No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor 2200 V3 and 2600 V3 Storage System V300R005 Command Reference 06

"Based on the CLI provided by the DeviceManager, this document describes how to use variouscommands classified by functions and how to set the CLI and manage the storage system throughthese commands."
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).




AC power module

The module that transfers the external AC power supply into the power supply for internal use.

Application server

A service processing node (a computer device) on the network. Application programs of data services run on the application server.

Asynchronous remote replication

A kind of remote replication. When the data at the primary site is updated, the data does not need to be updated synchronously at the mirroring site to finish the update. In this way, performance is not reduced due to data mirroring.





A collection of data stored on (usually removable) non-volatile storage media for purposes of recovery in case the original copy of data is lost or becomes inaccessible; also called a backup copy. To be useful for recovery, a backup must be made by copying the source data image when it is in a consistent state.

The act of creating a backup.


The numerical difference between the upper and lower frequencies of a band of electromagnetic radiation.

A deprecated synonym for data transfer capacity that is often incorrectly used to refer to throughput.

Baud rate

The number of times per second the signal can change on a transmission line. Typically, the transmission line uses only two signal states, making the baud rate equal to the number of bits per second that can be transferred.

Bit error

An incompatibility between a bit in a transmitted digital signal and the corresponding bit in the received digital signal.

Bit error rate (BER)

The probability that a transmitted bit will be erroneously received. The BER is measured by counting the number of bits in error at the output of a receiver and dividing by the total number of bits in the transmission. BER is typically expressed as a negative power of 10.


Bonding of multiple independent physical network ports into a logical port, which ensures the high availability of server network connections and improves network performance.

Boundary scan

A test methodology that uses shift registers in the output connections of integrated circuits (ICs). One IC is often connected to the next IC. A data pattern is passed through the chain and the observed returned data stream affected by the circuit conditions gives an indication of any faults present. The system is defined under IEEE standard 1149.1 and is also known as Joint Test Action Group (JTAG).

Browser/Server (B/S)

Architecture that defines the roles of the browser and server. The browser is the service request party and the server is the service provider.

Backup window

An interval of time during which a set of data can be backed up without seriously affecting applications that use the data.




Cache hit ratio

The ratio of the number of cache hits to the number of misses during the read operation, usually expressed as a percentage.

Cache prefetch strategy

The operation in which data has been read or is being read. The required data is read from a disk into the cache in advance.

Captive screw

Specially designed to lock into place on a parent or motherboard, allowing for easy installation and removal of attached pieces without release of the screw.


Connects a storage system to more disk enclosures through connection cables, expanding the capacity of the storage system.

The process of connecting two or more Fibre Channel hubs or switches together to increase the number of ports or extend distances.

Challenge Handshake Authentication Protocol (CHAP)

A password-based authentication protocol that uses a challenge to verify that a user has access rights to a system.

A hash of the supplied password with the challenge is sent for comparison so the cleartext password is never sent over the connection.


A snapshot technology. The source data is completely copied to generate a data duplicate; the duplicate needs the same size storage space as the source data. The duplicate is also called clone.


A collection of computers that are interconnected (typically at high speeds) for the purpose of improving reliability, availability, serviceability, load balancing and/or performance.

Often, clustered computers have access to a common pool of storage, and run special software to coordinate the component computers' activities.


A technology for ensuring data security and integrity in a storage system. It is used to store the mission-critical data of the system.

Coffer disk

Disks that build up the coffer.

Command device

A special LUN through which the host can send inband commands to storage devices.

Compliance mode

A protection mode of WORM. In compliance mode, files within their protection period can be changed or deleted by either the file user or by the system administrator. Files with expired protection periods can be deleted but not changed by the file user or the system administrator.

Constant prefetch

A cache prefetch strategy. This strategy applies to applications that require reading the data of a fixed size in a certain order. An example is the streaming media demanded by multiple subscribers who use the same bit rate.


