Request doc changesEdit this pageLearn how to contribute
ON THIS PAGE
    • Product and Solutions
    • Support and Training
    • Cloud Central
    • Community
    • Blog
    • Customer Stories
    • Contact
    • Contact
    Menu bars
    netapp-mark netapp-logo
    English
      • English
      • 日本語
      • 한국어
      • 简体中文
      • 繁體中文
    Available PDFs
    • PDF of this doc site
      • Introduction and concepts
        • ONTAP concepts
          • Network architecture
          • Disks and aggregates
          • Storage virtualization
          • Path failover
          • Replication
          • Storage efficiency
          • Security
        • ONTAP and the cloud
          • Data protection and the cloud
          • Move entire workloads to the cloud
            • Storage protocols
          • Performance and efficiency in the cloud
          • Manage ONTAP in the cloud
          • Compliance and the cloud
      • Set up, upgrade and revert ONTAP
        • Setup ONTAP
          • Set up a cluster with the CLI
        • Upgrade ONTAP
          • Upgrade without Upgrade Advisor
            • What should I verify before I upgrade without Upgrade Advisor?
          • What should I verify before I upgrade with or without Upgrade Advisor?
            • Special considerations
              • MetroCluster configurations
              • SnapMirror
          • Which upgrade method should I use?
            • Manual nondisruptive using the CLI
              • MetroCluster configurations
          • What should I do after my upgrade?
            • Verify special configurations
        • Revert ONTAP
          • What should I read before I revert?
          • What else should I check before I revert?
            • SnapMirror
          • What should I do after reverting my cluster?
      • Cluster administration
        • Cluster management with System Manager
          • Manage nodes
        • Cluster management with the CLI
          • Cluster and SVM administrators
          • ONTAP management interface basics
            • Access the cluster by using the CLI (cluster administrators only)
            • Use the ONTAP command-line interface
              • About the different shells for CLI commands (cluster administrators only)
            • Manage CLI sessions (cluster administrators only)
              • Manage records of CLI sessions
          • Use the ONTAP command-line interface
            • About the different shells for CLI commands (cluster administrators only)
          • Cluster management basics (cluster administrators only)
          • Manage nodes
            • Rules governing node root volumes and root aggregates
            • Start or stop a node
            • Manage a node remotely using the SP/BMC
              • Configure the SP/BMC network
              • Access the SP/BMC
          • Manage audit logging for management activities
          • Manage the banner and MOTD
          • Manage licenses (cluster administrators only)
          • Manage jobs and schedules
          • Back up and restore cluster configurations (cluster administrators only)
            • Manage configuration backups
            • Recovering a node configuration
            • Recover a cluster configuration
          • Monitor a storage system
            • Manage AutoSupport with the CLI
              • Troubleshoot AutoSupport
            • Monitor the health of your system
          • Manage access to web services
            • Configure SAML authentication for web services
            • Manage web services
          • Verify the identity of remote servers using certificates
            • Mutually authenticating the cluster and a KMIP server
        • Disk and aggregate management with the CLI
          • Aggregate creation
          • Aggregate expansion
          • Managing aggregates
            • Relocate aggregate ownership within an HA pair
          • Work with Flash Pool aggregates
            • Flash Pool caching policies and SSD partitioning
            • Create a Flash Pool aggregate using SSD storage pools
            • Determine whether to modify the caching policy of Flash Pool aggregates
          • Managing disks
            • Manually assign ownership of partitioned disks
            • Disk sanitization
          • Managing RAID groups
          • Mirrored and unmirrored aggregates
        • FabricPool tier management with System Manager
        • FabricPool tier management with the CLI
          • Configure FabricPool
            • Prepare for FabricPool configuration
              • Set up an object store as the cloud tier for FabricPool
                • AWS S3 as the cloud tier
          • Manage FabricPool
            • Add or move volumes to FabricPool as needed
            • Object tagging using user-created custom tags
            • Promote data to the performance tier
          • Manage FabricPool mirrors
        • SVM data mobility
        • High availability management
        • Rest API management with System Manager
      • Volume administration
        • Volume and LUN management with System Manager
        • Logical storage management with the CLI
          • Create and manage volumes
            • SAN volumes
            • Delete directories
          • Move and copy volumes
          • Use FlexClone volumes to create efficient copies of your FlexVol volumes
          • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
            • How a FlexVol volume can reclaim free space with autodelete setting
          • Use qtrees to partition your FlexVol volumes
            • Convert a directory to a qtree
          • Logical space reporting and enforcement for volumes
          • Use quotas to restrict or track resource usage
            • Overview of the quota process
              • Special kinds of quotas
              • How quotas work with users and groups
              • How tree quotas work
              • How qtree changes affect quotas
              • How quotas are activated
              • How you can view quota information
              • Difference in space usage displayed by a quota report and a UNIX client
          • Use deduplication, data compression, and data compaction to increase storage efficiency
            • Create a volume efficiency policy to run efficiency operations
            • Manage volume efficiency operations manually
            • Manage volume efficiency operations using schedules
            • Monitor volume efficiency operations
          • Rehost a volume from one SVM to another SVM
          • Recommended volume and file or LUN configuration combinations
          • Cautions and considerations for changing file or directory capacity
          • Features supported with FlexClone files and FlexClone LUNs
        • FlexGroup volumes management with the CLI
          • FlexGroup volume setup
          • Manage FlexGroup volumes
          • Data protection for FlexGroup volumes
          • Manage data protection operations for FlexGroup volumes
            • Disaster recovery for FlexGroup volumes
            • Expand FlexGroup volumes in a SnapMirror relationship
          • Convert FlexVol volumes to FlexGroup volumes
        • FlexCache volumes management with the CLI
          • FlexCache volume creation
            • Process to create a FlexCache volume
          • Manage a FlexCache relationship
      • Network management
        • Manage your network with System Manager
        • Set up NAS path failover with the CLI
          • ONTAP 9.8 and later
            • Workflow NAS path failover
          • ONTAP 9.7 and earlier
            • Workflow NAS path failover
        • Manage your network with the CLI
          • Upgrade considerations
          • Networking components of a cluster
          • Configure network ports (cluster administrators only)
          • Configure IPspaces (cluster administrators only)
          • Configure broadcast domains (cluster administrators only)
            • ONTAP 9.8 and later
            • ONTAP 9.7 and earlier
          • Configure failover groups and policies for LIFs
          • Configure subnets (cluster administrators only)
          • Configure LIFs (cluster administrators only)
          • Configure host-name resolution
          • Balance network loads to optimize user traffic (cluster administrators only)
          • Secure your network
          • Configure QoS marking (cluster administrators only)
          • Manage SNMP on the cluster (cluster administrators only)
          • Manage routing in an SVM
          • ONTAP port usage on a storage system
          • View network information
      • NAS storage management
        • Manage NAS protocols with System Manager
          • Enable NAS storage
        • Configure NFS with the CLI
          • Preparation
          • Configure NFS access to an SVM
            • Configure name services
              • Configure local UNIX users and groups
              • Work with netgroups
              • Use LDAP
            • Use Kerberos with NFS for strong security
          • Add storage capacity to an NFS-enabled SVM
            • Create a volume or qtree storage container
            • Secure NFS access using export policies
          • How ONTAP exports differ from 7-Mode exports
        • Manage NFS with the CLI
          • Understand NAS file access
            • Namespaces and junction points
            • How ONTAP controls access to files
            • How ONTAP handles NFS client authentication
          • Create and manage data volumes in NAS namespaces
          • Configure security styles
            • How security styles affect data access
          • Set up file access using NFS
            • Secure NFS access using export policies
            • Using Kerberos with NFS for strong security
            • Configure name services
              • Use LDAP
            • Configure name mappings
          • Manage file access using NFS
            • Configure the NFS credential cache
            • Manage export policy caches
            • Manage file locks
            • Manage NFSv4 ACLs
            • Manage NFSv4 file delegations
            • Configure NFSv4 file and record locking
          • Appendix: Supported NFS versions and clients
          • Appendix: NFS and SMB file and directory naming dependencies
        • Manage NFS over RDMA
        • Configure SMB with the CLI
          • Preparation
          • Configure SMB access to an SVM
            • Set up an SMB server in an Active Directory domain
            • Set up an SMB server in a workgroup
          • Configure SMB client access to shared storage
            • Create a volume or qtree storage container
        • Manage SMB with the CLI
          • SMB server support
          • Manage SMB servers
            • Use options to customize SMB servers
              • Manage how file security is presented to SMB clients for UNIX security-style data
            • Manage SMB server security settings
              • Use SMB signing to enhance network security
              • Configure required SMB encryption on SMB servers for data transfers over SMB
              • Secure LDAP session communication
                • Configure LDAP over TLS
            • Configure default Windows user to UNIX user mappings on the SMB server
            • Improve client performance with traditional and lease oplocks
            • Apply Group Policy Objects to SMB servers
              • How GPOs are updated on the SMB server
            • Manage domain controller connections
            • Use null sessions to access storage in non-Kerberos environments
            • Manage NetBIOS aliases for SMB servers
            • Manage miscellaneous SMB server tasks
            • Use IPv6 for SMB access and SMB services
          • Set up file access using SMB
            • Configure security styles
              • How security styles affect data access
            • Create and manage data volumes in NAS namespaces
            • Configure name mappings
            • Configure multidomain name-mapping searches
            • Create and configure SMB shares
              • Use SMB share properties
            • Secure file access by using SMB share ACLs
            • Secure file access by using file permissions
            • Secure file access by using Dynamic Access Control (DAC)
            • Secure SMB access using export policies
            • Secure file access by using Storage-Level Access Guard
          • Manage file access using SMB
            • Use local users and groups for authentication and authorization
              • How ONTAP uses local users and groups
              • What local privileges are
              • Enable or disable local users and groups functionality
              • Manage local user accounts
              • Manage local groups
              • Manage local privileges
            • Configure bypass traverse checking
            • Display information about file security and audit policies
            • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
              • Configure and apply file security on NTFS files and folders using the CLI
              • Configure and apply audit policies to NTFS files and folders using the CLI
            • Configure the metadata cache for SMB shares
            • Manage file locks
            • Monitor SMB activity
          • Deploy SMB client-based services
            • Use offline files to allow caching of files for offline use
            • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
            • Use folder redirection to store data on a SMB server
            • Recover files and folders using Previous Versions
          • Deploy SMB server-based services
            • Manage home directories
              • Home directory shares
            • Configure SMB client access to UNIX symbolic links
            • Use BranchCache to cache SMB share content at a branch office
              • Requirements and guidelines
              • Configure BranchCache
              • Configure BranchCache-enabled SMB shares
              • Manage and monitor the BranchCache configuration
              • Disable BranchCache on SMB shares
              • Disable or enable BranchCache on the SVM
              • Delete the BranchCache configuration on SVMs
            • Improve Microsoft remote copy performance
            • Improve client response time by providing SMB automatic node referrals with Auto Location
            • Provide folder security on shares with access-based enumeration
          • NFS and SMB file and directory naming dependencies
        • SMB configuration for Microsoft Hyper-V and SQL Server
          • Nondisruptive operations for Hyper-V and SQL Server over SMB
          • Share-based backups with Remote VSS
          • Configuration requirements and considerations
          • Plan the Hyper-V or SQL Server over SMB configuration
          • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
          • Manage Hyper-V and SQL Server over SMB configurations
          • Use statistics to monitor Hyper-V and SQL Server over SMB activity
          • Verify that the configuration is capable of nondisruptive operations
            • Determine whether SMB sessions are continuously available
      • SAN storage management
        • SAN management with System Manager
          • SAN storage
          • NVMe storage
        • SAN management with the CLI
          • Set up LUNs for FC and iSCSI
          • Set up namespaces for NVMe
          • Manage LUNs for FC and iSCSi
          • Recommended volume and file or LUN configuration combinations
          • Selective LUN Map
          • Manage iSCSI protocol
          • Manage FC protocol
          • Manage systems with FC adapters
          • Manage NVMe protocol
          • Manage LIFs for all SAN protocols
          • Data protection methods in SAN environments
            • Effect of moving or copying a LUN on Snapshot copies
            • Use FlexClone LUNs to protect your data
            • Configure and use SnapVault backups in a SAN environment
          • SAN Concepts
            • About SAN host provisioning
              • iSCSI service management
                • iSNS server registration requirement
            • About SAN volumes
            • About host-side space management
            • Storage virtualization with VMware and Microsoft copy offload
              • Microsoft Offloaded Data Transfer (ODX)
        • SAN configuration reference
          • Considerations for iSCSI configurations
          • Considerations for FC configurations
          • Manage systems with FC adapters
            • Manage X1143A-R6 adapters
          • Ways to Configure FCoE
          • Fibre Channel and FCoE zoning
          • Host support for multipathing
          • Configuration limits
      • S3 object storage management
        • S3 configuration with System Manager
        • S3 configuration with the CLI
          • S3 support in ONTAP 9
          • About the S3 configuration process
          • Configure S3 access to an SVM
          • Add storage capacity to an S3-enabled SVM
            • Create or modify access policy statements
            • Enable client access to S3 object storage
        • Protect buckets with S3 SnapMirror
          • Mirror and backup protection on a remote cluster
          • Mirror and backup protection on the local cluster
          • Backup protection with cloud targets
        • Audit S3 events
      • Security and data encryption
        • Manage security with System Manager
        • Manage administrator authentication and RBAC with the CLI
          • Create login accounts
            • Enable local account access
          • Manage access-control roles
          • Manage administrator accounts
            • Generate and install a CA-signed server certificate
            • Configure Active Directory domain controller access
            • Configure LDAP or NIS server access
          • Manage multi-admin verification
        • Ransomware protection
        • Antivirus configuration
          • About NetApp antivirus protection
          • Configure scanner pools
          • Configure on-access scanning
          • Configure on-demand scanning
          • Troubleshoot connectivity issues
        • NAS auditing and security tracing
          • Audit NAS events on SVMs
            • How auditing works
            • SMB events that can be audited
            • Create a file and directory auditing configuration on SVMs
            • Configure file and folder audit policies
            • Display information about audit policies applied to files and directories
            • CLI change events that can be audited
            • Manage auditing configurations
          • Use FPolicy for file monitoring and management on SVMs
            • How FPolicy works
              • How FPolicy works with external FPolicy servers
            • Plan the FPolicy configuration
              • Plan the FPolicy external engine configuration
              • Plan the FPolicy event configuration
              • Plan the FPolicy policy configuration
              • Plan the FPolicy scope configuration
            • Create the FPolicy configuration
            • Modify FPolicy configurations
            • Display information about FPolicy configurations
            • Manage FPolicy server connections
          • Use security tracing to verify or troubleshoot file and directory access
            • Perform security traces
        • Manage encryption with System Manager
        • Manage encryption with the CLI
          • Configure NetApp Volume Encryption
            • Configure NVE
              • Configure external key management
            • Encrypt volume data with NVE
          • Configure NetApp hardware-based encryption
            • Configure external key management
            • Configure onboard key management
          • Manage NetApp encryption
            • Securely purge data on an encrypted volume
            • Make data on a FIPS drive or SED inaccessible
      • Data protection and disaster recovery
        • Data protection with System Manager
        • Cluster and SVM peering with the CLI
          • Prepare for cluster and SVM peering
          • Configure intercluster LIFs
          • Configure peer relationships
        • Data protection with the CLI
          • Manage local Snapshot copies
            • Configure custom Snapshot policies
            • Manage the Snapshot copy reserve
            • Restore files from Snapshot copies
          • SnapMirror volume replication
            • SnapMirror licensing
          • Manage SnapMirror volume replication
            • Configure a replication relationship one step at a time
              • Customize a replication policy
            • Serve data from a SnapMirror DR destination volume
            • Restore files from a SnapMirror destination volume
          • Manage SnapMirror SVM replication
            • Replicate SVM configurations
            • Serve data from an SVM DR destination
            • Reactivate the source SVM
          • Manage SnapMirror root volume replication
          • SnapMirror technical details
        • Archive and compliance using SnapLock technology
          • Configure SnapLock
            • Set the retention time
          • Commit files to WORM
          • Use the privileged delete feature
          • Move a SnapLock volume
        • Consistency Groups management
          • SnapMirror Business Continuity
            • Planning
            • Manage SnapMirror for Business Continuity using System Manager
            • Installation and setup using the ONTAP CLI
            • Administration
            • Troubleshooting
        • Mediator service for MetroCluster and SnapMirror Business Continuity
        • Manage MetroCluster sites with System Manager
        • Data protection using tape backup
          • Manage tape drives
          • About tape drives
            • Tape devices overview
            • Tape aliasing
          • Transfer data using ndmpcopy
          • NDMP for FlexVol volumes
            • About NDMP modes of operation
            • Environment variable
          • Manage node-scoped NDMP mode for FlexVol volumes
          • Manage SVM-scoped NDMP mode for FlexVol volumes
          • About dump engine for FlexVol volumes
          • About SMTape engine for FlexVol volumes
          • Monitor tape backup and restore operations for FlexVol volumes
            • What the dump and restore event log message format is
          • Error messages for tape backup and restore of FlexVol volumes
            • Backup and restore error messages
            • NDMP error messages
            • Dump error messages
            • SMTape error messages
        • NDMP configuration
          • Configure NDMP at the SVM level or the node level
            • Configure SVM-scoped NDMP
            • Configure node-scoped NDMP
        • Replication between NetApp Element software and ONTAP
          • Enable SnapMirror in Element software
          • Configure a replication relationship
            • Customize a replication policy
            • Create a replication relationship
          • Serve data from a SnapMirror DR destination volume
      • PDF of this page
      • Event and performance monitoring
        • View cluster performance with System Manager
        • Performance monitoring setup with the CLI
          • Performance monitoring
            • Install Active IQ Unified Manager
            • Set up basic monitoring tasks
              • Use performance thresholds to generate event notifications
        • Performance management with the CLI
          • Monitor performance
            • Install Active IQ Unified Manager
            • Set up basic monitoring tasks
          • Manage performance issues
            • Perform basic infrastructure checks
              • Check protocol settings on the storage system
            • Manage workloads
              • Guarantee throughput with QoS
        • File System Analytics
        • EMS configuration
          • Configure EMS event notifications with the CLI
          • Update deprecated EMS event mapping
    Collection of separate PDF docs

    Creating your file...

