• ONTAP docs
  • Release notes
    • Release highlights
    • What's new in ONTAP 9.17.1
    • What's new in ONTAP 9.16.1
    • What's new in ONTAP 9.15.1
    • What's new in ONTAP 9.14.1
    • What's new in ONTAP 9.13.1
    • What's new in ONTAP 9.12.1
    • What's new in ONTAP 9.11.1
    • What's new in ONTAP 9.10.1
    • What's new in ONTAP 9.9.1
    • Changes to ONTAP defaults and limits
    • Release support
  • Get started
    • Learn about ONTAP
      • ONTAP platforms
      • ONTAP user interfaces
      • Integrate ONTAP System Manager with BlueXP
      • Cluster storage
      • High-availability pairs
      • AutoSupport and Digital Advisor
      • Network architecture
        • Overview
        • Logical ports
        • Support for industry-standard network technologies
        • RDMA
      • Client protocols
      • Disks and local tiers
        • Overview
        • RAID groups and local tiers
        • Mirrored and unmirrored local tiers
        • Root-data partitioning
      • Volumes, qtrees, files, and LUNs
      • Storage virtualization
        • Overview
        • SVM use cases
        • Cluster and SVM administration
        • Namespaces and junction points
      • Path failover
        • Overview
        • NAS path failover
        • SAN path failover
      • Load balancing
      • Replication
        • Snapshot copies
        • SnapMirror disaster recovery and data transfer
        • SnapMirror Cloud backups to object Storage
        • SnapVault archiving
        • Cloud backup and support for traditional backups
        • MetroCluster continuous availability
      • Storage efficiency
        • Overview
        • Thin provisioning
        • Deduplication
        • Compression
        • FlexClone volumes, files, and LUNs
        • Capacity measurements in ONTAP System Manager
        • Temperature sensitive storage
        • CPU or offload processor storage efficiency
      • Security
        • Client authentication and authorization
        • Administrator authentication and RBAC
        • Virus scanning
        • Encryption
        • WORM storage
      • ONTAP and VMware vSphere
      • Application aware data management
      • FabricPool
    • Quick start
    • Set up an ONTAP cluster
      • Workflow
      • Gather information
      • Create an a cluster and join nodes
      • Convert management LIFs from IPv4 to IPv6
      • Check your cluster with Active IQ Config Advisor
      • Synchronize the system time across the cluster
  • Upgrade and revert ONTAP
    • Upgrade ONTAP
      • Overview
      • When to upgrade ONTAP
      • Execute automated pre-upgrade checks before a planned upgrade
      • Prepare for an ONTAP upgrade
        • Determine how long an upgrade will take
        • Prepare to upgrade with Upgrade Advisor
        • Prepare to upgrade without Upgrade Advisor
          • Preparation summary
          • Choose your target ONTAP release
          • Confirm configuration support
          • Identify common configuration errors
          • Upgrade paths
          • Verify LIF failover configuration
          • Verify SVM routing configuration
          • Special considerations
            • Summary of special considerations
            • Mixed version clusters
            • MetroCluster upgrade requirements
            • SAN configurations
            • SnapMirror
              • Verify compatibility of ONTAP versions
              • DP-type relationships
              • Disable long-term retention snapshots
            • Verify licensing for SnapMirror S3 configurations
            • NetApp Storage Encryption
            • Netgroups
            • Assign an explicit value to the v4.2-xattrs option
            • LDAP clients using SSLv3
            • Adverse effects of session-oriented protocols
            • SSH public keys
            • Respond to ARP security warnings
          • Reboot SP or BMC
      • Download the ONTAP software image
      • ONTAP upgrade methods
        • Overview of upgrade methods
        • Automated upgrade
        • Manual upgrades
          • Install software package
          • Manual nondisruptive standard configuration
          • Manual nondisruptive MetroCluster (4 or 8 node)
          • Manual nondisruptive MetroCluster (2-node)
          • Manual disruptive
      • What to do after an ONTAP upgrade
        • Summary of post-upgrade verifications
        • Verify the cluster
        • Verify all LIFs are on home ports
        • Special configurations
          • Summary of post-upgrade special configurations
          • Network configuration
          • EMS LIF service
          • Networking and storage status
          • SAN configuration
          • KMIP server connections
          • Load-sharing mirror source volumes
          • User accounts that can access the Service Processor
        • Update the DQP
    • Firmware, system, and security updates
      • Overview
      • How automatic updates are scheduled for installation
      • Enable automatic updates
      • Modify automatic updates
      • Manage recommended automatic updates
      • Update firmware manually
    • Revert ONTAP
      • Do I need technical support?
      • ONTAP revert paths
      • Revert issues and limitations
      • Prepare for an ONTAP revert
        • Resources to review before a revert
        • System verifications
        • Perform ONTAP version specific pre-revert checks
          • Summary of pre-revert checks
          • Any ONTAP 9 version
            • SMB sessions
            • SnapMirror/SnapVault relationships
            • Deduplicated volumes
            • Snapshots
            • SnapLock
            • Automatic unplanned switchover for MetroCluster configurations
          • ONTAP 9.17.1
            • Anti-ransomware on SAN volumes
          • ONTAP 9.16.1
            • NVMe TLS configuration
            • Extended qtree performance monitoring
            • S3 CORS configuration
          • ONTAP 9.14.1
            • NFS trunking
          • ONTAP 9.12.1
            • S3 NAS buckets
            • NVMe in-band authentication
            • IPsec for MetroCluster configurations
          • ONTAP 9.11.1
            • Anti-ransomware licensing
          • ONTAP 9.6
            • SnapMirror Synchronous relationships
      • Download and install the revert software image
      • Revert a cluster
      • What to do after an ONTAP revert
        • Verify cluster and storage health
        • Enable automatic switchover for MetroCluster configurations
        • Enable and revert LIFs to home ports
        • Enable Snapshot copy policies
        • Verify IPv6 firewall entries
        • Verify user accounts that can access the Service Processor
  • Cluster administration
    • Cluster management with System Manager
      • Administration overview
      • Use System Manager to access ONTAP Clusters
      • Configure protocols
      • Enable new features
      • Download a cluster configuration
      • Assign tags to a cluster
      • View and submit support cases
      • Manage maximum capacity limit of a storage VM
      • Monitor cluster, tier, and SVM capacity
      • View hardware configurations and determine problems
      • Manage nodes
    • License management
      • Overview
      • Download NetApp License Files (NLFs)
      • Install ONTAP licenses
      • Manage ONTAP licenses
      • License types and licensed method
      • Commands for managing licenses
    • Cluster management with the CLI
      • Overview
      • Cluster and SVM administrators
        • Roles
        • Manage access to System Manager
        • What the cluster management server is
        • Types of SVMs
      • Access the cluster by using the CLI (cluster administrators only)
        • Access the cluster by using the serial port
        • Access the cluster using SSH
        • SSH login security
        • Enable Telnet or RSH access to the cluster
        • Access the cluster using Telnet
        • Access the cluster using RSH
      • Use the ONTAP command-line interface
        • Overview
        • Different shells for CLI commands (cluster administrators only)
        • Methods of navigating CLI command directories
        • Rules for specifying values in the CLI
        • Methods of viewing command history and reissuing commands
        • Keyboard shortcuts for editing CLI commands
        • Use of administrative privilege levels
        • Set the privilege level in the CLI
        • Set display preferences in the CLI
        • Methods of using query operators
        • Methods of using extended queries
        • Methods of customizing show command output by using fields
        • About positional parameters
        • Methods of accessing ONTAP man pages
      • Manage CLI sessions (cluster administrators only)
      • Cluster management (cluster administrators only)
        • Display information about the nodes in a cluster
        • Display cluster attributes
        • Modify cluster attributes
        • Display the status of cluster replication rings
        • About quorum and epsilon
        • What system volumes are
      • Manage nodes
        • Add nodes to the cluster
        • Remove nodes from the cluster
        • Access a node’s log, core dump, and MIB files by using a web browser
        • Access the system console of a node
        • Manage node root volumes and root aggregates
        • Start or stop a node
        • Manage a node by using the boot menu
        • Display node attributes
        • Modify node attributes
        • Rename a node
        • Manage single-node clusters
      • Configure the SP/BMC network
        • Isolate management network traffic
        • Considerations for the SP/BMC network configuration
        • Enable the SP/BMC automatic network configuration
        • Configure the SP/BMC network manually
        • Modify the SP API service configuration
      • Manage nodes remotely using the SP/BMC
        • Overview
        • About the Service Processor (SP)
        • About the Baseboard Management Controller (BMC)
        • Methods of managing SP/BMC firmware updates
        • When the SP/BMC uses the network interface for firmware updates
        • Accounts that can access the SP
        • Access the SP/BMC from an administration host
        • Access the SP/BMC from the system console
        • Relationship among the SP CLI, SP console, and system console sessions
        • Manage the IP addresses that can access the SP
        • Use online help at the SP/BMC CLI
        • Commands to manage a node remotely
        • About the threshold-based SP sensor readings and status values of the system sensors command output
        • About the discrete SP sensor status values of the system sensors command output
        • Commands for managing the SP from ONTAP
        • ONTAP commands for BMC management
        • BMC CLI commands
      • Manage the cluster time (cluster administrators only)
      • Manage the banner and MOTD
        • Overview
        • Create a banner
        • Manage the banner
        • Create an MOTD
        • Manage the MOTD
      • Manage jobs and schedules
      • Back up and restore cluster configurations (cluster administrators only)
        • What configuration backup files are
        • How the node and cluster configurations are backed up automatically
        • Commands for managing configuration backup schedules
        • Commands for managing configuration backup files
        • Find a configuration backup file to use for recovering a node
        • Restore the node configuration using a configuration backup file
        • Find a configuration to use for recovering a cluster
        • Restore a cluster configuration from an existing configuration
        • Synchronize a node with the cluster
      • Manage core dumps (cluster administrators only)
    • Disk and tier management
      • Overview
      • Manage local tiers
        • Learn about ONTAP local tier management
        • Add (create) a local tier
          • Workflow to add a local tier
          • Determine the number of disks or disk partitions required for a local tier
          • Decide which local tier creation method to use
          • Add (create) local tiers automatically
          • Add (create) local tiers manually
          • Add (create) local tiers with SyncMirror enabled
        • Manage the use of local tiers
          • Rename a local tier
          • Set media cost of a local tier
          • Manually fast zero drives
          • Manually assign disk ownership
          • Determine drive and RAID group information for a local tier
          • Assign local tiers to storage VMs (SVMs)
          • Determine which volumes reside on a local tier
          • Determine and control a volume’s space usage in a local tier
          • Determine space usage in a local tier
          • Relocate local tier ownership within an HA pair
          • Delete a local tier
          • Commands for relocating local tiers
          • Commands for managing local tiers
        • Add capacity (disks) to a local tier
          • Workflow to add capacity to a local tier
          • Methods to create space in a local tier
          • Add disks to a local tier
          • Add drives to a node or shelf
          • Correct misaligned spare partitions
      • Manage disks
        • How hot spare disks work
        • How low spare warnings can help you manage your spare disks
        • Additional root-data partitioning management options
        • Learn when to update the Disk Qualification Package
        • Disk and partition ownership
          • Manage the ownership of disks and partitions
          • Learn about auto-assignment of disk ownership
          • Display disk and partition ownership
          • Change auto-assignment settings for disk ownership
          • Manually assign ownership of unpartitioned disks
          • Manually assign ownership of partitioned disks
          • Set up an active-passive configuration on nodes using root-data partitioning
          • Set up an active-passive configuration on nodes using root-data-data partitioning
          • Remove ownership from a disk
        • Remove a failed disk
        • Disk sanitization
          • Learn about disk sanitization
          • When sanitization cannot be performed
          • What happens if sanitization is interrupted
          • Tips for managing local tiers containing data to be sanitized
          • Sanitize a disk
        • Commands for managing disks
        • Commands for displaying space usage information
        • Commands for displaying information about storage shelves
      • Manage RAID configurations
        • Default RAID policies for local tiers
        • RAID protection levels for disks
        • Drive and RAID group information for a local tier
        • Convert from RAID-DP to RAID-TEC
        • Convert RAID-TEC to RAID-DP
        • Considerations for sizing RAID groups
        • Customize the size of your RAID groups
      • Manage Flash Pool local tiers
        • Flash Pool local tier caching policies
        • Manage Flash Pool caching policies
          • Determine whether to modify the caching policy of Flash Pool local tiers
          • Modify caching policies of Flash Pool local tiers
          • Set the cache-retention policy for Flash Pool local tiers
        • Flash Pool SSD partitioning for Flash Pool local tiers using storage pools
        • Flash Pool candidacy and optimal cache size
        • Create a Flash Pool local tier using physical SSDs
        • Create a Flash Pool local tier using SSD storage pools
          • Determine whether a Flash Pool local tier is using an SSD storage pool
          • Add cache by adding an SSD storage pool
          • Create a Flash Pool using SSD storage pool allocation units
          • Determine the impact on cache size when SSDs are added to an SSD storage pool
          • Add SSDs to an SSD storage pool
          • Commands for managing SSD storage pools
    • FabricPool tier management
      • Overview
      • Requirements for using ONTAP FabricPool
      • Tier data efficiently with FabricPool policies
      • Learn about FabricPool configuration and management tasks
      • Configure FabricPool
        • Prepare for FabricPool configuration
          • Overview
          • Install a FabricPool license on an cluster
          • Install a CA certificate on an cluster for StorageGRID
          • Install a CA certificate on a cluster for S3
          • Set up an object store as the cloud tier for FabricPool
            • Overview
            • Set up StorageGRID as the FabricPool cloud tier
            • Set up S3 as the FabricPool cloud tier
            • Set up Alibaba Cloud Object Storage as the FabricPool cloud tier
            • Set up Amazon S3 as the FabricPool cloud tier
            • Set up Google Cloud Storage as the FabricPool cloud tier
            • Set up IBM Cloud Object Storage as the FabricPool cloud tier
            • Set up Azure Blob Storage as the FabricPool cloud tier
            • Set up object stores for FabricPool in a MetroCluster configuration
          • Test the cloud tier latency and throughput performance
          • Associate the cloud tier with a local tier
          • Tier data to local S3 bucket
      • Manage FabricPool
        • Analyze inactive data with inactive data reporting
        • Manage volumes for FabricPool
          • Create a volume on a FabricPool-enabled local tier
          • Move a volume to a FabricPool-enabled local tier
          • Enable volumes in FabricPool to write directly to the cloud
          • Enable volumes in FabricPool to perform aggressive read-aheads
        • Manage FabricPool volumes with user-created custom tags
        • Monitor space utilization of a FabricPool-enabled local tier
        • Modify a volume's tiering policy and minimum cooling period
        • Archive volumes with FabricPool (video)
        • Modify a volume's default FabricPool tiering policy
        • Set thresholds on FabricPool per-node put rate
        • Customize FabricPool object deletion and defragmentation
        • Promote data to the performance tier
      • Manage FabricPool mirrors
        • Overview
        • Create a FabricPool mirror
        • Display FabricPool mirror details
        • Promote a FabricPool mirror
        • Remove a FabricPool mirror
        • Replace an existing object store with a FabricPool mirror
        • Replace a FabricPool mirror in a MetroCluster configuration
      • Commands for managing FabricPool resources
    • SVM data mobility
      • Overview
      • Migrate an SVM
      • Monitor migration
      • Pause and resume migration
      • Cancel migration
      • Manually cut over clients
      • Manually remove source SVM
    • HA pair management
      • Learn about HA pair management in ONTAP clusters
      • Learn about hardware-assisted takeovers in ONTAP clusters
      • Learn about automatic takeover and giveback in ONTAP clusters
      • ONTAP automatic takeover commands
      • ONTAP automatic giveback commands
      • ONTAP manual takeover commands
      • ONTAP manual giveback commands
      • Testing takeover and giveback in ONTAP clusters
      • ONTAP commands for monitoring an HA pair
      • ONTAP commands for enabling and disabling storage failover
      • Halt or reboot ONTAP nodes without initiating takeover
    • REST API management with System Manager
      • Rest log overview
      • Access the REST API log
  • Volume administration
    • Volume and LUN management with System Manager
      • Overview
      • Manage volumes
        • Manage ONTAP volumes with System Manager
        • Add a volume
        • Assign tags to a volume
        • Recover deleted volumes
      • Manage LUNs
      • Expand volumes and LUNs
      • Save storage space
      • Balance load by moving LUNs
      • Balance loads by moving volumes to another tier
      • Use Ansible Playbooks to add or edit volumes or LUNs
      • Manage storage efficiency policies
      • Manage resources using quotas
      • Limit resource use
      • Clone data with FlexClone
      • Search, filter, and sort
    • Logical storage management with the CLI
      • Overview
      • Create and manage volumes
        • Create a volume
        • Enable large volume and large file support
        • SAN volumes
          • Overview of SAN volume provisioning
          • Configure volume provisioning options
          • Determine space usage in a volume or aggregate
          • Enable automatic snapshot and LUN deletion to manage space
          • Configure volumes to automatically provide more space when they are full
          • Configure volumes to automatically grow and shrink their size
          • Requirements for enabling both autoshrink and automatic Snapshot copy deletion
          • Autoshrink functionality and snapshot copy deletion
          • Address FlexVol volume fullness and overallocation alerts
          • Address aggregate fullness and overallocation alerts
          • Considerations when setting fractional reserve
        • Determine file and inode usage for a volume
        • Control and monitor FlexVol volume I/O performance with Storage QoS
        • Delete a FlexVol volume
        • Protection against accidental volume deletion
        • Commands for managing FlexVol volumes
        • Commands for displaying space usage information
      • Move and copy volumes
        • Move a FlexVol volume overview
        • Considerations and recommendations when moving volumes
        • Requirements for moving volumes in a SAN environment
        • Move a volume
        • Commands for moving volumes
        • Methods for copying a volume
      • Use FlexClone volumes to create efficient copies of your FlexVol volumes
        • Overview
        • Create a FlexClone volume
        • Split a FlexClone volume from its parent volume
        • Determine the space used by a FlexClone volume
        • Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
      • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
        • Overview
        • Create a FlexClone file or FlexClone LUN
        • View node capacity for creating and deleting FlexClone files and FlexClone LUNs
        • View the space savings due to FlexClone files and FlexClone LUNs
        • Methods to delete FlexClone files and FlexClone LUNs
        • How a FlexVol volume can reclaim free space with autodelete setting
          • Overview
          • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
          • Prevent automatic deletion of a FlexClone file or FlexClone LUN
          • Commands for configuring deletion of FlexClone files
      • Use qtrees to partition your FlexVol volumes
        • Qtrees and FlexVol volume partitioning
        • Obtain a qtree junction path
        • Directory to qtree conversions
          • Convert a directory to a qtree
          • Convert a directory to a qtree using a Windows client
          • Convert a directory to a qtree using a UNIX client
      • Logical space reporting and enforcement for volumes
        • Overview
        • Logical space enforcement
        • Logical space reporting
        • Enable logical space reporting and enforcement
        • Manage SVM capacity
      • Use quotas to restrict or track resource usage
        • Overview of the quota process
          • Understand quotas, quota rules, and quota policies
          • Benefits of using quotas
          • Quota process
          • Differences among hard, soft, and threshold quotas
          • About quota notifications
          • Quota targets and types
          • Special kinds of quotas
            • How default quotas work
            • How you use explicit quotas
            • How derived quotas work
            • Use tracking quotas
          • How quotas are applied
          • Considerations for assigning quota policies
          • How quotas work with users and groups
            • Overview
            • Specify UNIX users for quotas
            • Specify Windows users for quotas
            • How default user and group quotas create derived quotas
            • How quotas are applied to the root user
            • How quotas work with special Windows groups
            • How quotas are applied to users with multiple IDs
            • How ONTAP determines user IDs in a mixed environment
            • How quotas work with multiple users
            • UNIX and Windows name linking for quotas
          • How tree quotas work
            • Overview
            • How user and group quotas work with qtrees
            • How default tree quotas on a FlexVol volume create derived tree quotas
            • How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume
          • How qtree changes affect quotas
          • How quotas are activated
            • Overview
            • Understand when to use resizing
            • When a full quota reinitialization is required
          • How you can view quota information
            • Overview
            • See what quotas are in effect using the quota report
            • Why enforced quotas differ from configured quotas
            • Use the quota report to determine which quotas limit writes to a specific file
            • Commands for displaying information about quotas
            • When to use the volume quota policy rule show and volume quota report commands
          • Difference in space usage displayed by a quota report and a UNIX client
            • Overview
            • Disparity between ls command and quota report for space usage
            • How the df command accounts for file size
            • How the du command accounts for space usage
          • Examples of quota configuration
        • Set up quotas on an SVM
        • Modify (or Resizing) quota limits
        • Reinitialize quotas after making extensive changes
        • Commands to manage quota rules and quota policies
        • Commands to activate and modify quotas
      • Use deduplication, data compression, and data compaction to increase storage efficiency
        • Overview
        • Enable deduplication on a volume
        • Disable deduplication on a volume
        • Automatic volume-level background deduplication on AFF systems
        • Manage aggregate-level inline deduplication on AFF systems
        • Manage aggregate-level background deduplication on AFF systems
        • Temperature-sensitive storage efficiency overview
        • Storage efficiency behavior with volume move and SnapMirror
        • Set storage efficiency modes
        • Change volume inactive data compression threshold
        • Check volume efficiency mode
        • Change volume efficiency mode
        • View volume footprint savings with or without temperature-sensitive storage efficiency
        • Enable data compression on a volume
        • Move between secondary compression and adaptive compression
        • Disable data compression on a volume
        • Manage inline data compaction for AFF systems
        • Enable inline data compaction for FAS systems
        • Inline storage efficiency enabled by default on AFF systems
        • Enable storage efficiency visualization
        • Create a volume efficiency policy to run efficiency operations
          • Create a volume efficiency policy
          • Assign a volume efficiency policy to a volume
          • Modify a volume efficiency policy
          • View a volume efficiency policy
          • Disassociate a volume efficiency policy from a volume
          • Delete a volume efficiency policy
        • Manage volume efficiency operations manually
          • Overview
          • Run an efficiency operation manually
          • Checkpoints and efficiency operations
          • Resume a halted efficiency operation
          • Run an efficiency operation manually on existing data
        • Manage volume efficiency operations using schedules
          • Run an efficiency operation based on the amount of new data written
          • Run an efficiency operation using scheduling
        • Monitor volume efficiency operations
          • View efficiency operations and status
          • View efficiency space savings
          • View efficiency statistics of a FlexVol volume
        • Stop volume efficiency operations
        • Additional information about removing space savings from a volume
      • Rehost a volume from one SVM to another SVM
        • Prepare
        • Rehost an SMB volume
        • Rehost an NFS volume
        • Rehost a SAN volume
        • Rehost a volume in a SnapMirror relationship
        • Features that do not support volume rehost
      • Recommended volume and file or LUN configuration combinations
        • Overview
        • Determine the correct volume and LUN configuration combination for your environment
        • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
        • Settings for non-space-reserved files or LUNs with thin-provisioned volumes
        • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
      • Cautions and considerations for changing file or directory capacity
        • The maximum number of files allowed for FlexVol volumes
        • Maximum directory size for FlexVol volumes
        • Restrictions on node root volumes and root aggregates
        • Relocate a root volume to new aggregates
      • Features supported by FlexClone files and FlexClone LUNs
        • Overview
        • Deduplication with FlexClone files and FlexClone LUNs
        • How Snapshot copies work with FlexClone files and FlexClone LUNs
        • Inheritance of access control lists by FlexClone files and FlexClone LUNs
        • How quotas work with FlexClone files and FlexClone LUNs
        • FlexClone volumes and associated FlexClone files and FlexClone LUNs
        • NDMP and FlexClone files and LUNs
        • How volume SnapMirror works with FlexClone files and FlexClone LUNs
        • How space reservation works with FlexClone files and FlexClone LUNs
        • How an HA configuration works with FlexClone files and FlexClone LUNs
    • FlexGroup volumes management
      • Overview
      • Learn about ONTAP FlexGroup volumes
      • Supported and unsupported configurations for FlexGroup volumes
      • FlexGroup volume setup
        • Workflow
        • Enable 64-bit NFSv3 identifiers on ONTAP SVMs with FlexGroups
        • Provision a FlexGroup volume automatically
        • Create a FlexGroup volume
        • Provision NAS storage for large file systems using FlexGroup volumes
      • Manage FlexGroup volumes
        • Monitor the space usage of a FlexGroup volume
        • Increase the size of a FlexGroup volume
        • Reduce the size of a FlexGroup volume
        • Configure FlexGroup volumes to automatically grow and shrink their size
        • Delete directories asynchronously from FlexGroup volumes
        • Manage client rights to delete ONTAP directories asynchronously with FlexGroups
        • Create qtrees with FlexGroup volumes
        • Use quotas for FlexGroup volumes
        • Enable storage efficiency on a FlexGroup volume
        • Protect FlexGroup volumes using Snapshot copies
        • Move the constituents of a FlexGroup volume
        • Use aggregates in FabricPool for existing FlexGroup volumes
        • Balance FlexGroup volumes by redistributing file data
        • Rebalance FlexGroup volumes by moving files
      • Data protection for FlexGroup volumes
        • Workflow
        • Create a SnapMirror relationship for FlexGroup volumes
        • Create a SnapVault relationship for FlexGroup volumes
        • Create a unified data protection relationship for FlexGroup volumes
        • Create an SVM disaster recovery relationship for FlexGroup volumes
        • Transition an existing FlexGroup SnapMirror relationship to SVM DR
        • Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship
        • Considerations for creating SnapMirror cascade and fanout relationships for FlexGroup volumes
        • Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes
        • Monitor SnapMirror data transfers for FlexGroup volumes
      • Manage data protection operations for FlexGroup volumes
        • Disaster recovery for FlexGroup volumes
          • Workflow
          • Activate the destination FlexGroup volume
          • Reactivate the original source FlexGroup volume after disaster
          • Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery
        • Expand FlexGroup volumes in a SnapMirror relationship
          • Overview
          • Expand the source FlexGroup volume of a SnapMirror relationship
          • Expand the destination FlexGroup volume of a SnapMirror relationship
        • Perform a SnapMirror single file restore from a FlexGroup volume
        • Restore a FlexGroup volume from a SnapVault backup
        • Disable SVM protection on a FlexGroup volume
        • Enable SVM protection on a FlexGroup volume
      • Convert FlexVol volumes to FlexGroup volumes
        • Overview
        • Convert a FlexVol volume to a FlexGroup volume
        • Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship
    • FlexCache volumes management
      • Overview
      • FlexCache volumes supported protocols and features
      • Guidelines for sizing a FlexCache volume
      • Create a FlexCache volume
      • FlexCache write-back
        • Overview
        • Guidelines
        • Architecture
        • Use cases
        • Prerequisites
        • Interoperability
        • Enable and manage write-back
        • FAQ
      • Manage FlexCache volumes
        • Learn about auditing FlexCache volumes
        • Synchronize properties of a FlexCache volume from an origin volume
        • Update the configurations of a FlexCache relationship
        • Enable file access time updates
        • Enable global file locking
        • Prepopulate a FlexCache volume
        • Delete a FlexCache relationship
      • FlexCache for hotspot remediation
        • Overview
        • Architecture
        • Determine FlexCache array density
        • Decide on inter-SVM or intra-SVM HDFAs
        • Configure HDFAs and data LIFs
        • Client configuration
  • Network management
    • Get started
      • Visualize the ONTAP network using System Manager
      • Networking components of an ONTAP cluster
      • Network cabling guidelines
      • Determine which LIF failover policy to use
    • NAS path failover workflow
      • Configure NAS path failover on the ONTAP network
      • Worksheet for NAS path failover on the ONTAP network
    • Network ports
      • Learn about ONTAP network port configuration
      • Configure network ports
        • Combine physical ports to create ONTAP interface groups
        • Configure ONTAP VLANs over physical ports
        • Modify ONTAP network port attributes
        • Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity
        • Configure UTA X1143A-R6 ports for the ONTAP network
        • Convert the UTA2 port in the ONTAP network
        • Convert the CNA/UTA2 optical modules
        • Remove NICs from ONTAP cluster nodes
        • Monitor network ports
          • Monitor the health of network ports
          • Monitor the reachability of network ports
          • Port usage on the ONTAP network
          • ONTAP internal ports
    • IPspaces
      • IPspace configuration
      • Create IPspaces
      • View IPspaces
      • Delete IPspaces
    • Broadcast domains
      • Learn about ONTAP broadcast domains
      • Create broadcast domains
      • Add or remove ports from an ONTAP broadcast domain
      • Repair port reachability
      • Move broadcast domains into IPspaces
      • Split broadcast domains
      • Merge broadcast domains
      • Change the MTU value for ports in a broadcast domain
      • View broadcast domains
      • Delete a broadcast domain
    • Failover groups and policies
      • Learn about LIF failover on ONTAP networks
      • Create ONTAP failover groups
      • Configure failover settings on a LIF
      • Commands for managing failover groups and policies
    • Subnets (cluster administrators only)
      • Overview
      • Create subnets
      • Add or remove IP addresses from a subnet
      • Change subnet properties
      • View subnets
      • Delete subnets
    • SVMs
    • Logical interfaces (LIFs)
      • LIF overview
        • Learn about LIF configuration
        • LIF compatibility with port types
        • Supported LIF service policies and roles
        • LIFs and service policies
      • Manage LIFs
        • Configure LIF service policies
        • Create LIFs (network interface)
        • Modify LIFs
        • Migrate LIFs
        • Revert a LIF to its home port
        • Recover an incorrectly configured cluster LIF
        • Delete LIFs
      • Virtual IP (VIP) LIFs
    • Balance network loads
      • Optimize network traffic (cluster administrators only)
      • DNS load balancing overview
      • Create DNS load balancing zones
      • Add or remove a LIF from a load balancing zone
      • Configure DNS services
      • Configure dynamic DNS services
    • Host name resolution
      • Learn about host name resolution
      • Configure DNS for host-name resolution
      • Commands to manage the hosts table
    • Secure your network
      • Configure network security using federal information processing standards (FIPS)
      • Configure IPsec in-flight encryption
        • Prepare to use IPsec
        • Configure IPsec
      • Configure firewall policies for LIFs
      • Commands to manage firewall service and policies
    • QoS marking (cluster administrators only)
      • Learn about QoS marking
      • Modify QoS marking values
      • View QoS marking values
    • Manage SNMP (cluster administrators only)
      • Learn about SNMP
      • Create SNMP communities and assigning it to a LIF
      • Configure SNMPv3 users in a cluster
      • Configure traphosts to receive SNMP notifications
      • Test SNMP polling
      • Commands to manage SNMP
    • Manage routing in an SVM
      • Learn about SVM routing
      • Create static routes
      • Enable multipath routing
      • Delete static routes
      • View routing information
      • Remove dynamic routes from routing tables
    • ONTAP network information
      • View ONTAP network information
      • View network port information (cluster administrators only)
      • View information about a VLAN (cluster administrators only)
      • View interface group information (cluster administrators only)
      • View LIF information
      • View routing information
      • View DNS host table entries (cluster administrators only)
      • View DNS domain configurations
      • View information about failover groups
      • View LIF failover targets
      • View LIFs in a load balancing zone
      • View cluster connections
      • Commands to diagnose network problems
      • View network connectivity with neighbor discovery protocols
        • Neighbor discovery protocol overview
        • Use CDP to detect network connectivity
        • Use LLDP to detect network connectivity
  • NAS storage management
    • Manage NAS protocols with System Manager
      • NAS storage overview
      • VMware datastores
      • Home directories
      • Linux servers
      • Export policies
      • Windows servers
      • Both Windows and Linux
      • Secure client access with Kerberos
      • Provide client access with name services
      • Manage directories and files
      • Manage host-specific users and groups
      • Monitor NFS active clients
      • Enable NAS storage
        • Enable Linux servers
        • Enable Windows servers
        • Enable Both Windows and Linux
    • Configure NFS with the CLI
      • Learn about NFS configuration with the CLI
      • Learn about NFS configuration workflow
      • Preparation
        • Assess NFS physical storage requirements
        • Assess NFS network configuration requirements
        • Learn about NFS storage capacity provisioning
        • NFS configuration worksheet
      • Configure NFS access to an SVM
        • Create SVMs for NFS data access
        • Verify NFS protocol enablement on the SVM
        • Open NFS client access on the SVM
        • Create NFS servers
        • Create NFS LIFs
        • Enable DNS for NFS SVM host-name resolution
        • Configure name services
          • Learn about NFS name services
          • Configure the NFS name service switch table
          • Configure local UNIX users and groups
            • Learn about local UNIX users and groups for NFS SVMs
            • Create local UNIX users on NFS SVMs
            • Load local UNIX user lists on NFS SVMs
            • Create local UNIX groups on NFS SVMs
            • Add users to local UNIX group on NFS SVMs
            • Load local UNIX groups from URIs on NFS SVMs
          • Work with netgroups
            • Learn about netgroups on NFS SVMs
            • Load netgroups from URIs on NFS SVMs
            • Verify NFS SVM netgroup definitions
          • Create NIS domain configurations for NFS SVMs
          • Use LDAP
            • Learn about using LDAP name services on NFS SVMs
            • Create new LDAP client schemas for NFS SVMs
            • Create LDAP client configurations for NFS access
            • Associate LDAP client configurations with NFS SVMs
            • Verify LDAP sources for NFS SVMs
        • Use Kerberos with NFS for strong security
          • Learn about using Kerberos with NFS for security authentication
          • Verify UNIX permissions for NFS Kerberos configurations on SVMs
          • Create NFS Kerberos realm configurations on SVMs
          • Configure NFS Kerberos permitted encryption types for SVMs
          • Enable NFS Kerberos on LIFs
      • Add storage capacity to an NFS-enabled SVM
        • Learn about adding storage capacity to an NFS-enabled SVM
        • Create an NFS export policy
        • Add a rule to an NFS export policy
        • Create a volume or qtree storage container
          • Create an NFS volume
          • Create an NFS qtree
        • Secure NFS access using export policies
          • Learn about securing NFS access using export policies
          • Manage the processing order of NFS export rules
          • Assign an NFS export policy to a volume
          • Assign an NFS export policy to a qtree
        • Verify NFS client access from the cluster
        • Test NFS access from client systems
      • Where to find additional NFS information
      • How ONTAP exports differ from 7-Mode exports
        • Overview
        • Learn about 7-Mode and NFS export comparisons
        • Learn about NFS export policy examples
    • Manage NFS with the CLI
      • Learn about file access for the NFS protocol
      • Understand NAS file access
        • Namespaces and junction points
          • Learn about NAS namespaces and junction points
          • Learn about NAS namespace architectures
        • How ONTAP controls access to files
          • Learn about NAS file access control
          • Learn about authentication-based restrictions for NAS SVMs
          • Learn about file-based restrictions for NAS SVMs
        • How ONTAP handles NFS client authentication
          • Learn about authentication for NAS clients
          • Learn how ONTAP uses name services
          • Grant SMB file access from NFS clients
          • How the NFS credential cache works
      • Create and manage data volumes in NAS namespaces
        • Create NAS volumes with specified junction points
        • Create NAS volumes without specific junction points
        • Mount or unmount NFS volumes in the NAS namespace
        • Display NAS volume mount and junction point information
      • Configure security styles
        • How security styles affect data access
          • Learn about NAS security styles
          • Learn about security styles on NFS FlexVol volumes
          • Decide which security style to use on NAS SVMs
          • Learn about NFS security style inheritance
          • Learn about NFS UNIX permission preservation
          • Manage UNIX permissions on NFS SVMs using the Windows Security tab
        • Configure security styles on NFS SVM root volumes
        • Configure security styles on NFS FlexVol volumes
        • Configure security styles on NFS qtrees
      • Set up file access using NFS
        • Learn about setting up NFS file access on SVMs
        • Secure NFS access using export policies
          • How export policies control client access to NFS volumes or qtrees
          • Default export policies for NFS SVMs
          • How NFS export rules work
          • Manage SVM access for NFS clients with unlisted security types
          • How security types determine NFS client access levels
          • Learn about managing NFS superuser access requests
          • Learn about NFS export policy caches
          • Learn about NFS access caches
          • Learn about NFS access cache parameters
          • Remove export policies from NFS qtrees
          • Validate NFS qtree IDs for qtree file operations
          • Export policy restrictions and nested junctions for NFS FlexVol volumes
        • Using Kerberos with NFS for strong security
          • NFS support for Kerberos
          • Requirements for configuring Kerberos with NFS
          • Specify the user ID domain for NFSv4
        • Configure name services
          • Learn about NFS name service switch configuration
          • Use LDAP
            • Learn about LDAP for NFS SVMs
            • Learn about LDAP signing and sealing for NFS SVMs
            • Learn about LDAPS for NFS SVMs
            • Enable LDAP RFC2307bis support for NFS SVMs
            • NFS configuration options for LDAP directory searches
            • Improve performance of LDAP directory netgroup-by-host searches for NFS SVMs
            • Use LDAP fast bind for nsswitch authentication for NFS SVMs
            • Display LDAP statistics for NFS SVMs
        • Configure name mappings
          • Learn about name mapping configuration for NAS SVMs
          • Learn about name mappings for NAS SVMs
          • Multidomain searches for UNIX to Windows user name mappings on NAS SVMs
          • Name mapping conversion rules for NAS SVMs
          • Create name mappings for NAS SVMs
          • Configure the default user for NAS SVMs
          • Commands for managing NFS name mappings
        • Enable access for Windows NFS clients for SVMs
        • Enable the display of exports on NFS clients for SVMs
      • Manage file access using NFS
        • Enable or disable NFSv3 for SVMs
        • Enable or disable NFSv4.0 for SVMs
        • Enable or disable NFSv4.1 for SVMs
        • Manage NFSv4 storepool limits
        • Enable or disable pNFS for SVMs
        • Control NFS access over TCP and UDP for SVMs
        • Control NFS requests from nonreserved ports for SVMs
        • Handle NFS access to NTFS volumes or qtrees for unknown UNIX users
        • Considerations for clients that mount NFS exports on nonreserved ports
        • Perform stricter access checking for netgroups by verifying domains for NFS SVMs
        • Modify ports used for NFSv3 services for SVMs
        • Commands for managing NFS servers
        • Troubleshoot name service issues for NAS SVMs
        • Verify name service connections for NAS SVMs
        • Commands for managing NAS name service switch entries
        • Commands for managing NAS name service cache
        • Commands for managing name mappings
        • Commands for managing NAS local UNIX users
        • Commands for managing NAS local UNIX groups
        • Limits for local UNIX users, groups, and group members for NFS SVMs
        • Manage limits for local UNIX users and groups for NFS SVMs
        • Commands for managing NFS local netgroups
        • Commands for managing NFS NIS domain configurations
        • Commands for managing NFS LDAP client configurations
        • Commands for managing NFS LDAP configurations
        • Commands for managing NFS LDAP client schema templates
        • Commands for managing NFS Kerberos interface configurations
        • Commands for managing NFS Kerberos realm configurations
        • Commands for managing export policies
        • Commands for managing export rules
        • Configure the NFS credential cache
          • Reasons for modifying the NFS credential cache time-to-live for SVMs
          • Configure the time-to-live for cached NFS user credentials for SVMs
        • Manage export policy caches
          • Flush export policy caches for NAS SVMs
          • Display the export policy netgroup queue and cache for NFS SVMs
          • Check whether a client IP address is a member of an NFS netgroup
          • Optimize access cache performance for NFS SVMs
        • Manage file locks
          • Learn about file locking between protocols for NFS SVMs
          • Learn about read-only bits for NFS SVMs
          • Learn how NFS and Windows differ on handling locks on share path components
          • Display information about locks for NFS SVMs
          • Breaking file locks for NFS SVMs
        • Learn how FPolicy first-read and first-write filters work with NFS
        • Modify the NFSv4.1 server implementation ID for SVMs
        • Manage NFSv4 ACLs
          • Learn about the benefits of enabling NFSv4 ACLs for SVMs
          • Learn about NFSv4 ACLs for SVMs
          • Enable or disable NFSv4 ACL modification for SVMs
          • Learn how ONTAP uses NFSv4 ACLs to determine whether it can delete files
          • Enable or disable NFSv4 ACLs for SVMs
          • Modify the maximum ACE limit for NFSv4 ACLs for SVMs
        • Manage NFSv4 file delegations
          • Enable or disable NFSv4 read file delegations for SVMs
          • Enable or disable NFSv4 write file delegations for SVMs
        • Configure NFSv4 file and record locking
          • Learn about NFSv4 file and record locking for SVMs
          • Specify the NFSv4 locking lease period for SVMs
          • Specify the NFSv4 locking grace period for SVMs
        • Learn about NFSv4 referrals for SVMs
        • Enable or disable NFSv4 referrals for SVMs
        • Display statistics for NFS SVMs
        • Display DNS statistics for NFS SVMs
        • Display NIS statistics for NFS SVMs
        • Learn about support for VMware vStorage over NFS
        • Enable or disable VMware vStorage over NFS
        • Enable or disable rquota support on NFS SVMs
        • Learn about NFSv3 and NFSv4 performance improvements and TCP transfer size for SVMs
        • Modify the NFSv3 and NFSv4 TCP maximum transfer size for SVMs
        • Configure the number of group IDs allowed for NFS users for SVMs
        • Control root user access to NTFS security-style data for SVMs
      • Supported NFS versions and clients
        • Learn about supported NFS versions and clients
        • Learn about support for NFSv4.0 functionality
        • Learn about support limitations for NFSv4
        • Learn about support for NFSv4.1
        • Learn about support for NFSv4.2
        • Learn about support for parallel NFS
        • Learn about NFS hard mounts
      • NFS and SMB file and directory naming dependencies
        • Learn about NFS and SMB file and directory naming dependencies
        • Learn about valid characters in different operating systems for NFS SVMs
        • Learn about case-sensitivity of file and directory names in an NFS multiprotocol environment
        • Learn about creating NFS file and directory names
        • Learn about NFS handling of multi-byte file, directory, and qtree names
        • Configure character mapping for SMB file name translation on NFS volumes
        • NFS commands for managing character mappings for SMB file name translation
    • Manage NFS trunking
      • Learn about ONTAP NFS trunking
      • Configure a new NFS server and exports for trunking
        • Create a trunking-enabled NFS server on an ONTAP SVM
        • Prepare your network for ONTAP NFS trunking
        • Create an ONTAP volume export policy
        • Mount ONTAP volumes or data shares for NFS trunking
      • Adapt existing NFS exports for trunking
        • Adapt single-path exports for ONTAP NFS trunking
        • Enable trunking on an ONTAP NFS server
        • Update your network for ONTAP NFS trunking
        • Modify ONTAP volume export policies
        • Remount ONTAP volumes or data shares for NFS trunking
    • Manage NFS over RDMA
      • Overview
      • Configure NICs and NFS
      • Configure LIFs
      • Modify the NFS settings
    • Configure SMB with the CLI
      • Learn about SMB configuration with the ONTAP CLI
      • SMB configuration workflow
      • Preparation
        • Assess SMB physical storage requirements
        • Assess SMB networking requirements
        • Learn about SMB storage capacity provisioning
        • SMB configuration worksheet
      • Configure SMB access to an SVM
        • Learn about configuring SMB access to SVMs
        • Create SVMs to provide SMB data access
        • Verify that the SMB protocol is enabled on the SVM
        • Open the SMB export policy of the SVM root volume
        • Create SMB LIFs
        • Enable DNS for SMB host-name resolution
        • Set up an SMB server in an Active Directory domain
          • Configure time services for SMB servers
          • Commands for managing symmetric authentication on NTP servers
          • Create SMB servers in an Active Directory domain
          • Create keytab files for SMB authentication
        • Set up an SMB server in a workgroup
          • Learn about SMB server configuration in workgroups
          • Create SMB servers on the SVM with specified workgroups
          • Create local SMB user accounts
          • Create local SMB groups
          • Manage local SMB group membership
        • Verify enabled SMB versions
        • Map SMB servers on the DNS server
      • Configure SMB client access to shared storage
        • Overview
        • Create a volume or qtree storage container
          • Create SMB volumes
          • Create SMB qtrees
        • Requirements and considerations when creating SMB shares
        • Create SMB shares
        • Verify SMB client access
        • Create SMB share access control lists
        • Configure NTFS file permissions in SMB shares
        • Verify SMB user share access
    • Manage SMB with the CLI
      • Learn about SMB
      • SMB server support
        • Learn about ONTAP SMB server support
        • Supported SMB versions and functionality
        • Unsupported Windows features in ONTAP SMB
        • Configure NIS or LDAP name services on ONTAP SMB SVMs
        • Learn about ONTAP SMB name service switch configuration
      • Manage SMB servers
        • Modify ONTAP SMB servers
        • Use options to customize SMB servers
          • Available ONTAP SMB server options
          • Configure ONTAP SMB server options
          • Configure the grant UNIX group permission to ONTAP SMB users
          • Configure ONTAP SMB access restrictions for anonymous users
          • Manage how file security is presented to SMB clients for UNIX security-style data
            • Overview
            • Configure the presentation of NTFS ACLs to ONTAP SMB clients for UNIX security-style data
            • Learn about preserving UNIX permissions for SMB FlexVol volumes
            • Manage UNIX permissions using the Windows Security tab for SMB SVMs
        • Manage SMB server security settings
          • Learn about handling ONTAP SMB client authentication
          • Learn about SMB server security settings for ONTAP SVM disaster recovery configuration
          • Display information about ONTAP SMB server security settings
          • Configure ONTAP password complexity for local SMB users
          • Modify the ONTAP SMB server Kerberos security settings
          • Set the ONTAP SMB server minimum authentication security level
          • Configure strong ONTAP SMB security for Kerberos-based communication using AES encryption
          • Configure AES encryption for ONTAP SMB Kerberos-based communication
          • Use SMB signing to enhance network security
            • Learn about using ONTAP SMB signing to enhance network security
            • Learn how signing policies affect communication with ONTAP SMB servers
            • Learn about the performance impact of ONTAP SMB signing
            • ONTAP SMB signing configuration recommendations
            • Learn about ONTAP SMB signing configuration for multiple data LIFS
            • Configure ONTAP signing for incoming SMB traffic
            • Determine whether ONTAP SMB sessions are signed
            • Monitor ONTAP SMB signed session statistics
          • Configure required SMB encryption on SMB servers for data transfers over SMB
            • Learn about ONTAP SMB encryption
            • Learn about the performance impact of ONTAP SMB encryption
            • Configure ONTAP SMB encryption for incoming traffic
            • Determine whether clients are connected using encrypted ONTAP SMB sessions
            • Monitor ONTAP SMB encryption statistics
          • Secure LDAP session communication
            • Learn about ONTAP SMB LDAP signing and sealing
            • Enable LDAP signing and sealing on ONTAP SMB servers
            • Configure LDAP over TLS
              • Export self-signed root CA certificates for ONTAP SMB SVMs
              • Install self-signed root CA certificates on the ONTAP SMB SVM
              • Enable LDAP over TLS on the ONTAP SMB server
        • Configure ONTAP SMB Multichannel for performance and redundancy
        • Configure default Windows user to UNIX user mappings on the SMB server
          • Configure the default ONTAP SMB UNIX user
          • Configure the guest ONTAP SMB UNIX user
          • Map administrator groups to the ONTAP SMB root
        • Display information about what types of users are connected over ONTAP SMB sessions
        • ONTAP command options to limit excessive Windows client resource consumption
        • Improve client performance with traditional and lease oplocks
          • Learn about improving ONTAP SMB client performance with traditional and lease oplocks
          • Learn about writing ONTAP SMB cache data-loss considerations when using oplocks
          • Configure oplocks when creating ONTAP SMB shares
          • ONTAP commands for enabling or disabling oplocks on SMB volumes and qtrees
          • Configure oplocks on existing ONTAP SMB shares
          • Monitor ONTAP SMB oplock status
        • Apply Group Policy Objects to SMB servers
          • Learn about applying Group Policy Objects to ONTAP SMB servers
          • Learn about supported ONTAP SMB GPOs
          • ONTAP SMB server requirements for GPOs
          • Enable or disable GPO support on ONTAP SMB servers
          • How GPOs are updated on the SMB server
            • Learn about updating GPOs on ONTAP SMB servers
            • What to do if GPO updates are failing
          • Manually update GPO settings on ONTAP SMB servers
          • Display information about ONTAP SMB GPO configurations
          • Display information about ONTAP SMB restricted group GPOs
          • Display information about ONTAP SMB central access policies
          • Display information about ONTAP SMB central access policy rules
        • Learn about the ONTAP commands for managing SMB server computer account passwords
        • Manage domain controller connections
          • Display information about ONTAP SMB discovered servers
          • Reset and rediscover ONTAP SMB servers
          • Manage ONTAP SMB domain controller discovery
          • Add preferred ONTAP SMB domain controllers
          • ONTAP commands for managing preferred SMB domain controllers
          • Enable encrypted connections to ONTAP SMB domain controllers
        • Use null sessions to access storage in non-Kerberos environments
          • Use ONTAP SMB null sessions to access storage in non-Kerberos environments
          • Learn how ONTAP SMB storage systems provide null session access
          • Grant null users access to ONTAP SMB file system shares
        • Manage NetBIOS aliases for SMB servers
          • Learn about managing NetBIOS aliases for ONTAP SMB servers
          • Add NetBIOS alias lists to ONTAP SMB servers
          • Remove NetBIOS aliases from the list for ONTAP SMB servers
          • Display the NetBIOS aliases list for ONTAP SMB servers
          • Determine whether ONTAP SMB clients are connected using NetBIOS aliases
        • Manage miscellaneous SMB server tasks
          • Stop or start ONTAP SMB servers
          • Move ONTAP SMB servers to different OUs
          • Modify the dynamic DNS domain before moving SMB servers
          • Join SMB SVMs to Active Directory domains
          • Display information about SMB NetBIOS over TCP connections
          • Commands for managing SMB servers
          • Enable the SMB NetBios name service
        • Use IPv6 for SMB access and SMB services
          • Learn about the SMB requirements for IPv6
          • Learn about support for IPv6 with SMB access and CIFS services
          • Learn how SMB servers use IPv6 to connect to external servers
          • Enable IPv6 for SMB servers
          • Learn about disabling IPv6 for SMB servers
          • Monitor and display information about IPv6 SMB sessions
      • Set up file access using SMB
        • Configure security styles
          • How security styles affect data access
            • Learn about SMB security styles and their effects
            • Learn about where and when to set SMB security styles
            • Decide which SMB security styles to use on SVMs
            • Learn about SMB security style inheritance
            • Learn about preserving UNIX permissions for SMB FlexVol volumes
            • Manage UNIX permissions using the Windows Security tab for SMB SVMs
          • Configure SMB security styles on SVM root volumes
          • Configure SMB security styles on FlexVol volumes
          • Configure SMB security styles on qtrees
        • Create and manage data volumes in NAS namespaces
          • Learn about creating and managing SMB data volumes in NAS namespaces
          • Create SMB data volumes with specified junction points
          • Create SMB data volumes without specifying junction points
          • Mount or unmount existing SMB volumes in the NAS namespace
          • Display SMB volume mount and junction point information
        • Configure name mappings
          • Learn about SMB name mappings configuration
          • Learn about SMB name mapping
          • Learn about SMB multidomain searches for UNIX user to Windows user name mappings
          • Learn about SMB name mapping conversion rules
          • Create SMB name mapping
          • Configure the default SMB user
          • Commands for managing SMB name mappings
        • Configure multidomain name-mapping searches
          • Enable or disable SMB multidomain name mapping searches
          • Reset and rediscover trusted SMB domains
          • Display information about discovered trusted SMB domains
          • Add, remove, or replace trusted SMB domains in preferred lists
          • Display information about the preferred trusted SMB domain list
        • Create and configure SMB shares
          • Learn about creating and configuring SMB shares
          • Learn about the default administrative SMB shares
          • Learn about SMB share naming requirements
          • Learn about SMB directory case-sensitivity requirements when creating shares in a multiprotocol environment
          • Use SMB share properties
            • Learn about using SMB share properties
            • Add or remove share properties on existing SMB shares
          • Optimize SMB user access with the force-group share setting
          • Create SMB shares with the force-group share setting
          • View information about SMB shares using the MMC
          • Commands for managing SMB shares
        • Secure file access by using SMB share ACLs
          • Learn about managing SMB share-level ACLs
          • Create SMB share access control lists
          • Commands for managing SMB share access control lists
        • Secure file access by using file permissions
          • Configure advanced NTFS file permissions using the Windows Security tab
          • Configure NTFS file permissions using the ONTAP CLI
          • How UNIX file permissions provide access control when accessing files over SMB
        • Secure file access by using Dynamic Access Control (DAC)
          • Overview
          • Supported Dynamic Access Control functionality
          • Considerations when using Dynamic Access Control and central access policies with CIFS servers
          • Enable or disable Dynamic Access Control
          • Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled
          • Configure central access policies to secure data on CIFS servers
          • Display information about Dynamic Access Control security
          • Revert considerations for Dynamic Access Control
        • Secure SMB access using export policies
          • How export policies are used with SMB access
          • How export rules work
          • Examples of export policy rules that restrict or allow access over SMB
          • Enable or disable export policies for SMB access
        • Secure file access by using Storage-Level Access Guard
          • Overview
          • Use cases for using Storage-Level Access Guard
          • Workflow to configure Storage-Level Access Guard
          • Configure Storage-Level Access Guard
          • Effective SLAG matrix
          • Display information about Storage-Level Access Guard
          • Remove Storage-Level Access Guard
      • Manage file access using SMB
        • Use local users and groups for authentication and authorization
          • How ONTAP uses local users and groups
            • Local users and groups concepts
            • Reasons for creating local users and local groups
            • How local user authentication works
            • How user access tokens are constructed
            • Guidelines for using SnapMirror on SVMs that contain local groups
            • What happens to local users and groups when deleting CIFS servers
            • How you can use Microsoft Management Console with local users and groups
            • Guidelines for reverting
          • What local privileges are
            • List of supported privileges
            • Assign privileges
          • Guidelines for using BUILTIN groups and the local administrator account
          • Requirements for local user passwords
          • Predefined BUILTIN groups and default privileges
          • Enable or disable local users and groups functionality
            • Overview
            • Enable or disable local users and groups
            • Enable or disable local user authentication
          • Manage local user accounts
            • Modify local user accounts
            • Enable or disable local user accounts
            • Change local user account passwords
            • Display information about local users
            • Display information about group memberships for local users
            • Delete local user accounts
          • Manage local groups
            • Modify local groups
            • Display information about local groups
            • Manage local group membership
            • Display information about members of local groups
            • Delete a local group
            • Update domain user and group names in local databases
          • Manage local privileges
            • Add privileges to SMB local or domain users or groups
            • Remove privileges from SMB local or domain users or groups
            • Reset privileges for SMB local or domain users and groups
            • Display information about SMB privilege overrides
        • Configure bypass traverse checking
          • Learn about configuring SMB bypass traverse checking
          • Allow users or groups to bypass SMB directory traverse checking
          • Disallow users or groups from bypassing SMB directory traverse checking
        • Display information about file security and audit policies
          • Learn about viewing SMB file security and audit policies
          • Display information about SMB file security on NTFS security-style volumes
          • Display information about SMB file security on mixed security-style volumes
          • Display information about SMB file security on UNIX security-style volumes
          • Commands to display information about NTFS audit policies on SMB FlexVol volumes
          • Commands to display information about NFSv4 audit policies on SMB FlexVol volumes
          • Learn about the ways to display information about SMB file security and audit policies
        • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
          • Commands for managing SMB NTFS file security, NTFS audit policies, and Storage-Level Access Guard
          • Commands to set SMB file and folder security
          • Learn about the limits when using commands to set SMB file and folder security
          • Use security descriptors to apply SMB file and folder security
          • Learn about applying file-directory policies that use local SMB users or groups on the SVM disaster recovery destination
          • Configure and apply file security on NTFS files and folders using the CLI
            • Create NTFS security descriptors on SMB servers
            • Add NTFS DACL access control entries to NTFS security descriptors on SMB servers
            • Create SMB security policies
            • Add a task to the security policy
            • Apply security policies
            • Monitor SMB security policy jobs
            • Verify SMB file security
          • Configure and apply audit policies to NTFS files and folders using the CLI
            • Commands to configure and apply SMB audit policies to NTFS files and folders
            • Create NTFS security descriptors on SMB servers
            • Add NTFS SACL access control entries to NTFS security descriptors on SMB servers
            • Create SMB security policies
            • Add tasks to the SMB security policy
            • Apply SMB security policies
            • Monitor SMB security policy jobs
            • Verify SMB audit policies
          • Learn about managing SMB security policy jobs
          • Commands for managing NTFS security descriptors on SMB servers
          • Commands for managing NTFS DACL access control entries on SMB servers
          • Commands for managing NTFS SACL access control entries on SMB servers
          • Commands for managing SMB security policies
          • Commands for managing SMB security policy tasks
          • Commands for managing SMB security policy jobs
        • Configure the metadata cache for SMB shares
          • Learn about SMB metadata caching
          • Enable the SMB metadata cache
          • Configure the lifetime of SMB metadata cache entries
        • Manage file locks
          • Learn about SMB file locking between protocols
          • Learn about SMB read-only bits
          • How ONTAP differs from Windows in handling locks on share path components
          • Display information about SMB locks
          • Break SMB locks
        • Monitor SMB activity
          • Display SMB session information
          • Display information about open SMB files
          • Determine which statistics objects and counters are available on SMB servers
          • Display SMB statistics
      • Deploy SMB client-based services
        • Use offline files to allow caching of files for offline use
          • Learn about using offline files to allow caching of SMB files for offline use
          • Learn about requirements for using offline SMB files
          • Guidelines for deploying offline SMB files
          • Commands to configure offline SMB file support
          • Configure offline files support on SMB shares by using the Computer Management MMC
        • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
          • Learn about using roaming profiles to store SMB user profiles centrally
          • Learn about requirements for using roaming SMB profiles
          • Configure roaming SMB profiles through the Active Directory Users and Computers MMC
        • Use folder redirection to store data on a SMB server
          • Learn about using folder redirection to store data on SMB servers
          • Learn about requirements for using SMB folder redirection
          • Configure SMB folder redirection using Windows Properties
        • Learn about accessing the ~snapshot directory from Windows clients using SMB 2.x
        • Recover files and folders using Previous Versions
          • Learn about recovering SMB files and folders using previous versions
          • SMB requirements for using Microsoft Previous Versions
          • View and manage SMB snapshot data with the Windows Previous Versions tab
          • Determine whether SMB snapshots are available for Previous Versions use
          • Create SMB snapshot configurations to enable Previous Versions access
          • Learn about restoring Previous Versions directories that contain SMB junctions
      • Deploy SMB server-based services
        • Manage home directories
          • Learn about enabling dynamic home directories on SMB servers
          • Home directory shares
            • Add SMB home directory shares
            • Learn about unique SMB user name requirements for home directory shares
            • Learn about what happens to static SMB home directory share names after upgrading
          • Add SMB home directory search paths
          • Create SMB home directory configurations using the %w and %d variables
          • Configure SMB home directories using the %u variable
          • Learn about additional SMB home directory configurations
          • Commands for managing SMB search paths
          • Display information about SMB user home directory paths
          • Manage accessibility to SMB user home directories
        • Configure SMB client access to UNIX symbolic links
          • Learn about providing SMB client access to UNIX symbolic links
          • Limits when configuring UNIX symbolic links for SMB access
          • Control automatic DFS advertisements on SMB servers
          • Configure UNIX symbolic link support on SMB shares
          • Create symbolic link mappings for SMB shares
          • Commands for managing SMB symbolic link mappings
          • Windows backup applications and Unix-style symlinks on SMB servers
        • Use BranchCache to cache SMB share content at a branch office
          • Learn about using BranchCache to cache SMB share content at a branch office
          • Requirements and guidelines
            • Learn about SMB BranchCache version support
            • Learn about SMB network protocol support requirements
            • Learn about SMB and Windows hosts version requirements
            • Learn about the reasons SMB invalidates BranchCache hashes
            • Learn about choosing the SMB hash store location
            • Learn about SMB BranchCache recommendations
          • Configure BranchCache
            • Learn about SMB BranchCache configuration
            • Requirements for configuring SMB BranchCache
            • Configure BranchCache on SMB servers
            • Learn about configuring BranchCache at the remote office in SMB
          • Configure BranchCache-enabled SMB shares
            • Learn about configuring BranchCache-enabled SMB shares
            • Create BranchCache-enabled SMB shares
            • Enable BranchCache on existing SMB shares
          • Manage and monitor the BranchCache configuration
            • Modify BranchCache configurations on SMB shares
            • Display information about BranchCache configurations on SMB shares
            • Change the SMB BranchCache server key
            • Pre-compute BranchCache hashes on specified SMB paths
            • Flush hashes from the SMB SVM BranchCache hash store
            • Display SMB BranchCache statistics
            • Learn about SMB support for BranchCache Group Policy Objects
            • Display information about SMB BranchCache Group Policy Objects
          • Disable BranchCache on SMB shares
            • Learn about disabling BranchCache on SMB shares
            • Disable BranchCache on a single SMB share
            • Stop automatic caching on all SMB shares
          • Disable or enable BranchCache on the SVM
            • Learn what happens when you disable or reenable BranchCache on SMB servers
            • Disable or enable BranchCache on SMB shares
          • Delete the BranchCache configuration on SVMs
            • Learn what happens when you delete the BranchCache configuration on SMB shares
            • Delete the BranchCache configuration on SMB shares
          • Learn what happens to SMB BranchCache when reverting
        • Improve Microsoft remote copy performance
          • Learn about Microsoft remote copy performance improvements on SMB servers
          • Learn about ODX on SMB servers
          • Requirements for using ODX on SMB servers
          • Guidelines for using ODX on SMB servers
          • Use cases for ODX on SMB servers
          • Enable or disable ODX on SMB servers
        • Improve client response time by providing SMB automatic node referrals with Auto Location
          • Learn about improving client response time by providing SMB automatic node referrals with Auto Location
          • Requirements and guidelines for using automatic node referrals on SMB servers
          • Support for SMB automatic node referrals
          • Enable or disable SMB automatic node referrals
          • Use statistics to monitor SMB automatic node referral activity
          • Monitor client-side SMB automatic node referral information using a Windows client
        • Provide folder security on shares with access-based enumeration
          • Provide SMB folder security on shares with access-based enumeration
          • Enable or disable access-based enumeration on SMB shares
          • Enable or disable access-based enumeration from a Windows client on SMB shares
      • NFS and SMB file and directory naming dependencies
        • Learn about NFS and SMB file and directory naming dependencies
        • Learn about valid characters for SMB file or directory names
        • Case-sensitivity of SMB file and directory names in a multiprotocol environment
        • Learn about creating SMB file and directory names
        • Learn about SMB multi-byte file, directory, and qtree names
        • Configure character mapping for SMB file name translation on volumes
        • Commands for managing character mappings for SMB file name translation
    • Provide S3 client access to NAS data
      • Overview
      • NAS data requirements
      • Enable S3 multi-protocol access
      • Create S3 NAS bucket
      • Enable S3 client users
    • SMB configuration for Microsoft Hyper-V and SQL Server
      • Overview
      • Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions
      • Nondisruptive operations for Hyper-V and SQL Server over SMB
        • What are nondisruptive operations?
        • Protocols that enable nondisruptive operations over SMB
        • Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB
        • How SMB 3.0 functionality supports nondisruptive operations over SMB shares
        • What the Witness protocol does to enhance transparent failover
        • How the Witness protocol works
      • Share-based backups with Remote VSS
        • Overview
        • Remote VSS concepts
        • Example of a directory structure used by Remote VSS
        • How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB
      • How ODX copy offload is used with Hyper-V and SQL Server over SMB shares
      • Configuration requirements and considerations
        • ONTAP and licensing requirements
        • Network and data LIF requirements
        • SMB server and volume requirements for Hyper-V over SMB
        • SMB server and volume requirements for SQL Server over SMB
        • Continuously available share requirements and considerations for Hyper-V over SMB
        • Continuously available share requirements and considerations for SQL Server over SMB
        • Remote VSS considerations for Hyper-V over SMB configurations
        • ODX copy offload requirements for SQL Server and Hyper-V over SMB
      • Recommendations for SQL Server and Hyper-V over SMB configurations
      • Plan the Hyper-V or SQL Server over SMB configuration
        • Complete the volume configuration worksheet
        • Complete the SMB share configuration worksheet
      • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
        • Overview
        • Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares)
        • Verify that domain accounts map to the default UNIX user
        • Verify that the security style of the SVM root volume is set to NTFS
        • Verify that required CIFS server options are configured
        • Configure SMB Multichannel for performance and redundancy
        • Create NTFS data volumes
        • Create continuously available SMB shares
        • Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares)
        • Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares)
      • Manage Hyper-V and SQL Server over SMB configurations
        • Configure existing shares for continuous availability
        • Enable or disable VSS shadow copies for Hyper-V over SMB backups
      • Use statistics to monitor Hyper-V and SQL Server over SMB activity
        • Determine which statistics objects and counters are available
        • Display SMB statistics
      • Verify that the configuration is capable of nondisruptive operations
        • Use health monitoring to determine whether nondisruptive operation status is healthy
        • Display nondisruptive operation status by using system health monitoring
        • Verify the continuously available SMB share configuration
        • Verify LIF status
        • Determine whether SMB sessions are continuously available
          • Display SMB session information
          • Display information about open SMB files
  • SAN storage management
    • SAN concepts
      • SAN provisioning with iSCSI
      • iSCSI service management
        • Overview
        • How iSCSI authentication works
        • iSCSI initiator security management
        • iSCSI endpoint isolation
        • What CHAP authentication is
        • How using iSCSI interface access lists to limit initiator interfaces can increase performance and security
        • iSNS server registration requirement
      • SAN provisioning with FC
      • SAN provisioning with NVMe
      • SAN volumes
        • Overview
        • Configure volume provisioning options
        • SAN volume configuration options
        • Requirement for moving volumes in SAN environments
        • Considerations for setting fractional reserve
      • SAN host-side space management
      • igroups
      • Specify initiator WWPNs and iSCSI node names for an igroup
      • Storage virtualization with VMware and Microsoft copy offload
        • Overview
        • How LUN access works in a virtualized environment
        • Considerations for LIFs in cluster SAN environments
        • Improve VMware VAAI performance for ESX hosts
        • Microsoft Offloaded Data Transfer (ODX)
    • SAN administration
      • SAN provisioning
        • Overview
        • Learn about ASA configurations
        • Configure switches for FCoE
        • System requirements
        • What to know before you create a LUN
        • Verify or add the FC or iSCSI license
        • Provision SAN storage
      • NVMe provisioning
        • Overview
        • License requirements
        • NVMe support and limitations
        • Configure an SVM for NVMe
        • Provision NVMe storage
        • Map an NVMe namespace to a subsystem
      • Manage LUNs
        • Edit LUN QoS Policy
        • Convert a LUN into a namespace
        • Take a LUN offline
        • Resize a LUN
        • Move a LUN
        • Delete a LUN
        • What to know before copying LUNs
        • Examine configured and used space of a LUN
        • Control and monitor I/O performance to LUNs using Storage QoS
        • Tools available to effectively monitor your LUNs
        • Capabilities and restrictions of transitioned LUNs
        • I/O misalignments on properly aligned LUNs
        • Ways to address issues when LUNs go offline
        • Troubleshoot iSCSI LUNs not visible on the host
      • Manage igroups and portsets
        • Ways to limit LUN access with portsets and igroups
        • Manage igroups and initiators
        • Create nested igroup
        • Map igroup to multiple LUNs
        • Create a portset and bind to an igroup
        • Manage portsets
        • Selective LUN Map
      • Manage iSCSI protocol
        • Configure your network for best performance
        • Configure an SVM for iSCSI
        • Define a security policy method for an initiator
        • Delete an iSCSI service for an SVM
        • Get more details in iSCSI session error recoveries
        • Register the SVM with an iSNS server
        • Resolve iSCSI error messages on the storage system
        • iSCSI LIF failover for ASA platforms
      • Manage FC protocol
        • Configure an SVM for FC
        • Delete an FC service for an SVM
        • Recommended MTU configurations for FCoE jumbo frames
      • Manage NVMe protocol
        • Start the NVMe/FC service for an SVM
        • Delete NVMe/FC service from an SVM
        • Resize a NVMe namespace
        • Convert a namespace into a LUN
        • Set up in-band authentication over NVMe
        • Disable in-band authentication over NVMe
        • Set up TLS secure channel for NVMe/TCP
        • Disable TLS secure channel for NVMe/TCP
        • Change NVMe host priority
        • Manage automated host discovery for NVMe/TCP
        • Disable NVMe VMID
      • Manage systems with FC adapters
        • Overview
        • Commands for managing FC adapters
        • Configure FC adapters
        • View adapter settings
        • Change the UTA2 port from CNA mode to FC mode
        • Change the CNA/UTA2 target adapter optical modules
        • Supported port configurations for X1143A-R6 adapters
        • Configure X1143A-R6 adapter ports
        • Prevent loss of connectivity when using the X1133A-R6 adapter
      • Manage LIFs for all SAN protocols
        • Overview
        • Configure an NVMe LIF
        • What to know before moving a SAN LIF
        • Remove a SAN LIF from a port set
        • Move a SAN LIF
        • Delete a LIF in a SAN environment
        • SAN LIF requirements for adding nodes to a cluster
        • Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation
      • Enable space allocation for SAN protocols
      • Recommended volume and file or LUN configuration combinations
        • Overview
        • Determine the correct volume and LUN configuration combination for your environment
        • Calculate rate of data growth for LUNs
        • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
        • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
        • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
    • SAN data protection
      • Learn about data protection methods for SAN environments
      • Restore a single LUN from a snapshot
      • Restore all LUNs in a volume from a snapshot
      • Protect your data with ONTAP FlexClone LUNs
      • Configure and use SnapVault backups in a SAN environment
        • Learn about SnapVault backups in a SAN environment
        • Access a read-only LUN from a SnapVault backup
        • Restore a single LUN from a SnapVault backup
        • Restore all LUNs in a volume from a SnapVault backup
      • Recommended configuration to connect a host backup system
      • Use a host backup system to protect a LUN
    • SAN configuration reference
      • Learn about SAN configuration
      • iSCSI configurations
        • Configure iSCSI networks
        • Benefits of using VLANs in iSCSI configurations
      • FC configurations
        • Configure FC & FC-NVMe fabrics
        • FC switch configuration best practices
        • Recommended FC target port configuration and speeds
        • Configure FC adapters ports
        • Commands for managing FC adapters
        • Avoid connectivity loss when using the X1133A-R6 adapter
      • FCoE configurations
        • Configure FCoE fabrics
        • Supported FCoE initiator and target port combinations
      • FC and FCoE zoning
        • Learn about FC and FCoE zoning
        • Recommended FC and FCoE zoning configurations
      • Requirements for SAN hosts connected to ONTAP and non-NetApp systems
      • SAN configurations in a MetroCluster environment
        • Supported SAN configurations in a MetroCluster environment
        • Avoid port overlap during MetroCluster switchover and switchback
      • Support for SAN host multipathing
      • Configuration limits
        • Determine the maximum supported nodes and SAN hosts per cluster
        • ASA Array configuration limits and support
        • FC switch configuration limits
        • Maximum supported FC and FCoE hop counts
        • Calculate queue depth for FC hosts
        • Modify queue depths
  • S3 object storage management
    • Learn about S3 support in ONTAP 9
      • Overview
      • Architecture
      • Use cases
    • Plan
      • ONTAP version support for S3 object storage
      • ONTAP S3 supported actions
      • ONTAP S3 interoperability
      • ONTAP S3 validated third-party solutions
    • Configure
      • About the S3 configuration process
        • Workflow
        • Assess physical storage requirements
        • Assess networking requirements
        • Decide where to provision new S3 storage capacity
      • Configure S3 access to an SVM
        • Create an SVM for S3
        • Create and install a CA certificate on the SVM
        • Create an S3 service data policy
        • Create data LIFs
        • Create intercluster LIFs for remote FabricPool tiering
        • Create the S3 object store server
      • Add storage capacity to an S3-enabled SVM
        • Create a bucket
        • Manage bucket size
        • Create a bucket on a mirrored or unmirrored aggregate in a MetroCluster configuration
        • Create a bucket lifecycle rule
        • Create an S3 user
        • Create or modify S3 groups
        • Regenerate keys and modify their retention period
      • Create or modify access policy statements
        • About bucket and object store server policies
        • Modify a bucket policy
        • Create or modify an object store server policy
        • Configure S3 access for external directory services
        • Enable LDAP or domain users to generate S3 access keys
      • Enable client access to S3 object storage
        • Enable ONTAP S3 access for remote FabricPool tiering
        • Enable ONTAP S3 access for local FabricPool tiering
        • Enable client access from an S3 app
      • Storage service definitions
      • CORS integration with ONTAP
    • Protect buckets with SnapMirror S3
      • Learn about SnapMirror S3
      • Mirror and backup protection on a remote cluster
        • Create mirror for new bucket
        • Create mirror for existing bucket
        • Takeover from destination
        • Restore from destination
      • Mirror and backup protection on the local cluster
        • Create mirror for new bucket
        • Create mirror for existing bucket
        • Takeover from destination
        • Restore from destination
      • Backup protection with cloud targets
        • Requirements for cloud targets
        • Create backup for new bucket
        • Create backup for existing bucket
        • Restore from cloud target
      • Modify mirror policy
    • Protect S3 data with snapshots
      • Learn about S3 snapshots
      • Create S3 snapshots
      • View and restore S3 snapshots
      • Delete S3 snapshots
    • Audit S3 events
      • Learn about auditing S3 events
      • Plan a configuration
      • Create and enable a configuration
      • Select buckets for auditing
      • Modify a configuration
      • Show configurations
  • Authentication and access control
    • Authentication and access control
    • Manage administrator authentication and RBAC
      • Learn about administrator authentication and RBAC
      • Workflow
      • Configuration worksheets
      • Create login accounts
        • Learn about creating login accounts
        • Enable local account access
          • Learn about enabling local account access
          • Enable password account access
          • Enable SSH public key accounts
          • Enable multifactor authentication (MFA) accounts
            • Learn about multifactor authentication
            • Enable MFA with SSH and TOTP
            • Configure local user account for MFA with TOTP
            • Reset TOTP secret key
            • Disable TOTP secret key
          • Enable SSL certificate accounts
        • Enable Active Directory account access
        • Enable LDAP or NIS account access
      • Manage access-control roles
        • Learn about managing access-control roles
        • Modify the role assigned to an administrator
        • Define custom roles
        • Predefined roles for cluster administrators
        • Predefined roles for SVM administrators
        • Manage administrator access with System Manager
        • Access JIT privilege elevation in ONTAP
        • Configure JIT privilege elevation in ONTAP
      • Manage administrator accounts
        • Learn about managing administrator accounts
        • Associate a public key with an administrator account
        • Manage SSH public keys and X.509 certificates for an administrator account
        • Configure Cisco Duo 2FA for SSH logins
        • Generate and install a CA-signed server certificate
        • Manage certificates with System Manager
        • Configure Active Directory domain controller access
        • Configure LDAP or NIS server access
        • Change an administrator password
        • Lock and unlock an administrator account
        • Manage failed login attempts
        • Enforce SHA-2 on administrator account passwords
        • Diagnose and correct file access issues with System Manager
      • Manage multi-admin verification
        • Learn about multi-admin verification
        • Manage administrator groups
        • Enable and disable multi-admin verification
        • Manage protected operation rules
        • Request execution of protected operations
        • Manage protected operation requests
      • Manage dynamic authorization
        • Learn about dynamic authorization
        • Enable or disable dynamic authorization
        • Customize dynamic authorization
    • Authentication and authorization using OAuth 2.0
      • Overview
      • Concepts
        • Authorization servers and tokens
        • Client authorization
          • Overview and options
          • Self-contained scopes
          • External role mapping
          • How ONTAP determines access
        • Deployment scenarios
        • Client authentication using mTLS
      • Configure and deploy
        • Prepare to deploy OAuth 2.0
        • Deploy OAuth 2.0 in ONTAP
        • Issue a REST API call
    • Authentication and authorization using SAML
    • Working with OAuth 2.0 or SAML IdP groups
    • Authentication and authorization using WebAuthn MFA
      • Learn about WebAuthn multi-factor authentication
      • Enable WebAuthn MFA
      • Disable WebAuthn MFA
      • View WebAuthn MFA settings and manage credentials
    • Manage web services
      • Overview
      • Manage access to web services
      • Manage the web protocol engine
      • Commands for managing the web protocol engine
      • Configure access to web services
      • Commands for managing web services
      • Commands for managing mount points on the nodes
      • Manage SSL
      • Use HSTS for web services
      • Troubleshoot web service access problems
    • Verify the identity of remote servers using certificates
      • Overview
      • Verify digital certificates are valid using OCSP
      • View default certificates for TLS-based applications
    • Mutually authenticate the cluster and a KMIP server
      • Overview
      • Generate a certificate signing request for the cluster
      • Install a CA-signed server certificate for the cluster
      • Install a CA-signed client certificate for the KMIP server
  • Security and data encryption
    • Autonomous Ransomware Protection
      • Overview
      • Use cases and considerations
      • Enable Autonomous Ransomware Protection
      • Enable Autonomous Ransomware Protection by default
      • Enable ARP/AI
      • Update ARP/AI
      • Switch from learning mode to active mode
      • Learn about the entropy evaluation period for SAN volumes
      • Pause protection
      • Manage attack detection parameters
      • Respond to abnormal activity
      • Recover data after an attack
      • Adjust automatic ARP snapshot settings
    • Virus protection with Vscan
      • Learn about antivirus configuration
      • About NetApp antivirus protection
        • Learn about NetApp virus scanning
        • Virus scanning workflow
        • Antivirus architecture
        • Learn about ONTAP Vscan partner solutions
      • Vscan server installation and configuration
        • ONTAP Vscan server installation and configuration
        • Install ONTAP Vscan Antivirus Connectors
        • Configure ONTAP Vscan Antivirus Connector
      • Configure scanner pools
        • Learn about configuring scanner pools
        • Create a scanner pool on a single cluster
        • Create scanner pools in MetroCluster configurations
        • Apply a scanner policy on a single cluster
        • Apply scanner policies in MetroCluster configurations
        • ONTAP commands for managing scanner pools in Vscan
      • Configure on-access scanning
        • Create ONTAP Vscan on-access policies
        • Enable ONTAP Vscan on-access policies
        • Modify ONTAP Vscan file-operations profile for SMB shares
        • ONTAP Vscan commands for managing on-access policies
      • Configure on-demand scanning
        • Learn about configuring on-demand scanning
        • Create on-demand tasks
        • Schedule on-demand tasks
        • Run ONTAP Vscan on-demand tasks immediately
        • ONTAP Vscan commands for managing on-demand tasks
      • Best practices for configuring off-box antivirus functionality
      • Enable virus scanning on SVM ONTAP Vscan
      • Reset status of ONTAP Vscan scanned files
      • View Vscan event log information
      • Monitor and troubleshoot connectivity issues
        • Potential connectivity issues involving the scan-mandatory option
        • ONTAP commands for viewing Vscan server connection status
        • Troubleshoot virus ONTAP Vscan scanning
        • Monitor ONTAP Vscan status and performance activities
    • Audit NAS events on SVMs
      • Overview
      • How auditing works
        • Basic auditing concepts
        • How the ONTAP auditing process works
      • Auditing requirements and considerations
      • Limitations for the size of audit records on staging files
      • What the supported audit event log formats are
      • View audit event logs
      • SMB events that can be audited
        • Overview
        • Determine what the complete path to the audited object is
        • Considerations when auditing symlinks and hard links
        • Considerations when auditing alternate NTFS data streams
      • NFS file and directory access events that can be audited
      • Plan the auditing configuration
      • Create a file and directory auditing configuration on SVMs
        • Create the auditing configuration
        • Enable auditing on the SVM
        • Verify the auditing configuration
      • Configure file and folder audit policies
        • Overview
        • Configure audit policies on NTFS security-style files and directories
        • Configure auditing for UNIX security style files and directories
      • Display information about audit policies applied to files and directories
        • Display information about audit policies using the Windows Security tab
        • Display information about NTFS audit policies on FlexVol volumes using the CLI
        • Ways to display information about file security and audit policies
      • CLI change events that can be audited
        • Overview
        • Manage file-share event
        • Manage audit-policy-change event
        • Manage user-account event
        • Manage security-group event
        • Manage authorization-policy-change event
      • Manage auditing configurations
        • Manually rotate the audit event logs
        • Enable and disable auditing on SVMs
        • Display information about auditing configurations
        • Commands modifying auditing configurations
        • Delete an auditing configuration
        • Understand cluster revert implications
      • Troubleshoot auditing and staging volume space issues
    • Use FPolicy for file monitoring and management on SVMs
      • Understand FPolicy
        • Learn about two part ONTAP FPolicy solutions
        • ONTAP FPolicy synchronous and asynchronous notifications
        • ONTAP FPolicy persistent stores
        • ONTAP FPolicy configuration types
        • Cluster component roles in ONTAP FPolicy implementation
        • How ONTAP FPolicy works with external FPolicy servers
        • Node-to-external ONTAP FPolicy server communication process
        • Learn about ONTAP FPolicy services across SVM namespaces
        • How FPolicy passthrough-read enhances usability for hierarchical storage management
      • Plan the FPolicy configuration
        • Requirements, considerations, and best practices for configuring FPolicy
        • Set up ONTAP FPolicy configurations
        • Plan the FPolicy external engine configuration
          • Plan ONTAP FPolicy external engine configurations
          • Additional information about configuring FPolicy external engines to use SSL authenticated connections
          • Certificates do not replicate in SVM disaster recovery relationships with a non-ID-preserve configuration
          • Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster recovery configurations
          • Complete ONTAP FPolicy external engine configuration worksheets
        • Plan the FPolicy event configuration
          • Overview
          • Supported file operation and filter combinations that FPolicy can monitor for SMB
          • Supported file operation and filter combinations that FPolicy can monitor for NFSv3
          • Supported file operation and filter combinations that FPolicy can monitor for NFSv4
          • Complete ONTAP FPolicy event configuration worksheets
        • Plan the FPolicy policy configuration
          • Learn about ONTAP FPolicy policy configurations
          • Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine
          • Complete ONTAP FPolicy policy worksheets
        • Plan the FPolicy scope configuration
          • Learn about ONTAP FPolicy scope configurations
          • Complete ONTAP FPolicy scope worksheets
      • Create the FPolicy configuration
        • Create ONTAP FPolicy external engines
        • Create ONTAP FPolicy events
        • Create ONTAP FPolicy persistent stores
        • Create ONTAP FPolicy policies
        • Create ONTAP FPolicy scopes
        • Enable ONTAP FPolicy policies
      • Manage FPolicy configurations
        • Modify FPolicy configurations
          • Commands for modifying FPolicy configurations
          • Enable or disable ONTAP FPolicy policies
        • Display information about FPolicy configurations
          • Learn about ONTAP FPolicy show commands
          • Commands for displaying information about FPolicy configurations
          • Display information about FPolicy policy status
          • Display information about enabled ONTAP FPolicy policies
        • Manage FPolicy server connections
          • Connect to external FPolicy servers
          • Disconnect from external FPolicy servers
          • Display information about connections to external ONTAP FPolicy servers
          • Display information about ONTAP FPolicy passthrough-read connection status
    • Verify access using security tracing
      • Learn about ONTAP security traces
      • Types of access checks security traces monitor
      • Considerations when creating security traces
      • Perform security traces
        • Learn to perform ONTAP security traces
        • Create security trace filters
        • Display information about security trace filters
        • Display security trace results
        • Modify security trace filters on ONTAP SVMs
        • Delete security trace filters
        • Delete security trace records
        • Delete all security trace records
      • Interpret ONTAP security trace results
      • Where to find additional information
    • Manage encryption with System Manager
      • Encrypt stored data (software)
      • Encrypt stored data (hardware)
    • Manage encryption with the CLI
      • Overview
      • Configure NetApp volume and aggregate encryption
        • Overview
        • NetApp Volume Encryption workflow
        • Configure NVE
          • Determine whether your cluster version supports NVE
          • Install the license
          • