configuring CIFS for standalone mode
 - Configuring CIFS server status for standalone mode
 - Changing security settings
 - About configuring CIFS for Active Directory (AD) domain mode
 - Setting NTLM
 - About setting trusted domains
- Specifying trusted domains that are allowed access to the CIFS server
 - Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
 - Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
 - Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
 - Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
 - About configuring Windows Active Directory as an IDMAP backend for CIFS
 - Configuring the Active Directory schema with CIFS-schema extensions
 - Configuring the LDAP client for authentication using the CLI
 - Setting Active Directory trusted domains
 
 - About storing account information
 - Storing user and group accounts
 - Reconfiguring the CIFS service
 - About mapping user names for CIFS/NFS sharing
 - About the mapuser commands
 - Adding, removing, or displaying the mapping between CIFS and NFS users
 - Automatically mapping UNIX users from LDAP to Windows users
 - About managing home directories
 - About CIFS clustering modes
 - About migrating CIFS shares and home directories
 - Setting the CIFS aio_fork option
 - About managing local users and groups
 - Enabling CIFS data migration
 
 - Configuring an FTP server
- About FTP
 - Creating the FTP home directory
 - Using the FTP server commands
 - About FTP server options
 - Customizing the FTP server options
 - Administering the FTP sessions
 - Uploading the FTP logs
 - Administering the FTP local user accounts
 - About the settings for the FTP local user accounts
 - Configuring settings for the FTP local user accounts
 
 - Using Access Appliance as an Object Store server
 
 - Configuring the NFS server
 - Section V. Managing Access Appliance security
 - Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About troubleshooting
 - Monitoring command activity
 - Monitoring alerts
 - About alert management
 - Monitoring events
 - Viewing reports
 - Viewing cluster storage usage
 - Viewing file system usage
 - About event notifications
 - About severity levels and filters
 - About SNMP notifications
 - Configuring an email group
 - Configuring a syslog server
 - Exporting events in syslog format to a given URL
 - Displaying events on the console
 - Configuring events for event reporting
 - Configuring an SNMP management server
 
 - Appliance log files
 
 - Configuring event notifications and audit logs
 - Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- About creating and maintaining file systems
 - About encryption at rest
 - Considerations for creating a file system
- Best practices for creating file systems
 - Choosing a file system layout type
 - Determining the initial extent size for a file system
 - About striping file systems
 - About creating a tuned file system for a specific workload
 - About FastResync
 - About fsck operation
 - Setting retention in files
 - Setting WORM over NFS
 - Manually setting WORM-retention on a file over CIFS
 - About managing application I/O workloads using maximum IOPS settings
 
 - Creating a file system
 - Bringing the file system online or offline
 - Listing all file systems and associated information
 - Modifying a file system
 - Managing a file system
 - Destroying a file system
 - Upgrading disk layout versions
 
 
 - Creating and maintaining file systems
 - Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
 - Creating and maintaining NFS shares
- About NFS file sharing
 - About the NFS shares
 - Displaying file systems and snapshots that can be exported
 - Exporting an NFS share
 - Displaying exported directories
 - About managing NFS shares using netgroups
 - Unexporting a directory or deleting NFS options
 - Exporting an NFS share for Kerberos authentication
 - Mounting an NFS share with Kerberos security from the NFS client
 - Exporting an NFS snapshot
 
 - Creating and maintaining CIFS shares
- About managing CIFS shares
 - About the CIFS shares
 - Exporting a directory as a CIFS share
 - Configuring a CIFS share as secondary storage for an Enterprise Vault store
 - Exporting the same file system/directory as a different CIFS share
 - About the CIFS export options
 - Setting share properties
 - Displaying CIFS share properties
 - Hiding system files when adding a CIFS normal share
 - Allowing specified users and groups access to the CIFS share
 - Denying specified users and groups access to the CIFS share
 - Exporting a CIFS snapshot
 - Deleting a CIFS share
 - Modifying a CIFS share
 - Making a CIFS share shadow copy aware
 - About managing CIFS shares for Enterprise Vault
 
 - Using Access Appliance with OpenStack
 - Integrating Access Appliance with Data Insight
 
 - Section IX. Managing Access Appliance storage services
- Compressing files
- About compressing files
 - Best practices for using compression
 - Use cases for compressing files
 - Compression tasks
- Compressing files
 - Showing the scheduled compression job
 - Scheduling compression jobs
 - Listing compressed files
 - Uncompressing files
 - Modifying the scheduled compression
 - Removing the specified schedule
 - Stopping the schedule for a file system
 - Removing the pattern-related rule for a file system
 - Removing the modified age related rule for a file system
 
 
 - Configuring episodic replication
- About Access Appliance episodic replication
 - How Access Appliance Replication works
 - Starting Access Appliance episodic replication
 - Setting up communication between the source and the destination clusters
 - Setting up the file systems to replicate
 - Setting up files to exclude from an episodic replication unit
 - Scheduling the episodic replication
 - Defining what to replicate
 - About the maximum number of parallel episodic replication jobs
 - Managing an episodic replication job
 - Replicating compressed data
 - Displaying episodic replication job information and status
 - Synchronizing an episodic replication job
 - Behavior of the file systems on the episodic replication destination target
 - Accessing file systems configured as episodic replication destinations
 - Episodic replication job failover and failback
 
 - Configuring continuous replication
- About Access Appliance continuous replication
 - How Access Appliance continuous replication works
 - Starting Access Appliance continuous replication
 - Setting up communication between the source and the target clusters
 - Setting up the file system to replicate
 - Managing continuous replication
 - Displaying continuous replication information and status
 - Unconfiguring continuous replication
 - Continuous replication failover and failback
 - Addition of multiple file systems to a Replicated Volume Group
 
 - Using snapshots
 - Using instant rollbacks
- About instant rollbacks
 - Creating a space-optimized rollback
 - Creating a full-sized rollback
 - Listing Access Appliance instant rollbacks
 - Restoring a file system from an instant rollback
 - Refreshing an instant rollback from a file system
 - Bringing an instant rollback online
 - Taking an instant rollback offline
 - Destroying an instant rollback
 - Creating a shared cache object for Access Appliance instant rollbacks
 - Listing cache objects
 - Destroying a cache object of a Access Appliance instant rollback
 