    This may take a few minutes. Thanks for your patience.
    Your file is ready
    • ONTAP docs
    • Release Notes
    • Introduction and concepts
      • ONTAP concepts
        • Overview
        • ONTAP platforms
        • Cluster storage
        • High-availability pairs
        • AutoSupport and Active IQ Digital Advisor
        • Network architecture
          • Overview
          • Logical ports
          • Support for industry-standard network technologies
          • RDMA
        • Client protocols
        • Disks and aggregates
          • Overview
          • Aggregates and RAID groups
          • Root-data partitioning
        • Volumes, qtrees, files, and LUNs
        • Storage virtualization
          • Overview
          • SVM use cases
          • Cluster and SVM administration
          • Namespaces and junction points
        • Path failover
          • Overview
          • NAS path failover
          • SAN path failover
        • Load balancing
        • Replication
          • Snapshot copies
          • SnapMirror disaster recovery and data transfer
          • SnapMirror Cloud backups to object Storage
          • SnapVault archiving
          • Cloud backup and support for traditional backups
          • MetroCluster continuous availability
        • Storage efficiency
          • Thin provisioning
          • Deduplication
          • Compression
          • FlexClone volumes, files, and LUNs
        • Security
          • Client authentication and authorization
          • Administrator authentication and RBAC
          • Virus scanning
          • Encryption
          • WORM storage
        • Application aware data management
      • ONTAP and the cloud
        • Overview
        • Data protection and the cloud
          • Overview
          • Data replication
          • High availability
          • Encryption of data at rest
          • Antivirus protection
        • Move entire workloads to the cloud
          • Storage protocols
            • File sharing with NFS and SMB
            • iSCSI
          • AutoSupport and Active IQ Digital Advisor
          • Storage VMs
          • FlexGroup volumes
        • Performance and efficiency in the cloud
          • Overview
          • FabricPool
          • Storage Efficiency
        • Manage ONTAP in the cloud
          • Overview
          • Event and performance monitoring
          • Volume management
          • Volume move
          • ONTAP updates
        • Compliance and the cloud
          • NetApp Cloud Data Sense
          • Data sovereignty
          • SnapLock WORM storage
      • ONTAP manual pages
    • Set up, upgrade and revert ONTAP
      • Setup ONTAP
        • Decide which setup method to use
        • Setup a cluster with System Manager
        • Set up a cluster with the CLI
          • Create the cluster on the first node
          • Join remaining nodes to the cluster
          • Check your cluster with Active IQ Config Advisor
          • Synchronize the system time across the cluster
          • Commands for managing symmetric authentication on NTP servers
          • Additional system configuration tasks to complete
        • Configure All SAN Array Software
      • Upgrade ONTAP
        • Overview
        • Upgrade Paths
        • Upgrade with Upgrade Advisor
        • Upgrade without Upgrade Advisor
          • Should I upgrade without Upgrade Advisor?
          • What should I read before I upgrade?
          • What should I verify before I upgrade without Upgrade Advisor?
            • Overview
            • Cluster upgrade limits
            • Current cluster activity
            • How firmware is updated during upgrade
        • What should I verify before I upgrade with or without Upgrade Advisor?
          • Overview of pre-upgrade verifications
          • Cluster health
          • Storage health
          • SVM routing configuration
          • LIF failover configuration
          • Status (HA, LDAP, DNS, MetroCluster networking and storage)
          • All LIFs are on home ports
          • Common configuration errors
          • Special considerations
            • Summary of special considerations
            • Mixed version clusters
            • SAN configurations
            • MetroCluster configurations
              • Upgrade requirements
              • Network and storage status
            • Advanced Data Partitioning
            • Deduplicated volumes and aggregates
            • SnapMirror
              • Upgrade requirements
              • Prepare SnapMirror relationships
            • SnapLock
            • Load-sharing mirrors
            • NetApp Storage Encryption
            • Netgroups
            • LDAP clients using SSLv3
            • Session-oriented protocols
        • How do I get and install the upgrade software image?
        • Which upgrade method should I use?
          • Overview of upgrade methods
          • Automated nondisruptive using System Manager
          • Automated nondisruptive using the CLI
          • Automated disruptive using the CLI
          • Manual nondisruptive using the CLI
            • Non-MetroCluster configurations
            • MetroCluster configurations
              • 4 or 8 node
              • 2-node 9.2 or earlier
          • Manual disruptive using the CLI
        • What should I do after my upgrade?
          • Overview of post-upgrade verifications
          • Verify your cluster
          • Verify all LIFs are on home ports
          • Verify special configurations
            • Summary for verifications for special configurations
            • Verify your network configuration
            • Verify your networking and storage status
            • Verify your SAN configuration
            • Reconfigure KMIP server connections
            • Relocate moved load-sharing mirror source volumes
            • Resume SnapMirror operations
            • Set the desired NT ACL permissions display level for NFS clients
            • Enforce SHA-2 on administrator passwords
          • Update the DQP
      • Update firmware
      • Revert ONTAP
        • Overview
        • Do I need technical support?
        • What are the revert paths?
        • What should I read before I revert?
          • Pre-reversion resources
          • Revert considerations
        • What should I verify before I revert?
        • What else should I check before I revert?
          • Summary of pre-revert checks
          • SnapMirror
            • SnapMirror Synchronous relationships
            • SnapMirror/SnapVault relationships
          • SnapLock
          • Split FlexClone volumes
          • FlexGroup volumes
          • SMB servers in workgroup mode
          • Deduplicated volumes
          • 2 or 4-node MetroCluster
          • Snapshot copies
          • User accounts that use SHA-2 hash function
          • Anti-ransomware licensing
        • How do I get and install the revert software image?
        • Revert my cluster
        • What should I do after reverting my cluster?
          • Verify cluster and storage health
          • Enable automatic switchover for MetroCluster configurations
          • Enable and revert LIFs to home ports
          • Enable Snapshot copy policies
          • Verify client access (SMB and NFS)
          • Verify IPv6 firewall entries
          • Revert password hash function
          • Maually update SP firmware
    • Cluster administration
      • Cluster management with System Manager
        • Administration overview
        • Use System Manager to access a Cluster
        • Enable new features
        • View and submit support cases
        • Monitor risks with Active IQ Digital Advisor
        • Gain insights to help optimize your system
        • View hardware configurations and determine problems
        • Add (create) a local tier
        • Edit a local tier
        • Add capacity to a local tier
        • Add cache to a local tier
        • Manage nodes
          • Reboot, shut down, take over, and give back nodes
          • Add nodes to cluster
      • Cluster management with the CLI
        • Overview
        • Cluster and SVM administrators
          • Roles
          • Manage access to System Manager
          • What the cluster management server is
          • Types of SVMs
        • ONTAP management interface basics
          • Access the cluster by using the CLI (cluster administrators only)
            • Access the cluster by using the serial port
            • Access the cluster by using SSH
            • SSH login security
            • Enable Telnet or RSH access to the cluster
            • Access the cluster by using Telnet
            • Access the cluster by using RSH
          • Use the ONTAP command-line interface
            • Overview
            • About the different shells for CLI commands (cluster administrators only)
              • About
              • Access of nodeshell commands and options in the clustershell
              • Display available nodeshell commands
            • Methods of navigating CLI command directories
            • Rules for specifying values in the CLI
            • Methods of viewing command history and reissuing commands
            • Keyboard shortcuts for editing CLI commands
            • Use of administrative privilege levels
            • Set the privilege level in the CLI
            • Set display preferences in the CLI
            • Methods of using query operators
            • Methods of using extended queries
            • Methods of customizing show command output by using fields
            • About positional parameters
            • Methods of accessing ONTAP man pages
          • Manage CLI sessions (cluster administrators only)
            • Manage records of CLI sessions
              • Overview
              • Record a CLI session
              • Commands for managing records of CLI sessions
            • Commands for managing the automatic timeout period of CLI sessions
        • Use the ONTAP command-line interface
          • About the different shells for CLI commands (cluster administrators only)
            • Access of nodeshell commands and options in the clustershell
            • Display available nodeshell commands
          • Methods of navigating CLI command directories
          • Rules for specifying values in the CLI
          • Methods of viewing command history and reissuing commands
          • Keyboard shortcuts for editing CLI commands
          • Use of administrative privilege levels
          • Set the privilege level in the CLI
          • Set display preferences in the CLI
          • Methods of using query operators
          • Methods of using extended queries
          • Methods of customizing show command output by using fields
          • About positional parameters
          • Methods of accessing ONTAP man pages
        • Cluster management basics (cluster administrators only)
          • Display information about the nodes in a cluster
          • Display cluster attributes
          • Modify cluster attributes
          • Display the status of cluster replication rings
          • About quorum and epsilon
          • What system volumes are
        • Manage nodes
          • Display node attributes
          • Modify node attributes
          • Rename a node
          • Add nodes to the cluster
          • Remove nodes from the cluster
          • Access a node’s log, core dump, and MIB files by using a web browser
          • Access the system console of a node
          • Rules governing node root volumes and root aggregates
            • Overview
            • Free up space on a node’s root volume
            • Relocate root volumes to new aggregates
          • Start or stop a node
            • Overview
            • Reboot a node at the system prompt
            • Boot ONTAP at the boot environment prompt
            • Shut down a node
          • Manage a node by using the boot menu
          • Manage a node remotely using the SP/BMC
            • Overview
            • About the SP
            • What the Baseboard Management Controller does
            • Configure the SP/BMC network
              • Isolate management network traffic
              • Considerations for the SP/BMC network configuration
              • Enable the SP/BMC automatic network configuration
              • Configure the SP/BMC network manually
              • Modify the SP API service configuration
            • Methods of managing SP/BMC firmware updates
            • When the SP/BMC uses the network interface for firmware updates
            • Access the SP/BMC
              • Accounts that can access the SP
              • Access the SP/BMC from an administration host
              • Access the SP/BMC from the system console
              • Relationship among the SP CLI, SP console, and system console sessions
              • Manage the IP addresses that can access the SP
            • Use online help at the SP/BMC CLI
            • Commands to manage a node remotely
            • About the threshold-based SP sensor readings and status values of the system sensors command output
            • About the discrete SP sensor status values of the system sensors command output
            • Commands for managing the SP from ONTAP
            • ONTAP commands for BMC management
            • BMC CLI commands
        • Manage audit logging for management activities
          • How ONTAP implements audit logging
          • Changes to audit logging in ONTAP 9
          • Display audit log contents
          • Manage audit GET request settings
          • Manage audit log destinations
        • Manage the cluster time (cluster administrators only)
        • Commands for managing the cluster time
        • Manage the banner and MOTD
          • Overview
          • Create a banner
          • Manage the banner
          • Create an MOTD
          • Manage the MOTD
        • Manage licenses (cluster administrators only)
          • Overview
          • License types and licensed method
          • Commands for managing licenses
        • Manage jobs and schedules
          • Job categories
          • Commands for managing jobs
          • Commands for managing job schedules
        • Back up and restore cluster configurations (cluster administrators only)
          • What configuration backup files are
          • Manage configuration backups
            • How the node and cluster configurations are backed up automatically
            • Commands for managing configuration backup schedules
            • Commands for managing configuration backup files
          • Recovering a node configuration
            • Find a configuration backup file to use for recovering a node
            • Restore the node configuration using a configuration backup file
          • Recover a cluster configuration
            • Find a configuration to use for recovering a cluster
            • Restore a cluster configuration from an existing configuration
          • Synchronize a node with the cluster
        • Manage core dumps (cluster administrators only)
        • Commands for managing core dumps
        • Monitor a storage system
          • Use AutoSupport and Active IQ Digital Advisor
          • Manage AutoSupport with System Manager
          • Manage AutoSupport with the CLI
            • Overview
            • When and where AutoSupport messages are sent
            • How AutoSupport creates and sends event-triggered messages
            • Types of AutoSupport messages and their content
            • What AutoSupport subsystems are
            • AutoSupport size and time budgets
            • Files sent in event-triggered AutoSupport messages
            • Log files sent in AutoSupport messages
            • Files sent in weekly AutoSupport messages
            • How AutoSupport OnDemand obtains delivery instructions from technical support
            • Structure of AutoSupport messages sent by email
            • AutoSupport severity types
            • Requirements for using AutoSupport
            • Set up AutoSupport
            • Upload core dump files
            • Upload performance archive files
            • Get AutoSupport message descriptions
            • Commands for managing AutoSupport
            • Information included in the AutoSupport manifest
            • AutoSupport case suppression during scheduled maintenance windows
            • Troubleshoot AutoSupport
              • Troubleshoot AutoSupport when messages are not received
              • Troubleshoot AutoSupport message delivery over HTTP or HTTPS
              • Troubleshoot AutoSupport message delivery over SMTP
              • Troubleshoot the AutoSupport subsystem
          • Monitor the health of your system
            • Overview
            • How health monitoring works
            • Ways to respond to system health alerts
            • System health alert customization
            • How health alerts trigger AutoSupport messages and events
            • Available cluster health monitors
            • Receive system health alerts automatically
            • Respond to degraded system health
            • Example of responding to degraded system health
            • Configure discovery of cluster and management network switches
            • Verify the monitoring of cluster and management network switches
            • Commands for monitoring the health of your system
          • Display environmental information
        • Manage access to web services
          • Overview
          • Manage the web protocol engine
          • Commands for managing the web protocol engine
          • Configure SAML authentication for web services
            • Configure SAML authentication
            • Disable SAML authentication
            • Troubleshoot issues with SAML configuration
          • Manage web services
            • Overview
            • Commands for managing web services
            • Commands for managing mount points on the nodes
          • Manage SSL
          • Commands for managing SSL
          • Configure access to web services
          • Troubleshoot web service access problems
        • Verify the identity of remote servers using certificates
          • Overview
          • Verify digital certificates are valid using OCSP
          • View default certificates for TLS-based applications
          • Mutually authenticating the cluster and a KMIP server
            • Overview
            • Generate a certificate signing request for the cluster
            • Install a CA-signed server certificate for the cluster
            • Install a CA-signed client certificate for the KMIP server
      • Disk and aggregate management with the CLI
        • Overview
        • Aggregate creation
          • Workflow
          • Decide which aggregate creation method to use
          • Create aggregates with auto-provision
          • Default RAID policies for aggregates
          • Determine the number of disks or disk partitions required for an aggregate
          • Create aggregates manually
        • Aggregate expansion
          • Workflow
          • Add drives to a node or shelf
          • Manually assign disk ownership
          • Fast zeroing of drives
          • Expand aggregates
        • Managing aggregates
          • RAID protection levels for disks
          • Determine the number of disks or disk partitions required for an aggregate
          • Correct misaligned spare partitions
          • Determine drive and RAID group information for an aggregate
          • Relocate aggregate ownership within an HA pair
            • Relocate aggregate ownership
            • Commands for aggregate relocation
          • Assign aggregates to SVMs
          • Determine space usage in an aggregate
          • Determine which volumes reside on an aggregate
          • How you can determine and control a volume’s space usage in the aggregate
          • Methods to create space in an aggregate
          • Commands for managing aggregates
        • Work with Flash Pool aggregates
          • Flash Pool caching policies and SSD partitioning
            • How Flash Pool aggregate caching policies work
            • How Flash Pool SSD partitioning works for Flash Pool aggregates using storage pools
          • Determine Flash Pool candidacy and optimal cache size
          • Create a Flash Pool aggregate using physical SSDs
          • Create a Flash Pool aggregate using SSD storage pools
            • Determine whether a Flash Pool aggregate is using an SSD storage pool
            • Create an SSD storage pool
            • Create a Flash Pool aggregate using SSD storage pool allocation units
            • Determine the impact to cache size of adding SSDs to an SSD storage pool
            • Add SSDs to an SSD storage pool
            • Commands for managing SSD storage pools
          • Determine whether to modify the caching policy of Flash Pool aggregates
            • Overview
            • Modify caching policies of Flash Pool aggregates
            • Set the cache-retention policy for Flash Pool aggregates
        • Managing disks
          • When you need to update the Disk Qualification Package
          • How hot spare disks work
          • How low spare warnings can help you manage your spare disks
