Adaptec iSA1500 User Guide - Page 199

create target pool [size size | remainder] (unrestricted | restricted initiator_list)

Page 199 highlights

Using CLI create target pool [size size | remainder] (unrestricted | restricted initiator_list) Create a new target with a name of target. The iqn name used to access this target by an initiator will be automatically generated. The target will take its space from the named pool. If the size option is not used, all of the available space in that pool will be used; if the size option is used, the size parameter is the size in bytes, the size as a percentage of the total size of the pool or remainder for all of the remaining space in the pool (the default action). The Access Control must be explicitly defined using the restricted or unrestricted option. If restricted is supplied, a list of initiators must be supplied which will be used to define the initial ACL. destroy target_list Destroy the named targets. Unlike more target commands this will not work for mirror targets. Use the mirror destroy command instead. info [target_list] Show information about all of the targets if target_list list is not supplied, or just the named targets if it is. This is the same as the target target info command if the target_list is just a single target. list filters List the targets known to the system. The list may be restricted by adding one or more of the filters listed in Table 8-41 on page 8-61. If multiple filters are supplied a target will only be listed if it matches all of them. 8-60

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

8-60
Using CLI
create
target pool
[size
size
| remainder]
(unrestricted |
restricted
initiator_list
)
Create a new target with a name of
target
. The iqn name used to
access this target by an initiator will be automatically generated.
The target will take its space from the named
pool
. If the
size
option is not used, all of the available space in that pool will be
used; if the
size
option is used, the
size
parameter is the size in
bytes
,
the size as a
percentage
of the total size of the pool or
remainder
for all of the remaining space in the pool (the default
action).
The Access Control must be explicitly defined using the
restricted
or
unrestricted
option. If
restricted
is
supplied, a
list
of initiators must be supplied which will be used
to define the initial ACL.
destroy
target_list
Destroy the named targets.
Unlike more target commands this will not work for mirror targets.
Use the
mirror destroy
command instead.
info [
target_list
]
Show information about all of the targets if
target_list
list
is
not supplied, or just the named targets if it is. This is the same as
the
target
target
info
command if the
target_list
is just
a single target.
list
filters
List the targets known to the system. The list may be restricted by
adding one or more of the filters listed in
Table 8-41 on page 8-61
. If
multiple filters are supplied a target will only be listed if it matches
all of them.