 
 - Compressing files
 - Section X. Reference
 - Index
 
A
- about
 - Access Appliance continuous replication, About Access Appliance continuous replication
 - Access Appliance episodic replication, About Access Appliance episodic replication
 - Active Directory (AD), About Active Directory (AD)
 - bonding Ethernet interfaces, About bonding Ethernet interfaces
 - buckets and objects, About buckets and objects
 - changing share properties, Setting share properties
 - configuring Access Appliance for CIFS, About configuring Access Appliance for CIFS
 - configuring CIFS for AD domain mode, About configuring CIFS for Active Directory (AD) domain mode
 - configuring disks, About configuring disks
 - configuring in IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
 - configuring routing tables, About configuring routing tables
 - configuring storage pools, About configuring storage pools
 - Continuous replication failover and failback, Continuous replication failover and failback
 - creating and maintaining file systems, About creating and maintaining file systems
 - episodic replication job failover and failback, Episodic replication job failover and failback
 - Ethernet interfaces, About Ethernet interfaces
 - FTP, About FTP
 - FTP local user set, About the settings for the FTP local user accounts
 - FTP set, About FTP server options
 - iSCSI, About iSCSI
 - leaving AD domain, About leaving an AD domain
 - managing CIFS shares, About managing CIFS shares
 - Multi-protocol support for NFS with S3, S3 with NFS use case
 - NFS file sharing, About NFS file sharing
 - setting trusted domains, About setting trusted domains
 - shares, About file sharing protocols
 - snapshot schedules, About snapshot schedules
 - snapshots, About snapshots
 - storage provisioning and management, About storage provisioning and management
 - storing account information, About storing account information
 - striping file systems, About striping file systems
 - the IP addresses for the Ethernet interfaces, About Ethernet interfaces
 
- About
 - compressed file format, About the compressed file format
 - compressing files, About compressing files
 - concurrent access, About concurrent access
 - FastResync, About FastResync
 - file compression attributes, About the file compression attributes
 - file compression block size, About the file compression block size
 - integration with OpenStack Cinder, About the Access Appliance integration with OpenStack Cinder
 - SNMP notifications, About SNMP notifications
 
- about Access Appliance
 - as an iSCSI target, About Access Appliance as an iSCSI target
 
- About Configuring
 - about maximum IOPS, About managing application I/O workloads using maximum IOPS settings
 - about S3
 - viewing information, Viewing information about S3
 
- Access
 - accessing the CLISH, Accessing the Access CLISH
 
- Access Appliance
 - about, About Access Appliance
 - integration with OpenStack Manila, About the Access Appliance integration with OpenStack Manila
 - key features, About Access Appliance
 - product documentation, Using the Access Appliance product documentation
 
- Access Appliance continuous replication
 - about, About Access Appliance continuous replication
 - description of feature, How Access Appliance continuous replication works
 - starting, Starting Access Appliance continuous replication
 
- Access Appliance episodic replication
 - about, About Access Appliance episodic replication
 - compression, Replicating compressed data
 - scheduling, Scheduling the episodic replication
 - starting, Starting Access Appliance episodic replication
 
- Access Appliance Replication
 - description of feature, How Access Appliance Replication works
 
- Access Appliance to the Kerberos realm
 - adding and configuring, Adding and configuring Access Appliance to the Kerberos realm
 
- accessing
 - Access Appliance product documentation, Using the Access Appliance product documentation
 - CLISH, Accessing the Access CLISH
 - disk details, Accessing disk details
 - episodic replication destinations, Accessing file systems configured as episodic replication destinations
 - man pages, About accessing the online man pages
 
- Active Directory
 - setting the trusted domains for, Setting Active Directory trusted domains
 
- Active Directory (AD)
 - about, About Active Directory (AD)
 - joining Access Appliance to, Joining Access Appliance to Active Directory (AD)
 - verifying Access Appliance has joined successfully, Verifying that Access Appliance has joined Active Directory (AD) successfully
 
- activity
 - monitoring, Monitoring command activity
 
- AD domain mode
 - changing domain settings, Changing domain settings for AD domain mode
 - configuring CIFS, About configuring CIFS for Active Directory (AD) domain mode
 - security settings, Changing domain settings for AD domain mode
 
- AD interface
 - using, Removing the AD interface
 
- AD trusted domains
 - disabling, Setting Active Directory trusted domains
 
- add local user
 - adding
 - a column to a file system, Adding or removing a column from a file system
 - a severity level to an email group, Configuring an email group
 - a syslog server, Configuring a syslog server
 - an email address to a group, Configuring an email group
 - an email group, Configuring an email group
 - an initiator for an iSCSI target, Adding an initiator for an iSCSI target
 - CIFS share, Setting share properties
 - filter to a group, Configuring an email group
 - IP address to a cluster, Configuring IP addresses
 - mirror to a file system, Adding or removing a mirror from a file system
 - portal IPs for an iSCSI target, Adding portal IPs for an iSCSI target
 - SNMP management server, Configuring an SNMP management server
 - VLAN interfaces, Configuring VLAN interfaces
 
- adding a mapping
 - between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
 
- adding and configuring
 - Access Appliance to the Kerberos realm, Adding and configuring Access Appliance to the Kerberos realm
 
- aio_fork option
 - setting, Setting the CIFS aio_fork option
 
- alerts
 - file system removing, Removing file system alerts
 
- allowing
 - specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
 
- an initiator for an iSCSI target
 - as an iSCSI target
 - about Access Appliance, About Access Appliance as an iSCSI target
 
- Authenticate
 - NFS clients, About authenticating NFS clients
 
- authenticating
 - NFS clients using Kerberos, Setting up Kerberos authentication for NFS clients
 
- authentication
 - configuring the LDAP client using the CLI, Configuring the LDAP client for authentication using the CLI
 
- authentication for an iSCSI target
 
B
- best practices
 - creating file systems, Best practices for creating file systems
 
- Best practices
 - using compression, Best practices for using compression
 
- bind distinguished name
 - setting for LDAP server, Configuring LDAP server settings
 
- bonding
 - Ethernet interfaces, Bonding Ethernet interfaces
 
- bonding Ethernet interfaces
 - bringing
 - file system online or offline, Bringing the file system online or offline
 
- buckets and objects
 - about, About buckets and objects
 
C
- cache object
 - destroying for an instant rollback, Destroying a cache object of a Access Appliance instant rollback
 
- cache objects
 - listing, Listing cache objects
 
- changing
 - an IP address to online
 - on any running node, Configuring IP addresses
 
- domain settings for AD domain mode, Changing domain settings for AD domain mode
 - local CIFS user password, Creating a local CIFS user
 - security settings, Changing security settings
 - share properties about, Setting share properties
 
- checking
 - and repairing a file system, Checking and repairing a file system
 - for stale mirrors on file systems, Checking and resynchronizing stale mirrors
 - on the status of the NFS server, Accessing the NFS server
 
- CIFS
 - allowing specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
 - configuring schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
 - denying specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
 - export options, About the CIFS export options
 - mapuser commands, About the mapuser commands
 - standalone mode, About configuring CIFS for standalone mode
 - using multi-domain controller support, Using multi-domain controller support in CIFS
 
- CIFS aio_fork option
 - setting, Setting the CIFS aio_fork option
 
- CIFS and NFS protocols
 - share directories, Sharing directories using CIFS and NFS protocols
 