          • Display disk and partition ownership
          • Manually assign ownership of partitioned disks
            • Overview
            • Manually assign disks with root-data partitioning
            • Manually assign disks with root-data-data partitioning
          • Additional root-data partitioning management options
          • Configure automatic assignment of disk ownership
          • Which disk autoassignment policy to use
          • Remove a failed disk
          • Remove ownership from a disk
          • Disk sanitization
            • Overview
            • When sanitization cannot be performed
            • What happens if sanitization is interrupted
            • Tips for managing aggregates containing data to be sanitized
            • Sanitize a disk
          • Set up an active-passive configuration on nodes using root-data partitioning
          • Set up an active-passive configuration on nodes using root-data-data partitioning
          • Commands for managing disks
          • Commands for displaying space usage information
          • Commands for displaying information about storage shelves
        • Managing RAID groups
          • Convert from RAID-DP to RAID-TEC
          • Convert RAID-TEC to RAID-DP
          • Considerations for sizing RAID groups
          • Customize the size of your RAID groups
        • Mirrored and unmirrored aggregates
          • Overview
          • How unmirrored aggregates work
          • How mirrored aggregates work
      • FabricPool tier management with System Manager
        • FabricPool overview
        • Add a connection to the cloud
        • Tier data to the cloud
        • Install a FabricPool license
        • Tier data to local bucket
        • Create tiering object tags
        • Enable inactive data reporting
      • FabricPool tier management with the CLI
        • Overview
        • Benefits of storage tiers by using FabricPool
        • Considerations and requirements for using FabricPool
        • About FabricPool tiering policies
        • FabricPool management workflow
        • Configure FabricPool
          • Prepare for FabricPool configuration
            • Overview
            • Install a FabricPool license
            • Install a FabricPool license (video)
            • Install a CA certificate if you use StorageGRID
            • Install a CA certificate if you use ONTAP S3
            • Set up an object store as the cloud tier for FabricPool
              • Specify the StorageGRID configuration information
              • Set up StorageGRID as the cloud tier
              • Attach StorageGRID as a FabricPool cloud tier (video)
              • Set up ONTAP S3 as the cloud tier
              • Set up Alibaba Cloud Object Storage as the cloud tier
              • AWS S3 as the cloud tier
                • Specify the AWS S3 configuration information
                • Attach AWS S3 as a FabricPool cloud tier (video)
              • Set up Google Cloud Storage as the cloud tier
              • Set up IBM Cloud Object Storage as the cloud tier
              • Set up Azure Blob Storage for the cloud as the cloud tier
              • Set up object stores for FabricPool in a MetroCluster configuration
            • Attach the cloud tier to an aggregate
        • Manage FabricPool
          • Overview
          • Determinine how much data in a volume is inactive by using inactive data reporting
          • Add or move volumes to FabricPool as needed
            • Create a volume for FabricPool
            • Move a volume to FabricPool
          • Object tagging using user-created custom tags
            • Overview
            • Assign a new tag during volume creation
            • Modify an existing tag
            • Delete a tag
            • View existing tags on a volume
            • Check object tagging status on FabricPool volumes
          • Monitor the space utilization for FabricPool
          • Manage storage tiering by modifying a volume’s tiering policy or tiering minimum cooling period
          • Archive volumes with FabricPool (video)
          • Use cloud migration controls to override a volume’s default tiering policy
          • Promote data to the performance tier
            • Overview
            • Promote all data from a FabricPool volume to the performance tier
            • Promote file system data to the performance tier
            • Check the status of a performance tier promotion
            • Trigger scheduled migration and tiering
        • Manage FabricPool mirrors
          • Overview
          • Create a FabricPool mirror
          • Monitor FabricPool mirror resync status
          • Display FabricPool mirror details
          • Promote a FabricPool mirror
          • Remove a FabricPool mirror
          • Replace an existing object store using a FabricPool mirror
          • Replace a FabricPool mirror on a MetroCluster configuration
        • Commands for managing aggregates with FabricPool
      • SVM data mobility
        • Overview
        • Migrate an SVM
        • Monitor migration
        • Pause and resume migration
        • Cancel migration
        • Manually cut over clients
        • Manually remove source SVM
      • High availability management
        • Overview
        • How hardware-assisted takeover works
        • How automatic takeover and giveback works
        • Automatic takeover commands
        • Automatic giveback commands
        • Manual takeover commands
        • Manual giveback commands
        • Testing takeover and giveback
        • Commands for monitoring an HA pair
        • Commands for enabling and disabling storage failover
        • Halt or reboot a node without initiating takeover
      • Rest API management with System Manager
        • Rest log overview
        • Access the REST API log
    • Volume administration
      • Volume and LUN management with System Manager
        • Overview
        • Manage volumes
        • Add a volume
        • Add LUNs
        • Expand volumes and LUNs
        • Recover deleted volumes
        • Save storage space
        • Balance load by moving LUNs
        • Balance loads by moving volumes to another tier
        • Use Ansible Playbooks to add or edit volumes or LUNs
        • Manage storage efficiency policies
        • Manage resources using quotas
        • Limit resource use
        • Clone data with FlexClone
        • Search, filter, and sort
        • Capacity measurements
      • Logical storage management with the CLI
        • Overview
        • Create and manage volumes
          • Create a volume
          • SAN volumes
            • About
            • Configure volume provisioning options
            • Determine space usage in a volume or aggregate
            • Delete Snapshot copies automatically
            • Configure volumes to automatically provide more space when they are full
            • Configure volumes to automatically grow and shrink their size
            • Requirements for enabling both autoshrink and automatic Snapshot copy deletion
            • How the autoshrink functionality interacts with Snapshot copy deletion
            • Address FlexVol volume fullness and overallocation alerts
            • Address aggregate fullness and overallocation alerts
            • Considerations for setting fractional reserve
          • Display file or inode usage
          • Control and monitoring I/O performance to FlexVol volumes by using Storage QoS
          • Delete a FlexVol volume
          • Protection against accidental volume deletion
          • Delete directories
            • Overview
          • Commands for managing FlexVol volumes
          • Commands for displaying space usage information
        • Move and copy volumes
          • How moving a FlexVol volume works
          • Considerations and recommendations when moving volumes
          • Requirement for moving volumes in SAN environments
          • Move a volume
          • Commands for moving volumes
          • Methods for copying a volume
        • Use FlexClone volumes to create efficient copies of your FlexVol volumes
          • Overview
          • Create a FlexClone volume
          • Split a FlexClone volume from its parent volume
          • Determine the space used by a FlexClone volume
          • Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
        • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
          • Overview
          • Create a FlexClone file or FlexClone LUN
          • View node capacity for creating and deleting FlexClone files and FlexClone LUNs
          • View the space savings due to FlexClone files and FlexClone LUNs
          • Methods to delete FlexClone files and FlexClone LUNs
          • How a FlexVol volume can reclaim free space with autodelete setting
            • Overview
            • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
            • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
            • Commands for configuring deletion of FlexClone files
        • Use qtrees to partition your FlexVol volumes
          • Overview
          • Obtain a qtree junction path
          • Qtree name restrictions
          • Convert a directory to a qtree
            • Overview
            • Convert a directory to a qtree using a Windows client
            • Convert a directory to a qtree using a UNIX client
          • Commands for managing and configuring qtrees
        • Logical space reporting and enforcement for volumes
          • Overview
          • What logical space reporting shows
          • What logical space enforcement does
          • Enable logical space reporting and enforcement
        • Use quotas to restrict or track resource usage
          • Overview of the quota process
            • Quota process
            • Differences among hard, soft, and threshold quotas
            • About quota notifications
            • Why you use quotas
            • What quota rules, quota policies, and quotas are
            • Quota targets and types
            • Special kinds of quotas
              • How default quotas work
              • How you use explicit quotas
              • How derived quotas work
              • How you use tracking quotas
            • How quotas are applied
            • Considerations for assigning quota policies
            • How quotas work with users and groups
              • Overview
              • How you specify UNIX users for quotas
              • How you specify Windows users for quotas
              • How default user and group quotas create derived quotas
              • How quotas are applied to the root user
              • How quotas work with special Windows groups
              • How quotas are applied to users with multiple IDs
              • How ONTAP determines user IDs in a mixed environment
              • How quotas with multiple users work
              • How you link UNIX and Windows names for quotas
            • How quotas work with qtrees
            • How tree quotas work
              • Overview
              • How user and group quotas work with qtrees
              • How default tree quotas on a FlexVol volume create derived tree quotas
              • How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume
            • How qtree changes affect quotas
              • Overview
              • How deleting a qtree affects tree quotas
              • How renaming a qtree affects quotas
              • How changing the security style of a qtree affects user quotas
            • How quotas are activated
              • Overview
              • When you can use resizing
              • When a full quota reinitialization is required
            • How you can view quota information
              • Overview
              • How you can use the quota report to see what quotas are in effect
              • Why enforced quotas differ from configured quotas
              • Use the quota report to determine which quotas limit writes to a specific file
              • Commands for displaying information about quotas
              • When to use the volume quota policy rule show and volume quota report commands
            • Difference in space usage displayed by a quota report and a UNIX client
              • Overview
              • How a quota report accounts for disk space and file usage
              • How the ls command accounts for space usage
              • How the df command accounts for file size
              • How the du command accounts for space usage
            • Examples of quota configuration
          • Set up quotas on anSVM
          • Modify (or Resizing) quota limits
          • Reinitialize quotas after making extensive changes
          • Commands to manage quota rules and quota policies
          • Commands to activate and modify quotas
        • Use deduplication, data compression, and data compaction to increase storage efficiency
          • Overview
          • Enable deduplication on a volume
          • Disable deduplication on a volume
          • Manage automatic volume-level background deduplication on AFF systems
          • Manage aggregate-level inline deduplication on AFF systems
          • Manage aggregate-level background deduplication on AFF systems
          • Temperature-sensitive storage efficiency overview
          • Set storage efficiency modes
          • Check volume efficiency mode
          • Change volume efficiency mode
          • Enable data compression on a volume
          • Move between secondary compression and adaptive compression
          • Disable data compression on a volume
          • Manage inline data compaction for AFF systems
          • Enable inline data compaction for FAS systems
          • Inline storage efficiency enabled by default on AFF systems
          • Enable storage efficiency visualization
          • Create a volume efficiency policy to run efficiency operations
            • Overview
            • Assign a volume efficiency policy to a volume
            • Modify a volume efficiency policy
            • View a volume efficiency policy
            • Disassociate a volume efficiency policy from a volume
            • Delete a volume efficiency policy
          • Manage volume efficiency operations manually
            • Overview
            • Run efficiency operations manually
            • Use checkpoints to resume efficiency operation
            • Resume a halted efficiency operation
            • Run efficiency operations manually on existing data
          • Manage volume efficiency operations using schedules
            • Run efficiency operations depending on the amount of new data written
            • Run efficiency operations using scheduling
          • Monitor volume efficiency operations
            • View the status of efficiency operations
            • View efficiency space savings
            • View efficiency statistics of a FlexVol volume
          • Stop volume efficiency operations
          • Information about removing space savings from a volume
        • Rehost a volume from one SVM to another SVM
          • Overview
          • Rehost CIFS volumes
          • Rehost NFS volumes
          • Rehost SAN volumes
          • Rehost volumes in a SnapMirror relationship
          • Features that do not support volume rehost
        • Storage limits
        • Recommended volume and file or LUN configuration combinations
          • Overview
          • Determine the correct volume and LUN configuration combination for your environment
          • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
          • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
          • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
        • Cautions and considerations for changing file or directory capacity
          • Considerations for changing the maximum number of files allowed on a FlexVol volume
          • Cautions for increasing the maximum directory size for FlexVol volumes
          • Rules governing node root volumes and root aggregates
          • Relocate root volumes to new aggregates
        • Features supported with FlexClone files and FlexClone LUNs
          • Overview
          • How deduplication works with FlexClone files and FlexClone LUNs
          • How Snapshot copies work with FlexClone files and FlexClone LUNs
          • How access control lists work with FlexClone files and FlexClone LUNs
          • How quotas work with FlexClone files and FlexClone LUNs
          • How FlexClone volumes work with FlexClone files and FlexClone LUNs
          • How NDMP works with FlexClone files and FlexClone LUNs
          • How volume SnapMirror works with FlexClone files and FlexClone LUNs
          • How volume move affects FlexClone files and FlexClone LUNs
          • How space reservation works with FlexClone files and FlexClone LUNs
          • How an HA configuration works with FlexClone files and FlexClone LUNs
      • FlexGroup volumes management with System Manager
      • FlexGroup volumes management with the CLI
        • Overview
        • What a FlexGroup volume is
        • Supported and unsupported configurations for FlexGroup volumes
        • FlexGroup volume setup
          • Workflow
          • Enable 64-bit NFSv3 identifiers on an SVM
          • Provision a FlexGroup volume automatically
          • Create a FlexGroup volume
        • Manage FlexGroup volumes
          • Monitor the space usage of a FlexGroup volume
          • Increase the size of a FlexGroup volume
          • Reduce the size of a FlexGroup volume
          • Configure FlexGroup volumes to automatically grow and shrink their size
          • Delete files and directories rapidly on a cluster
          • Manage client rights to delete directories rapidly
          • Create qtrees with FlexGroup volumes
          • Use quotas for FlexGroup volumes
          • Enable storage efficiency on a FlexGroup volume
          • Protect FlexGroup volumes using Snapshot copies
          • Move the constituents of a FlexGroup volume
          • Use aggregates in FabricPool for existing FlexGroup volumes
        • Data protection for FlexGroup volumes
          • Workflow
          • Create a SnapMirror relationship for FlexGroup volumes
          • Create a SnapVault relationship for FlexGroup volumes
          • Create a unified data protection relationship for FlexGroup volumes
          • Create an SVM disaster recovery relationship for FlexGroup volumes
          • Transition an existing FlexGroup SnapMirror relationship to SVM DR
          • Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship
          • Considerations for creating SnapMirror cascade and fanout relationships for FlexGroups
          • Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes
          • Monitor SnapMirror data transfers for FlexGroup volumes
        • Manage data protection operations for FlexGroup volumes
          • Disaster recovery for FlexGroup volumes
            • Workflow
            • Activate the destination FlexGroup volume
            • Reactivate the original source FlexGroup volume after disaster
            • Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery
          • Expand FlexGroup volumes in a SnapMirror relationship
            • Overview
            • Expand the source FlexGroup volume of a SnapMirror relationship
            • Expand the destination FlexGroup volume of a SnapMirror relationship
          • Perform a SnapMirror single file restore from a FlexGroup volume
          • Restore a FlexGroup volume from a SnapVault backup
          • Disable SVM protection on a FlexGroup volume
          • Enable SVM protection on a FlexGroup volume
        • Convert FlexVol volumes to FlexGroup volumes
          • Overview
          • Convert a FlexVol volume to a FlexGroup volume
          • Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship
      • FlexCache volumes management with System Manager
      • FlexCache volumes management with the CLI
        • Overview
        • Benefits of FlexCache volumes
        • Typical FlexCache deployments
        • Supported and unsupported features for FlexCache volumes
        • FlexCache volume creation
          • Workflow
          • Add a FlexCache license
          • Process to create a FlexCache volume
            • Create a FlexCache volume
            • Guidelines for sizing a FlexCache volume
            • Considerations for auditing FlexCache volumes
        • Manage a FlexCache relationship
          • View the connection status of a FlexCache relationship
          • Synchronize properties of a FlexCache volume from an origin volume
          • Update the configurations of a FlexCache relationship
          • Enable file access time updates
          • Enable global file locking
          • Prepopulate a FlexCache volume
          • Delete a FlexCache relationship
    • Network management
      • Manage your network with System Manager
        • Overview
        • View and manage your network
        • Auto detect wiring issues
        • Download network data for reporting
      • Set up NAS path failover with the CLI
        • ONTAP 9.8 and later
          • About NAS path failover for ONTAP 9.8 and later
          • Workflow NAS path failover
            • Overview
