Reference Guide
Contents
Notes, Cautions, and Warnings...................................................................................................2
1 Command Line Interface............................................................................................................7
Overview...................................................................................................................................................................7
Accessing The CLI....................................................................................................................................................7
Navigating The CLI....................................................................................................................................................8
One Menu At A Time..........................................................................................................................................8
Single Line Command.........................................................................................................................................8
Understanding The CLI Command Syntax................................................................................................................8
CLI Menu Options.....................................................................................................................................................9
2 Protecting Data..........................................................................................................................11
replication...............................................................................................................................................................11
nas-replication.................................................................................................................................................11
partner-systems...............................................................................................................................................17
snapshots................................................................................................................................................................19
revert................................................................................................................................................................19
actions..............................................................................................................................................................19
policies.............................................................................................................................................................21
antivirus..................................................................................................................................................................24
hosts.................................................................................................................................................................24
ndmp.......................................................................................................................................................................25
active-jobs........................................................................................................................................................25
configuration....................................................................................................................................................26
3 Managing The System..............................................................................................................27
general....................................................................................................................................................................27
info....................................................................................................................................................................27
cluster-id..........................................................................................................................................................28
background-operations....................................................................................................................................28
administrators..................................................................................................................................................29
cluster-name....................................................................................................................................................31
licensing...........................................................................................................................................................32
time-configuration..................................................................................................................................................33
view..................................................................................................................................................................33
list-timezones...................................................................................................................................................33
set.....................................................................................................................................................................33