- CIFS clustering modes
 - CIFS data migration
 - enabling, Enabling CIFS data migration
 
- CIFS home directories
 - CIFS operating modes
 - CIFS server
 - starting, Reconfiguring the CIFS service
 - trusted domains that are allowed access, Specifying trusted domains that are allowed access to the CIFS server
 
- CIFS server status
 - standalone mode, Configuring CIFS server status for standalone mode
 
- CIFS service
 - standalone mode, Configuring CIFS server status for standalone mode
 
- CIFS share
 - adding, Setting share properties
 - deleting, Deleting a CIFS share
 - exporting as a directory, Exporting a directory as a CIFS share
 - exporting the same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
 - making shadow copy aware, Making a CIFS share shadow copy aware
 - modifying, Modifying a CIFS share
 
- CIFS share and home directory
 - migrating from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
 
- CIFS share for Enterprise Vault with replication
 - CIFS share for Enterprise Vault without replication
 - CIFS share with continuous replication
 - CIFS share with encryption
 - creating, Creating a CIFS share with encryption
 
- CIFS share with episodic replication
 - CIFS share with episodic replication and encryption
 - CIFS share without replication and encryption
 - CIFS shares and home directories
 - migrating from ctdb clustering modes, About migrating CIFS shares and home directories
 - migrating from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
 
- CIFS snapshot
 - exporting, Exporting a CIFS snapshot
 
- CIFS/NFS sharing
 - mapping user names, About mapping user names for CIFS/NFS sharing
 
- clearing
 - DNS domain names, Configuring DNS settings
 - DNS name servers, Configuring DNS settings
 - LDAP configured settings, Configuring LDAP server settings
 
- CLI
 - configure and manage storage, Workflow for configuring and managing storage using the Access Appliance CLI
 
- client configurations
 - cloning
 - LUN for an iSCSI target, Cloning a LUN for an iSCSI target
 
- cluster
 - adding an IP address to, Configuring IP addresses
 - changing an IP address to online for any running node, Configuring IP addresses
 - displaying all the IP addresses for, Configuring IP addresses
 
- clustering modes
 - collect logs
 - commands, Viewing log files using the Support command
 - datacollect, Gathering device logs with the DataCollect command
 - log file location, Viewing log files using the Support command
 - types of logs, Viewing log files using the Support command
 
- columns
 - adding or removing, Adding or removing a column from a file system
 
- command history
 - displaying, Displaying the command history
 
- Command-Line Interface (CLI)
 - getting help on how to use, Getting help using the Access CLISH
 
- communicating
 - source and destination clusters, Setting up communication between the source and the destination clusters
 - source and target clusters, Setting up communication between the source and the target clusters
 
- Compressed file format
 - Compressing files
 - about, About compressing files
 - use cases, Use cases for compressing files
 
- compression
 - tasks, Compression tasks
 
- Concurrent access
 - about, About concurrent access
 
- concurrent access
 - NFS and S3, About concurrent access with NFS and S3
 
- Configure and manage storage
 - configuring
 - Access Appliance for CIFS, About configuring Access Appliance for CIFS
 - AD schema with CIFS-schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
 - CIFS for standalone mode, About configuring CIFS for standalone mode
 - event notifications, Monitoring alerts , About event notifications
 - IP routing, Configuring routing tables
 - IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
 - iSCSI devices, Configuring the iSCSI devices
 - iSCSI discovery, Configuring discovery on iSCSI
 - iSCSI initiator, Configuring the iSCSI initiator
 - iSCSI initiator name, Configuring the iSCSI initiator name
 - iSCSI targets, Configuring the iSCSI targets
 - job resynchronization, Synchronizing an episodic replication job
 - NFS client for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
 - NIC devices, Configuring NIC devices
 - NSS lookup order, Configuring NSS lookup order
 - VLAN interfaces, Configuring VLAN interfaces
 - Windows Active Directory as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
 
- Configuring
 - Object Store server, Configuring the Object Store server
 
- Configuring Access Appliance
 - ID mapping for NFS version 4, Configuring Access Appliance for ID mapping for NFS version 4
 
- configuring CIFS share
 - secondary storage for an Enterprise Vault store, Configuring a CIFS share as secondary storage for an Enterprise Vault store
 
- configuring disks
 - about, About configuring disks
 
- configuring Ethernet interfaces
 - about, About Ethernet interfaces
 
- configuring routing tables
 - configuring storage pools
 - Configuring the Object Store server
 - Considerations
 - creating a file system, Considerations for creating a file system
 
- continuous replication
 - display status, Displaying continuous replication information and status
 - setting up file system, Setting up the file system to replicate
 - unconfiguring, Unconfiguring continuous replication
 
- Continuous replication failover and failback
 - converting
 - existing file system into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
 
- creating
 - CIFS share for Enterprise Vault with replication, Creating a CIFS share for Enterprise Vault with replication
 - CIFS share for Enterprise Vault without replication, Creating a CIFS share for Enterprise Vault without replication
 - CIFS share with continuous replication, Creating a CIFS share with continuous replication
 - CIFS share with encryption, Creating a CIFS share with encryption
 - CIFS share with episodic replication, Creating a CIFS share with episodic replication
 - CIFS share with episodic replication and encryption, Creating a CIFS share with episodic replication and encryption
 - CIFS share without replication and encryption, Creating a CIFS share without replication and encryption
 - full-sized rollback, Creating a full-sized rollback
 - iSCSI target, Creating an iSCSI target and provisioning LUNs
 - local CIFS group, Configuring a local group
 - local CIFS user, Creating a local CIFS user
 - LUN for an iSCSI target, Creating a LUN for an iSCSI target
 - mirrored file systems, Creating a file system
 - mirrored-stripe file systems, Creating a file system
 - NFS share with continuous replication, Creating an NFS share with continuous replication
 - NFS share with encryption, Creating an NFS share with encryption
 - NFS share with episodic replication, Creating an NFS share with episodic replication
 - NFS share with episodic replication and encryption, Creating an NFS share with episodic replication and encryption
 - NFS share without replication and encryption, Creating an NFS share without replication and encryption
 - OpenStack Manila file share, Creating an OpenStack Manila file share
 - OpenStack Manila share snapshot, Creating an OpenStack Manila share snapshot
 - OpenStack Manila share type, Creating an OpenStack Manila share type
 - share backend on the OpenStack controller node, Creating a new share backend on the OpenStack controller node
 - shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
 - simple file systems, Creating a file system
 - snapshot of a LUN for an iSCSI target, Creating a snapshot of a LUN for an iSCSI target
 - snapshot schedules, Configuring snapshot schedules
 - snapshots, Creating snapshots
 - space-optimized instant rollbacks, Creating a space-optimized rollback
 - storage pools, Configuring storage pools, Adding disks to a storage pool
 - striped file systems, Creating a file system
 - striped-mirror file systems, Creating a file system
 
