Академический Документы
Профессиональный Документы
Культура Документы
0
Command Line Interface Reference Guide
NetApp, Inc.
495 East Java Drive
Sunnyvale, CA 94089 U.S.A.
Telephone: +1 (408) 822-6000
Fax: +1 (408) 822-4501
Support telephone: +1 (888) 4-NETAPP
Documentation comments: doccomments@netapp.com
Information Web: http://www.netapp.com
Part number 215-03955_A0
September 2008
Copyright
information
Copyright 1994-2008 NetApp, Inc. All rights reserved. Printed in the U.S.A.
Part number: 215-03955_A0 (09208_KM40)
Model Number: KM500
No part of this document covered by copyright may be reproduced in any form or by any means
graphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an
electronic retrieval systemwithout prior written permission of the copyright owner.
Portions of this product copyright 2005 Sun Microsystems, Inc. All rights reserved.
This software is provided AS IS, without a warranty of any kind. ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS, AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT, ARE HEREBY EXCLUDED. SUN MICROSYSTEMS, INC. (SUN) AND
ITS LICENSORS SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE
AS A RESULT OF USING, MODIFYING, OR DISTRIBUTING THIS SOFTWARE OR ITS
DERIVATIVES. IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST
REVENUE, PROFIT OR DATA, OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE
THEORY OF LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS
SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
JRE and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in
the United States and other countries.
Portions of this product are derived from FreeBSD, which is copyrighted by FreeBSD. Copyright
1994-2003 FreeBSD, Inc. All rights reserved.
Software derived from copyrighted material of FreeBSD is subject to the following license and
disclaimer:
Redistribution and use of the software in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
THIS SOFTWARE IS PROVIDED BY THE FREEBSD PROJECT AS IS AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE FREEBSD PROJECT OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
ii
iii
Trademark
information
NetApp, the Network Appliance logo, the bolt design, NetAppthe Network Appliance Company,
Cryptainer, Cryptoshred, DataFabric, DataFort, Data ONTAP, Decru, FAServer, FilerView,
FlexClone, FlexVol, Manage ONTAP, MultiStore, NearStore, NetCache, NOW NetApp on the Web,
SANscreen, SecureShare, SnapDrive, SnapLock, SnapManager, SnapMirror, SnapMover,
SnapRestore, SnapValidator, SnapVault, Spinnaker Networks, SpinCluster, SpinFS, SpinHA,
SpinMove, SpinServer, StoreVault, SyncMirror, Topio, VFM, VFM (Virtual File Manager), and
WAFL are registered trademarks of NetApp, Inc. in the U.S.A. and/or other countries. gFiler,
Network Appliance, SnapCopy, Snapshot, and The evolution of storage are trademarks of NetApp,
Inc. in the U.S.A. and/or other countries and registered trademarks in some other countries. The
NetApp arch logo; the StoreVault logo; ApplianceWatch; BareMetal; Camera-to-Viewer;
ComplianceClock; ComplianceJournal; ContentDirector; ContentFabric; EdgeFiler; FlexShare;
FPolicy; Go Further, Faster; HyperSAN; InfoFabric; Lifetime Key Management, LockVault; NOW;
ONTAPI; OpenKey, RAID-DP; ReplicatorX; RoboCache; RoboFiler; SecureAdmin; Serving Data
by Design; SharedStorage; Simplicore; Simulate ONTAP; Smart SAN; SnapCache; SnapDirector;
SnapFilter; SnapMigrator; SnapSuite; SohoFiler; SpinMirror; SpinRestore; SpinShot; SpinStor;
vFiler; Virtual File Manager; VPolicy; and Web Filer are trademarks of NetApp, Inc. in the U.S.A.
and other countries. NetApp Availability Assurance and NetApp ProTech Expert are service marks of
NetApp, Inc. in the U.S.A.
IBM, the IBM logo, AIX, and System Storage are trademarks and/or registered trademarks of
International Business Machines Corporation.
Apple is a registered trademark and QuickTime is a trademark of Apple, Inc. in the U.S.A. and/or
other countries. Microsoft is a registered trademark and Windows Media is a trademark of Microsoft
Corporation in the U.S.A. and/or other countries. RealAudio, RealNetworks, RealPlayer,
RealSystem, RealText, and RealVideo are registered trademarks and RealMedia, RealProxy, and
SureStream are trademarks of RealNetworks, Inc. in the U.S.A. and/or other countries.
All other brands or products are trademarks or registered trademarks of their respective holders and
should be treated as such.
NetApp, Inc. is a licensee of the CompactFlash and CF Logo trademarks. NetApp, Inc. NetCache is
certified RealSystem compatible.
Power supply
notice
The appliance is suitable for IT power systems. Connect each power supply to a separate power
source for failover support.
WARNING: The power supply cord is used as the main disconnect device. Ensure that the socketoutlet is located/installed near the equipment and is easily accessible.
ATTENTION: LE CORDON D'ALIMENTATION EST UTILIS COMME INTERRUPTEUR
GNRAL. LA PRISE DE COURANT DOIT TRE SITUE OU INSTALLE PROXIMIT
DU MATRIEL ET TRE FACILE D'ACCS.
WARNUNG: Das Netzkabel dient als Netzschalter. Stellen Sie sicher, das die Steckdose einfach
zugnglich ist.
WARNING: This product relies on the building's installation for short-circuit (overcurrent)
protection. Ensure that a fuse or circuit breaker no larger than 120 VAC, 15A U.S. (240 VAC, 10A
international) is used on the phase conductors (all current-carrying conductors).
iv
ATTENTION: Pour ce qui est de la protection contre les courts-circuits (surtension), ce produit
dpend de linstallation lectrique du local. Vrifier qu'un fusible ou quun disjoncteur de 120 V alt.,
15 A U.S. maximum (240 V alt., 10 A international) est utilis sur les conducteurs de phase
(conducteurs de charge).
WARNUNG: Dieses Produkt ist darauf angewiesen, da im Gebude ein Kurzschlu- bzw.
berstromschutz installiert ist. Stellen Sie sicher, da eine Sicherung oder ein Unterbrecher von nicht
mehr als 240 V Wechselstrom, 10 A (bzw. in den USA 120 V Wechselstrom, 15 A) an den
Phasenleitern (allen stromfhrenden Leitern) verwendet wird.
VARNING: Apparaten skall anslutas till jordat uttag nr den ansluts till ett ntverk.
OPPMERKSAMHET: Apparatet m kun tilkoples jordet stikkontakt.
WARNING: This unit has more than one power supply connection; all connections must be removed
to remove all power from the unit.
WARNUNG: Diese Einheit verfgt ber mehr als einen Stromanschlu; um Strom gnzlich von der
Einheit fernzuhalten, mssen alle Stromzufuhren abgetrennt sein.
ATTENTION: Cette unit est quipe de plusieurs raccordements d'alimentation. Pour supprimer
tout courant lectrique de l'unit, tous les cordons d'alimentation doivent tre dbranchs.
Lithium battery
notice
This product contains a lithium battery. Although the battery is not field-serviceable, observe the
following warning:
CAUTION: Danger of explosion if battery is replaced with incorrect type. Replace only with the
same type recommended by the manufacturer. Dispose of used batteries according to the
manufacturer's instructions.