The control logic in a disk or tape that performs command decoding and execution, host data transfer, serialization and deserialization of data, error detection and correction, and overall management of device operations.

The control logic in a storage subsystem that performs command transformation and routing, aggregation (RAID, mirroring, striping, or other), high-level error recovery, and performance optimization for multiple storage devices.

Controller enclosure

An enclosure that accommodates controllers and provides storage services. It is the core component of a storage system, and generally consists of components such as controllers, power supplies, and fans.


The replacement of a properly functioning array member by another disk, including copying of the member's contents to the replacing disk.

Copyback, which is most often used to create or restore a particular physical configuration for an array (e.g., a particular arrangement of array members on device I/O interconnects), is accomplished without reduction of the array.


A pair state. The state indicates that the source LUN data is being synchronized to the target LUN.



Data compression

The process of encoding data to reduce its size.

Lossy compression (i.e., compression using a technique in which a portion of the original information is lost) is acceptable for some forms of data (e.g., digital images) in some applications, but for most IT applications, lossless compression (i.e., compression using a technique that preserves the entire content of the original data, and from which the original data can be reconstructed exactly) is required.

Data deduplication

The replacement of multiple copies of data, at variable levels of granularity, with references to a shared copy in order to save storage space and/or bandwidth.

Data flow

A process that involves processing data extracted from the source system. These processes include: filtering, integration, calculation, and summary, finding and solving data inconsistency, and deleting invalid data so that the processed data meets the requirements of the destination system for the input data.

Data migration

The process to cleanse and transform historical data, and then load it to a new system.

Data source

A system, database (database user; database instance), or file that can make BOs persistent.

Data switch

A data switch used for interconnections between controllers.

Dirty data

Data that is stored temporarily on the cache and has not been written onto disks.

Disaster recovery

The recovery of data, access to data and associated processing through a comprehensive process of setting up a redundant site (equipment and work space) with recovery of operational data to continue business operations after a loss of use of all or part of a data center.

This involves not only an essential set of data but also an essential set of all the hardware and software to continue processing of that data and business. Any disaster recovery may involve some amount of down time.

Disk array

A set of disks from one or more commonly accessible disk subsystems, combined with a body of control software.

The control software presents the disks' storage capacity to hosts as one or more virtual disks. Control software is often called firmware or microcode when it runs in a disk controller. Control software that runs in a host computer is usually called a volume manager.

Disk domain

The control software presents the disks' storage capacity to hosts as one or more virtual disks. Control software is often called firmware or microcode when it runs in a disk controller. Control software that runs in a host computer is usually called a volume manager.

Disk location

The process of locating a disk in the storage system by determining the enclosure ID and slot ID of the disk.

Disk enclosure

Consists of the following parts in redundancy: expansion module, disk, power module, and fan module. System capacity can be expanded by cascading multiple disk enclosures.

Disk utilization

The percentage of used capacity in the total available capacity.




External device LUN (eDevLUN)

Logical storage array space created by a third-party storage array.


An engine is a core component that provides storage services for external applications. Hosted in a controller enclosure, the engine usually consists of one pair of controllers, disk modules, interface modules, power modules, fan modules, and batteries.


Connects a storage system to more disk enclosures through connection cables, expanding the capacity of the storage system.

Expander module

A component used for expanding.





The automatic substitution of a functionally equivalent system component for a failed one.

The term failover is most often applied to intelligent controllers connected to the same storage devices and host computers. If one of the controllers fails, failover occurs, and the survivor takes over its I/O load.

File engine

The component in a unified storage system that provides file-level services.

File change log (FCL)

A type of log used to record the file and directory changes in file system.

File system snapshot

A type of snapshot created for a file system that is both readable and writable. It is mainly used to provide a new file system from the snapshot of a read-only file system.

Field replaceable unit (FRU)

A unit or component of a system that is designed to be replaced in the field, i.e., without returning the system to a factory or repair depot.