            • Worksheet for NAS path failover configuration
            • Create IPspaces
            • Move broadcast domains
            • Repair port reachability
            • Create SVMs
            • Create LIFs
            • Configure DNS services
        • ONTAP 9.7 and earlier
          • Set up NAS path failover (ONTAP 9.0-9.7 CLI)
          • Workflow NAS path failover
            • Overview
            • Worksheet for NAS path failover configuration
            • Create IPspaces
            • Determine which ports can be used for a broadcast domains
            • Remove ports from a broadcast domain
            • Create a broadcast domain
            • Create a subnet
            • Create SVMs
            • Create LIFs
            • Configure DNS services
            • Configure dynamic DNS services
      • Manage your network with the CLI
        • Network management overview
        • Upgrade considerations
          • Network features by release
          • Verify your networking configuration after upgrading to ONTAP 9.8 or later
        • Networking components of a cluster
          • Overview
          • Network cabling guidelines
          • Relationship between broadcast domains, failover groups, and failover policies
        • Configure network ports (cluster administrators only)
          • Overview
          • Combine physical ports to create interface groups
          • Configure VLANs over physical ports
          • Modify network port attributes
          • Modify MTU setting for interface group ports
          • Monitor the health of network ports
          • Monitor the reachability of network ports in ONTAP 9.8 and later
          • Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity
          • Removing a NIC from the node on ONTAP 9.7 or earlier
          • Removing a NIC from the node on ONTAP 9.8 or later
        • Configure IPspaces (cluster administrators only)
          • Overview
          • Example of using IPspaces
          • Standard properties of IPspaces
          • Create IPspaces
          • Display IPspaces
          • Delete an IPspace
        • Configure broadcast domains (cluster administrators only)
          • ONTAP 9.8 and later
            • About broadcast domains for ONTAP 9.8 and later
            • Example of using broadcast domains
            • Add or remove ports from a broadcast domain
            • Split broadcast domains
            • Merge broadcast domains
            • Change the MTU value for ports in a broadcast domain
            • Display broadcast domains
            • Delete a broadcast domain
          • ONTAP 9.7 and earlier
            • About broadcast domains for ONTAP 9.7 and earlier
            • Example of using broadcast domains
            • Create a broadcast domain
            • Add or remove ports from a broadcast domain
            • Split broadcast domains
            • Merge broadcast domains
            • Change the MTU value for ports in a broadcast domain
            • Display broadcast domains
            • Delete a broadcast domain
        • Configure failover groups and policies for LIFs
          • Overview
          • Create a failover group
          • Configure failover settings on a LIF
          • Commands for managing failover groups and policies
        • Configure subnets (cluster administrators only)
          • Overview
          • Create a subnet
          • Add or remove IP addresses from a subnet
          • Change subnet properties
          • Display subnets
          • Delete a subnet
        • Configure LIFs (cluster administrators only)
          • Overview
          • LIF compatibility with port types
          • LIF roles in ONTAP 9.5 and earlier
          • LIFs and service policies
          • Configure LIF service policies
          • Create a LIF
          • Modify a LIF
          • Migrate a LIF
          • Revert a LIF to its home port
          • ONTAP 9.8 or later-Recover from an incorrectly configured cluster LIF
          • Delete a LIF
          • Configure virtual IP (VIP) LIFs
        • Configure host-name resolution
          • Overview
          • Configure DNS for host-name resolution
          • Manage the hosts table (cluster administrators only)
        • Balance network loads to optimize user traffic (cluster administrators only)
          • Overview
          • How DNS load balancing works
          • Create a DNS load balancing zone
          • Add or remove a LIF from a load balancing zone
        • Secure your network
          • Configure network security using Federal Information Processing Standards (FIPS)
          • Configure IP security (IPsec) over wire encryption
          • Configure firewall policies for LIFs
          • Commands for managing firewall service and policies
        • Configure QoS marking (cluster administrators only)
          • Overview
          • DSCP marking for UC compliance
          • Modify QoS marking values
          • Display QoS marking values
        • Manage SNMP on the cluster (cluster administrators only)
          • Overview
          • What MIBs are
          • SNMP traps
          • Create an SNMP community and assign it to a LIF
          • Configure SNMPv3 users in a cluster
          • Configure traphosts to receive SNMP notifications
          • Commands for managing SNMP
        • Manage routing in an SVM
          • Overview
          • Create a static route
          • Enable multipath routing
          • Delete a static route
          • Display routing information
          • Remove dynamic routes from routing tables
        • ONTAP port usage on a storage system
          • Overview
          • ONTAP internal ports
        • View network information
          • Overview
          • Display network port information
          • Display information about a VLAN (cluster administrators only)
          • Display interface group information (cluster administrators only)
          • Display LIF information
          • Display routing information
          • Display DNS host table entries (cluster administrators only)
          • Display DNS domain configurations
          • Display information about failover groups
          • Display LIF failover targets
          • Display LIFs in a load balancing zone
          • Display cluster connections
          • Commands for diagnosing network problems
          • Display network connectivity with neighbor discovery protocols
    • NAS storage management
      • Manage NAS protocols with System Manager
        • NAS storage overview
        • VMware datastores
        • Home directories
        • Linux servers
        • Export policies
        • Windows servers
        • Both Windows and Linux
        • Secure client access with Kerberos
        • Provide client access with name services
        • Manage directories and files
        • Manage host-specific users and groups
        • Monitor NFS active clients
        • Enable NAS storage
          • Enable Linux servers
          • Enable Windows servers
          • Enable Both Windows and Linux
      • Configure NFS with the CLI
        • Overview
        • Workflow
        • Preparation
          • Assess physical storage requirements
          • Assess networking requirements
          • Decide where to provision new NFS storage capacity
          • Worksheet for gathering NFS configuration information
        • Configure NFS access to an SVM
          • Create an SVM
          • Verify that the NFS protocol is enabled on the SVM
          • Open the export policy of the SVM root volume
          • Create an NFS server
          • Create a LIF
          • Enable DNS for host-name resolution
          • Configure name services
            • Overview
            • Configure the name service switch table
            • Configure local UNIX users and groups
              • Overview
              • Create a local UNIX user
              • Load local UNIX users from a URI
              • Create a local UNIX group
              • Add a user to a local UNIX group
              • Load local UNIX groups from a URI
            • Work with netgroups
              • Overview
              • Load netgroups into SVMs
              • Verify the status of netgroup definitions
            • Create an NIS domain configuration
            • Use LDAP
              • Overview
              • Create a new LDAP client schema
              • Install the self-signed root CA certificate on the SVM
              • Create an LDAP client configuration
              • Associate the LDAP client configuration with SVMs
              • Verify LDAP sources in the name service switch table
          • Use Kerberos with NFS for strong security
            • Overview
            • Verify permissions for Kerberos configuration
            • Create an NFS Kerberos realm configuration
            • Configure NFS Kerberos permitted encryption types
            • Enable Kerberos on a data LIF
        • Add storage capacity to an NFS-enabled SVM
          • Overview
          • Create an export policy
          • Add a rule to an export policy
          • Create a volume or qtree storage container
            • Create a volume
            • Create a qtree
          • Secure NFS access using export policies
            • Overview
            • Manage the processing order of export rules
            • Assign an export policy to a volume
            • Assign an export policy to a qtree
          • Verify NFS client access from the cluster
          • Test NFS access from client systems
        • Where to find additional information
        • How ONTAP exports differ from 7-Mode exports
          • Overview
          • Comparison of exports in 7-Mode and ONTAP
          • Examples of ONTAP export policies
      • Manage NFS with the CLI
        • Overview
        • Understand NAS file access
          • Namespaces and junction points
            • Overview
            • What the typical NAS namespace architectures are
          • How ONTAP controls access to files
            • Overview
            • Authentication-based restrictions
            • File-based restrictions
          • How ONTAP handles NFS client authentication
            • Overview
            • How ONTAP uses name services
            • How ONTAP grants SMB file access from NFS clients
            • How the NFS credential cache works
        • Create and manage data volumes in NAS namespaces
          • Create data volumes with specified junction points
          • Creating data volumes without specifying junction points
          • Mounting or unmounting existing volumes in the NAS namespace
          • Displaying volume mount and junction point information
        • Configure security styles
          • How security styles affect data access
            • What the security styles and their effects are
            • Where and when to set security styles
            • Decide which security style to use on SVMs
            • How security style inheritance works
            • How ONTAP preserves UNIX permissions
            • Manage UNIX permissions using the Windows Security tab
          • Configure security styles on SVM root volumes
          • Configure security styles on FlexVol volumes
          • Configure security styles on qtrees
        • Set up file access using NFS
          • Overview
          • Secure NFS access using export policies
            • How export policies control client access to volumes or qtrees
            • Default export policy for SVMs
            • How export rules work
            • Manage clients with an unlisted security type
            • How security types determine client access levels
            • Manage superuser access requests
            • How ONTAP uses export policy caches
            • How the access cache works
            • How access cache parameters work
            • Removing an export policy from a qtree
            • Validating qtree IDs for qtree file operations
            • Export policy restrictions and nested junctions for FlexVol volumes
          • Using Kerberos with NFS for strong security
            • ONTAP support for Kerberos
            • Requirements for configuring Kerberos with NFS
            • Specifying the user ID domain for NFSv4
          • Configure name services
            • How ONTAP name service switch configuration works
            • Use LDAP
              • Overview
              • LDAP signing and sealing concepts
              • LDAPS concepts
              • Enable LDAP RFC2307bis support
              • Configuration options for LDAP directory searches
              • Improve performance of LDAP directory netgroup-by-host searches
              • Use LDAP fast bind for nsswitch authentication
              • Display LDAP statistics
          • Configure name mappings
            • Overview
            • How name mapping works
            • Multidomain searches for UNIX user to Windows user name mappings
            • Name mapping conversion rules
            • Create a name mapping
            • Configure the default user
            • Commands for managing name mappings
          • Enable access for Windows NFS clients
          • Enable the display of NFS exports on NFS clients
        • Manage file access using NFS
          • Enable or disable NFSv3
          • Enable or disable NFSv4.0
          • Enable or disable NFSv4.1
          • Enable or disable pNFS
          • Controlling NFS access over TCP and UDP
          • Controlling NFS requests from nonreserved ports
          • Handling NFS access to NTFS volumes or qtrees for unknown UNIX users
          • Considerations for clients that mount NFS exports using a nonreserved port
          • Performing stricter access checking for netgroups by verifying domains
          • Modifying ports used for NFSv3 services
          • Commands for managing NFS servers
          • Troubleshooting name service issues
          • Verifying name service connections
          • Commands for managing name service switch entries
          • Commands for managing name service cache
          • Commands for managing name mappings
          • Commands for managing local UNIX users
          • Commands for managing local UNIX groups
          • Limits for local UNIX users, groups, and group members
          • Manage limits for local UNIX users and groups
          • Commands for managing local netgroups
          • Commands for managing NIS domain configurations
          • Commands for managing LDAP client configurations
          • Commands for managing LDAP configurations
          • Commands for managing LDAP client schema templates
          • Commands for managing NFS Kerberos interface configurations
          • Commands for managing NFS Kerberos realm configurations
          • Commands for managing export policies
          • Commands for managing export rules
          • Configure the NFS credential cache
            • Reasons for modifying the NFS credential cache time-to-live
            • Configure the time-to-live for cached NFS user credentials
          • Manage export policy caches
            • Flush export policy caches
            • Display the export policy netgroup queue and cache
            • Checking whether a client IP address is a member of a netgroup
            • Optimizing access cache performance
          • Manage file locks
            • About file locking between protocols
            • How ONTAP treats read-only bits
            • How ONTAP differs from Windows on handling locks on share path components
            • Display information about locks
            • Breaking locks
          • How FPolicy first-read and first-write filters work with NFS
          • Modifying the NFSv4.1 server implementation ID
          • Manage NFSv4 ACLs
            • Benefits of enabling NFSv4 ACLs
            • How NFSv4 ACLs work
            • Enable or disable modification of NFSv4 ACLs
            • How ONTAP uses NFSv4 ACLs to determine whether it can delete a file
            • Enable or disable NFSv4 ACLs
            • Modifying the maximum ACE limit for NFSv4 ACLs
          • Manage NFSv4 file delegations
            • Enable or disable NFSv4 read file delegations
            • Enable or disable NFSv4 write file delegations
          • Configure NFSv4 file and record locking
            • About NFSv4 file and record locking
            • Specifying the NFSv4 locking lease period
            • Specifying the NFSv4 locking grace period
          • How NFSv4 referrals work
          • Enable or disable NFSv4 referrals
          • Displaying NFS statistics
          • Displaying DNS statistics
          • Displaying NIS statistics
          • Support for VMware vStorage over NFS
          • Enable or disable VMware vStorage over NFS
          • Enable or disable rquota support
          • NFSv3 and NFSv4 performance improvement by modifying the TCP transfer size
          • Modifying the NFSv3 and NFSv4 TCP maximum transfer size
          • Configure the number of group IDs allowed for NFS users
          • Controlling root user access to NTFS security-style data
        • Appendix: Supported NFS versions and clients
          • Overview
          • NFSv4.0 functionality supported by ONTAP
          • Limitations of ONTAP support for NFSv4
          • ONTAP support for NFSv4.1
          • ONTAP support for NFSv4.2
          • ONTAP support for parallel NFS
          • Use of hard mounts
        • Appendix: NFS and SMB file and directory naming dependencies
          • Overview
          • Characters a file or directory name can use
          • Case-sensitivity of file and directory names in a multiprotocol environment
          • How ONTAP creates file and directory names
          • How ONTAP handles multi-byte file, directory, and qtree names
          • Configure character mapping for SMB file name translation on volumes
          • Commands for managing character mappings for SMB file name translation
      • Manage NFS over RDMA
        • Overview
        • NIC configuration
        • LIF configuration
        • Modify the NFS configuration
      • Configure SMB with the CLI
        • Overview
        • Workflow
        • Preparation
          • Assess physical storage requirements
          • Assess networking requirements
          • Decide where to provision new SMB storage capacity
          • Worksheet for gathering SMB configuration information
        • Configure SMB access to an SVM
          • Overview
          • Create an SVM
          • Verify that the SMB protocol is enabled on the SVM
          • Open the export policy of the SVM root volume
          • Create a LIF
          • Enable DNS for host-name resolution
          • Set up an SMB server in an Active Directory domain
            • Configure time services
            • Commands for managing symmetric authentication on NTP servers
            • Create an SMB server in an Active Directory domain
            • Create keytab files for SMB authentication
          • Set up an SMB server in a workgroup
            • Overview
            • Create an SMB server in a workgroup
            • Create local user accounts
            • Create local groups
            • Manage local group membership
          • Verify enabled SMB versions
          • Map the SMB server on the DNS server
        • Configure SMB client access to shared storage
          • Overview
          • Create a volume or qtree storage container
            • Create a volume
            • Create a qtree
          • Requirements and considerations for creating an SMB share
          • Create an SMB share
          • Verify SMB client access
          • Create SMB share access control lists
          • Configure NTFS file permissions in a share
          • Verify user access
      • Manage SMB with the CLI
        • Overview
        • SMB server support
          • Overview
          • Supported SMB versions and functionality
          • Unsupported Windows features
          • Configure NIS or LDAP name services on the SVM
          • How ONTAP name service switch configuration works
        • Manage SMB servers
          • Modify SMB servers
          • Use options to customize SMB servers
            • Available SMB server options
            • Configure SMB server options
            • Configure the grant UNIX group permission to SMB users
            • Configure access restrictions for anonymous users
            • Manage how file security is presented to SMB clients for UNIX security-style data
              • Overview
              • Enable or disable the presentation of NTFS ACLs for UNIX security-style data
              • How ONTAP preserves UNIX permissions
              • Manage UNIX permissions using the Windows Security tab
          • Manage SMB server security settings
            • How ONTAP handles SMB client authentication
            • Guidelines for SMB server security settings in an SVM disaster recovery configuration
            • Display information about CIFS server security settings
            • Enable or disable required password complexity for local SMB users
            • Modify the CIFS server Kerberos security settings
            • Set the CIFS server minimum authentication security level