ATTENTION: II y a danger d'explosion s'il a remplacement incorrect de la batterie. Remplacer
uniquement avec une batterie du meme type ou d'un type equivalent recommande par le constructeur.
Mettre au rebut les batteries usagees conformement aux instructions du fabricant.
WARNUNG: Bei Einsetzen einer falschen Batterie besteht Explosionsgefahr. Ersetzen Sie die
Batterie nur durch den gleichen oder vom Hersteller empfohlenen Batterietyp. Entsorgen Sie die
benutzten Batterien nach den Anweisungen des Herstellers.
WARNING: TO PREVENT BODILY INJURY WHEN MOUNTING OR SERVICING THE
APPLIANCE, DO NOT LIFT OR CARRY THE UNIT BY THE FRONT PANEL. THE FRONT
PANEL IS INTENDED TO BE AN EASILY DETACHABLE COMPONENT AND IS NOT
DESIGNED TO CARRY PRODUCT WEIGHT.
Perchlorate present
Important: Special handling may apply. See: http://www.dtsc.ca.gov/hazardouswaste/perchlorate/
Rack mounting
notice
Appropriate hardware is provided with the appliance to mount it in an EIA standard 19 rack. Follow
instructions provided in the package to mount the slide rails to the sides of the LKM appliance and
attach the rail mounts to the rack. Then slide the appliance into the rack on the rails and secure the
appliance in place using the provided screws.
WARNING: To prevent bodily injury when mounting or servicing this unit in a rack, take special
precautions to ensure that the system remains stable. These guidelines are provided to ensure your
safety:
This unit should be mounted at the bottom of the rack if it is the only unit in the rack.
When mounting this unit in a partially filled rack, load the rack from the bottom to the top with the
heaviest component at the bottom of the rack.
If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the
unit in the rack.
ATTENTION: Pour viter toute blessure corporelle pendant les oprations de montage ou de
rparation de cette unit en casier, il convient de prendre des prcautions spciales afin de maintenir
la stabilit du systme. Les directives ci-dessous sont destines assurer la protection du personnel.
Si cette unit constitue la seule unit monte en casier, elle doit tre place dans le bas.
Si cette unit est monte dans un casier partiellement rempli, charger le casier de bas en haut en
plaant l'lment le plus lourd dans le bas.
Si le casier est quip de dispositifs stabilisateurs, installer les stabilisateurs avant de monter ou de
rparer l'unit en casier.
WARNUNG: Zur Vermeidung von Krperverletzung beim Anbringen oder Warten dieser Einheit in
einem Gestell mssen Sie besondere Vorkehrungen treffen, um sicherzustellen, da das System stabil
bleibt. Die folgenden Richtlinien sollen zur Gewhrleistung Ihrer Sicherheit dienen:
Wenn diese Einheit die einzige im Gestell ist, sollte sie unten im Gestell angebracht werden.
Bei Anbringung dieser Einheit in einem zum Teil gefllten Gestell ist das Gestell von unten nach
oben zu laden, wobei das schwerste Bauteil unten im Gestell anzubringen ist.
Wird das Gestell mit Stabilisierungszubehr geliefert, sind zuerst die Stabilisatoren zu installieren,
bevor Sie die Einheit im Gestell anbringen oder sie warten.
vi
Table of Contents
1 Top-level commands......................................................................................................
2 db3 commands..............................................................................................................
3 trustee commands.........................................................................................................
4 lkm commands............................................................................................................
16
5 net commands.............................................................................................................
32
6 keyman commands.....................................................................................................
38
7 cli commands...............................................................................................................
44
8 active-role commands.................................................................................................
46
9 domain commands.....................................................................................................
47
10 group commands......................................................................................................
53
11 role commands..........................................................................................................
58
12 user commands.........................................................................................................
60
Page 2 of 144
13 cluster co mmands.....................................................................................................
72
14 db commands............................................................................................................
84
15 system commands....................................................................................................
90
Page 3 of 144
1 TOP-LEVEL COMMANDS
active-role...
authorize +
challenge +
cli...
cluster...
Cluster commands
db...
db3...
domain...
group...
Group commands
help
keyman...
lkm...
net...
Network commands
password
quit
role...
Role commands
system...
System commands
trustee...
user...
User commands
who
whoami
authorize
Purpose:
Usage:
authorize <user>
Parameters:
<user>
username[@domain]
Page 4 of 144
challenge
Purpose:
Usage:
challenge <user>
Parameters:
<user>
username[@domain]
help
Purpose:
Usage:
help
password
Purpose:
Usage:
Options:
-f, --force
--new <new>
New password
--old <old>
Old password
--user <user>
username[@domain]
Page 5 of 144
quit
Purpose:
Usage:
quit
who
Purpose:
Usage:
who
whoami
Purpose:
Usage:
whoami
Page 6 of 144
2 DB3 COMMANDS
db3 restart
db3 techdump
db3 zeroize
db3 restart
Purpose:
Usage:
db3 restart
db3 techdump
Purpose:
Usage:
db3 techdump
db3 zeroize
Purpose:
Usage:
db3 zeroize
Page 7 of 144
3 TRUSTEE COMMANDS
trustee delete
trustee keys...
trustee linkkey...
trustee linkkeysharing...
trustee list
trustee peer...
trustee unapproved...
trustee delete
Purpose:
Usage:
Options:
-i, --id <id>
Trustee ID
trustee list
Purpose:
Usage:
trustee list [-i, --id <id>] [-l, --label <label>] [-n, --limit
<limit>] [-o, --offset <offset>]
Options:
-i, --id <id>
Trustee ID
Page 8 of 144
Usage:
trustee keys export [-c, --cryptainer-path <cryptainer-path>] [-f, -ftp <ftp>] [-k, --key-id <key-id>] [-l, --lun <lun>] [--media-label
<media-label>] [--owner-name <owner-name>] [-p, --password
<password>] [--pool-label <pool-label>] [-d, --port-wwn <port-wwn>]
[--tgt-name <tgt-name>] [-u, --username <username>] <label>
Parameters:
<label>
Options:
-c, --cryptainer-path <cryptainer-path>
Key ID
--media-label <media-label>
--owner-name <owner-name>
--pool-label <pool-label>
--tgt-name <tgt-name>
Usage:
Options:
-f, --ftp <ftp>
Page 9 of 144
Usage:
Options:
-i, --id <id>
Trustee ID
Usage:
trustee linkkey list [-i, --id <id>] [-l, --label <label>] [-n, -limit <limit>] [-o, --offset <offset>]
Options:
-i, --id <id>
Trustee ID
Change the link key which is used for a particular trustee link
Usage:
Parameters:
<label>
<id>
Link Key ID
Page 10 of 144
Usage:
Options:
-i, --id <id>
Link Key ID
Usage:
Options:
-i, --id <id>
Link Key ID
Usage:
Options:
-i, --id <id>
Trustee ID
Page 11 of 144
Usage:
trustee peer list [-i, --id <id>] [-l, --label <label>] [-n, --limit
<limit>] [-o, --offset <offset>]
Options:
-i, --id <id>
Trustee ID
Get a secret shared trustee authorization token. The secretsharing is done using the specified
recovery cards
Usage:
trustee unapproved approve [-i, --id <id>] [-l, --label <label>] [-t,
--type <type>]
Options:
-i, --id <id>
Trustee ID
Page 12 of 144
Usage:
Parameters:
<label>
<mylabel>
Usage:
Options:
-i, --id <id>
Trustee ID
Usage:
trustee unapproved list [-i, --id <id>] [-l, --label <label>] [-n, -limit <limit>] [-o, --offset <offset>]
Options:
-i, --id <id>
Trustee ID
Page 13 of 144
Usage:
Options:
-f, --ftp <ftp>
Usage:
Options:
-q, --quiet
-v, --verbose
Page 14 of 144
Usage:
Usage:
Parameters:
<label>
Options:
-f, --ftp <ftp>
Page 15 of 144
4 LKM COMMANDS
lkm db...