Field replaceable units may either be customer-replaceable or their replacement may require trained service personnel.


Low-level software for booting and operating an intelligent device.

Firmware generally resides in read-only memory (ROM) on the device.

Front-end host port

The port that connects the controller enclosure to the service side and transfers service data. There are three types of front-end host ports: SAS, Fibre Channel, and iSCSI.





A device that receives data via one protocol and transmits it via another.

Global system for mobile communications (GSM)

The second-generation mobile networking standard defined by the European Telecommunications Standards Institute (ETSI). It is aimed at designing a standard for global mobile phone networks. GSM consists of three main parts: mobile switching subsystem (MSS), base station subsystem (BSS), and mobile station (MS).

Group quota

The maximum storage space allocated to a user group. The quota is adjustable if necessary.




Hard disk

A non-volatile storage device that digitally stores encoded data on rapidly rotating platters that have magnetic surfaces. Hard disks generally offer more storage and quicker access to data than floppy disks do.

Hard disk tray

The tray that bears the hard disk.

Hard quota

The value that limits the space used in quota configuration. If the space used surpasses the hard quota, file operation is not allowed to continue.


Heartbeat supports node communication, fault diagnosis, and event triggering. Heartbeats are protocols that require no acknowledgement. They are transmitted between two devices. The device can judge the validity status of the peer device.

Hit ratio

The ratio of directly accessed I/Os from cache to all I/Os.

Hot swap

The substitution of a replacement unit (RU) in a system for a defective unit, where the substitution can be performed while the system is performing its normal functioning normally.

Hot swaps are physical operations typically performed by humans.


A self-protective data property built into the storage device.


A value-added service of storage systems. HyperMetro means two datasets (on two storage systems) can provide storage services as one dataset to achieve load balancing among applications and failover without service interruption.

HyperMetro Domain

A HyperMetro configuration object generally; made up of two storage arrays and one quorum server. HyperMetro services can be created on a HyperMetro domain.





Shorthand for input/output.

I/O is the process of moving data between a computer system's main memory and an external device or interface such as a storage device, display, printer, or network connected to other computer systems. This encompasses reading, or moving data into a computer system's memory, and writing, or moving data from a computer system's memory to another location.

Inband management

The management control information of the network and the carrier service information of the user network are transferred through the same logical channel. In-band management enables users to manage storage arrays through commands. Management commands are sent through service channels, such as I/O write and read channels. The advantages of in-band management include high speed, stable transfer, and no additional management network ports required.


The system component that originates an I/O command over an I/O interconnect.

The endpoint that originates a SCSI I/O command sequence.

I/O adapters, network interface cards, and intelligent I/O interconnect control ASICs are typical initiators.

Intelligent prefetch

A cache prefetch strategy. The system software calculates a proper size of prefetched data. This strategy applies to a read application involving a single bit stream or to the situations where you do not know whether the data is read in a certain order. An example of intelligent prefetch is reading or writing a file.

Interface module

A replaceable field module that accommodates the service or management ports.




Load balance

A method of adjusting the system, application components, and data to averagely distribute the applied I/Os or computing requests to physical resources of the system.

Local backup

A backup methodology that utilizes host resources to copy data to a backup location that is under control of the same host.

Local restore

A backup methodology that utilizes host resources to copy data to a backup location that is under control of the same host.

Logical unit

The addressable entity within a SCSI target that executes I/O commands.

Logical unit number (LUN)

The SCSI identifier of a logical unit within a target.

Industry shorthand, when phrased as "LUN", for the logical unit indicated by the logical unit number.

LUN copy

The function of copying the original LUN data to one or multiple target LUNs.

LUN formatting

The process of writing 0 bits in the data area on the logical drive and generating related parity bits so that the logical drive can be in the ready state.

LUN mapping

A storage system maps LUNs to application servers so that application servers can access storage resources.