            • Configure strong security for Kerberos-based communication by using AES encryption
            • Enable or disable AES encryption for Kerberos-based communication
            • Use SMB signing to enhance network security
              • Overview
              • How SMB signing policies affect communication with a CIFS server
              • Performance impact of SMB signing
              • Recommendations for configuring SMB signing
              • Guidelines for SMB signing when multiple data LIFS are configured
              • Enable or disable required SMB signing for incoming SMB traffic
              • Determining whether SMB sessions are signed
              • Monitor SMB signed session statistics
            • Configure required SMB encryption on SMB servers for data transfers over SMB
              • Overview
              • Performance impact of SMB encryption
              • Enable or disable required SMB encryption for incoming SMB traffic
              • Determine whether clients are connected using encrypted SMB sessions
              • Monitor SMB encryption statistics
            • Secure LDAP session communication
              • LDAP signing and sealing concepts
              • Enable LDAP signing and sealing on the CIFS server
              • Configure LDAP over TLS
                • Export a copy of the self-signed root CA certificate
                • Install the self-signed root CA certificate on the SVM
                • Enable LDAP over TLS on the CIFS server
          • Configure SMB Multichannel for performance and redundancy
          • Configure default Windows user to UNIX user mappings on the SMB server
            • Configure the default UNIX user
            • Configure the guest UNIX user
            • Map the administrators group to root
          • Display information about what types of users are connected over SMB sessions
          • Command options to limit excessive Windows client resource consumption
          • Improve client performance with traditional and lease oplocks
            • Overview
            • Write cache data-loss considerations when using oplocks
            • Enable or disable oplocks when creating SMB shares
            • Commands for enabling or disabling oplocks on volumes and qtrees
            • Enable or disable oplocks on existing SMB shares
            • Monitor oplock status
          • Apply Group Policy Objects to SMB servers
            • Overview
            • Supported GPOs
            • Requirements for using GPOs with your CIFS server
            • Enable or disable GPO support on a SMB server
            • How GPOs are updated on the SMB server
              • Overview
              • What to do if GPO updates are failing
            • Manually updating GPO settings on the CIFS server
            • Display information about GPO configurations
            • Display detailed information about restricted group GPOs
            • Display information about central access policies
            • Display information about central access policy rules
          • Commands for managing CIFS servers computer account passwords
          • Manage domain controller connections
            • Display information about discovered servers
            • Reset and rediscover servers
            • Manage domain controller discovery
            • Add preferred domain controllers
            • Commands for managing preferred domain controllers
            • Enable SMB2 connections to domain controllers
            • Enable encrypted connections to domain controllers
          • Use null sessions to access storage in non-Kerberos environments
            • Overview
            • How the storage system provides null session access
            • Grant null users access to file system shares
          • Manage NetBIOS aliases for SMB servers
            • Overview
            • Add a list of NetBIOS aliases to the CIFS server
            • Remove NetBIOS aliases from the NetBIOS alias list
            • Display the list of NetBIOS aliases on CIFS servers
            • Determine whether SMB clients are connected using NetBIOS aliases
          • Manage miscellaneous SMB server tasks
            • Stop or start the CIFS server
            • Move CIFS servers to different OUs
            • Modify the dynamic DNS domain on the SVM before moving the SMB server
            • Join anSVM to an Active Directory domain
            • Display information about NetBIOS over TCP connections
            • Commands for managing CIFS servers
            • Enable the NetBios name service
          • Use IPv6 for SMB access and SMB services
            • Requirements for using IPv6
            • Support for IPv6 with SMB access and CIFS services
            • How CIFS servers use IPv6 to connect to external servers
            • Enable IPv6 for SMB (cluster administrators only)
            • Disable IPv6 for SMB
            • Monitor and display information about IPv6 SMB sessions
        • Set up file access using SMB
          • Configure security styles
            • How security styles affect data access
              • What the security styles and their effects are
              • Where and when to set security styles
              • Decide which security style to use on SVMs
              • How security style inheritance works
              • How ONTAP preserves UNIX permissions
              • Manage UNIX permissions using the Windows Security tab
            • Configure security styles on SVM root volumes
            • Configure security styles on FlexVol volumes
            • Configure security styles on qtrees
          • Create and manage data volumes in NAS namespaces
            • Overview
            • Create data volumes with specified junction points
            • Create data volumes without specifying junction points
            • Mount or unmount existing volumes in the NAS namespace
            • Display volume mount and junction point information
          • Configure name mappings
            • Overview
            • How name mapping works
            • Multidomain searches for UNIX user to Windows user name mappings
            • Name mapping conversion rules
            • Create a name mapping
            • Configure the default user
            • Commands for managing name mappings
          • Configure multidomain name-mapping searches
            • Enable or disable multidomain name mapping searches
            • Reset and rediscover trusted domains
            • Display information about discovered trusted domains
            • Add, remove, or replace trusted domains in preferred trusted domain lists
            • Display information about the preferred trusted domain list
          • Create and configure SMB shares
            • Overview
            • What the default administrative shares are
            • SMB share naming requirements
            • Directory case-sensitivity requirements when creating shares in a multiprotocol environment
            • Use SMB share properties
              • Overview
              • Add or remove share properties on an existing SMB share
            • Optimize SMB user access with the force-group share setting
            • Create an SMB share with the force-group share setting
            • View information about SMB shares using the MMC
            • Commands for managing SMB shares
          • Secure file access by using SMB share ACLs
            • Guidelines for managing SMB share-level ACLs
            • Create SMB share access control lists
            • Commands for managing SMB share access control lists
          • Secure file access by using file permissions
            • Configure advanced NTFS file permissions using the Windows Security tab
            • Configure NTFS file permissions using the ONTAP CLI
            • How UNIX file permissions provide access control when accessing files over SMB
          • Secure file access by using Dynamic Access Control (DAC)
            • Overview
            • Supported Dynamic Access Control functionality
            • Considerations when using Dynamic Access Control and central access policies with CIFS servers
            • Enable or disable Dynamic Access Control
            • Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled
            • Configure central access policies to secure data on CIFS servers
            • Display information about Dynamic Access Control security
            • Revert considerations for Dynamic Access Control
            • Where to find additional information about configuring and using Dynamic Access Control and central access policies
          • Secure SMB access using export policies
            • How export policies are used with SMB access
            • How export rules work
            • Examples of export policy rules that restrict or allow access over SMB
            • Enable or disable export policies for SMB access
          • Secure file access by using Storage-Level Access Guard
            • Overview
            • Use cases for using Storage-Level Access Guard
            • Workflow to configure Storage-Level Access Guard
            • Configure Storage-Level Access Guard
            • Effective SLAG matrix
            • Display information about Storage-Level Access Guard
            • Remove Storage-Level Access Guard
        • Manage file access using SMB
          • Use local users and groups for authentication and authorization
            • How ONTAP uses local users and groups
              • Local users and groups concepts
              • Reasons for creating local users and local groups
              • How local user authentication works
              • How user access tokens are constructed
              • Guidelines for using SnapMirror on SVMs that contain local groups
              • What happens to local users and groups when deleting CIFS servers
              • How you can use Microsoft Management Console with local users and groups
              • Guidelines for reverting
            • What local privileges are
              • List of supported privileges
              • Assign privileges
            • Guidelines for using BUILTIN groups and the local administrator account
            • Requirements for local user passwords
            • Predefined BUILTIN groups and default privileges
            • Enable or disable local users and groups functionality
              • Overview
              • Enable or disable local users and groups
              • Enable or disable local user authentication
            • Manage local user accounts
              • Modify local user accounts
              • Enable or disable local user accounts
              • Change local user account passwords
              • Display information about local users
              • Display information about group memberships for local users
              • Delete local user accounts
            • Manage local groups
              • Modify local groups
              • Display information about local groups
              • Manage local group membership
              • Display information about members of local groups
              • Delete a local group
              • Update domain user and group names in local databases
            • Manage local privileges
              • Add privileges to local or domain users or groups
              • Remove privileges from local or domain users or groups
              • Reset privileges for local or domain users and groups
              • Display information about privilege overrides
          • Configure bypass traverse checking
            • Overview
            • Allow users or groups to bypass directory traverse checking
            • Disallow users or groups from bypassing directory traverse checking
          • Display information about file security and audit policies
            • Overview
            • Display information about file security on NTFS security-style volumes
            • Display information about file security on mixed security-style volumes
            • Display information about file security on UNIX security-style volumes
            • Display information about NTFS audit policies on FlexVol volumes using the CLI
            • Display information about NFSv4 audit policies on FlexVol volumes using the CLI
            • Ways to display information about file security and audit policies
          • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
            • Overview
            • Use cases for using the CLI to set file and folder security
            • Limits when using the CLI to set file and folder security
            • How security descriptors are used to apply file and folder security
            • Guidelines for applying file-directory policies that use local users or groups on the SVM disaster recovery destination
            • Configure and apply file security on NTFS files and folders using the CLI
              • Create an NTFS security descriptor
              • Add NTFS DACL access control entries to the NTFS security descriptor
              • Create security policies
              • Add a task to the security policy
              • Apply security policies
              • Monitor the security policy job
              • Verify the applied file security
            • Configure and apply audit policies to NTFS files and folders using the CLI
              • Create an NTFS security descriptor
              • Add NTFS SACL access control entries to the NTFS security descriptor
              • Create security policies
              • Add a task to the security policy
              • Apply security policies
              • Monitor the security policy job
              • Verify the applied audit policy
            • Considerations when managing security policy jobs
            • Commands for managing NTFS security descriptors
            • Commands for managing NTFS DACL access control entries
            • Commands for managing NTFS SACL access control entries
            • Commands for managing security policies
            • Commands for managing security policy tasks
            • Commands for managing security policy jobs
          • Configure the metadata cache for SMB shares
            • How SMB metadata caching works
            • Enable the SMB metadata cache
            • Configure the lifetime of SMB metadata cache entries
          • Manage file locks
            • About file locking between protocols
            • How ONTAP treats read-only bits
            • How ONTAP differs from Windows on handling locks on share path components
            • Display information about locks
            • Breaking locks
          • Monitor SMB activity
            • Display SMB session information
            • Display information about open SMB files
            • Determine which statistics objects and counters are available
            • Display statistics
        • Deploy SMB client-based services
          • Use offline files to allow caching of files for offline use
            • Overview
            • Requirements for using offline files
            • Guidelines for deploying offline files
            • Configure offline files support on SMB shares using the CLI
            • Configure offline files support on SMB shares by using the Computer Management MMC
          • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
            • Overview
            • Requirements for using roaming profiles
            • Configure roaming profiles
          • Use folder redirection to store data on a SMB server
            • Overview
            • Requirements for using folder redirection
            • Configure folder redirection
          • Access the ~snapshot directory from Windows clients using SMB 2.x
          • Recover files and folders using Previous Versions
            • Overview
            • Requirements for using Microsoft Previous Versions
            • Use the Previous Versions tab to view and manage Snapshot copy data
            • Determine whether Snapshot copies are available for Previous Versions use
            • Create a Snapshot configuration to enable Previous Versions access
            • Guidelines for restoring directories that contain junctions
        • Deploy SMB server-based services
          • Manage home directories
            • How ONTAP enables dynamic home directories
            • Home directory shares
              • Add a home director share
              • Home directory shares require unique user names
              • What happens to static home directory share names after upgrading
            • Add a home directory search path
            • Create a home directory configuration using the %w and %d variables
            • Configure home directories using the %u variable
            • Additional home directory configurations
            • Commands for managing search paths
            • Display information about an SMB user’s home directory path
            • Manage accessibility to users' home directories
          • Configure SMB client access to UNIX symbolic links
            • How ONTAP enables you to provide SMB client access to UNIX symbolic links
            • Limits when configuring UNIX symbolic links for SMB access
            • Control automatic DFS advertisements in ONTAP with a CIFS server option
            • Configure UNIX symbolic link support on SMB shares
            • Create symbolic link mappings for SMB shares
            • Commands for managing symbolic link mappings
          • Use BranchCache to cache SMB share content at a branch office
            • Requirements and guidelines
              • BranchCache version support
              • Network protocol support requirements
              • ONTAP and Windows hosts version requirements
              • Reasons ONTAP invalidates BranchCache hashes
              • Guidelines for choosing the hash store location
              • BranchCache recommendations
            • Configure BranchCache
              • Overview
              • Requirements for configuring BranchCache
              • Configure BranchCache on the SMB server
              • Where to find information about configuring BranchCache at the remote office
            • Configure BranchCache-enabled SMB shares
              • Overview
              • Create a BranchCache-enabled SMB share
              • Enable BranchCache on an existing SMB share
            • Manage and monitor the BranchCache configuration
              • Modify BranchCache configurations
              • Display information about BranchCache configurations
              • Change the BranchCache server key
              • Pre-computing BranchCache hashes on specified paths
              • Flush hashes from the SVM BranchCache hash store
              • Display BranchCache statistics
              • Support for BranchCache Group Policy Objects
              • Display information about BranchCache Group Policy Objects
            • Disable BranchCache on SMB shares
              • Overview
              • Disable BranchCache on a single SMB share
              • Stop automatic caching on all SMB shares
            • Disable or enable BranchCache on the SVM
              • What happens when you disable or reenable BranchCache on the CIFS server
              • Disable or enable BranchCache
            • Delete the BranchCache configuration on SVMs
              • What happens when you delete the BranchCache configuration
              • Delete the BranchCache configuration
            • What happens to BranchCache when reverting
          • Improve Microsoft remote copy performance
            • Overview
            • How ODX works
            • Requirements for using ODX
            • Guidelines for using ODX
            • Use cases for ODX
            • Enable or disable ODX
          • Improve client response time by providing SMB automatic node referrals with Auto Location
            • Overview
            • Requirements and guidelines for using automatic node referrals
            • Support for SMB automatic node referrals
            • Enable or disable SMB automatic node referrals
            • Use statistics to monitor automatic node referral activity
            • Monitor client-side SMB automatic node referral information using a Windows client
          • Provide folder security on shares with access-based enumeration
            • Overview
            • Enable or disable access-based enumeration on SMB shares
            • Enable or disable access-based enumeration from a Windows client
        • NFS and SMB file and directory naming dependencies
          • Overview
          • Characters a file or directory name can use
          • Case-sensitivity of file and directory names in a multiprotocol environment
          • How ONTAP creates file and directory names
          • How ONTAP handles multi-byte file, directory, and qtree names
          • Configure character mapping for SMB file name translation on volumes
          • Commands for managing character mappings for SMB file name translation
      • SMB configuration for Microsoft Hyper-V and SQL Server
        • Overview
        • Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions
        • Nondisruptive operations for Hyper-V and SQL Server over SMB
          • What are nondisruptive operations?