ConfigDB commands
lkm doc
lkm key...
Key commands
lkm openkey
lkm restart
lkm server...
Server commands
lkm status
lkm test
lkm zeroize
Page 16 of 144
Usage:
lkm doc
Purpose:
Usage:
lkm doc
lkm restart
Purpose:
Usage:
lkm restart
Usage:
lkm status
Purpose:
Usage:
Options:
-v, --verbose
Page 17 of 144
lkm test
Purpose:
Usage:
lkm test [--all] [--key-parse] [--key-share] [--key-translation] [-key-vault-encrypt] [--key-vault-sign] [--time-key-generate <time-keygenerate>] [--time-key-translation <time-key-translation>] [-verbose]
Options:
--all
--key-parse
--key-share
--key-translation
Exercises SEP
--key-vault-encrypt
--key-vault-sign
--time-key-generate <time-key-generate>
--time-key-translation <time-keytranslation>
--verbose
Benchmark Translation
Output all status (output failures only by default)
lkm zeroize
Purpose:
Usage:
Options:
--keep_journal
--keep_key_db
--keep_remote_cdbs
lkm db export +
lkm db list
lkm db remove +
Page 18 of 144
lkm db copy
Purpose:
Usage:
Parameters:
<from>
Database Name
<to>
lkm db export
Purpose:
Usage:
Parameters:
<db>
Options:
-f, --ftp-dir <ftp-dir>
lkm db list
Purpose:
Usage:
lkm db list
lkm db remove
Purpose:
Usage:
Parameters:
<dbfile>
Database to remove
Page 19 of 144
Page 20 of 144
Usage:
Usage:
Usage:
lkm key export [-f, --ftp <ftp>] [-n, --limit <limit>] [-o, --offset
<offset>] [--order <order>] [--order-by <order-by>] [-p, --password
<password>] [-s, --seqnum <seqnum>] [-u, --username <username>]
Options:
-f, --ftp <ftp>
--order <order>
asc | desc
--order-by <order-by>
Usage:
lkm key import [-f, --ftp <ftp>] [-p, --password <password>] [-u, -username <username>] [-w, --webfile <webfile>]
Options:
-f, --ftp <ftp>
Page 21 of 144
Usage:
lkm key list [-n, --limit <limit>] [-o, --offset <offset>] [--order
<order>] [--order-by <order-by>] [--verify-show <verify-show>] [-verify-skip]
Options:
-n, --limit <limit>
--order <order>
asc | desc
--order-by <order-by>
--verify-show <verify-show>
--verify-skip
Usage:
Parameters:
<peer>
IP address
List all key sharing groups this LKM appliance knows about
Usage:
lkm key sharing group list [-n, --limit <limit>] [-o, --offset
<offset>]
Options:
-n, --limit <limit>
Page 22 of 144
Usage:
Options:
--reset
Usage:
Usage:
lkm key verify [-a, --all] [-n, --limit <limit>] [-o, --offset
<offset>] [--order <order>] [--order-by <order-by>] [--skipverification]
Options:
-a, --all
--order <order>
asc | desc
--order-by <order-by>
--skip-verification
Usage:
Page 23 of 144
Usage:
Parameters:
<attr_type>
<is_primary_key>
<attr_name>
<attr_display_name>
Usage:
lkm key attribute list [-n, --limit <limit>] [-o, --offset <offset>]
Options:
-n, --limit <limit>
Usage:
lkm key journal list [-n, --limit <limit>] [-o, --offset <offset>]
Options:
-n, --limit <limit>
Page 24 of 144
Usage:
Options:
-i, --init-time
-r, --recompute
Recompute statistics
Usage:
Usage:
Options:
-o, --overwrite
Overwrite entries
Page 25 of 144
Usage:
Usage:
Page 26 of 144
Usage:
Usage:
lkm openkey enroll set [-t, --endtime <endtime>] [-k, --ksg <ksg>]
[-m, --netmask <netmask>] [-o, --only-added] [-p, --port <port>] [-b,
--range-begin <range-begin>] [-e, --range-end <range-end>] [-s, -subnet <subnet>] <mode>
Parameters:
<mode>
off|auto|manual
Options:
-t, --endtime <endtime>
Cut-off time for accepting enrollment requests. 'YYYY-MMDD HH:MM:SS' Default is forever.
Default key sharing group. Name must begin and end with
forward slash delimiter.
Only accept peers from this subnet. Used with -s, not -b or
-e. Default 0.0.0.0.
-o, --only-added
Only accept peers from this ip range. Used with -e, not -s
or -m. Default 0.0.0.0.
Only accept peers from this ip range. Used with -b, not -s
or -m. Default 255.255.255.255.
Only accept peers from this subnet. Used with -m, not -b or
-e. Default 0.0.0.0.
Page 27 of 144
Usage:
lkm openkey enroll pending accept [-a, --all] [-k, --ksg <ksg>] [-m,
--netmask <netmask>] [-s, --subnet <subnet>]
Options:
-a, --all
Usage:
Parameters:
<ip>
IP address
Options:
-t, --text
Usage:
lkm openkey enroll pending list [-c, --count] [-i, --ip <ip>] [-n, -limit <limit>] [-o, --offset <offset>]
Options:
-c, --count
Page 28 of 144
Usage:
Options:
-a, --all
Certificate commands
Usage:
Parameters:
<peer>
IP address
Options:
--key-sharing-group <key-sharing-group>
--protocol <protocol>
xml
Shared secret
--trustee <trustee>
--type <type>
Page 29 of 144
Usage:
lkm server list [-c, --count] [-i, --ip <ip>] [-n, --limit <limit>]
[-o, --offset <offset>]
Options:
-c, --count
Usage:
Parameters:
<peer>
IP address
Usage:
Parameters:
<peer>
IP address
Options:
--key-sharing-group <key-sharing-group>
--protocol <protocol>
binary | xml
--trustee <trustee>
Page 30 of 144
Usage:
Parameters:
<peer>
IP address
Usage:
Parameters:
<peer>
IP address
<certificate>
Certificate
Page 31 of 144
5 NET COMMANDS
net apply
net status
net util...