LUN migration

A method for the LUN data to migrate between different physical storage spaces while ensuring data integrity and uninterrupted operation of host services.

LUN snapshot

A type of snapshot created for a LUN. This snapshot is both readable and writable and is mainly used to provide a snapshot LUN from point-in-time LUN data.




Maintenance terminal

A computer connected through a serial port or management network port. It maintains the storage system.

Management interface module

The module that integrates one or more management network ports.

Management network

An entity that provides means to transmit and process network management information.

Management network port

The network port on the controller enclosure connected to the maintenance terminal. It is provided for the remote maintenance terminal. Its IP address can be modified with the change of the customer's environment.

Minimum file system loading

A method of restoring the user data in an offline file system.





A managed device in the network. For a device with a single frame, one node stands for one device. For a device with multiple frames, one node stands for one frame of the device.




Out-of-band management

A management mode used during out-of-band networking. The management and control information of the network and the bearer service information of the user network are transmitted through different logical channels.

Owning controller

The controller that can prior access a certain LUN.




Power failure protection

When an external power failure occurs, the AC PEM depends on the battery for power supply. This ensures the integrity of the dirty data in the cache.


When an external power failure occurs, the AC PEM depends on the battery for power supply. This ensures the integrity of the dirty data in the cache.

Primary storage controller

The controller that plays a leading role in controlling management. It can perform relevant management operations on the controller enclosure.

Primary/Secondary switchover

A process for the conversion of the primary/secondary relationship.

Prior controller

For the application server LUN, prior controller means the working controller is the owner controller of the corresponding LUN array.

Protocol endpoint

A proxy to process VM I/Os. After VM I/Os are sent to a PE, the PE redirects the I/Os to virtual volumes.



Quota tree

A first-level file system directory that can be managed with quota.

Quorum server

A server that can provide arbitration services for clusters or HyperMetro to prevent the resource access conflicts of multiple application servers.

Quorum Server Mode

A HyperMetro arbitration mode. When a HyperMetro arbitration occurs, the quorum server decides which site wins the arbitration.




RAID level

The application of different redundancy types to a logical drive. A RAID level improves the fault tolerance or performance of the logical drive but reduces the available capacity of the logical drive. You must specify a RAID level for each logical drive.

Read-only file system snapshot

A type of file system snapshot. This snapshot is read-only, mainly for data backup or data restoring.


The regeneration and writing onto one or more replacement disks of all of the user data and check data from a failed disk in a mirrored or RAID array.

In most arrays, a rebuild can occur while applications are accessing data on the array's virtual disks.


The inclusion of extra components of a given type in a system (beyond those required by the system to carry out its function) for the purpose of enabling continued operation in the event of a component failure.

Remote backup

A way to back up file system data by copying data from the file system in the local storage array to the file system in the backup storage array.

Remote replication

A core technology for disaster recovery and a foundation that implements remote data synchronization and disaster recovery. This technology remotely maintains a set of data mirrors through the remote data connection function of the storage devices that are separated in different places. Even when a disaster occurs, the data backup on the remote storage device is not affected. Remote replication can be divided into synchronous remote replication and asynchronous remote replication.

Remote restore

A way to restore file system data by copying backup data from the backup storage array to the file system in the local storage array.

Reverse synchronizing

The process of restoring data from the redundancy machine (RM) when the services of the production machine (PM) are recovering.


The process of restoring data from the redundancy machine (RM) when the services of the production machine (PM) are recovering.





A parameterized list of primitive I/O interconnect operations intended to be executed in sequence. Often used with respect to ports, most of which are able to execute scripts of I/O commands autonomously (without policy processor assistance).

A sequence of instructions intended to be parsed and carried out by a command line interpreter or other scripting language. Perl, VBScript, JavaScript and Tcl are all scripting languages.