          • Protocols that enable nondisruptive operations over SMB
          • Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB
          • How SMB 3.0 functionality supports nondisruptive operations over SMB shares
          • What the Witness protocol does to enhance transparent failover
          • How the Witness protocol works
        • Share-based backups with Remote VSS
          • Overview
          • Remote VSS concepts
          • Example of a directory structure used by Remote VSS
          • How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB
        • How ODX copy offload is used with Hyper-V and SQL Server over SMB shares
        • Configuration requirements and considerations
          • ONTAP and licensing requirements
          • Network and data LIF requirements
          • SMB server and volume requirements for Hyper-V over SMB
          • SMB server and volume requirements for SQL Server over SMB
          • Continuously available share requirements and considerations for Hyper-V over SMB
          • Continuously available share requirements and considerations for SQL Server over SMB
          • Remote VSS considerations for Hyper-V over SMB configurations
          • ODX copy offload requirements for SQL Server and Hyper-V over SMB
        • Recommendations for SQL Server and Hyper-V over SMB configurations
        • Plan the Hyper-V or SQL Server over SMB configuration
          • Complete the volume configuration worksheet
          • Complete the SMB share configuration worksheet
        • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
          • Overview
          • Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares)
          • Verify that domain accounts map to the default UNIX user
          • Verify that the security style of the SVM root volume is set to NTFS
          • Verify that required CIFS server options are configured
          • Configure SMB Multichannel for performance and redundancy
          • Create NTFS data volumes
          • Create continuously available SMB shares
          • Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares)
          • Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares)
        • Manage Hyper-V and SQL Server over SMB configurations
          • Configure existing shares for continuous availability
          • Enable or disable VSS shadow copies for Hyper-V over SMB backups
        • Use statistics to monitor Hyper-V and SQL Server over SMB activity
          • Determine which statistics objects and counters are available
          • Display SMB statistics
        • Verify that the configuration is capable of nondisruptive operations
          • Use health monitoring to determine whether nondisruptive operation status is healthy
          • Display nondisruptive operation status by using system health monitoring
          • Verify the continuously available SMB share configuration
          • Verify LIF status
          • Determine whether SMB sessions are continuously available
            • Display SMB session information
            • Display information about open SMB files
    • SAN storage management
      • SAN management with System Manager
        • SAN storage
          • Overview
          • VMware datastores
          • Linux servers
          • Windows servers
          • Manage igroups and initiators
          • Create nested igroup
          • Map igroup to multiple LUNs
          • Create and manage portsets
          • Edit LUN QoS Policy
          • Take a LUN offline
        • NVMe storage
          • Overview
          • Provision NVMe storage for SUSE Linux
          • Resize a namespace
      • SAN management with the CLI
        • Overview
        • Set up LUNs for FC and iSCSI
          • LUN guidelines
          • LUN setup workflow
          • Configure switches for FCoE
          • Prerequisites for setting up LUNs
          • Verify the license for FC or iSCSI
          • Configure an SVM for iSCSI
          • Configure an SVM for FC
          • Create LUNs and mapping to igroups
          • Enable block access for a specific host
          • Convert a LUN into a namespace
        • Set up namespaces for NVMe
          • NVMe namespaces considerations
          • Configure an SVM for NVMe
          • Create an NVMe namespace and subsystem
          • Mapping an NVMe namespace to a subsystem
          • Convert a namespace into a LUN
        • Manage LUNs for FC and iSCSi
          • Increase the size of a LUN
          • Decrease the size of a LUN
          • Move a LUN
          • Delete a LUN
          • Considerations for copying LUNs
          • Ways to limit LUN access with port sets and igroups
          • Examine configured and used space of a LUN
          • Control and monitor I/O performance to LUNs using Storage QoS
          • Tools available to effectively monitor your LUNs
          • Considerations for transitioning SAN configurations
          • I/O misalignments on properly aligned LUNs
          • Ways to address issues when LUNs go offline
        • Recommended volume and file or LUN configuration combinations
          • Overview
          • Determine the correct volume and LUN configuration combination for your environment
          • Calculate rate of data growth for LUNs
          • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
          • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
          • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
        • Selective LUN Map
          • Overview
          • Determine whether SLM is enabled on a LUN map
          • Create port sets and bind igroups to port sets
          • Modify the SLM reporting-nodes list
        • Manage iSCSI protocol
          • Configure your network for best performance
          • Define a security policy method for an initiator
          • Delete an iSCSI service for an SVM
          • Get more details in iSCSI session error recoveries
          • Register the SVM with an iSNS server
          • Resolve iSCSI error messages on the storage system
          • Troubleshoot iSCSI LUNs not visible on the host
        • Manage FC protocol
          • Delete an FC service for an SVM
          • Recommended MTU configurations for FCoE jumbo frames
        • Manage systems with FC adapters
          • Overview
          • Commands for managing FC adapters
          • Configure FC adapters for initiator mode
          • Configure FC adapters for target mode
          • Display information about an FC target adapter
          • Change the UTA2 port from CNA mode to FC mode
          • Change the CNA/UTA2 target adapter optical modules
          • View adapter settings
          • Supported port configurations for X1143A-R6 adapters
          • Configure X1143A-R6 adapter ports
          • Prevent loss of connectivity when using the X1133A-R6 adapter
        • Manage NVMe protocol
          • Overview
          • Start the NVMe/FC service for an SVM
          • Delete NVMe/FC service from an SVM
          • Resize a NVMe namespace
        • Manage LIFs for all SAN protocols
          • Overview
          • Configure an NVMe LIF
          • Considerations for SAN LIF movement
          • Remove a SAN LIF from a port set
          • Move a SAN LIF
          • Delete a LIF in a SAN environment
          • Considerations for adding nodes to a cluster
          • Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation
        • Data protection methods in SAN environments
          • Overview
          • Effect of moving or copying a LUN on Snapshot copies
            • Overview
            • Restore a single LUN from a Snapshot copy
            • Restore all LUNs in a volume from a Snapshot copy
            • Delete one or more existing Snapshot copies from a volume
          • Use FlexClone LUNs to protect your data
            • Overview
            • Reasons for using FlexClone LUNs
            • How a FlexVol volume can reclaim free space with autodelete setting
            • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
            • Clone LUNs from an active volume
            • Create FlexClone LUNs from a Snapshot copy in a volume
            • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
          • Configure and use SnapVault backups in a SAN environment
            • Overview
            • Access a read-only LUN copy from a SnapVault backup
            • Restore a single LUN from a SnapVault backup
            • Restore all LUNs in a volume from a SnapVault backup
          • How you can connect a host backup system to the primary storage system
          • Back up a LUN through a host backup system
        • Considerations for SAN configurations in a MetroCluster environment
        • SAN Concepts
          • About SAN host provisioning
            • SAN provisioning with iSCSI
            • iSCSI service management
              • Overview
              • How iSCSI authentication works
              • iSCSI initiator security management
              • iSCSI endpoint isolation
              • What CHAP authentication is
              • How using iSCSI interface access lists to limit initiator interfaces can increase performance and security
              • iSNS server registration requirement
                • What iSNS is
                • How SVMs interact with an iSNS server
                • Commands for managing iSNS
            • SAN provisioning with FC
            • SAN provisioning with NVMe
          • About SAN volumes
            • Overview
            • Configure volume provisioning options
            • SAN volume configuration options
            • Requirement for moving volumes in SAN environments
            • Considerations for setting fractional reserve
          • About host-side space management
            • Overview
            • Automatic host-side space management with SCSI thinly provisioned LUNs
            • Enable space allocation for SCSI thinly provisioned LUNs
            • Host support for SCSI thin provisioning
            • Simplified host management with SnapCenter
          • About igroups
          • Example of how igroups give LUN access
          • Specify initiator WWPNs and iSCSI node names for an igroup
          • Storage virtualization with VMware and Microsoft copy offload
            • Overview
            • How LUN access works in a virtualized environment
            • Considerations for LIFs in cluster SAN environments
            • Improve VMware VAAI performance for ESX hosts
            • Microsoft Offloaded Data Transfer (ODX)
              • Overview
              • Requirements for using ODX
              • Use cases for ODX
      • SAN configuration reference
        • Overview
        • Considerations for iSCSI configurations
          • Overview
          • Ways to configure iSCSI SAN hosts with single nodes
          • Ways to configure iSCSI SAN hosts with HA pairs
          • Benefits of using VLANs in iSCSI configurations
        • Considerations for FC-NVMe configurations
        • Considerations for FC configurations
          • Overview
          • Ways to configure FC and FC-NVMe SAN hosts with single nodes
          • Ways to configure FC & FC-NVMe SAN hosts with HA pairs
          • FC switch configuration best practices
          • Supported number of FC hop counts
          • FC target port supported speeds
          • FC Target port configuration recommendations
        • Manage systems with FC adapters
          • Overview
          • Commands for managing FC adapters
          • Configure FC adapters for initiator mode
          • Configure FC adapters for target mode
          • Display information about an FC target adapter
          • Change the FC adapter speed
          • Supported FC ports
          • Prevent loss of connectivity when using the X1133A-R6 adapter
          • Manage X1143A-R6 adapters
            • Overview
            • Configure the ports
            • Change the UTA2 port from CNA mode to FC mode
            • Change the CNA/UTA2 target adapter optical modules
            • View adapter settings
        • Ways to Configure FCoE
          • Overview
          • FCoE initiator and target combinations
          • FCoE supported hop count
        • Fibre Channel and FCoE zoning
          • Overview
          • World Wide Name-based zoning
          • Individual zones
          • Single-fabric zoning
          • Dual-fabric HA pair zoning
          • Zoning restrictions for Cisco FC and FCoE switches
        • Requirements for shared SAN configurations
        • Host support for multipathing
          • Overview
          • When host multipathing software is required
          • Recommended number of paths from host to nodes in cluster
        • Configuration limits
          • Determine the number of supported nodes for SAN configurations
          • Determine the number of supported hosts per cluster in FC and FC-NVMe configurations
          • Determine the supported number of hosts in iSCSI configurations
          • FC switch configuration limits
          • Calculate queue depth
          • Set queue depths
        • Considerations for SAN configurations in a MetroCluster environment
    • S3 object storage management
      • S3 configuration with System Manager
        • Object storage overview
        • Enable S3 server
        • Provision buckets
        • Add S3 users and groups
        • Manage bucket access
        • Manage storage VM access
      • S3 configuration with the CLI
        • Overview
        • S3 support in ONTAP 9
          • ONTAP S3 architecture and use cases
          • ONTAP version support for S3 object storage
          • ONTAP S3 supported actions
          • ONTAP S3 interoperability
        • About the S3 configuration process
          • Workflow
          • Assess physical storage requirements
          • Assess networking requirements
          • Decide where to provision new S3 storage capacity
        • Configure S3 access to an SVM
          • Create an SVM for S3
          • Create and install a CA certificate on the SVM
          • Create an S3 service data policy
          • Create data LIFs
          • Create intercluster LIFs for remote FabricPool tiering
          • Create the S3 object store server
        • Add storage capacity to an S3-enabled SVM
          • Create a bucket
          • Create an S3 user
          • Create or modify S3 groups
          • Create or modify access policy statements
            • About bucket and object store server policies
            • Modify a bucket policy
            • Create or modify an object store server policy
          • Enable client access to S3 object storage
            • Enable ONTAP S3 access for remote FabricPool tiering
            • Enable ONTAP S3 access for local FabricPool tiering
            • Enable client access from an S3 app
        • Storage service definitions
      • Protect buckets with S3 SnapMirror
        • Overview
        • Mirror and backup protection on a remote cluster
          • Create mirror for new bucket
          • Create mirror for existing bucket
          • Takeover from destination
          • Restore from destination
        • Mirror and backup protection on the local cluster
          • Create mirror for new bucket
          • Create mirror for existing bucket
          • Takeover from destination
          • Restore from destination
        • Backup protection with cloud targets
          • Requirements for cloud targets
          • Create backup for new bucket
          • Create backup for existing bucket
          • Restore from cloud target
        • Modify mirror policy
      • Audit S3 events
        • Overview
        • Plan a configuration
        • Create and enable the configuration
        • Select buckets for auditing
        • Modify the configuration
        • Show configurations
    • Security and data encryption
      • Manage security with System Manager
        • Security overview
        • Multi-factor authentication
        • Control administrator access
        • Diagnose and correct file access issues
        • Manage certificates
      • Manage administrator authentication and RBAC with the CLI
        • Overview
        • Workflow
        • Configuration worksheets
        • Create login accounts
          • Overview
          • Enable local account access
            • Overview
            • Enable password account access
            • Enable SSH public key accounts
            • Enable SSH multifactor authentication (MFA)
            • Enable SSL certificate accounts
          • Enable Active Directory account access
          • Enable LDAP or NIS account access
          • Configure SAML authentication
        • Manage access-control roles
          • Overview
          • Modify the role assigned to an administrator
          • Define custom roles
          • Predefined roles for cluster administrators
          • Predefined roles for SVM administrators
        • Manage administrator accounts
          • Overview
          • Associate a public key with an administrator account
          • Generate and install a CA-signed server certificate
            • Overview
            • Generate a certificate signing request
            • Install a CA-signed server certificate
          • Configure Active Directory domain controller access
            • Overview
            • Configure an authentication tunnel
            • Create an SVM computer account on the domain
          • Configure LDAP or NIS server access
            • Overview
            • Configure LDAP server access
            • Configure NIS server access
            • Create a name service switch
          • Change an administrator password
          • Lock and unlock an administrator account
          • Manage failed login attempts
          • Enforce SHA-2 on administrator account passwords
        • Manage multi-admin verification
          • Overview
          • Manage administrator groups
          • Enable and disable multi-admin verification
          • Manage protected operation rules
          • Request execution of protected operations
          • Manage protected operation requests
      • Ransomware protection
        • Overview
        • Use cases and considerations
        • Enable
        • Enable by default
        • Pause
        • Respond to abnormal activity
        • Recover data after an attack
        • Modify Snapshot copy options
      • Antivirus configuration
        • Overview
        • About NetApp antivirus protection
          • Understanding NetApp virus scanning
          • Virus scanning workflow
          • Antivirus architecture
        • Vscan server installation and configuration
        • Configure scanner pools
          • Overview
          • Create a scanner pool on a single cluster
          • Create scanner pools in MetroCluster configurations
          • Apply a scanner policy on a single cluster
          • Apply scanner policies in MetroCluster configurations
          • Commands for managing scanner pools
        • Configure on-access scanning
          • Create an on-access policy
          • Enable an on-access policy
          • Modify the Vscan file-operations profile for an SMB share
          • Commands for managing on-access policies
        • Configure on-demand scanning
          • Overview
          • Create an on-demand task
          • Schedule an on-demand task
          • Run an on-demand task immediately
          • Commands for managing on-demand tasks
        • Enable virus scanning on an SVM
