User guide

maintenance --help........................................................................................................................................116
5 Managing DR Series System Storage Operations.............................................................118
System Storage Operation Commands.................................................................................................................118
Connection............................................................................................................................................................118
Connection Command Usage ........................................................................................................................118
connection --show [--name <name>] ........................................................................................................... 119
connection --show [--name <name>] [--type <NFS|CIFS|OST|RDS>] [--verbose].........................................119
connection --show [--verbose]...................................................................................................................... 120
connection --add --name <name> --type <NFS|CIFS|OST|RDS> [--clients <ip address>] [--rootmap
<nobody|root|administrator>] [--options <nfs options>] [--capacity <positive integer>].............................. 121
connection --update --name <name> --type <NFS|CIFS|OST|RDS> [--clients <ip address>] [--rootmap
<nobody|root|administrator>] [--options <nfs options>] [--capacity <positive integer>].............................. 121
connection --delete --name <name> --type <NFS|CIFS|OST|RDS> [--clients <ip address>]........................ 122
connection --enable --name <name> --type <NFS|CIFS|OST|RDS>..............................................................122
connection --disable --name <name> --type <NFS|CIFS|OST|RDS>............................................................. 122
connection --help...........................................................................................................................................123
Container.............................................................................................................................................................. 124
Container Command Usage ...........................................................................................................................124
container --show............................................................................................................................................124
container --show [--name <name>] [--verbose]............................................................................................ 124
container --add --name <name>....................................................................................................................125
container --delete --name <name>................................................................................................................125
container --delete --name <name> [--delete_files]....................................................................................... 126
container --marker [--enable <Auto | CommVault | Networker | TSM | ARCserve | HP_DataProtector |
Unix_Dump | BridgeHead>] [--disable <Auto | CommVault | Networker | TSM | ARCserve |
HP_DataProtector | Unix_Dump | BridgeHead>] --name <name>.................................................................126
container --delete_files --name <name>....................................................................................................... 127
container --help..............................................................................................................................................127
Replication............................................................................................................................................................128
Replication Command Usage ........................................................................................................................ 128
replication --show [--name <name>] [--role <source | target>] [--verbose] [--limits]...................................128
replication --show..........................................................................................................................................129
replication --show [--limits]............................................................................................................................129
replication --add --name <name> --role <source | target> --peer <ip address | hostname> [--
peer_name <name>] [--replication_traffic <ip address | hostname>] [--encryption <none | aes128 |
aes256>][--username <user name>].............................................................................................................. 130
replication --add --name <name> --role <source | target> --peer <ip address | hostname> [--
peer_name <name>] [--replication_traffic <ip address | hostname>] [--encryption <none | aes128 |
aes256>][--username <user name>]
.............................................................................................................. 130
replication --update --name <name> --role <source | target> [--peer <ip address | hostname>] [--
encryption <none | aes128 | aes256>] [--username <user name>]................................................................131