Where to find additional information

Contributors NetAppZacharyWambold

After you have successfully tested CIFS client access, you can perform advanced CIFS configuration or add SAN access.When protocol access is complete, you should protect the root volume of SVM. There is comprehensive content and technical reports to help you achieve these goals.

CIFS/SMB configuration

You can further configure CIFS access using the following content and technical reports:

Root volume protection

After configuring protocols on the SVM, you should ensure that its root volume is protected:

  • Data protection

    Describes how to create a load-sharing mirror to protect the SVM root volume, which is a NetApp best practice for NAS-enabled SVMs. Also describes how to quickly recover from volume failures or losses by promoting the SVM root volume from a load-sharing mirror