Network utilities
net apply
Purpose:
Usage:
Options:
--httpd
Restart httpd
--sshd
Restart sshd
Usage:
Usage:
Parameters:
<ifname>
Page 32 of 144
net status
Purpose:
Usage:
Options:
-q, --quiet
-v, --verbose
Ping a host
Usage:
Options:
-a
-d
-n
Usage:
Parameters:
<hostname>
Hostname or IP address
Page 33 of 144
Usage:
net util ifconfig [-C] [-L] [-a] [-d] [-l] [-m] [-u]
Options:
-C
-L
-a
-d
-l
-m
-u
Page 34 of 144
Usage:
Usage:
net util netstat [-I <>] [-L] [-W] [-a] [-b] [-d] [-e] [-f <>] [-i]
[-m] [-n] [-p <>] [-r] [-s]
Options:
-I <>
-L
-W
-a
-b
-d
-e
-f <>
-i
-m
-n
-p <>
-r
-s
Page 35 of 144
Ping a host
Usage:
net util ping [-I <>] [-S <>] [-c <>] [-s <>] <hostname>
Parameters:
<hostname>
Hostname or IP address
Options:
-I <>
-S <>
-c <>
-s <>
Usage:
Parameters:
<interface>
Page 36 of 144
Usage:
Parameters:
<interface>
<filter>
Packet-matching filter
Options:
-x, --file <file>
Usage:
Parameters:
<interface>
Usage:
Parameters:
<interface>
Page 37 of 144
6 KEYMAN COMMANDS
keyman cryptainerkeys...
keyman expirekeys
keyman lkmkeys...
keyman masterkeys
keyman purgekeys...
keyman set
Usage:
Options:
-d, --dk-id <dk-id>
Domain Key ID
keyman expirekeys
Purpose:
Usage:
Options:
-c, --coordinator
Page 38 of 144
keyman masterkeys
Purpose:
Usage:
Options:
-g, --generation <generation>
Master Key ID
keyman set
Purpose:
Usage:
Options:
-k, --ck-id <ck-id>
Cryptainer Key ID
Page 39 of 144
Usage:
Parameters:
<no-of-keys>
No of keys to generate
Options:
-x, --exportable <exportable>
Usage:
keyman cryptainerkeys list [-k, --ck-id <ck-id>] [--expired] [-n, -limit <limit>] [-o, --offset <offset>] [--readonly]
Options:
-k, --ck-id <ck-id>
Cryptainer Key ID
--expired
--readonly
Usage:
Parameters:
<ck-id>
<new-name>
Page 40 of 144
Usage:
Usage:
Options:
-k, --ck-id <ck-id>
Cryptainer Key ID
Domain Key ID
-n, --iscsi-owner-name <iscsi-owner-name> iSCSI Owner Name
-n, --iscsi-tgt-name <iscsi-tgt-name>
iSCSI Target Name
-s, --lower-limit-timestamp <lower-limit- Lower limit timestamp: local time (not UTC): 'YYYY-MM-DD
timestamp>
[hh:mm:ss]' or 'now'
-l, --lun <lun>
Logical Unit Number
--media-label <media-label>
--pool-label <pool-label>
Page 41 of 144
Usage:
keyman lkmkeys list [-k, --ck-id <ck-id>] [-d, --dk-id <dk-id>] [-n,
--iscsi-owner-name <iscsi-owner-name>] [-n, --iscsi-tgt-name <iscsitgt-name>] [-s, --lower-limit-timestamp <lower-limit-timestamp>] [-l,
--lun <lun>] [--media-label <media-label>] [--pool-label <poollabel>] [-p, --port-wwn <port-wwn>] [-v, --server <server>] [-f, -upper-limit-timestamp <upper-limit-timestamp>]
Options:
-k, --ck-id <ck-id>
Cryptainer Key ID
Domain Key ID
--pool-label <pool-label>
Page 42 of 144
Usage:
Usage:
keyman purgekeys start [-a, --age <age>] [-k, --ck-id <ck-id>] [-r,
--remove-tape-history]
Options:
-a, --age <age>
Age in days
Cryptainer Key ID
-r, --remove-tape-history
Usage:
Usage:
Page 43 of 144
7 CLI COMMANDS
cli complete
cli cshelp...
cli documentation
cli format +
cli pager +
cli complete
Purpose:
Usage:
cli complete
cli documentati on
Purpose:
Usage:
Options:
-n, --name-only
cli format
Purpose:
Usage:
Parameters:
<format>
Page 44 of 144
cli pager
Purpose:
Usage:
Parameters:
<on|off>
Usage:
Usage:
Usage:
Page 45 of 144
active-role add +
active-role list
active-role remove +
Usage:
Parameters:
<active-role>
Usage:
active-role list
Usage:
Parameters:
<active-role>
Page 46 of 144
9 DOMAIN
COMMANDS
domain add +
Add a domain
domain list
List domains
domain migrate +
domain remove +
Remove a domain
domain set +
domain validate +
Page 47 of 144
domain add
Purpose:
Add a domain
Usage:
Parameters:
<name>
Domain name
<type>
<cifs|nfs>
<subtype>
<local|windows|nis|ldap|userless>
Options:
--auto-import <auto-import>
--kdc <kdc>
--krb-realm <krb-realm>
Kerberos Realm
--ldap-bind-dn <ldap-bind-dn>
--ldap-schema <ldap-schema>
--netbios <netbios>
--search-dn-list <search-dn-list>
--server <server>
Server name
Usage:
Parameters:
<name>
Domain name
Options:
--netbios <netbios>
Page 48 of 144
Usage:
domain group list [-g, --group <group>] [-n, --num-of-groups <num-ofgroups>] <domain>
Parameters:
<domain>
Name of domain
Options:
-g, --group <group>
Usage:
Parameters:
<domain>
Name of domain
Options:
-p, --password <password>
password
User name
domain list
Purpose:
List domains
Usage:
Options:
-n, --limit <limit>
--name <name>
Domain name
--netbios <netbios>
--server <server>
Server name
--type <type>
<cifs|nfs>
Page 49 of 144
domain migrate
Purpose:
Usage:
Parameters:
<source-domain>
<dest-domain>
domain remove
Purpose:
Remove a domain
Usage:
Parameters:
<domain name>
Name of domain
Options:
-f, --forced
Remove all users and groups in the domain along with the
domain
Page 50 of 144
domain set
Purpose:
Usage:
Parameters:
<domain name>
Name of domain
Options:
--auto-import <auto-import>
--kdc <kdc>
--krb-realm <krb-realm>
Kerberos Realm
--ldap-bind-dn <ldap-bind-dn>
--ldap-schema <ldap-schema>
--netbios <netbios>
--search-dn-list <search-dn-list>
--server <server>
Server name
Usage:
Parameters:
<domain>
Name of domain
Options:
-n, --num-of-users <num-of-users>
Page 51 of 144
domain validate
Purpose:
Usage:
Parameters:
<name>
Domain name
Page 52 of 144
10 GROUP COMMANDS
group add +
Add a group
group group...
group list
List groups
group remove +
Remove a group
group review
group role...