- Creating a file system
 - considerations, Considerations for creating a file system
 
- creating and maintaining file systems
 - creating directory
 - creating file systems
 - best practices, Best practices for creating file systems
 
- ctdb clustering mode
 - about, About CIFS clustering modes
 - directory-level share support, Exporting a directory as a CIFS share
 - switching the clustering mode, About switching the clustering mode
 
- current Ethernet interfaces and states
 - customizing server options
 
D
- data flow
 - continuous replication synchronous mode, How data flows in continuous replication synchronous mode
 
- Data Insight
 - integrating Access Appliance, Access Appliance integration with Data Insight
 
- datacollect
 - device logs, Gathering device logs with the DataCollect command
 
- decreasing
 - size of a file system, Decreasing the size of a file system
 
- defining
 - what to replicate, Defining what to replicate
 
- defrag, Defragmenting a file system
 - defragmenting
 - file systems, Defragmenting a file system
 
- delete local user
 - deleting
 - CIFS share, Deleting a CIFS share
 - configured mail server, Configuring an email group
 - email address from a specified group, Configuring an email group
 - email groups, Configuring an email group
 - file system store for an iSCSI target, Removing the file system store for an iSCSI target
 - filter from a specified group, Configuring an email group
 - home directories, Deleting home directories and disabling creation of home directories
 - home directory of given user, Deleting home directories and disabling creation of home directories
 - local CIFS group, Configuring a local group
 - local CIFS user, Creating a local CIFS user
 - NFS options, Unexporting a directory or deleting NFS options
 - route entries from routing tables of nodes in cluster, Configuring routing tables
 - severity from a specified group, Configuring an email group
 - snapshot schedules, Managing automated snapshots
 - syslog server, Configuring a syslog server
 - VLAN interfaces, Configuring VLAN interfaces
 
- denying
 - specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
 
- description of Access Appliance continuous replication, How Access Appliance continuous replication works
 - description of Access Appliance Replication, How Access Appliance Replication works
 - destroying
 - a file system, Destroying a file system
 - cache object of an instant rollback, Destroying a cache object of a Access Appliance instant rollback
 - instant rollbacks, Destroying an instant rollback
 - snapshots, Managing disk space used by snapshots
 - storage pools, Configuring storage pools
 
- directories
 - displaying exported, Displaying exported directories
 - unexporting the share, Unexporting a directory or deleting NFS options
 
- directory-level share support
 - ctdb clustering mode, Exporting a directory as a CIFS share
 
- disabling
 - AD trusted domains, Setting Active Directory trusted domains
 - creation of home directories, Deleting home directories and disabling creation of home directories
 - DNS settings, Configuring DNS settings
 - FastResync option, Disabling the FastResync option for a file system
 - LDAP clients
 - configurations, Administering the Access Appliance cluster's LDAP client
 
- NIS clients, Configuring the NIS-related settings
 - NTLM, Setting NTLM
 - quota limits used by snapshots, Managing disk space used by snapshots
 
- disk
 - formatting, Formatting or reinitializing a disk
 - removing, Removing a disk
 
- disk layout versions
 - upgrading, Upgrading disk layout versions
 
- Disk quotas
 - CIFS, About quotas for usage
 - file systems, About quotas for usage
 - usage, About quotas for usage
 
- disks
 - accessing details about, Accessing disk details
 - viewing information about, Viewing information about disks
 
- displaying
 - all the IP addresses for cluster, Configuring IP addresses
 - command history, Displaying the command history
 - current Ethernet interfaces and states, Displaying current Ethernet interfaces and states
 - current list of SNMP management servers, Configuring an SNMP management server
 - DNS settings, Configuring DNS settings
 - events on the console, Displaying events on the console
 - existing email groups or details, Configuring an email group
 - exported directories, Displaying exported directories
 - file system alert values, Displaying file system alert values
 - file systems that can be exported, Displaying file systems and snapshots that can be exported
 - home directory usage information, Displaying home directory usage information
 - information for all disk devices for the nodes in a cluster, Displaying information for all disk devices associated with the nodes in a cluster
 - LDAP client configurations, Administering the Access Appliance cluster's LDAP client
 - LDAP configured settings, Configuring LDAP server settings
 - list of syslog servers, Configuring a syslog server
 - local CIFS group, Configuring a local group
 - local CIFS user, Creating a local CIFS user
 - NFS statistics, Displaying and resetting NFS statistics
 - NIS-related settings, Configuring the NIS-related settings
 - NSS configuration, Configuring NSS lookup order
 - routing tables of the nodes in the cluster, Configuring routing tables
 - share properties, Displaying CIFS share properties
 - snapshot quotas, Managing disk space used by snapshots
 - snapshot schedules, Configuring snapshot schedules
 - snapshots, Displaying snapshots
 - snapshots that can be exported, Displaying file systems and snapshots that can be exported
 - time interval or number of duplicate events for notifications, Configuring events for event reporting
 - values of the configured SNMP notifications, Configuring an SNMP management server
 - values of the configured syslog server, Configuring a syslog server
 - VLAN interfaces, Configuring VLAN interfaces
 
- displaying a mapping
 - between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
 
- displaying WWN information, Displaying WWN information
 - DNS
 - domain names
 - clearing, Configuring DNS settings
 
- name servers
 - clearing, Configuring DNS settings
 - specifying, Configuring DNS settings
 
- settings
 - disabling, Configuring DNS settings
 - displaying, Configuring DNS settings
 - enabling, Configuring DNS settings
 
- domain
 - setting, Reconfiguring the CIFS service
 - setting user name, Reconfiguring the CIFS service
 
- domain controller
 - setting, Reconfiguring the CIFS service
 
- domain name
 - for the DNS server
 - setting, Configuring DNS settings
 
E
- email address
 - adding to a group, Configuring an email group
 - deleting from a specified group, Configuring an email group
 
- email groups
 - adding, Configuring an email group
 - adding ignore-string functionality, Configuring an email group
 - deleting, Configuring an email group
 - deleting ignore-string functionality, Configuring an email group
 - displaying existing and details, Configuring an email group
 
- enabling
 - CIFS data migration, Enabling CIFS data migration
 - DNS settings, Configuring DNS settings
 - FastResync for a file system, Configuring FastResync for a file system
 - LDAP client configurations, Administering the Access Appliance cluster's LDAP client
 - NIS settings, Configuring the NIS-related settings
 - NTLM, Setting NTLM
 - quota limits used by snapshots, Managing disk space used by snapshots
 
- enabling, disabling, and displaying
 - file system quotas, Enabling, disabling, and displaying the status of file system quotas
 