        • Reset the status of scanned files
        • View Vscan event log information
        • Troubleshoot connectivity issues
          • Potential connectivity issues involving the scan-mandatory option
          • Commands for viewing Vscan server connection status
      • NAS auditing and security tracing
        • Overview
        • Audit NAS events on SVMs
          • Overview
          • How auditing works
            • Basic auditing concepts
            • How the ONTAP auditing process works
          • Auditing requirements and considerations
          • Limitations for the size of audit records on staging files
          • What the supported audit event log formats are
          • View audit event logs
          • SMB events that can be audited
            • Overview
            • Determine what the complete path to the audited object is
            • Considerations when auditing symlinks and hard links
            • Considerations when auditing alternate NTFS data streams
          • NFS file and directory access events that can be audited
          • Plan the auditing configuration
          • Create a file and directory auditing configuration on SVMs
            • Create the auditing configuration
            • Enable auditing on the SVM
            • Verify the auditing configuration
          • Configure file and folder audit policies
            • Overview
            • Configure audit policies on NTFS security-style files and directories
            • Configure auditing for UNIX security style files and directories
          • Display information about audit policies applied to files and directories
            • Display information about audit policies using the Windows Security tab
            • Display information about NTFS audit policies on FlexVol volumes using the CLI
            • Ways to display information about file security and audit policies
          • CLI change events that can be audited
            • Overview
            • Manage file-share event
            • Manage audit-policy-change event
            • Manage user-account event
            • Manage security-group event
            • Manage authorization-policy-change event
          • Manage auditing configurations
            • Manually rotate the audit event logs
            • Enable and disable auditing on SVMs
            • Display information about auditing configurations
            • Commands for modifying auditing configurations
            • Delete an auditing configuration
            • What the process is when reverting
          • Troubleshoot auditing and staging volume space issues
        • Use FPolicy for file monitoring and management on SVMs
          • How FPolicy works
            • What the two parts of the FPolicy solution are
            • What synchronous and asynchronous notifications are
            • Roles that cluster components play with FPolicy implementation
            • How FPolicy works with external FPolicy servers
              • Overview
              • How control channels are used for FPolicy communication
              • How privileged data access channels are used for synchronous communication
              • How FPolicy connection credentials are used with privileged data access channels
              • What granting super user credentials for privileged data access means
              • How FPolicy manages policy processing
            • What the node-to-external FPolicy server communication process is
            • How FPolicy services work across SVM namespaces
          • FPolicy configuration types
          • How FPolicy passthrough-read enhances usability for hierarchical storage management
          • Requirements, considerations, and best practices for configuring FPolicy
          • What the steps for setting up an FPolicy configuration are
          • Plan the FPolicy configuration
            • Plan the FPolicy external engine configuration
              • Additional information about configuring FPolicy external engines to use SSL authenticated connections
              • Certificates do not replicate in SVM disaster recovery relationships with a non-ID-preserve configuration
              • Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster recovery configurations
              • Complete the FPolicy external engine configuration worksheet
            • Plan the FPolicy event configuration
              • Overview
              • List of supported file operation and filter combinations that FPolicy can monitor for SMB
              • Supported file operation and filter combinations that FPolicy can monitor for NFSv3
              • Supported file operation and filter combinations that FPolicy can monitor for NFSv4
              • Complete the FPolicy event configuration worksheet
            • Plan the FPolicy policy configuration
              • Overview
              • Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine
              • Complete the FPolicy policy worksheet
            • Plan the FPolicy scope configuration
              • Overview
              • Complete the FPolicy scope worksheet
          • Create the FPolicy configuration
            • Create the FPolicy external engine
            • Create the FPolicy event
            • Create the FPolicy policy
            • Create the FPolicy scope
            • Enable the FPolicy policy
          • Modify FPolicy configurations
            • Commands for modifying FPolicy configurations
            • Enable or disabling FPolicy policies
          • Display information about FPolicy configurations
            • How the show commands work
            • Commands for displaying information about FPolicy configurations
            • Display information about FPolicy policy status
            • Display information about enabled FPolicy policies
          • Manage FPolicy server connections
            • Connect to external FPolicy servers
            • Disconnect from external FPolicy servers
            • Display information about connections to external FPolicy servers
            • Display information about the FPolicy passthrough-read connection status
        • Use security tracing to verify or troubleshoot file and directory access
          • How security traces work
          • Types of access checks security traces monitor
          • Considerations when creating security traces
          • Perform security traces
            • Overview
            • Create security trace filters
            • Display information about security trace filters
            • Display security trace results
            • Modify security trace filters
            • Delete security trace filters
            • Delete security trace records
            • Delete all security trace records
          • Interpret security trace results
        • Where to find additional information
      • Manage encryption with System Manager
        • Encrypt stored data (software)
        • Encrypt stored data (hardware)
      • Manage encryption with the CLI
        • Overview
        • Configure NetApp Volume Encryption
          • Overview
          • NetApp Volume Encryption workflow
          • Configure NVE
            • Determine whether your cluster version supports NVE
            • Install the license
            • Configure external key management
              • Overview
              • Install SSL certificates on the cluster
              • Enable external key management in ONTAP 9.6 and later (NVE)
              • Enable external key management in ONTAP 9.5 and earlier
              • Manage keys with Azure or Google key managements services
            • Enable onboard key management in ONTAP 9.6 and later (NVE)
            • Enable onboard key management in ONTAP 9.5 and earlier (NVE)
            • Enable onboard key management in newly added nodes
          • Encrypt volume data with NVE
            • Overview
            • Enable aggregate-level encryption with VE license
            • Enable encryption on a new volume
            • Enable encryption on an existing volume with the volume encryption conversion start command
            • Enable encryption on an existing volume with the volume move start command
            • Enable node root volume encryption
        • Configure NetApp hardware-based encryption
          • Overview
          • Hardware-based encryption workflow
          • Configure external key management
            • Overview
            • Collect network information in ONTAP 9.2 and earlier
            • Install SSL certificates on the cluster
            • Enable external key management in ONTAP 9.6 and later (HW-based)
            • Enable external key management in ONTAP 9.5 and earlier
            • Configure clustered external key server
            • Create authentication keys in ONTAP 9.6 and later
            • Create authentication keys in ONTAP 9.5 and earlier
            • Assign a data authentication key to a FIPS drive or SED (external key management)
          • Configure onboard key management
            • Enable onboard key management in ONTAP 9.6 and later
            • Enable onboard key management in ONTAP 9.5 and earlier
            • Assign a data authentication key to a FIPS drive or SED (onboard key management)
          • Assign a FIPS 140-2 authentication key to a FIPS drive
          • Enable cluster-wide FIPS-compliant mode for KMIP server connections
        • Manage NetApp encryption
          • Unencrypting volume data
          • Move an encrypted volume
          • Delegate authority to run the volume move command
          • Change the encryption key for a volume with the volume encryption rekey start command
          • Change the encryption key for a volume with the volume move start command
          • Rotate authentication keys for NetApp Storage Encryption
          • Delete an encrypted volume
          • Securely purge data on an encrypted volume
            • Overview
            • Securely purge data on an encrypted volume without a SnapMirror relationship
            • Securely purge data on an encrypted volume with an Asynchronous SnapMirror relationship
            • Scrub data on an encrypted volume with a Synchronous SnapMirror relationship
          • Change the onboard key management passphrase
          • Back up onboard key management information manually
          • Restore onboard key management encryption keys
          • Restore external key management encryption keys
          • Replace SSL certificates
          • Replace a FIPS drive or SED
          • Make data on a FIPS drive or SED inaccessible
            • Overview
            • Sanitize a FIPS drive or SED
            • Destroy a FIPS drive or SED
            • Emergency shredding of data on an FIPS drive or SED
          • Return a FIPS drive or SED to service when authentication keys are lost
          • Return a FIPS drive or SED to unprotected mode
          • Remove an external key manager connection
          • Modify external key management server properties
          • Transition to external key management from onboard key management
          • Transition to onboard key management from external key management
          • What happens when key management servers are not reachable during the boot process
          • Disable encryption by default with ONTAP 9.7 and later
    • Data protection and disaster recovery
      • Data protection with System Manager
        • Data protection overview
        • Create custom data protection policies
        • Configure Snapshot copies
        • Recalculate reclaimable space
        • Enable or disable client access to Snapshot copy directory
        • Recover from Snapshot copies
        • Prepare for mirroring and vaulting
        • Configure mirrors and vaults
        • Configure storage VM disaster recovery
        • Serve data from a destination
        • Resynchronize a protection relationship
        • Restore a volume from an earlier Snapshot copy
        • Recover from Snapshot copies
        • Restore to a new volume
        • Reverse resynchronize a protection relationship
        • Reactivate a source storage VM
        • Resynchronize a destination storage VM
        • Back up data to the cloud using SnapMirror
        • Back up data using Cloud Backup
      • Cluster and SVM peering with the CLI
        • Overview
        • Prepare for cluster and SVM peering
          • Peer basics
          • Prerequisites for cluster peering
          • Use shared or dedicated ports
          • Use custom IPspaces to isolate replication traffic
        • Configure intercluster LIFs
          • Configure intercluster LIFs on shared data ports
          • Configure intercluster LIFs on dedicated ports
          • Configure intercluster LIFs in custom IPspaces
        • Configure peer relationships
          • Create a cluster peer relationship
          • Create an intercluster SVM peer relationship
          • Add an intercluster SVM peer relationship
        • Enable cluster peering encryption on an existing peer relationship
        • Remove cluster peering encryption from an existing peer relationship
        • Where to find additional information
      • Data protection with the CLI
        • Overview
        • Manage local Snapshot copies
          • Overview
          • Configure custom Snapshot policies
            • Overview
            • When to configure a custom Snapshot policy
            • Create a Snapshot job schedule
            • Create a Snapshot policy
          • Manage the Snapshot copy reserve
            • Overview
            • When to increase the Snapshot copy reserve
            • How deleting protected files can lead to less file space than expected
            • Monitor Snapshot copy disk consumption
            • Check available Snapshot copy reserve on a volume
            • Modify the Snapshot copy reserve
            • Autodelete Snapshot copies
          • Restore files from Snapshot copies
            • Restore a file from a Snapshot copy on an NFS or SMB client
            • Enable and disable NFS and SMB client access to Snapshot copy directory
            • Restore a single file from a Snapshot copy
            • Restore part of a file from a Snapshot copy
            • Restore the contents of a volume from a Snapshot copy
        • SnapMirror volume replication
          • About
          • Asynchronous SnapMirror disaster recovery basics
          • SnapMirror Synchronous disaster recovery basics
          • About workloads supported by StrictSync and Sync policies
          • Vault archiving using SnapMirror technology
          • SnapMirror unified replication basics
          • XDP replaces DP as the SnapMirror default
          • When a destination volume grows automatically
          • Fan-out and cascade data protection deployments
          • SnapMirror licensing
            • Overview
            • Install a SnapMirror Cloud license
          • DPO systems feature enhancements
        • Manage SnapMirror volume replication
          • SnapMirror replication workflow
          • Configure a replication relationship in one step
          • Configure a replication relationship one step at a time
            • Create a destination volume
            • Create a replication job schedule
            • Customize a replication policy
              • Create a custom replication policy
              • Define a rule for a policy
              • Define a schedule for creating a local copy on the destination
            • Create a replication relationship
            • Initialize a replication relationship
            • Example: Configure a vault-vault cascade
          • Convert an existing DP-type relationship to XDP
          • Convert the type of a SnapMirror relationship
          • Convert the mode of a SnapMirror Synchronous relationship
          • Serve data from a SnapMirror DR destination volume
            • Make the destination volume writeable
            • Configure the destination volume for data access
            • Reactivate the original source volume
          • Restore files from a SnapMirror destination volume
            • Restore a single file, LUN, or NVMe namespace from a SnapMirror destination
            • Restore the contents of a volume from a SnapMirror destination
          • Update a replication relationship manually
          • Resynchronize a replication relationship
          • Delete a volume replication relationship
          • Manage storage efficiency
          • Use SnapMirror global throttling
        • About SnapMirror SVM replication
        • Manage SnapMirror SVM replication
          • Replicate SVM configurations
            • SnapMirror SVM replication workflow
            • Criteria for placing volumes on destination SVMs
            • Replicate an entire SVM configuration
            • Exclude LIFs and related network settings from SVM replication
            • Exclude network, name service, and other settings from SVM replication
            • Specify aggregates to use for SVM DR relationships
            • SMB only: Create a SMB server
            • Exclude volumes from SVM replication
          • Serve data from an SVM DR destination
            • SVM disaster recovery workflow
            • Make SVM destination volumes writeable
          • Reactivate the source SVM
            • Source SVM reactivation workflow
            • Reactivate the original source SVM
            • Reactivate the original source SVM (FlexGroup volumes only)
          • Convert volume replication relationships to an SVM replication relationship
          • Delete an SVM replication relationship
        • Manage SnapMirror root volume replication
          • Overview
          • Create and initializing load-sharing mirror relationships
          • Update a load-sharing mirror relationship
          • Promote a load-sharing mirror
        • SnapMirror technical details
          • Use path name pattern matching
          • Use extended queries to act on many SnapMirror relationships
          • Ensure a common Snapshot copy in a mirror-vault deployment
          • Compatible ONTAP versions for SnapMirror relationships
          • SnapMirror limitations
      • Archive and compliance using SnapLock technology
        • Overview
        • What SnapLock is
        • SnapLock workflow
        • Configure SnapLock
          • Install the license
          • Initialize the ComplianceClock
          • Create a SnapLock aggregate
          • Create a SnapLock volume
          • Mount a SnapLock volume
          • Set the retention time
            • Overview
            • Set the retention time for a file explicitly
            • Set the default retention period
          • Verify SnapLock settings
          • Reset the ComplianceClock for an NTP-configured system
        • Commit files to WORM
          • Commit files to WORM manually
          • Autocommit files to WORM
          • Use a command or program to create a WORM appendable file
          • Use volume append mode to create WORM appendable files
        • Commit Snapshot copies to WORM
        • Mirror WORM files
        • Create an audit log
        • Use the privileged delete feature
          • Create a SnapLock administrator account
          • Enable the privileged delete feature
          • Delete WORM files using privileged delete
        • Use the Legal Hold feature
        • Use the Event Based Retention (EBR) feature
        • Move a SnapLock volume
          • Create a SnapLock security administrator account