group add
Purpose:
Add a group
Usage:
Parameters:
<group>
Usage:
Parameters:
<domain>
Name of domain
Page 53 of 144
group list
Purpose:
List groups
Usage:
Options:
-c, --count-only
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--icase
--name <name>
Group name
--sid <sid>
Windows security id
group remove
Purpose:
Remove a group
Usage:
Parameters:
<group>
group review
Purpose:
Usage:
Options:
-q, --quiet
-v, --verbose
Page 54 of 144
Usage:
Options:
--domain <domain>
--domain-type <domain-type>
--flags <flags>
--group <group>
--group-domain <group-domain>
--group-domain-type <group-domain-type>
--icase
--name <name>
--uflags <uflags>
Page 55 of 144
Usage:
group group parentlist [--domain <domain>] [--domain-type <domaintype>] [--flags <flags>] [--group <group>] [--group-domain <groupdomain>] [--group-domain-type <group-domain-type>] [--icase] [-n, -limit <limit>] [--name <name>] [-o, --offset <offset>] [--uflags
<uflags>]
Options:
--domain <domain>
--domain-type <domain-type>
--flags <flags>
--group <group>
--group-domain <group-domain>
--group-domain-type <group-domain-type>
--icase
--name <name>
--uflags <uflags>
Usage:
Parameters:
<role>
<group>
Page 56 of 144
Usage:
Parameters:
<role>
<group>
Page 57 of 144
11 ROLE COMMANDS
role list
List roles
role list
Purpose:
List roles
Usage:
Options:
-c, --count-only
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--icase
--name <name>
Group name
--sid <sid>
Windows security id
Page 58 of 144
Usage:
role path list [--domain <domain>] [--domain-type <domain-type>] [-flags <flags>] [--group <group>] [--group-domain <group-domain>] [-group-domain-type <group-domain-type>] [--icase] [-n, --limit
<limit>] [--name <name>] [-o, --offset <offset>] [--uflags <uflags>]
Options:
--domain <domain>
--domain-type <domain-type>
--flags <flags>
--group <group>
--group-domain <group-domain>
--group-domain-type <group-domain-type>
--icase
--name <name>
--uflags <uflags>
Page 59 of 144
12 USER COMMANDS
user add +
user cifs...
user comers...
user group...
user home...
user list
user remove +
user role...
user set +
user add
Purpose:
Usage:
Parameters:
<group>
Group/role name
<username>
Options:
--dcrcert <dcrcert>
Pre-assigned certificate
--dcrid <dcrid>
Pre-assigned ID
--domain <domain>
Domain
--fullname <fullname>
Full name
--icase
--id <id>
--local
--localcert <localcert>
Local certificate
--localid <localid>
Local ID
--password <password>
User password
Page 60 of 144
user list
Purpose:
Usage:
Options:
-c, --count-only
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--fullname <fullname>
Full name
--gid <gid>
Unix group id
--icase
--id <id>
Unix id
--name <name>
Name
--sid <sid>
Windows security id
user remove
Purpose:
Usage:
Parameters:
<user>
username[@domain]
Options:
--icase
--id <id>
Unix id
Page 61 of 144
user set
Purpose:
Usage:
Parameters:
<user>
username[@domain]
Options:
--dcrcert <dcrcert>
Pre-assigned certificate
--dcrid <dcrid>
Pre-assigned ID
--fullname <fullname>
Full name
--id <id>
--localcert <localcert>
Local certificate
--localid <localid>
Local ID
--newpass <newpass>
-r, --resetpass
Usage:
Parameters:
<user>
username[@domain]
Page 62 of 144
Usage:
Parameters:
<user>
username[@domain]
Usage:
user cifs validate [--domain-name <domain-name>] [--kdc <kdc>] [-krb-realm <krb-realm>] [--server <server>] <domain type> <user name>
<password>
Parameters:
<domain type>
<user name>
User's name
<password>
User's password
Options:
--domain-name <domain-name>
--kdc <kdc>
--krb-realm <krb-realm>
--server <server>
Page 63 of 144
Usage:
Parameters:
<user>
username[@domain]
Usage:
Parameters:
<user>
username[@domain]
Options:
-p, --pword <pword>
--type <type>
Page 64 of 144
Usage:
Options:
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--group <group>
Group/role name
--group-domain <group-domain>
Group/role domain
--group-domain-type <group-domain-type>
--icase
--id <id>
Unix id
--name <name>
Name
--uflags <uflags>
Page 65 of 144
Usage:
Options:
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--group <group>
Group/role name
--group-domain <group-domain>
Group/role domain
--group-domain-type <group-domain-type>
--icase
--id <id>
Unix id
--name <name>
Name
--uflags <uflags>
Page 66 of 144
Usage:
Parameters:
<group>
<user>
username[@domain]
Options:
--flags <flags>
Usage:
Options:
-c, --count-only
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--group <group>
Group/role name
--group-domain <group-domain>
Group/role domain
--group-domain-type <group-domain-type>
--icase
--id <id>
Unix id
--name <name>
Name
--uflags <uflags>
Page 67 of 144
Usage:
user group parentlist [-c, --count-only] [--domain <domain>] [-domain-type <domain-type>] [--flags <flags>] [--group <group>] [-group-domain <group-domain>] [--group-domain-type <group-domaintype>] [--icase] [--id <id>] [-n, --limit <limit>] [--name <name>]
[-o, --offset <offset>] [--uflags <uflags>]
Options:
-c, --count-only
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--group <group>
Group/role name
--group-domain <group-domain>
Group/role domain
--group-domain-type <group-domain-type>
--icase
--id <id>
Unix id
--name <name>
Name
--uflags <uflags>
Usage:
Parameters:
<group>
<user>
username[@domain]
Options:
--flags <flags>
Page 68 of 144
Usage:
Usage:
Parameters:
<user or domain>
Options:
--vip <vip>
Usage:
Parameters:
<user or domain>
<path>
Options:
--vip
Page 69 of 144
Usage:
Parameters:
<group>
<user>
username[@domain]
Options:
--flags <flags>
Page 70 of 144
Usage:
Options:
-c, --count-only
--domain <domain>
Domain
--domain-type <domain-type>
<cifs|nfs>
--flags <flags>
--group <group>
Group/role name
--group-domain <group-domain>
Group/role domain
--group-domain-type <group-domain-type>
--icase
--id <id>
Unix id
--name <name>
Name
--uflags <uflags>
Usage:
Parameters:
<group>
<user>
username[@domain]
Options:
--flags <flags>
Page 71 of 144
13 CLUSTER COMMANDS
cluster config...
cluster disable +
Disable clustering
cluster enable +
Enable clustering
cluster rexec
cluster rsh +
cluster state
cluster status
cluster disable
Purpose:
Disable clustering
Usage:
Parameters:
<member-ip or name>
cluster enable
Purpose:
Enable clustering
Usage:
Parameters:
<member-ip or name>
Page 72 of 144
cluster rexec
Purpose:
Usage:
Options:
--ip <ip>
--name <name>
cluster rsh
Purpose:
Usage:
Parameters:
<member-ip or name>
cluster state
Purpose:
Usage:
cluster state
cluster status
Purpose:
Usage:
cluster status
IPsec commands
Member commands
Page 73 of 144
Usage:
Parameters:
<name>
Cluster's name
Usage:
Parameters:
<member-ip>
Options:
-r, --rebuild
Usage:
Parameters:
<remote-ip>
Options:
-p, --potential
Page 74 of 144
Usage:
Options:
--coord <coord>
Can be coordinator?
--ip <ip>
--member-id <member-id>
--name <name>
Page 75 of 144
Usage:
Usage:
Usage:
Usage:
Usage:
Options:
-s, --secret <secret>
Page 76 of 144
Usage:
Usage:
cluster config member list [-c, --count] [-n, --limit <limit>] [-member-id <member-id>] [--member-ip <member-ip>] [-o, --offset
<offset>]
Options:
-c, --count
--member-id <member-id>
--member-ip <member-ip>
Usage:
Parameters:
<member-ip>
Page 77 of 144
Usage:
Usage:
Parameters:
<old-member-ip>
Member's IP address
Options:
--coord <coord>
Can be coordinator?