- encryption
 - Enterprise Vault store
 - configuring CIFS share as secondary storage, Configuring a CIFS share as secondary storage for an Enterprise Vault store
 
- episodic replication destination file system behavior
 - episodic replication destinations
 - episodic replication job
 - displaying status, Displaying episodic replication job information and status
 - enabling compression, Replicating compressed data
 - managing, Managing an episodic replication job
 - show job, Displaying episodic replication job information and status
 
- episodic replication jobs
 - maximum number of parallel, About the maximum number of parallel episodic replication jobs
 
- episodic replication unit
 - setting up files to exclude, Setting up files to exclude from an episodic replication unit
 
- Ethernet interfaces
 - bonding, Bonding Ethernet interfaces
 
- event notifications
 - configuring, Monitoring alerts , About event notifications
 - displaying time interval for, Configuring events for event reporting
 
- event reporting
 - setting events for, Configuring events for event reporting
 
- events
 - displaying on the console, Displaying events on the console
 - monitoring, Monitoring events
 
- excluding directories and files
 - export options
 - exporting
 - an NFS share, Exporting an NFS share
 - CIFS snapshot, Exporting a CIFS snapshot
 - directory as a CIFS share, Exporting a directory as a CIFS share
 - events in syslog format to a given URL, Exporting events in syslog format to a given URL
 - NFS snapshot, Exporting an NFS snapshot
 - same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
 - SNMP MIB file to a given URL, Configuring an SNMP management server
 
- exporting for Kerberos authentication
 
F
- failover and failback
 - about, Continuous replication failover and failback
 - about episodic replication, Episodic replication job failover and failback
 
- FastResync
 - about, About FastResync
 
- File compression attributes
 - File compression block size
 - file system
 - converting into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
 
- file system alert values
 - displaying, Displaying file system alert values
 
- file system alerts
 - removing, Removing file system alerts
 - setting, Setting file system alerts
 
- file system quotas
 - enabling, disabling, and displaying, Enabling, disabling, and displaying the status of file system quotas
 - setting and displaying, Setting and displaying file system quotas
 
- file system store for an iSCSI target
 - file systems
 - adding a mirror to, Adding or removing a mirror from a file system
 - bringing online or offline, Bringing the file system online or offline
 - checking and repairing, Checking and repairing a file system
 - checking for stale mirrors, Checking and resynchronizing stale mirrors
 - creating, Creating a file system
 - decreasing the size of, Decreasing the size of a file system
 - defragmenting, Defragmenting a file system
 - destroying, Destroying a file system
 - disabling FastResync option, Disabling the FastResync option for a file system
 - enabling FastResync, Configuring FastResync for a file system
 - increasing the size of, Increasing the size of a file system
 - listing with associated information, Listing all file systems and associated information
 - removing a mirror from, Adding or removing a mirror from a file system
 - restoring from an instant rollback, Restoring a file system from an instant rollback
 - that can be exported
 - types of layout, Choosing a file system layout type
 
- filter
 - about, Monitoring alerts , About severity levels and filters
 - adding to a group, Configuring an email group
 - deleting from a specified group, Configuring an email group
 
- firewall setting, Changing the firewall settings
 - forcefully
 - importing new LUNs for new or existing pools, Importing new LUNs forcefully for new or existing pools
 
- formatting
 - fsck
 - about, About fsck operation
 
- FTP
 - about, About FTP
 - add local user, Administering the FTP local user accounts
 - creating directory, Creating the FTP home directory
 - customizing server options, Customizing the FTP server options
 - delete local user, Administering the FTP local user accounts
 - local user password, Administering the FTP local user accounts
 - local user set download bandwidth, Configuring settings for the FTP local user accounts
 - local user set home directory, Configuring settings for the FTP local user accounts
 - local user set maximum connections, Configuring settings for the FTP local user accounts
 - local user set maximum disk usage, Configuring settings for the FTP local user accounts
 - local user set maximum files, Configuring settings for the FTP local user accounts
 - local user set upload bandwidth, Configuring settings for the FTP local user accounts
 - logupload, Uploading the FTP logs
 - server start, Using the FTP server commands
 - server status, Using the FTP server commands
 - server stop, Using the FTP server commands
 - session show, Administering the FTP sessions
 - session showdetail, Administering the FTP sessions
 - session terminate, Administering the FTP sessions
 - show local users, Administering the FTP local user accounts
 
- FTP local user set
 - FTP set
 - about, About FTP server options
 
G
- group membership
 - managing, Creating a local CIFS user
 
H
- hiding
 - system files when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
 
- history command
 - home directories
 - setting up, Setting up home directories
 
- home directory file systems
 - home directory of given user
 - home directory usage information
 - displaying, Displaying home directory usage information
 
- hostname or IP address
 - setting for LDAP server, Configuring LDAP server settings
 
- how to use
 - Command-Line Interface (CLI), Getting help using the Access CLISH
 
I
- ID mapping for NFS version 4
 - configuring Access Appliance, Configuring Access Appliance for ID mapping for NFS version 4
 
- importing
 - new LUNs forcefully for new or existing pools, Importing new LUNs forcefully for new or existing pools
 
- increasing
 - size of a file system, Increasing the size of a file system
 - size of a LUN for an iSCSI target, Increasing the size of a LUN for an iSCSI target
 
- initiating host discovery of LUNs, Initiating host discovery of LUNs
 - initiator for an iSCSI target
 - instant rollbacks
 - about, About instant rollbacks
 - bringing online, Bringing an instant rollback online
 - creating a shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
 - creating full-sized, Creating a full-sized rollback
 - creating space-optimized, Creating a space-optimized rollback
 - destroying, Destroying an instant rollback
 - listing, Listing Access Appliance instant rollbacks
 - refreshing from a file system, Refreshing an instant rollback from a file system
 - restoring a file system from, Restoring a file system from an instant rollback
 - taking offline, Taking an instant rollback offline
 
- integrating Access Appliance with Data Insight, Access Appliance integration with Data Insight
 - integration of Access Appliance
 - with OpenStack, About the Access Appliance integration with OpenStack
 
- Integration with OpenStack Cinder
 - IP addresses
 - adding to a cluster, Configuring IP addresses
 - displaying for the cluster, Configuring IP addresses
 - modifying, Configuring IP addresses
 - removing from the cluster, Configuring IP addresses
 
- IP addresses for the Ethernet interfaces
 - about, About Ethernet interfaces
 
- IP routing
 - configuring, Configuring routing tables
 
- iSCSI
 - about, About iSCSI
 
- iSCSI devices
 - configuring, Configuring the iSCSI devices
 
- iSCSI discovery
 - configuring, Configuring discovery on iSCSI
 
- iSCSI initiator
 - configuring, Configuring the iSCSI initiator
 
- iSCSI initiator name
 - configuring, Configuring the iSCSI initiator name
 
- iSCSI target
 - creating, Creating an iSCSI target and provisioning LUNs
 - removing, Removing an iSCSI target
 
