American Megatrends MAN-STOR-ITX27-CLI manual Command Argument Description

Page 21

Command

Argument

Description

 

-c/--containername <containername>

 

 

-m/--mode {0/1/2}

0 – Write through

 

For example: set –t lunwritecachemode –v v1 –c c1

1 – Write back

 

–m 0 iscsi

 

add iscsi

-t/--type {processor}

Adds the processor to the specified

 

-n/--targetname <target suffix>

target (used for backup).

remove iscsi

-t/--type {processor}

Removes the processor from the

 

-n/--targetname <target suffix>

specified target.

get iscsi

-t/--type {statistics}

Gets the iSCSI statistics, for

 

For example: get –t statistics iscsi

example, No. of iSCSI PDU sent

 

 

and received, payload, and

 

 

login/session failures.

get iscsi

-t/--type {portalstatus}

Gets the iSCSI Portal Status.

 

-p/--ipaddress <ipaddress>

 

get iscsi

-t/--type {servicestatus}

Gets the iSCSI service status.

 

 

(Active/Inactive)

add iscsi

-t/--type {lun}

Adds the LUN to the specified

 

-v/--volumename <volume name>

target.

 

-c/--containername <container name>

 

 

-n/--targetname <targetsuffix>

 

remove iscsi

-t/--type {lun}

Removes the LUN from the

 

-v/--volumename <volume name>

specified target.

 

-c/--containername <container name>

 

 

-n/--targetname <target suffix>

 

get iscsi

-t/--type {sessions}

Gets the current sessions details

 

For example: get –t sessions iscsi

including session id.

remove iscsi

-t/--type {session}

Terminates the session with the

 

-s/--sessionid <session id>

given ID. To avoid automatic

 

 

reconnection by the initiator, you

 

 

will need to change the security

 

 

settings for that target prior to

 

 

termination.

list iscsi

-t/--type {tgt}

Gets the List of Targets available.

list iscsi

-t/--type {lun}

Gets the available LUNs in the

 

-n/--targetname <target suffix>

given target.

get iscsi

-t/--type {tgtauthsettings}

Gets the Authorization settings for

 

-n/--targetname <target suffix>

the target.

set iscsi

-t/--type {peersecret}

Sets the peer secret for the initiator.

 

-i/--initiatorname < initiatorname. (Default : none)>

You will be prompted to enter this

 

-s/--peersecret

twice.

 

For example: set –t peersecret –I iqn.1991-

 

 

10.com.microsoft:newbox –s iscsi

 

set iscsi

-t/--type {tgtauthsettings}

Sets the Authorization settings for

 

-n/--targetname <targetsuffix>

the target. The secret name should

 

-u/--username <user name ‘none’ for default >

be at least 12 characters in size

 

-r/--secretname <user password ‘none’ for default >

This will give exclusive access to

 

-i/--initiatorname <initiator name – ‘none’ for

the LUN for the specified user and

 

default>

initiator for maximum security.

get iscsi

-t/--type {lun}

Gives the LUN's Information for

 

-n/--targetname <target suffix>

the specified target.

 

-v/--volumename<volumename>

 

 

-c/--containername<containername>

 

 

-i/--info

 

get iscsi

-t/--type {tgtoptimizations}

Gives the Target's Optimization

 

-n/--targetname <target name>

settings (i.e. whether multiple

 

 

initiator logins are supported).

set iscsi

-t/--type {tgtoptimizations}

Sets the Target's Optimization

 

-n/--targetname <target suffix>

settings to allow/disallow multiple

 

-p/ --multiplesession {y/n}

initiators logging in to a target

 

-g/--nopinterval < nop ping internal >

simultaneously.