--ip <ip>
--txid <txid>
Ask the master for the global domain key and join the
cluster
Page 78 of 144
Usage:
Parameters:
<member-ip>
Options:
-m, --master
-s, --slave
Usage:
Parameters:
<member-ip>
Options:
-i, --initial
Page 79 of 144
Ask the master for the global domain key and join the cluster
Usage:
Usage:
Usage:
Options:
-c, --count
--member-id <member-id>
--member-ip <member-ip>
Usage:
Options:
-q, --quiet
-v, --verbose
Page 80 of 144
Usage:
Usage:
cluster config potentialmember set [--coord <coord>] [--ip <ip>] [-name <name>] <old-member-ip>
Parameters:
<old-member-ip>
Member's IP address
Options:
--coord <coord>
Can be coordinator?
--ip <ip>
--name <name>
Usage:
Page 81 of 144
Usage:
cluster config route add [-p, --peer <peer>] [-s, --source <source>]
[-t, --timeout <timeout>] <member-ip>
Parameters:
<member-ip>
Options:
-p, --peer <peer>
Peer IP address
Source IP address
Usage:
Usage:
Parameters:
<member-ip>
Usage:
Page 82 of 144
Dont maintain a route heartbeat and keep alive for all open routes
Usage:
Maintain a route heartbeat and keep alive for all open routes
Usage:
Page 83 of 144
14 DB COMMANDS
db begin
Begin a transaction
db commit
db connect
db export
db import
db index...
db record +
db recover
db rollback
db save
db select
db size
db status
db trx...
db xlog...
db begin
Purpose:
Begin a transaction
Usage:
Options:
-p, --priority <priority>
Page 84 of 144
db commit
Purpose:
Usage:
db commit
db connect
Purpose:
Usage:
Options:
-f, --force-reconnect
db export
Purpose:
Usage:
Options:
-f, --ftp-dir <ftp-dir>
-l, --lkm
-x, --purge
Page 85 of 144
db import
Purpose:
Usage:
db import [-v, --dbversion <dbversion>] [-f, --ftp <ftp>] [-p, -password <password>] [-u, --username <username>] [-w, --webfile
<webfile>]
Options:
-v, --dbversion <dbversion>
db record
Purpose:
Usage:
db record <rid>
Parameters:
<rid>
db recover
Purpose:
Usage:
Options:
-p, --password <password>
Page 86 of 144
db rollback
Purpose:
Usage:
db rollback
db save
Purpose:
Usage:
db save
db select
Purpose:
Usage:
Options:
-n, --limit <limit>
db size
Purpose:
Usage:
Options:
-s, --summary
-t, --tables
db status
Purpose:
Usage:
Options:
-v, --verbose
Page 87 of 144
db index test
db index list
Purpose:
Usage:
db index list
db index test
Purpose:
Usage:
db index test
db trx list
List transactions
db trx kill
Purpose:
Usage:
Parameters:
<txid>
Page 88 of 144
db trx list
Purpose:
List transactions
Usage:
db trx list
db xlog test
db xlog list
Purpose:
Usage:
Options:
-a, --action <action>
-d, --detail
db xlog test
Purpose:
Usage:
db xlog test
Page 89 of 144
15 SYSTEM COMMANDS
system agreement...
Agreement commands
system banner
Banner commands
system certificate...
Certificate commands
system check
system crypto...
Crypto commands
system date...
Date commands
system finalize
system httpd...
HTTPD commands
system license...
License commands
system log...
system property...
Property commands
system raid...
Raid commands
system reboot
system revert
system selftest
system sensors
system serial
system shutdown
system tamper...
Tamper commands
system timezone...
Timezone commands
system upgrade
system util...
System utilities
system version
system wizard...
Wizard commands
system zeroize
Page 90 of 144
Usage:
system check
Purpose:
Usage:
Options:
-q, --quiet
-v, --verbose
system finalize
Purpose:
Usage:
system finalize
Usage:
system lproperty get [-d, --detail] [-n, --limit <limit>] [-k, --name
<name>] [-o, --offset <offset>] [-r, --role <role>] [-v, --value
<value>]
Options:
-d, --detail
Page 91 of 144
Usage:
system reboot
Purpose:
Usage:
Options:
-p
system revert
Purpose:
Usage:
Options:
-k, --keep_ip
--verbose
system selftest
Purpose:
Usage:
Options:
-q, --quiet
-v, --verbose
Page 92 of 144
system sensors
Purpose:
Usage:
system sensors
system serial
Purpose:
Usage:
system serial
system shutdown
Purpose:
Usage:
system shutdown
Usage:
Usage:
Usage:
system upgrade
Purpose:
Page 93 of 144
Usage:
system upgrade [-k, --keep_ip] [--keep_journal] [--keep_key_db] [-keep_remote_cdbs] [-n, --no_snapshot] [-r, --partial] [-p, --password
<password>] [-u, --username <username>] [--verbose] [-v, --verify]
[-z, --zeroize]
Options:
-k, --keep_ip
--keep_journal
--keep_key_db
--keep_remote_cdbs
-n, --no_snapshot
-r, --partial
--verbose
-v, --verify
-z, --zeroize
system version
Purpose:
Usage:
Options:
-c, --crypto-card <crypto-card>
system zeroize
Purpose:
Usage:
Options:
-k, --keep_ip
--keep_journal
--keep_key_db
-p, --keep_protected
--keep_remote_cdbs
Page 94 of 144
Usage:
Usage:
Page 95 of 144
Usage:
Usage:
Usage:
Page 96 of 144
Usage:
Usage:
Usage:
Page 97 of 144
Usage:
Usage:
Options:
-s, --summary
Certificate version
Usage:
Parameters:
<certificate>
Certificate
Options:
-v, --version <version>
Certificate version
Page 98 of 144
Usage:
system certificate sign [-v, --version <version>] <CN> <C> <ST> <L>
<O> <OU> <E>
Parameters:
<CN>
commonName
<C>
countryName
<ST>
stateOrProvinceName
<L>
localityName
<O>
organizationName
<OU>
organizationalUnitName
<E>
emailAddress
Options:
-v, --version <version>
Certificate version
Page 99 of 144
Usage:
Parameters:
<CN>
commonName
<C>
countryName
<ST>
stateOrProvinceName
<L>
localityName
<O>
organizationName
<OU>
organizationalUnitName
<E>
emailAddress
Options:
-v, --version <version>
Certificate version
Usage:
Options:
-v, --version <version>
Certificate version
Security manager
Protected EEPROM
Start the crypto module (set cipher and load Master Key)
Usage:
Usage:
Options:
-c, --crypto-card <crypto-card>
Usage:
Options:
-c, --crypto-card <crypto-card>
Security manager
Usage:
system crypto manager [-a, --authenticate] [-c, --changeaks] [-d, -device <device>] [-g, --genmk] [-h, --help] [-i, --id] [-k, --key
<key>] [-n, --newik] [-r, --rcid] [-s, --seed] [-V, --versionsyscard]
Options:
-a, --authenticate
-c, --changeaks
-g, --genmk
-h, --help
-i, --id
-n, --newik
-r, --rcid
Retrieve DRTKN ID
-s, --seed
-V, --version-syscard
Usage:
Usage:
Options:
-r, --reset
Usage:
Start the crypto module (set cipher and load Master Key)
Usage:
Options:
-c, --cluster
Usage:
Options:
-c, --crypto-card <crypto-card>
Generate a nonce
Usage:
Parameters:
<purpose>
purpose code
Usage:
Parameters:
<message>
Generate a nonce
Usage:
Parameters:
<purpose>
purpose code
Usage:
Send challenge
Receive response
Send challenge
Usage:
Parameters:
<id>
peer device id
Receive response
Usage:
Parameters:
<msg>
response message
Usage:
Run the ECCDH Blade ring protocol to establish a new Ignition Key among the SEPs
Usage:
Usage:
Options:
--replace
Usage:
Options:
-c, --crypto-card <crypto-card>
Usage:
Usage:
Options:
-v, --version <version>
Certificate version
Usage:
Options:
-v, --version <version>
Certificate version
Usage:
Parameters:
<label>
<domain>
<command>
<drtknid>
Options:
--certblob <certblob>
Usage:
Parameters:
<id>
Options:
--certblob <certblob>
Usage:
system crypto rc delete [-d, --domain <domain>] [-i, --id <id>] [-l,
--label <label>]
Options:
-d, --domain <domain>
Recovery card id
Usage:
system crypto rc list [-c, --count] [-d, --domain <domain>] [-i, --id
<id>] [-l, --label <label>] [-n, --limit <limit>] [-o, --offset
<offset>]
Options:
-c, --count
Recovery Card ID
Restore recovery officers from the config DB into the SEP whitelist during recovery wizard
Usage:
Usage:
Export an RIP
Import an RIP
Export an RIP
Usage:
Options:
-f, --ftpPath <ftpPath>
Get the Combination ID given recovery card IDs and key type being recovered
Usage:
Usage:
Import an RIP
Usage:
Options:
-f, --ftpPath <ftpPath>
Usage:
Options:
-f, --first