- iSCSI target service
 - managing, Managing the iSCSI target service
 
- iSCSI targets
 - configuring, Configuring the iSCSI targets
 - managing, Managing the iSCSI targets
 
J
- job resynchronization
 - configuring, Synchronizing an episodic replication job
 
- joining
 - Access Appliance to Active Directory (AD), Joining Access Appliance to Active Directory (AD)
 
K
- Kerberos authentication
 - authenticating NFS clients, Setting up Kerberos authentication for NFS clients
 
- Kerberos realm
 - adding and configuring Access Appliance for, Adding and configuring Access Appliance to the Kerberos realm
 
- Kerberos share
 - mounting from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
 
- Kernel-based
 - NFS server, Using the kernel-based NFS server
 
L
- layouts
 - types of file system, Choosing a file system layout type
 
- LDAP
 - before configuring, About configuring LDAP settings
 
- LDAP client
 - configuring for authentication using the CLI, Configuring the LDAP client for authentication using the CLI
 
- LDAP password hash algorithm
 - setting password for, Configuring LDAP server settings
 
- LDAP server
 - clearing configured settings, Configuring LDAP server settings
 - disabling client configurations, Administering the Access Appliance cluster's LDAP client
 - displaying client configurations, Administering the Access Appliance cluster's LDAP client
 - displaying configured settings, Configuring LDAP server settings
 - enabling client configurations, Administering the Access Appliance cluster's LDAP client
 - setting over SSL, Configuring LDAP server settings
 - setting port number, Configuring LDAP server settings
 - setting the base distinguished name, Configuring LDAP server settings
 - setting the bind distinguished name, Configuring LDAP server settings
 - setting the hostname or IP address, Configuring LDAP server settings
 - setting the root bind DN, Configuring LDAP server settings
 - setting the users, groups, and netgroups base DN, Configuring LDAP server settings
 
- leaving
 - AD domain, About leaving an AD domain
 
- list of initiators for an iSCSI target
 - list of snapshots for an iSCSI target
 - listing
 - all file systems and associated information, Listing all file systems and associated information
 - cache objects, Listing cache objects
 - free space for storage pools, Configuring storage pools
 - instant rollbacks, Listing Access Appliance instant rollbacks
 - storage pools, Configuring storage pools
 
- local CIFS groups
 - creating, Configuring a local group
 - deleting, Configuring a local group
 - displaying, Configuring a local group
 
- local CIFS user
 - creating, Creating a local CIFS user
 - deleting, Creating a local CIFS user
 - displaying, Creating a local CIFS user
 
- local CIFS user password
 - changing, Creating a local CIFS user
 
- local user and groups
 - managing, About managing local users and groups
 
- local user password
 - local user set download bandwidth
 - local user set home directory
 - local user set maximum connections
 - local user set maximum disk usage
 - local user set maximum files
 - local user set upload bandwidth
 - log files
 - introduction, About appliance log files
 
- logupload
 - LUN for an iSCSI target
 - cloning, Cloning a LUN for an iSCSI target
 - creating, Creating a LUN for an iSCSI target
 - removing, Removing a LUN for an iSCSI target
 
- LUN snapshot
 - removing, Removing a LUN snapshot
 - restoring, Restoring a LUN snapshot
 
- LUNs
 - initiating host discovery, Initiating host discovery of LUNs
 - managing, Managing the LUNs
 - provisioning, Creating an iSCSI target and provisioning LUNs
 
- LUNs for an iSCSI target
 
M
- mail server
 - deleting the configured mail server, Configuring an email group
 - obtaining details for, Configuring an email group
 - setting the details of external, Configuring an email group
 
- man pages
 - how to access, About accessing the online man pages
 
- managing
 - CIFS shares, About managing CIFS shares
 - continuous replication, Managing continuous replication
 - group membership, Creating a local CIFS user
 - home directories, About managing home directories
 - iSCSI target service, Managing the iSCSI target service
 - iSCSI targets, Managing the iSCSI targets
 - local users and groups, About managing local users and groups
 - LUNs, Managing the LUNs
 - mappings with iSCSI initiators, Managing the mappings with iSCSI initiators
 - users, Managing the users
 
- managing NFS shares
 - using netgroups, About managing NFS shares using netgroups
 
- mapping
 - of UNIX users from LDAP to Windows users, Automatically mapping UNIX users from LDAP to Windows users
 
- mappings with iSCSI initiators
 - mapuser commands
 - about, About the mapuser commands
 
- maximum IOPS
 - setting, Setting the maximum IOPS
 
- maximum number
 - parallel episodic replication jobs, About the maximum number of parallel episodic replication jobs
 
- migrating
 - CIFS share and home directory from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
 - CIFS shares and home directories, About migrating CIFS shares and home directories
 - CIFS shares and home directories from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
 
- mirrored file systems
 - creating, Creating a file system
 
- mirrored-stripe file systems
 - creating, Creating a file system
 
- modifying
 - an IP address, Configuring IP addresses
 - CIFS share, Modifying a CIFS share
 - snapshot schedules, Configuring snapshot schedules
 - tunables for iSCSI, Modifying tunables for iSCSI
 
- monitoring
 - activity, Monitoring command activity
 - events, Monitoring events
 
- more command
 - using, Using the more command
 
- mounting
 - NFS share from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
 
- mounting snapshots, Bringing snapshots online or taking snapshots offline
 - Multi-protocol support for NFS with S3
 - limitations, S3 with NFS use case
 
N
- naming requirement for new users, About the naming requirements for adding new users
 - navigating CLISH
 - Access, Navigating the Access CLISH
 
- NFS client
 - configuring for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
 
- NFS clients
 - authenticating, About authenticating NFS clients
 
- NFS file sharing
 - about, About NFS file sharing
 
- NFS options
 - NFS server
 - about, About using the NFS server with Access Appliance
 - checking on the status, Accessing the NFS server
 - kernel-based, Using the kernel-based NFS server
 - starting, Accessing the NFS server
 - stopping, Accessing the NFS server
 
- NFS share
 - exporting, Exporting an NFS share
 - exporting for Kerberos authentication, Exporting an NFS share for Kerberos authentication
 
- NFS share with continuous replication
 - NFS share with encryption
 - creating, Creating an NFS share with encryption
 
- NFS share with episodic replication
 - NFS share with episodic replication and encryption
 - NFS share without replication and encryption
 - NFS shares
 - managing using netgroups, About managing NFS shares using netgroups
 
- NFS snapshot
 - exporting, Exporting an NFS snapshot
 
- NFS statistics
 - displaying, Displaying and resetting NFS statistics
 - resetting, Displaying and resetting NFS statistics
 