Chapter Two: Command Set 15

Image 21
Contents MAN-STOR-ITX27-CLI 06/07/2010 Revision History Preface Table of Contents Limited Warranty Limitations of LiabilityTechnical Support Disclaimer Accessing CLI PrefaceOverview of CLI NIC-1 Initial SetupThis will list the available RAID LD’s present in the system Volume ConfigurationPage To create a target, use the following commands Similarly a SAN volume can be created as followsNext step is to activate a port for iSCSI traffic Then, to enable the target, use the syntax belowChapter Command SetCLIshow -h Enter For example To find out how the show command works, typeThese commands configure the way alerts are generated Alert ConfigurationDate/Time Configuration Domain ConfigurationThese commands configure the time zone and date These commands display or clear the event log Event log CommandsThese commands configure the network firewall options Firewall ConfigurationGeneral Server Configuration Health ConfigurationThese commands get the health information ISCSI Configuration Command Argument Description These commands configure the License License configurationNetwork Controller Configuration NAS Quota Configuration NAS User / Group Configuration List retrieved will be given for both instead of singlyFor exmaple set -t user -u test1 -p test1 -f Test1 ug Protocol Configuration RAID & Disk Management Commands Command Argument Description Upgrades the firmware for a These commands work on NAS shares and directory Share, Directory & ACL ConfigurationLevel for NT Volume and Snapshot Commands System Control ConfigurationThese commands configure the System controls 3provisiontype 0-ThinCommand Argument Description Command Argument Description UPS Configuration These commands configure the UPS for power managementXml Synchronous replication For example update -l c0v0 -p 50 -m SyncreplicaFor example Update -l c0v0 -g rg0 syncreplica For example Update -l c0v0 -p 50 -m 172.16.70.102These commands configure asynchronous replication Asynchronous ReplicationUtilization bandwidth utilization Command Argument Description Failedduetorollback Command Argument Description Command Argument Description Command Argument Description These commands configure a journal and journal file Journal Volume ManagementExample Example Get -t journalfile -c Cont0 -f jf0 journalPage These commands are to view cdp for journal file Recovery WizardThese commands are used as part of recovery wizard Continuous Data ProtectionStorage Resource Management These commands are used as part of SRMList the tasks in report, pending Workflow queueLocal and Replicated Snapshot validation These commands are used as part of snap validationPage Appendix a Error Codes Code 175 Error in mounting the share 338 License file read write error Code Code Code Code Description Code Description Code Description

MAN-STOR-ITX27-CLI specifications

American Megatrends Inc. (AMI), a leader in the design and development of innovative hardware and firmware solutions, has made significant strides with its product line, notably with the MAN-STOR-ITX27-CLI model. This compact yet powerful storage solution is designed to meet the evolving needs of modern computing environments, making it a popular choice among tech enthusiasts, system integrators, and IT professionals.

One of the main features of the MAN-STOR-ITX27-CLI is its form factor. Built in the Mini-ITX style, this storage system is optimized for space-saving applications without compromising performance. Its compact design allows it to be integrated into a variety of systems, from home media servers to business workstations, facilitating enhanced flexibility in deployment.

The MAN-STOR-ITX27-CLI utilizes advanced storage technologies to deliver reliable and high-speed data access. It supports multiple storage drives, including SSDs and traditional HDDs, providing users with a choice for speed or capacity according to their specific needs. The RAID configuration support enhances data redundancy and performance, ensuring that critical data remains accessible and secure.

In terms of connectivity, the MAN-STOR-ITX27-CLI is equipped with an array of ports, including USB 3.0, HDMI, and Ethernet, which facilitate seamless integration with other devices. High-speed data transfer rates are achieved, making it ideal for applications requiring quick data retrieval and storage, such as video editing and large-scale data analysis.

Another notable characteristic is its cooling system. The MAN-STOR-ITX27-CLI incorporates an efficient thermal management solution that helps maintain optimal operating temperatures, thus ensuring longevity and stability. This feature is particularly important in high-performance scenarios where excessive heat could impact system reliability.

Furthermore, the MAN-STOR-ITX27-CLI is designed with user-friendly features in mind. It allows for easy upgrades and expansions, making it a future-proof choice as storage demands continue to grow. The intuitive setup process and compatibility with a range of operating systems further simplify installation and management.

In conclusion, the American Megatrends MAN-STOR-ITX27-CLI is a versatile and powerful storage solution that excels in both performance and user convenience. Its advanced technology, compact design, and robust features make it a leading choice for anyone seeking reliable and efficient storage in a dynamic computing environment. With the increasing demand for data-driven solutions, products like the MAN-STOR-ITX27-CLI showcase AMI's commitment to innovation and quality in the field of technology.