-l, --last
Usage:
Usage:
system crypto secretshare getclustertoken Get a secret shared cluster token from a remote master
potential member. The secretsharing is done using the
specified recovery cards
system crypto secretshare getcombination Get the Combination ID given recovery card IDs and key
type being recovered
system crypto secretshare getshare +
Get the secret share given the recovery card IDs and
combination ID
system crypto secretshare loadshare +
Load a secret share into the SEP
system crypto secretshare recoverykey
Get a secret shared drtkn authorization token. The secretsharing is done using the specified
recovery cards
Usage:
Get a secret shared cluster token from a remote master potential member. The secretsharing is
done using the specified recovery cards
Usage:
Get the Combination ID given recovery card IDs and key type being recovered
Usage:
Options:
-c, --cleartext_recoverable
-r, --recoverable
Get the secret share given the recovery card IDs and combination ID
Usage:
Parameters:
<combnid>
<drtknid>
Options:
-c, --cltkn
-d, --drtkn
-t, --trustee
Usage:
Parameters:
<command>
<drtknid>
Options:
-f, --first
-l, --last
Usage:
Options:
-c, --cleartext_recoverable
-r, --recoverable
Usage:
Parameters:
<rec_scheme>
query whitelist
Usage:
Parameters:
<keyblob>
Options:
--certblob <certblob>
Usage:
query whitelist
Usage:
Parameters:
<pattern>
search pattern
Usage:
Parameters:
<pattern>
Usage:
Options:
-f, --format <format>
Usage:
Options:
-f, --format <format>
Return the percentage of the job done and the job type
Return the percentage of the job done and the job type
Usage:
Usage:
Usage:
Parameters:
<type>
Usage:
Parameters:
<status>
Usage:
Parameters:
<license>
Usage:
Parameters:
<feature>
Usage:
Usage:
Parameters:
<license>
Usage:
Options:
-b, --begin <begin>
Usage:
Parameters:
<type>
<SEC|OPR|PRF|ADT>
<level>
<mesg>
Usage:
Usage:
Usage:
Parameters:
<mesg>
Usage:
system property get [-d, --detail] [-n, --limit <limit>] [-k, --name
<name>] [-o, --offset <offset>] [-r, --role <role>] [-v, --value
<value>]
Options:
-d, --detail
Usage:
Parameters:
<name>
Property name
<boolean>
Globalize? <on|off>
Usage:
Parameters:
<name>
Property name
Options:
-g, --global
-i, --insert
Property value
Usage:
Options:
-g, --global
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Options:
-c, --crypto-card <crypto-card>
Usage:
Options:
-c, --crypto-card <crypto-card>
Usage:
Usage:
Usage:
Parameters:
<timezone>
Timezone (e.g.,America/Los_Angeles)
system util df
system util ls +
system util ps
Show how long the system has been running,and its load
averages for the last 1,5,and 15 minutes
Usage:
Parameters:
<subject>
Usage:
Parameters:
<file>
system util df
Purpose:
Usage:
Options:
-h
-i
-k
-m
Usage:
Parameters:
<string>
any string
Usage:
Options:
-c, --count <count>
Usage:
system util ls
Purpose:
Usage:
Parameters:
<directory>
Usage:
Usage:
Usage:
system util ps
Purpose:
Usage:
system util ps [-a] [-c] [-j] [-l] [-m] [-r] [-u] [-v] [-x]
Options:
-a
-c
-j
-l
-m
-r
-u
-v
-x
Usage:
Usage:
Usage:
Show how long the system has been running,and its load averages for the last 1,5,and 15 minutes
Usage:
Usage:
system util vmstat [-c <>] [-i] [-m] [-n <>] [-p <>] [-s] [-z]
Options:
-c <>
-i
-m
-n <>
-p <>
-s
-z
Usage:
Usage:
Usage:
Options:
--all
--name <name>
--password <password>
--server <server>
--username <username>
Usage:
Usage:
Options:
--all
--name <name>
Usage:
Options:
--domain <domain>
--name <name>
username@domain
Usage:
Usage:
Options:
-s, --sample_rate <sample_rate>
Display a list of current trending information, if no counter name is specified then a list of counters
is displayed
Usage:
system util trend list [-b, --board_num <board_num>] [-c, -counter_name <counter_name>] [-n, --num_samples <num_samples>]
Options:
-b, --board_num <board_num>
Usage:
Options:
-b, --get_interval_rate
Usage:
Options:
--wiztype <wiztype>
Wizard type
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Usage:
Get commands to setup trust between SEP and system card and generate keys
Usage:
Options:
--slave
--wiztype <wiztype>
Wizard type
Usage:
Usage:
Usage:
Alphabetical Index
active-role add........................................................................................................................................................................................
46
active-role list.........................................................................................................................................................................................
46
active-role remove.................................................................................................................................................................................
46
authorize....................................................................................................................................................................................................
4
challenge...................................................................................................................................................................................................
5
cli complete............................................................................................................................................................................................
44
cli cshelp disable....................................................................................................................................................................................
45
cli cshelp enable....................................................................................................................................................................................
45
cli cshelp find..........................................................................................................................................................................................
45
cli documentation..................................................................................................................................................................................
44
cli format.................................................................................................................................................................................................
44
cli pager...................................................................................................................................................................................................
45
cluster config ipsec dumpsad.............................................................................................................................................................
76
cluster config ipsec dumpspd.............................................................................................................................................................
76
cluster config ipsec flushsad...............................................................................................................................................................
76
cluster config ipsec restart..................................................................................................................................................................
76
cluster config ipsec secret...................................................................................................................................................................