- NIC devices
 - configuring, Configuring NIC devices
 
- NIS
 - clients
 - disabling, Configuring the NIS-related settings
 - enabling, Configuring the NIS-related settings
 
- domain name
 - setting on all the nodes of cluster, Configuring the NIS-related settings
 
- related settings
 - displaying, Configuring the NIS-related settings
 
- server name
 - setting on all the nodes of cluster, Configuring the NIS-related settings
 
- node
 - in a cluster
 - displaying information for all disk devices, Displaying information for all disk devices associated with the nodes in a cluster
 
- NSS
 - displaying configuration, Configuring NSS lookup order
 - lookup order
 - configuring, Configuring NSS lookup order
 
- NTLM
 - disabling, Setting NTLM
 - enabling, Setting NTLM
 
O
- object server, About the Object Store server
 - object server group-specific parameters
 - Object Store server
 - configuring, Configuring the Object Store server
 
- objectstore buckets, File systems used for objectstore buckets
 - obtaining
 - details of the configured email server, Configuring an email group
 
- offline
 - taking an instant rollback offline, Taking an instant rollback offline
 
- online
 - bringing an instant rollback online, Bringing an instant rollback online
 
- OpenStack
 - about the integration with OpenStack, About the Access Appliance integration with OpenStack
 
- OpenStack Manila
 - integration with Access Appliance, About the Access Appliance integration with OpenStack Manila
 
- OpenStack Manila file share
 - creating, Creating an OpenStack Manila file share
 
- OpenStack Manila share snapshot
 - OpenStack Manila share type
 - creating, Creating an OpenStack Manila share type
 
P
- planned failback
 - process overview, Overview of the planned failback process, Overview of the planned failback process
 
- planned failover
 - process overview, Overview of the planned failover process, Overview of the planned failover process
 
- portal IPs for an iSCSI target
 - preserving
 - snapshot schedules, Managing automated snapshots
 
- Private network
 - provisioning
 - Public network
 
Q
- quota commands
 - setting and displaying file system quotas, Setting and displaying file system quotas
 
- quota limits
 - enabling or disabling snapshot, Managing disk space used by snapshots
 
- quotas
 - CIFS home directories, About quotas for CIFS home directories
 - setting user quotas for users of specified groups, Setting user quotas for users of specified groups
 
R
- reducing
 - size of a LUN for an iSCSI target, Reducing the size of a LUN for an iSCSI target
 
- refreshing
 - instant rollbacks from a file system, Refreshing an instant rollback from a file system
 
- removing
 - a column from a file system, Adding or removing a column from a file system
 - a disk, Removing a disk
 - authentication for an iSCSI target, Removing authentication settings for an iSCSI target
 - initiator for an iSCSI target, Removing an initiator for an iSCSI target
 - IP address from the cluster, Configuring IP addresses
 - iSCSI target, Removing an iSCSI target
 - LUN for an iSCSI target, Removing a LUN for an iSCSI target
 - LUN snapshot, Removing a LUN snapshot
 - mirror from a file system, Adding or removing a mirror from a file system
 - portal IPs for an iSCSI target, Removing portal IPs for an iSCSI target
 - snapshot schedules, Managing automated snapshots
 
- removing a mapping
 - between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
 
- renaming
 - storage pools, Configuring storage pools
 
- replicating file systems
 - setting up, Setting up the file systems to replicate
 
- resetting
 - NFS statistics, Displaying and resetting NFS statistics
 
- restoring
 - a file system from an instant rollback, Restoring a file system from an instant rollback
 - LUN snapshot, Restoring a LUN snapshot
 - snapshots, Restoring a snapshot
 
- resynchronizing
 - stale mirrors on file systems, Checking and resynchronizing stale mirrors
 
- route entries
 - deleting from routing tables, Configuring routing tables
 
- routing tables
 - of the nodes in the cluster
 - displaying, Configuring routing tables
 
S
- scheduling
 - episodic replication, Scheduling the episodic replication
 
- security
 - standalone mode, Configuring CIFS server status for standalone mode
 
- security settings
 - AD domain mode, Changing domain settings for AD domain mode
 - changing, Changing security settings
 
- server start
 - server status
 - server stop
 - session show
 - session showdetail
 - session terminate
 - setting
 - aio_fork option, Setting the CIFS aio_fork option
 - base distinguished name for the LDAP server, Configuring LDAP server settings
 - bind distinguished name for LDAP server, Configuring LDAP server settings
 - details of the external mail server, Configuring an email group
 - domain, Reconfiguring the CIFS service
 - domain controller, Reconfiguring the CIFS service
 - domain name for the DNS server, Configuring DNS settings
 - domain user name, Reconfiguring the CIFS service
 - events for event reporting, Configuring events for event reporting
 - file system alerts, Setting file system alerts
 - filter of the syslog server, Configuring a syslog server
 - home directory file systems, Setting the home directory file systems
 - IDMAP backend to ad for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
 - IDMAP backend to hash for accessing CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
 - IDMAP backend to ldap for trusted domain access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
 - IDMAP backend to rid for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
 - LDAP server hostname or IP address, Configuring LDAP server settings
 - LDAP server over SSL, Configuring LDAP server settings
 - LDAP server port number, Configuring LDAP server settings
 - LDAP users, groups, and netgroups base DN, Configuring LDAP server settings
 - maximum IOPS, Setting the maximum IOPS
 - NIS domain name on all the nodes of cluster, Configuring the NIS-related settings
 - prior to configuring LDAP, About configuring LDAP settings
 - retention, Setting retention in files
 - root bind DN for the LDAP server, Configuring LDAP server settings
 - severity of the syslog server, Configuring a syslog server
 - SNMP filter notifications, Configuring an SNMP management server
 - SNMP severity notifications, Configuring an SNMP management server
 - the NIS server name on all the nodes of cluster, Configuring the NIS-related settings
 - trusted domains, About setting trusted domains
 - trusted domains for the Active Directory, Setting Active Directory trusted domains
 - user quotas for users of specified groups, Setting user quotas for users of specified groups
 - WORM over NFS, Setting WORM over NFS
 - WORM-retention over CIFS, Manually setting WORM-retention on a file over CIFS
 
- setting up
 - authentication for an iSCSI target, Setting up authentication for an iSCSI target
 - home directories, Setting up home directories
 - object server group-specific parameters, Setting up the Object Access server group-specific parameters
 - replicating file systems, Setting up the file systems to replicate
 
- setting up an episodic replication unit
 - to exclude directories and files, Setting up files to exclude from an episodic replication unit
 
- severity levels
 - about, Monitoring alerts , About severity levels and filters
 - adding to an email group, Configuring an email group
 
