Reference Guide

access-control local-groups restore................................................................................................. 36
access-control local-groups view..................................................................................................... 36
access-control local-users add..........................................................................................................37
access-control local-users change-password..................................................................................38
access-control local-users delete......................................................................................................39
access-control local-users edit..........................................................................................................39
access-control local-users list...........................................................................................................40
access-control local-users restore.................................................................................................... 41
access-control local-users view.........................................................................................................41
access-control local-users view-groups...........................................................................................42
access-control local-users without-password-complexity-checks add-user................................42
access-control local-users without-password-complexity-checks change-password.................43
access-control mapping manual add................................................................................................44
access-control mapping manual delete............................................................................................44
access-control mapping manual edit................................................................................................ 45
access-control mapping manual list..................................................................................................46
access-control mapping manual restore.......................................................................................... 46
access-control mapping manual view...............................................................................................47
access-control mapping policy edit.................................................................................................. 48
access-control mapping policy view.................................................................................................48
access-control users-database edit...................................................................................................48
access-control users-database view................................................................................................. 49
access-control users-list.................................................................................................................... 50
events auditing view............................................................................................................................ 51
events auditing list............................................................................................................................... 51
events auditing summary-list............................................................................................................. 53
events system list................................................................................................................................ 53
events system summary-list............................................................................................................... 54
events system view..............................................................................................................................55
hardware destroy-cluster destroy-and-change-model................................................................... 56
hardware fabrics add...........................................................................................................................56
hardware fabrics fc list........................................................................................................................ 57
hardware fabrics fc view..................................................................................................................... 57
hardware fabrics iSCSI add................................................................................................................. 58
hardware fabrics iSCSI delete.............................................................................................................59
hardware fabrics iSCSI edit................................................................................................................. 59
hardware fabrics iSCSI list.................................................................................................................. 60
hardware fabrics iSCSI-portals add-IPv4...........................................................................................60
hardware fabrics iSCSI-portals delete-IPv4....................................................................................... 61
hardware fabrics iSCSI-portals disable-authentication..................................................................... 61
hardware fabrics iSCSI-portals enable-authentication..................................................................... 62
hardware fabrics iSCSI-portals rediscover-all................................................................................... 62
4