          • Move a SnapLock volume
        • SnapLock APIs
      • Consistency Groups management
        • Overview
        • Configure a single consistency group
        • Configure a hierarchical consistency group
        • Protect
        • Delete
        • SnapMirror Business Continuity
          • Overview
          • Key concepts
          • Planning
            • Prerequisites
            • Additional restrictions and limitations
            • ONTAP access options
            • Prepare to use the ONTAP CLI
            • Prepare to use the ONTAP Mediator
            • Summary of deployment best practices
          • Manage SnapMirror for Business Continuity using System Manager
            • Configure Mediator
            • Configure protection for business continuity
            • Reestablish original protection relationship after unplanned failover
          • Installation and setup using the ONTAP CLI
            • High level deployment workflow
            • Install ONTAP Mediator Service and confirm the ONTAP cluster configuration
            • Initialize the ONTAP Mediator
            • Create a consistency group relationship
            • Initialize a consistency group
            • Mapping LUNs to the application hosts
          • Administration
            • Create a common snapshot copy
            • Perform a planned failover
            • Automatic unplanned failover operations
            • Basic monitoring
            • Add and remove volumes in a consistency group
            • Resume protection in a fan-out configuration
            • Convert existing relationships to SM-BC relationships
            • SM-BC upgrade and revert considerations
            • Remove an SM-BC configuration
            • Remove ONTAP Mediator
          • Troubleshooting
            • SnapMirror delete operation fails in takover state
            • Failure creating a SnapMirror relationship and initializing consistency group
            • Planned failover unsuccesful
            • Mediator not reachable or Mediator quorum status is false
            • Automatic unplanned failover not triggered on Site B
            • Link between Site B and Mediator down and Site A down
            • Link between Site A to Mediator Down and Site B down
            • SM-BC SnapMirror delete operation fails when fence is set on destination volumes
            • Volume move operation stuck when primary site is down
            • release operation fails when unable to delete Snapshot copy
            • Volume move reference Snapshot copy shows as the newest
      • Mediator service for MetroCluster and SnapMirror Business Continuity
        • Install or upgrade
        • Manage
      • Manage MetroCluster sites with System Manager
        • MetroCluster overview
        • Set up a MetroCluster site
        • Set up MetroCluster peering
        • Configure a MetroCluster site
        • Perform MetroCluster switchover and switchback
        • Modify address, netmask, and gateway in a MetroCluster IP
        • Troubleshoot problems with a MetroCluster
      • Data protection using tape backup
        • Tape backup overview
        • Tape backup and restore workflow
        • Use cases for choosing a tape backup engine
        • Manage tape drives
          • Overview
          • Commands for managing tape drives, media changers, and tape drive operations
          • Use a nonqualified tape drive
          • Assign tape aliases
          • Remove tape aliases
          • Enable or disable tape reservations
          • Commands for verifying tape library connections
        • About tape drives
          • Qualified tape drives overview
          • Format of the tape configuration file
          • How the storage system qualifies a new tape drive dynamically
          • Tape devices overview
            • Overview
            • Tape device name format
            • Supported number of simultaneous tape devices
          • Tape aliasing
            • Overview
            • What physical path names are
            • What serial numbers are
          • Considerations when configuring multipath tape access
          • How you add tape drives and libraries to storage systems
          • What tape reservations are
        • Transfer data using ndmpcopy
          • Overview
          • Options for the ndmpcopy command
        • NDMP for FlexVol volumes
          • About NDMP for FlexVol volumes
          • About NDMP modes of operation
            • What node-scoped NDMP mode is
            • What SVM-scoped NDMP mode is
          • Considerations when using NDMP
          • Environment variable
            • Overview
            • Environment variables supported by ONTAP
          • Common NDMP tape backup topologies
          • Supported NDMP authentication methods
          • NDMP extensions supported by ONTAP
          • NDMP restartable backup extension for a dump supported by ONTAP
          • What enhanced DAR functionality is
          • Scalability limits for NDMP sessions
        • About NDMP for FlexGroup volumes
        • About NDMP with SnapLock volumes
        • Manage node-scoped NDMP mode for FlexVol volumes
          • Overview
          • Commands for managing node-scoped NDMP mode
          • User authentication in a node-scoped NDMP mode
        • Manage SVM-scoped NDMP mode for FlexVol volumes
          • Overview
          • Commands for managing SVM-scoped NDMP mode
          • What Cluster Aware Backup extension does
          • Availability of volumes and tape devices for backup and restore on different LIF types
          • What affinity information is
          • NDMP server supports secure control connections in SVM-scoped mode
          • NDMP data connection types
          • User authentication in the SVM-scoped NDMP mode
          • Generate an NDMP-specific password for NDMP users
          • How tape backup and restore operations are affected during disaster recovery in MetroCluster configuration
        • About dump engine for FlexVol volumes
          • About
          • How a dump backup works
          • Types of data that the dump engine backs up
          • What increment chains are
          • What the blocking factor is
          • When to restart a dump backup
          • How a dump restore works
          • Types of data that the dump engine restores
          • Considerations before restoring data
          • Scalability limits for dump backup and restore sessions
          • Tape backup and restore support between Data ONTAP operating in 7-Mode and ONTAP
          • Delete restartable contexts
          • How dump works on a SnapVault secondary volume
          • How dump works with storage failover and ARL operations
          • How dump works with volume move
          • How dump works when a FlexVol volume is full
          • How dump works when volume access type changes
          • How dump works with SnapMirror single file or LUN restore
          • How dump backup and restore operations are affected in MetroCluster configurations
        • About SMTape engine for FlexVol volumes
          • About
          • Use Snapshot copies during SMTape backup
          • SMTape capabilities
          • Features not supported in SMTape
          • Scalability limits for SMTape backup and restore sessions
          • What tape seeding is
          • How SMTape works with storage failover and ARL operations
          • How SMTape works with volume move
          • How SMTape works with volume rehost operations
          • How NDMP backup policy are affected during ADB
          • How SMTape backup and restore operations are affected in MetroCluster configurations
        • Monitor tape backup and restore operations for FlexVol volumes
          • Overview
          • Access the event log files
          • What the dump and restore event log message format is
            • Overview
            • What logging events are
            • What dump events are
            • What restore events are
          • Enable or disable event logging
        • Error messages for tape backup and restore of FlexVol volumes
          • Backup and restore error messages
            • Resource limitation: no available thread
            • Tape reservation preempted
            • Could not initialize media
            • Maximum number of allowed dumps or restores (maximum session limit) in progress
            • Media error on tape write
            • Tape write failed
            • Tape write failed - new tape encountered media error
            • Tape write failed - new tape is broken or write protected
            • Tape write failed - new tape is already at the end of media
            • Tape write error
            • Media error on tape read
            • Tape read error
            • Already at the end of tape
            • Tape record size is too small. Try a larger size.
            • Tape record size should be block_size1 and not block_size2
            • Tape record size must be in the range between 4KB and 256KB
          • NDMP error messages
            • Network communication error
            • Message from Read Socket: error_string
            • Message from Write Dirnet: error_string
            • Read Socket received EOF
            • ndmpd invalid version number: version_number ``
            • ndmpd session session_ID not active
            • Could not obtain vol ref for Volume volume_name
            • Data connection type ["NDMP4_ADDR_TCP"|"NDMP4_ADDR_TCP_IPv6"] not supported for ["IPv6"|"IPv4"] control connections
            • DATA LISTEN: CAB data connection prepare precondition error
            • DATA CONNECT: CAB data connection prepare precondition error
            • Error:show failed: Cannot get password for user '<username>'
          • Dump error messages
            • Destination volume is read-only
            • Destination qtree is read-only
            • Dumps temporarily disabled on volume, try again
            • NFS labels not recognized
            • No files were created
            • Restore of the file <file name> failed
            • Truncation failed for src inode <inode number>…​
            • Unable to lock a snapshot needed by dump
            • Unable to locate bitmap files
            • Volume is temporarily in a transitional state
          • SMTape error messages
            • Chunks out of order
            • Chunk format not supported
            • Failed to allocate memory
            • Failed to get data buffer
            • Failed to find snapshot
            • Failed to create snapshot
            • Failed to lock snapshot
            • Failed to delete snapshot
            • Failed to get latest snapshot
            • Failed to load new tape
            • Failed to initialize tape
            • Failed to initialize restore stream
            • Failed to read backup image
            • Image header missing or corrupted
            • Internal assertion
            • Invalid backup image magic number
            • Invalid backup image checksum
            • Invalid input tape
            • Invalid volume path
            • Mismatch in backup set ID
            • Mismatch in backup time stamp
            • Job aborted due to shutdown
            • Job aborted due to Snapshot autodelete
            • Tape is currently in use by other operations
            • Tapes out of order
            • Transfer failed (Aborted due to MetroCluster operation)
            • Transfer failed (ARL initiated abort)
            • Transfer failed (CFO initiated abort)
            • Transfer failed (SFO initiated abort)
            • Underlying aggregate under migration
            • Volume is currently under migration
            • Volume offline
            • Volume not restricted
      • NDMP configuration
        • Overview
        • Workflow
        • Prepare for NDMP configuration
        • Verify tape device connections
        • Enable tape reservations
        • Configure NDMP at the SVM level or the node level
          • Overview
          • Configure SVM-scoped NDMP
            • Overview
            • Enable SVM-scoped NDMP on the cluster
            • Configure a backup user for the cluster
            • Configure LIFs
          • Configure node-scoped NDMP
            • Enable node-scoped NDMP on the cluster
            • Configure a LIF
        • Configure the backup application
      • Replication between NetApp Element software and ONTAP
        • Overview
        • Workflow
        • Enable SnapMirror in Element software
          • Enable SnapMirror on the Element cluster
          • Enable SnapMirror on the Element source volume
          • Create a SnapMirror endpoint
        • Configure a replication relationship
          • Create a replication job schedule
          • Customize a replication policy
            • Create a custom replication policy
            • Define a rule for a policy
          • Create a replication relationship
            • Create a relationship from an Element source to an ONTAP destination
            • Create a relationship from an ONTAP source to an Element destination
          • Initialize a replication relationship
        • Serve data from a SnapMirror DR destination volume
          • Make the destination volume writeable
          • Configure the destination volume for data access
          • Reactivate the original source volume
        • Update a replication relationship manually
        • Resynchronize a replication relationship
    • Event and performance monitoring
      • View cluster performance with System Manager
        • Cluster performance overview
        • Dashboard tour
        • Identify hot objects
        • Modify QoS
      • Monitor cluster performance using System Manager
      • Performance monitoring setup with the CLI
        • Overview
        • Performance monitoring
          • Workflow
          • Verify that your VMware environment is supported
          • Active IQ Unified Manager worksheet
          • Install Active IQ Unified Manager
            • Download and deploy Active IQ Unified Manager
            • Configure initial Active IQ Unified Manager settings
          • Specify the clusters to be monitored
          • Set up basic monitoring tasks
            • Perform daily monitoring
            • Use weekly and monthly performance trends to identify performance issues
            • Use performance thresholds to generate event notifications
              • Set performance thresholds
              • Configure alert settings
          • Identify performance issues in Active IQ Unified Manager
        • Use Active IQ Digital Advisor to view system performance
      • Performance management with the CLI
        • Overview
        • Monitor performance
          • Workflow
          • Verify that your VMware environment is supported
          • Active IQ Unified Manager worksheet
          • Install Active IQ Unified Manager
            • Download and deploy Active IQ Unified Manager
            • Configure initial Active IQ Unified Manager settings
          • Specify the clusters to be monitored
          • Set up basic monitoring tasks
            • Perform daily monitoring
            • Use weekly and monthly performance trends to identify performance issues
            • Use performance thresholds to generate event notifications
            • Set performance thresholds
            • Add alerts
          • Identify performance issues in Active IQ Unified Manager
        • Use Active IQ Digital Advisor to view system performance
        • Manage performance issues
          • Workflow
          • Perform basic infrastructure checks
            • Check protocol settings on the storage system
              • Check the NFS TCP maximum transfer size
              • Check the iSCSI TCP read/write size
              • Check the CIFS multiplex settings
              • Check the FC adapter port speed
            • Check the network settings on the data switches
            • Check the MTU network setting on the storage system
            • Check disk throughput and latency
            • Check throughput and latency between nodes
          • Manage workloads
            • Identify remaining performance capacity
            • Identify high-traffic clients or files
            • Guarantee throughput with QoS
              • Overview
              • Enable or disable throughput floors v2
              • Storage QoS workflow
              • Set a throughput ceiling with QoS
              • Set a throughput floor with QoS
              • Use adaptive QoS policy groups
      • Monitor cluster performance with Unified Manager
      • Monitor cluster performance with Cloud Insights
      • File System Analytics
        • Overview
        • Enable File System Analytics
        • View file system activity
        • Enable Activity Tracking
        • Take corrective action based on analytics
        • Considerations
      • EMS configuration
        • Overview
        • Configure EMS event notifications with System Manager
        • Configure EMS event notifications with the CLI
          • Workflow
          • Decide where to send event notifications
          • Configure EMS events to send email notifications
          • Configure EMS events to forward notifications to a syslog server
          • Configure SNMP traphosts to receive event notifications
          • Configure important EMS events to forward notifications to a REST API server
        • Update deprecated EMS event mapping
          • EMS event mapping models
          • Update EMS event mapping from deprecated ONTAP commands
    • Legal notices
    • docs.netapp.com
    • ONTAP 9

    Data protection and disaster recovery

    Get started
    Data protection overview
    Cluster and SVM peering basics
    MetroCluster overview
    SnapLock overview
    Tape backup overview
    Cluster and SVM peering
    Prepare for cluster and SVM peering with System Manager
    Create a cluster peer relationship with the CLI
    Create an intercluster SVM peer relationship with the CLI
    Configure intercluster LIFs with the CLI
    Disaster recovery and preparation
    Protect volumes with System Manager
    Protect volumes with the CLI
    Protect storage VMs with System Manager
    Protect SVMs with the CLI
    Restore data with System Manager
    Restore data with the CLI
    Compatible ONTAP versions for SnapMirror
    Archive and compliance
    Create SnapLock aggregates and volumes
    Commit files to WORM
    Set the retention time
    Consistency Groups
    Overview
    Configure Consistency Groups
    Protect your data
    SnapMirror Business Continuity overview
    Deployment with System Manager
    Deployment with the CLI
    SnapMirror Cloud
    SnapMirror Cloud Licensing
    Cloud backup
    MetroCluster
    Manage MetroCluster sites with System Manager
    Manage MetroCluster with the CLI
    Tape backup
    Configure NDMP
    Transfer data using ndmpcopy
    SMTape engine
    Dump engine
    More resources
    TR-4015: SnapMirror Configuration and Best Practices
    TR-4733: SnapMirror Synchronous Configuration and Best Practices
    TR-4526: Compliant WORM Storage Using SnapLock
    TR-4183: SnapVault Best Practices
    • © 2022 NetApp, Inc.
    • Terms of Use
    • Privacy Policy
    • Cookie Policy
    • Cookie Settings
    • Have feedback for our website? Let us know
    • Announcements
    • blog blog@
    • community community@
    • twitter twitter@
    • facebook facebook@
    • linkedin linkedin@
    • youtube youtube@
    • slideshare slideshare@