- severity notifications
 - shadow copy
 - making a CIFS share aware, Making a CIFS share shadow copy aware
 
- share backend
 - creating on the OpenStack controller node, Creating a new share backend on the OpenStack controller node
 
- share directories
 - CIFS and NFS protocols, Sharing directories using CIFS and NFS protocols
 
- share properties
 - displaying, Displaying CIFS share properties
 
- shared cache object
 - shares
 - about, About file sharing protocols
 
- show local users
 - showing
 - snapshot schedules, Managing automated snapshots
 
- size of a LUN for an iSCSI target
 - snapshot of a LUN for an iSCSI target
 - snapshot schedules
 - about, About snapshot schedules
 - creating, Configuring snapshot schedules
 - deleting, Managing automated snapshots
 - displaying, Configuring snapshot schedules
 - modifying, Configuring snapshot schedules
 - preserving, Managing automated snapshots
 - removing, Managing automated snapshots
 - showing, Managing automated snapshots
 
- snapshots
 - about, About snapshots
 - creating, Creating snapshots
 - destroying, Managing disk space used by snapshots
 - displaying, Displaying snapshots
 - displaying quotas, Managing disk space used by snapshots
 - enabling or disabling quota limits, Managing disk space used by snapshots
 - mounting, Bringing snapshots online or taking snapshots offline
 - restoring, Restoring a snapshot
 - that can be exported
 - unmounting, Bringing snapshots online or taking snapshots offline
 
- SNMP
 - filter notifications
 - management server
 - adding, Configuring an SNMP management server
 - deleting configured, Configuring an SNMP management server
 - displaying current list of, Configuring an SNMP management server
 
- MIB file
 - exporting to a given URL, Configuring an SNMP management server
 
- notifications
 - displaying the values of, Configuring an SNMP management server
 
- server
 - setting severity notifications, Configuring an SNMP management server
 
- SNMP notifications
 - about, About SNMP notifications
 
- source and destination clusters
 - source and target clusters
 - specific workload
 - creating a tuned file system, About creating a tuned file system for a specific workload
 
- specified group
 - deleting a severity from, Configuring an email group
 
- specifying
 - DNS name servers, Configuring DNS settings
 
- SSL
 - setting the LDAP server for, Configuring LDAP server settings
 
- standalone mode
 - CIFS server status, Configuring CIFS server status for standalone mode
 - CIFS service, Configuring CIFS server status for standalone mode
 - security, Configuring CIFS server status for standalone mode
 
- starting
 - Access Appliance continuous replication, Starting Access Appliance continuous replication
 - Access Appliance episodic replication, Starting Access Appliance episodic replication
 - CIFS server, Reconfiguring the CIFS service
 - NFS server, Accessing the NFS server
 
- stopping
 - NFS server, Accessing the NFS server
 
- storage pools
 - creating, Configuring storage pools, Adding disks to a storage pool
 - destroying, Configuring storage pools
 - listing, Configuring storage pools
 - listing free space, Configuring storage pools
 - renaming, Configuring storage pools
 
- storage provisioning and management
 - storing
 - account information, About storing account information
 - user and group accounts in LDAP, Storing user and group accounts
 - user and group accounts locally, Storing user and group accounts
 
- striped file systems
 - creating, Creating a file system
 
- striped-mirror file systems
 - creating, Creating a file system
 
- striping file systems
 - about, About striping file systems
 
- switching
 - ctdb clustering mode, About switching the clustering mode
 
- syslog format
 - exporting events to a given URL, Exporting events in syslog format to a given URL
 
- syslog server
 - adding, Configuring a syslog server
 - deleting, Configuring a syslog server
 - displaying the list of, Configuring a syslog server
 - displaying the values of, Configuring a syslog server
 - setting the filter of, Configuring a syslog server
 - setting the severity of, Configuring a syslog server
 
- system files
 - hiding when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
 
T
- troubleshooting
 - about, About troubleshooting
 
- trusted domains
 - allowing access to CIFS when setting an IDMAP backend to ad, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
 - allowing access to CIFS when setting an IDMAP backend to hash, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
 - allowing access to CIFS when setting an IDMAP backend to ldap, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
 - allowing access to CIFS when setting an IDMAP backend to rid, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
 - specifying which are allowed access to the CIFS server, Specifying trusted domains that are allowed access to the CIFS server
 
- tunables for iSCSI
 - modifying, Modifying tunables for iSCSI
 
- tuned file system
 - creating for a specific workload, About creating a tuned file system for a specific workload
 
U
- unexporting
 - share of exported directory, Unexporting a directory or deleting NFS options
 
- UNIX users from LDAP to Windows users
 - automatic mapping of, Automatically mapping UNIX users from LDAP to Windows users
 
- unmounting snapshots, Bringing snapshots online or taking snapshots offline
 - unplanned failback
 - unplanned failover
 - upgrading
 - disk layout versions, Upgrading disk layout versions
 
- Use case
 - configuring the Object Store server, Use cases for configuring the Object Store server
 
- Use cases
 - compressing files, Use cases for compressing files
 
- user and group accounts in LDAP
 - storing, Storing user and group accounts
 
- user and group accounts locally
 - storing, Storing user and group accounts
 
- user names
 - mapping for CIFS/NFS sharing, About mapping user names for CIFS/NFS sharing
 
- users
 - managing, Managing the users
 
- using
 - AD interface, Removing the AD interface
 - history command, Displaying the command history
 - more command, Using the more command
 - multi-domain controller support in CIFS, Using multi-domain controller support in CIFS
 
- Using compression
 - best practices, Best practices for using compression
 
- Using NFS Server, About using the NFS server with Access Appliance
 
V
- verifying
 - Access Appliance has joined Active Directory (AD), Verifying that Access Appliance has joined Active Directory (AD) successfully
 
- viewing
 - information about disks, Viewing information about disks
 - list of initiators for an iSCSI target, Viewing the list of initiators for an iSCSI target
 - list of snapshots for an iSCSI target, Viewing the list of snapshots for an iSCSI target
 - LUNs for an iSCSI target, Viewing the list of LUNs for an iSCSI target
 - portal IPs for an iSCSI target, Viewing the portal IPs for an iSCSI target
 
- viewing information
 - about S3, Viewing information about S3
 
- VLAN
 - adding interfaces, Configuring VLAN interfaces
 - configuring interfaces, Configuring VLAN interfaces
 - deleting interfaces, Configuring VLAN interfaces
 - displaying interfaces, Configuring VLAN interfaces
 
W
- what to replicate
 - defining, Defining what to replicate
 
- Windows Active Directory
 - configuring as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
 
- workflow
 - object server, About the Object Store server
 
- WORM over NFS
 - setting, Setting WORM over NFS
 
- WORM-retention over CIFS
 - WWN information
 - displaying, Displaying WWN information