Skip to main content

Common ONTAP features supported on ASA r2 systems

Contributors netapp-aherbin

Because ASA r2 systems run a streamlined version of ONTAP, many common ONTAP tasks and System Manager functions are performed the same way on ASA r2 systems as on other ONTAP systems.

For more information about common features and functions, see the following ONTAP documentation.

Data protection

Learn more about common data protection features supported on ASA r2 systems.

Clustered external key servers

You can configure connectivity to clustered external key management servers on an storage VM. With clustered key servers, you can designate primary and secondary key servers on a storage VM. When registering keys, ONTAP will first attempt to access a primary key server before sequentially attempting to access secondary servers until the operation completes successfully, preventing duplication of keys.

External key management for encryption at rest

You can use one or more KMIP servers to secure the keys the cluster uses to access encrypted data.

Data security

Learn more about common data security features supported on ASA r2 systems.

Administrator access management

The role assigned to an administrator determines which functions the administrator can perform. Predefined roles for cluster administrators and storage VM administrators are provided by System Manager. You assign the role when you create the administrator’s account, or you can assign a different role later.

Client authentication and authorization

ONTAP uses standard methods to secure client and administrator access to storage and to protect against viruses. Advanced technologies are available for encryption of data at rest and for WORM storage. ONTAP authenticates a client machine and user by verifying their identities with a trusted source. ONTAP authorizes a user to access a file or directory by comparing the user's credentials with the permissions configured on the file or directory.

OAuth 2.0 authentication

You can use the Open Authorization (OAuth 2.0) framework to control access to your ONTAP clusters. OAuth 2.0 restricts and controls access to protected resources using signed access tokens.

SAML authentication and administrator access

You can configure and enable Security Assertion Markup Language (SAML) authentication for web services. SAML authenticates users by an external Identity Provider (IdP) instead of the directory service providers such as Active Directory and LDAP.

Networking

Learn more about common networking features supported on ASA r2 systems.

FIPS compliance

ONTAP is compliant in the Federal Information Processing Standards (FIPS) 140-2 for all SSL connections. You can turn SSL FIPS mode on and off, set SSL protocols globally, and turn off any weak ciphers such as RC4 within ONTAP.

Beginning with ONTAP 9.18.1 postquantum computing cryptographic algorithms are supported for SSL. These algorithms provide additional protection against potential future quantum computing attacks, and are available when SSL FIPS mode is disabled.

An interface group, also known as a Link Aggregation Group (LAG), is created by combining two or more physical ports on the same node into a single logical port. The logical port provides increased resiliency, increased availability, and load sharing.

SAN Protocols

ASA r2 systems support all SAN protocols (iSCSI, FC, NVMe/FC, NVMe/TCP).

System Manager

You can search for various actions, objects,and information topics in System Manager. You can also search table data for specific entries.