76
cluster config member count..............................................................................................................................................................
77
cluster config member list...................................................................................................................................................................
77
cluster config member remove..........................................................................................................................................................77
cluster config member rmall...............................................................................................................................................................
78
cluster config member set...................................................................................................................................................................
78
cluster config name..............................................................................................................................................................................
74
cluster config potentialmember add.................................................................................................................................................79
cluster config potentialmember authenticate.................................................................................................................................79
cluster config potentialmember commit..........................................................................................................................................
80
cluster config potentialmember getmaster.....................................................................................................................................80
cluster config potentialmember list...................................................................................................................................................
80
cluster config potentialmember review............................................................................................................................................80
cluster config potentialmember rmall...............................................................................................................................................
81
cluster config potentialmember set...................................................................................................................................................
81
cluster config potentialmember status.............................................................................................................................................
81
cluster config pull..................................................................................................................................................................................
74
cluster config remote list.....................................................................................................................................................................
74
cluster config route add.......................................................................................................................................................................
82
cluster config route heartbeat disable..............................................................................................................................................83
cluster config route heartbeat enable...............................................................................................................................................
83
cluster config route list.........................................................................................................................................................................
82
cluster config route remove................................................................................................................................................................
82
cluster config route rmall.....................................................................................................................................................................
82
cluster config set-local..........................................................................................................................................................................
75
cluster disable........................................................................................................................................................................................
72
cluster enable.........................................................................................................................................................................................
72
cluster rexec...........................................................................................................................................................................................
73
cluster rsh................................................................................................................................................................................................
73
cluster state............................................................................................................................................................................................
73
cluster status..........................................................................................................................................................................................
73
db begin...................................................................................................................................................................................................
84
NetApp Proprietary Information
db commit...............................................................................................................................................................................................
85
db connect..............................................................................................................................................................................................
85
db export.................................................................................................................................................................................................
85
db import.................................................................................................................................................................................................
86
db index list.............................................................................................................................................................................................
88
db index test...........................................................................................................................................................................................
88
db record.................................................................................................................................................................................................
86
db recover...............................................................................................................................................................................................
86
db rollback..............................................................................................................................................................................................
87
db save....................................................................................................................................................................................................
87
db select..................................................................................................................................................................................................
87
db size......................................................................................................................................................................................................
87
db status..................................................................................................................................................................................................
87
db trx kill..................................................................................................................................................................................................
88
db trx list..................................................................................................................................................................................................
89
db xlog list...............................................................................................................................................................................................
89
db xlog test.............................................................................................................................................................................................
89
db3 restart.................................................................................................................................................................................................
7
db3 techdump..........................................................................................................................................................................................
7
db3 zeroize................................................................................................................................................................................................
7
domain add.............................................................................................................................................................................................
48
domain controller discover..................................................................................................................................................................
48
domain group list...................................................................................................................................................................................
49
domain hash import..............................................................................................................................................................................
49
domain list..............................................................................................................................................................................................
49
domain migrate.....................................................................................................................................................................................
50
domain remove......................................................................................................................................................................................
50
domain set..............................................................................................................................................................................................
51
domain user list.....................................................................................................................................................................................
51
domain validate.....................................................................................................................................................................................
52
group add................................................................................................................................................................................................
53
group domain discover.........................................................................................................................................................................
53
group group list......................................................................................................................................................................................
55
group group parentlist..........................................................................................................................................................................
56
group list..................................................................................................................................................................................................
54
group remove.........................................................................................................................................................................................
54
group review...........................................................................................................................................................................................
54
group role grant.....................................................................................................................................................................................
56
group role revoke..................................................................................................................................................................................
57
help.............................................................................................................................................................................................................
5
keyman cryptainerkeys generate.......................................................................................................................................................
40
keyman cryptainerkeys list..................................................................................................................................................................
40
keyman cryptainerkeys rename.........................................................................................................................................................
40
keyman domainkeys list......................................................................................................................................................................
38
keyman expirekeys...............................................................................................................................................................................
38
keyman lkmkeys backup.....................................................................................................................................................................
41
keyman lkmkeys import......................................................................................................................................................................
41
keyman lkmkeys list.............................................................................................................................................................................
42
keyman masterkeys..............................................................................................................................................................................
39
keyman purgekeys accelerate............................................................................................................................................................
43
keyman purgekeys start.......................................................................................................................................................................
43
keyman purgekeys status....................................................................................................................................................................
43
keyman purgekeys stop.......................................................................................................................................................................
43
keyman set.............................................................................................................................................................................................
39
lkm db copy............................................................................................................................................................................................
19
lkm db export.........................................................................................................................................................................................
19
lkm db list...............................................................................................................................................................................................
19
lkm db remove.......................................................................................................................................................................................
19
lkm disk usage.......................................................................................................................................................................................
17
lkm doc....................................................................................................................................................................................................
17
lkm key add............................................................................................................................................................................................
21
lkm key attribute add...........................................................................................................................................................................
24
lkm key attribute list.............................................................................................................................................................................
24
lkm key delete........................................................................................................................................................................................
21
lkm key export.......................................................................................................................................................................................
21
lkm key import.......................................................................................................................................................................................
21
lkm key journal list................................................................................................................................................................................
24
lkm key journal state............................................................................................................................................................................
25
lkm key journal status..........................................................................................................................................................................
25
lkm key journal zeroize........................................................................................................................................................................
25
lkm key list..............................................................................................................................................................................................
22
lkm key resync.......................................................................................................................................................................................
22
lkm key sharing group list...................................................................................................................................................................
22
lkm key statistics...................................................................................................................................................................................
23
lkm key update......................................................................................................................................................................................
23
lkm key verify.........................................................................................................................................................................................
23
lkm key whitelist list.............................................................................................................................................................................
23
lkm openkey client list..........................................................................................................................................................................
26
lkm openkey enroll list.........................................................................................................................................................................
27
lkm openkey enroll pending accept...................................................................................................................................................
28
lkm openkey enroll pending certificate get......................................................................................................................................
28
lkm openkey enroll pending list..........................................................................................................................................................
28
lkm openkey enroll pending reject.....................................................................................................................................................
29
lkm openkey enroll set.........................................................................................................................................................................
27
lkm openkey license list.......................................................................................................................................................................
26
lkm restart..............................................................................................................................................................................................
17
lkm server add.......................................................................................................................................................................................
29
lkm server certificate get.....................................................................................................................................................................
31
lkm server certificate set.....................................................................................................................................................................
31
lkm server list.........................................................................................................................................................................................
30
lkm server remove................................................................................................................................................................................
30
lkm server set.........................................................................................................................................................................................
30
lkm state info.........................................................................................................................................................................................
17
lkm status...............................................................................................................................................................................................
17
lkm test...................................................................................................................................................................................................
18
lkm zeroize..............................................................................................................................................................................................
18
net apply..................................................................................................................................................................................................
32
net connection list.................................................................................................................................................................................
32
net interface get....................................................................................................................................................................................
32
net status................................................................................................................................................................................................
33
net util arp...............................................................................................................................................................................................
33
net util host.............................................................................................................................................................................................
33
net util ifconfig.......................................................................................................................................................................................
34
net util ipsecstats..................................................................................................................................................................................
35
net util netstat........................................................................................................................................................................................
35
net util ping.............................................................................................................................................................................................
36