Secondary controller

(1) A controller that backs up service and management data of the primary controller in a clustered system. When the primary controller fails, the secondary controller is upgraded to the primary controller and takes over the management and services of the controller enclosure. (2) A controller that backs up the management data of the primary controller in a block-level array. When the primary controller fails, the secondary controller is upgraded to the primary controller and takes over the management of the system.

Security style

An ACL authentication mode used in a file system or quota tree. The security style affects the user quota calculations.

Serial port

An input/output location (channel) that sends and receives data (one bit at a time) to and from the CPU of a computer or a communications device. Serial ports are used for serial data communication and as interfaces for some peripheral devices, such as mouse devices and printers.

Service data

The user and/or network information required for the normal functioning of services.

Service network port

The network port that is used to store services.

SFP optical transceiver

A component that can make data conversion between optical signals and electrical signals and that can receive and transfer data.

Simple network management protocol (SNMP)

An IETF protocol for monitoring and managing systems and devices in a network.

The data being monitored and managed is defined by a MIB. The functions supported by the protocol are the request and retrieval of data, the setting or writing of data, and traps that signal the occurrence of events.

Single point of failure (SPOF)

One component or path in a system, the failure of which would make the system inoperable.


A position defined by a upper guide rail and the corresponding lower guide rail in a frame. A slot houses a board.

Small computer system interface (SCSI)

A collection of ANSI standards and proposed standards that define I/O interconnects primarily intended for connecting storage subsystems or devices to hosts through host bus adapters.

Originally intended primarily for use with small (desktop and desk-side workstation) computers, SCSI has been extended to serve most computing needs, and is arguably the most widely implemented I/O interconnect in use today.


A feature of Huawei storage system. With SmartMulti-Tenant, multiple virtual storage systems can be created in one physical storage system, allowing tenants to share the same storage system hardware resources without affecting each other's data security and privacy. This feature achieves more flexible, easy-to-manage, and low-cost shared storage in unified, multi-protocol storage architecture.


A point in time copy of a defined collection of data.

Clones and snapshots are full copies. See delta snapshot. Depending on the system, snapshots may be of files, LUNs, file systems, or any other type of container supported by the system.

Snapshot copy

A copy of a snapshot LUN.

Snapshot file system

A type of file system snapshot.

Snapshot quota

The maximum storage space used for a file system snapshot and the quota is adjustable if necessary.

Soft quota

An alarm that notifies space usage in quota configuration. An alarm is triggered when used space exceeds the soft quota. The alarm is terminated once the used space lowers below the soft quota.

Source LUN

The LUN where the original data is located.

Static Priority Mode

An alarm that notifies space usage in quota configuration. An alarm is triggered when used space exceeds the soft quota. The alarm is terminated once the used space lowers below the soft quota.

Storage pool shrinking

A method of shrinking the total storage pool capacity.

Storage system

An integrated system that consists of the following parts: controller, storage array, host bus adapter, physical connection between storage units, and all control software.

Storage unit

An abstract definition of backup storage media for storing backup data. The storage unit is connected to the actual storage media used to back up data.

Streaming media

The medium by which media content is continuously transmitted in real time using the streaming method. Streaming media ensures high-quality playback effects at low bandwidth costs by integrating with the following technologies: data collection, data compression, encoding, storage, transmission, terminal playback, and network communication.


The set of strips at corresponding locations of each member extent of a disk array that uses striped data mapping.

The strips in a stripe are associated with each other in a way (e.g., relative extent block addresses) that allows membership in the stripe to be quickly and uniquely determined by a computational algorithm. Parity RAID uses stripes to map virtual disk block addresses to member extent block addresses.


A type of smaller network that forms a larger network according to a rule, such as, forming a network according to different districts. This facilitates the management of a large network.

Subnet mask

The subnet mask is a binary pattern that is stored in the device and is matched with the IP address. A subnet mask is used by the IP protocol to determine to which network segment packets are destined.

Synchronous remote replication

A kind of remote replication. When the data at the primary site is updated, the data must be synchronously updated at the mirroring site before the update is complete. In this way, the data stored at both the primary and mirroring sites can be synchronized.





The endpoint that receives a SCSI I/O command sequence.

Target LUN

The LUN on which target data resides.


A property of SmartMulti-Tenant. It represents a virtual storage system in a physical storage system. The private and independent logical resource of a tenant mainly includes disk domain space, LUN, file system, and ports. Tenants receive complete storage services, but also maintain resource and network isolation with other tenants, avoiding service interference.

Thick LUN

A logical disk accessible to hosts, which is allocated with storage resources only once according to the capacity specified at create time by using the automatic provisioning technology.

Thin provisioning

A technology that allocates the physical capacity of a volume or file system as applications write data, rather than preallocating all the physical capacity at the time of provisioning.

Thin LUN

A logic disk that can be accessed by hosts. It dynamically allocates storage resources from the thin pool according to the actual capacity requirements of users.

Timing snapshot

Creates virtual snapshots periodically to continuously protect data.


The logical layout of the components of a computer system or network and their interconnections. Topology deals with questions of what components are directly connected to other components from the standpoint of being able to communicate. It does not deal with questions of physical location of components or interconnecting cables.

The communication infrastructure that provides Fibre Channel communication among a set of PN_Ports (e.g., a Fabric, an Arbitrated Loop, or a combination of the two).


A type of SNMP message used to signal that an event has occurred.

Trap delivery to recipients uses UDP and is not completely reliable.


The process of aggregating multiple physical ports into a logical path on the configuration software. The bandwidths of multiple ports are combined, so the bandwidth between switches and network nodes increases. The logical port enjoys a high bandwidth that is several times of that of an independent physical port.




User datagram protocol (UDP)

An Internet protocol that provides connectionless datagram delivery service to applications.

UDP over IP adds the ability to address multiple endpoints within a single network node.

User interface

The space where users interact with a machine.

User quota

A limit imposed on the storage capacity used by each user, that is, the maximum storage space for each user.




Variable prefetch

A cache prefetch strategy. The size of the data to be prefetched is the multiple of prefetching multiplied by the length of a read command.

This strategy applies to applications that require reading data of variable sizes in a certain order or to situations where multiple subscribers read data concurrently. However, no fixed prefetch size can be set because the amount of pre-read data cannot be judged.

Virtual volume

A VMware virtual volume. A VM consists of a group of virtual volumes.


A property of SmartMulti-Tenant. It represents a virtual storage system. In Huawei SmartMulti-Tenant, a tenant is called a vStore.




Working controller

The controller that reads data from and writes data onto LUNs or file systems in storage arrays.

Write back

A caching technology in which the completion of a write request is signaled as soon as the data is in the cache. Actual writing to non-volatile media occurs at a later time. Write back includes inherent risks: an application will take action predicated on the write completion signal, and a system failure before the data is written to non-volatile media will cause media contents to be inconsistent with that subsequent action. For these reasons, sufficient write back implementations include mechanisms to preserve cache contents across system failures (including power failures) and a flushed cache at system restart time.

Write through

A caching technology in which the completion of a write request is not signaled until data is safely stored on non-volatile media. Write performance equipped with the write through technology is approximately that of a non-cached system. However, if the written data is also held in a cache, subsequent read performance may be dramatically improved.

Write Once Read Many (WORM)

A type of storage, designed for fixed content, that preserves what is written to it in an immutable fashion.

Optical disks are an example of WORM storage.





A collection of Fibre Channel N_Ports and/or NL_Ports (i.e., device ports) that are permitted to communicate with each other via the fabric.

A collection of Fibre Channel N_Ports and/or NL_Ports (i.e., device ports) that are permitted to communicate with each other via the fabric.

Updated: 2019-07-22

Document ID: EDOC1000106139

Views: 319753

Downloads: 210

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next