Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Acopia Networks 810-0044-00 manuals

810-0044-00 first page preview

810-0044-00

Brand: Acopia Networks | Category: Storage
Table of contents
  1. revision history
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Back-end Storage and Servers
  20. Resilient Overlay Network (RON)
  21. Document Conventions
  22. CLI Overview
  23. Cfg Mode
  24. The no Convention
  25. Getting Started
  26. Sample Network
  27. Contacting Customer Service
  28. Today's File Storage
  29. Optimizing Storage in a Namespace Volume
  30. adapting storage to user demands
  31. migration for capacity
  32. migration for class of storage: file-placement policy
  33. controlling costs
  34. specifying the windows domain
  35. specifying the username and password
  36. listing all proxy users
  37. configuring the ntlm authentication server
  38. listing ntlm authentication servers
  39. displaying detailed server status
  40. adding an active-directory forest (kerberos)
  41. adding a redundant forest root
  42. identifying a dynamic-dns server
  43. removing a name server
  44. adding a child domain
  45. removing a child domain
  46. adding a tree domain
  47. removing a tree domain
  48. dissolving a forest-to-forest trust
  49. showing one active-directory forest
  50. showing dc status
  51. focusing on a single processor
  52. removing an active-directory forest
  53. authorizing windows-management (mmc) access
  54. removing a user
  55. removing a permission
  56. showing all management-authorization groups
  57. focusing on one group
  58. before you begin
  59. identifying a nis server for the nis domain
  60. removing a nis server
  61. showing details for a nis domain
  62. showing the members of one netgroup
  63. updating the nis database
  64. scheduling regular updates
  65. removing the nis domain-server map
  66. listing all nfs access lists
  67. showing one nfs access list
  68. resolving all netgroups in the access list
  69. setting the nis domain
  70. adding a permit rule
  71. permitting a netgroup
  72. rule ordering
  73. removing a permit rule
  74. changing the anonymous user id
  75. reverting to the default user id
  76. removing a deny rule
  77. adding a description
  78. removing an access list
  79. examining cifs shares
  80. using proxy-user credentials
  81. showing the physical paths for cifs shares
  82. focusing on one share
  83. showing connectivity only
  84. showing capabilities only
  85. showing shares only
  86. showing time settings
  87. probing for cifs security
  88. adding an external filer
  89. providing the filer's ip address
  90. removing a secondary address
  91. re-instating a directory
  92. adding a description (optional)
  93. setting the cifs port (optional)
  94. showing external-filer details
  95. showing details for all external filers
  96. removing an external filer
  97. listing all namespaces
  98. showing details for all namespaces
  99. showing shares behind one namespace
  100. removing a protocol
  101. changing protocols after import
  102. setting cifs character encoding
  103. configuring windows authentication (cifs)
  104. using kerberos for client authentication
  105. identifying the ntlm authentication server
  106. multi-domain support
  107. removing an ntlm-authentication server
  108. selecting a sam-reference filer
  109. enabling all shares in the namespace
  110. showing namespace configuration
  111. removing a namespace
  112. declaring the volume "direct
  113. reverting to a managed volume
  114. adding a share
  115. showing supported protocols at the filer
  116. using a managed volume as a filer
  117. attaching a virtual directory to the back-end share
  118. removing an attach point
  119. freespace ignore
  120. removing a direct share
  121. default-vpu assignment
  122. sample - configuring a direct volume
  123. removing a direct volume
  124. storing volume metadata on a dedicated share
  125. using multiple metadata shares
  126. removing a metadata share
  127. designating the metadata share as critical (optional)
  128. migrating metadata to a new share after import
  129. import multi-scan
  130. reverting to unprotected metadata and faster import
  131. safe modes for share imports into pre-enabled volumes
  132. conditions for running the modify command
  133. running a no-modify import
  134. preventing modification on or after re-import
  135. automatically synchronizing metadata (cifs)
  136. allowing renames on collision
  137. disallowing renames
  138. supporting filers with local groups
  139. supporting subshares and their acls
  140. required windows permissions
  141. replicating subshares at all of the volume's filers
  142. disabling filer subshares
  143. showing available filer shares
  144. disconnecting from the filer before the share is enabled
  145. reinstating the directory test
  146. import sync-attributes
  147. preventing directory renames during import
  148. allowing directory renames on import
  149. preventing file renames during import
  150. allowing file renames in import
  151. ignoring sid errors from the filer (cifs)
  152. acknowledging sid errors
  153. examining the shareenablesubshareinc report (cifs)
  154. removing a managed-volume share
  155. vpu limits for managed volumes and shares
  156. changing the number of reserved files
  157. reverting to the default number of reserved files
  158. taking ownership of all shares (optional)
  159. monitoring the import
  160. import errors
  161. canceling a share import
  162. sample - configuring a managed volume
  163. removing a managed volume
  164. adding a global server
  165. setting the windows domain (cifs only)
  166. adding a virtual server
  167. registering with a wins server (cifs)
  168. removing the wins-server setting
  169. setting the netbios name (optional, cifs)
  170. adding a netbios alias
  171. reverting to the default netbios name
  172. disabling a virtual server
  173. enabling the global server
  174. showing one global-server
  175. removing a global server
  176. sample - configuring a global server
  177. configuring nfs
  178. exporting a namespace volume
  179. stopping an nfs export
  180. disabling nlm (optional)
  181. enabling nlm
  182. notifications to nlm clients
  183. showing one nfs service
  184. sample - configuring an nfs front-end service
  185. removing an nfs service
  186. showing the nfs/tcp timeout
  187. exporting a filer subshare (and using its acl)
  188. exposing hidden subshares
  189. exporting all filer subshares at once
  190. exposing all hidden subshares
  191. adding new subshares
  192. allowing clients to use windows management (mmc)
  193. client experience: using mmc to manage a namespace
  194. disallowing windows-management access
  195. setting a server description (optional)
  196. enabling cifs service
  197. support for both ntlm and kerberos
  198. replacing back-end services
  199. update schedule for dns "a" records
  200. removing a host name
  201. clearing records of failed deletes
  202. supporting aliases with kerberos
  203. listing cifs services
  204. showing all cifs services
  205. sample - configuring a cifs front-end service
  206. removing a cifs service
  207. removing all of a volume's front-end exports
  208. showing all front-end services
  209. showing front-end services per virtual-server
  210. showing the services at the redundant peer
  211. showing server maps
  212. with filer ip addresses
  213. showing the servers behind one virtual server
  214. showing the servers behind one namespace
  215. showing server status
  216. showing all policy rules
  217. showing details
  218. showing details for the namespace
  219. showing details for the volume
  220. adding a share farm
  221. adding a share to the farm
  222. removing a share from a share farm
  223. auto migrating existing files
  224. balancing new files based on free space
  225. based on latency (bandwidth)
  226. maintaining minimum free space
  227. disabling the free-space threshold
  228. distributing new files
  229. constraining directories below a certain depth
  230. not constraining directories
  231. stopping all share-farm rules
  232. creating a schedule
  233. setting the duration (optional)
  234. setting the start time (optional)
  235. showing all schedules
  236. showing one schedule
  237. pausing all rules in a volume
  238. resuming all policies in a volume
  239. pausing on a schedule
  240. draining one or more shares
  241. identifying the source share(s)
  242. generating a verbose report
  243. disabling file retention
  244. verifying that all files are removed
  245. removing all policy objects from a namespace
  246. removing all policy objects from a volume
  247. file-attribute migrations
  248. from a netapp filer, unix qtree
  249. from an emc filer
  250. from a unix/smb filer with acls
  251. some cifs applications block out migrations
  252. setting a directory path (optional)
  253. disabling recursive matches
  254. using a complex regular expression
  255. regular expression syntax
  256. shorthand for character groups
  257. for more information
  258. reverting to the root path
  259. matching filenames (optional)
  260. excluding files
  261. grouping files by size
  262. selecting files based on their sizes
  263. grouping files by age
  264. selecting files based on their ages
  265. choosing last-accessed or last-modified
  266. identifying a source fileset (optional)
  267. setting the age-evaluation interval (optional)
  268. reverting to the default evaluation interval
  269. reverting to the default start time
  270. joining filesets
  271. intersecting filesets
  272. listing all filesets
  273. showing one global fileset
  274. showing filesets in a managed volume
  275. directing file placement
  276. matching directories only
  277. matching and promoting directories
  278. promoting directories on a target share farm
  279. matching directory trees (directories and files)
  280. limiting the selection to particular source share(s) (optional)
  281. disabling inline notifications (optional)
  282. showing the effects of file placement
  283. moving the rule to the beginning or end
  284. adding a shadow volume (target switch)
  285. compatible software releases
  286. allowing modifications
  287. turning off shadowing
  288. specifying a fileset to copy (source switch)
  289. configuring a shadow-copy rule (source switch)
  290. choosing a shadow-volume target
  291. using a path in the shadow volume
  292. removing the shadow-volume target
  293. applying a schedule
  294. including identical files in reports
  295. supporting local groups (cifs)
  296. translating local sids
  297. copying files opened through cifs
  298. allowing only reads during the shadow copy
  299. support for multi-protocol volumes
  300. enabling pruning
  301. copying all directories
  302. publishing individual files
  303. removing any bandwidth limit
  304. reverting to the default
  305. enabling the shadow-copy rule
  306. focusing on one rule
  307. report format
  308. reformatting the report
  309. truncating the report
  310. copying the source volume to multiple targets
  311. Table Of Contents
Acopia Networks categories
More Acopia Networks categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine