
StorTrends® iTX Software CLI (Command Line Interface) (Version 2.7) User’s Guide
iv
Table of Contents
Revision History......................................................................................................................................... ii
Table of Contents ..................................................................................................................................... iv
Table of Contents ..................................................................................................................................... iv
Limited Warranty ....................................................................................................................................... v
Limitations of Liability ................................................................................................................................ v
Technical Support...................................................................................................................................... v
Web Site ................................................................................................................................................ v
Disclaimer................................................................................................................................................. vi
Chapter 1
Overview of CLI ..................................................................................................................... 1
Preface ...................................................................................................................................................... 1
Overview of CLI ......................................................................................................................................... 1
Accessing CLI............................................................................................................................................ 1
Initial Setup ................................................................................................................................................ 2
Network Configuration ........................................................................................................................... 2
Volume Configuration ................................................................................................................................ 3
1. RAID Disk Creation............................................................................................................................ 3
2. Container and Volume Configuration................................................................................................. 4
3. Enabling Share or Target................................................................................................................... 5
Chapter 2
Command Set ........................................................................................................................ 7
Command Set............................................................................................................................................ 7
Alert Configuration..................................................................................................................................... 9
Date/Time Configuration.......................................................................................................................... 10
Domain Configuration .............................................................................................................................. 10
Event log Commands .............................................................................................................................. 11
Firewall Configuration .............................................................................................................................. 12
General Server Configuration.................................................................................................................. 13
Health Configuration ................................................................................................................................ 13
iSCSI Configuration ................................................................................................................................. 14
License configuration............................................................................................................................... 16
Network Controller Configuration ............................................................................................................ 17
NAS Quota Configuration ........................................................................................................................ 18
NAS User / Group Configuration ............................................................................................................. 19
Protocol Configuration ............................................................................................................................. 20
RAID & Disk Management Commands ................................................................................................... 21
Share, Directory & ACL Configuration..................................................................................................... 24
System Control Configuration ................................................................................................................. 26
Volume and Snapshot Commands.......................................................................................................... 26
UPS Configuration ................................................................................................................................... 29
Synchronous replication .......................................................................................................................... 30
Asynchronous Replication ....................................................................................................................... 33
Journal Volume Management ................................................................................................................. 39
Continuous Data Protection..................................................................................................................... 41
Recovery Wizard ..................................................................................................................................... 41
Storage Resource Management ............................................................................................................. 42
Local and Replicated Snapshot validation ..............................................................................................43
Appendix A
Error Codes ...................................................................................................................... 45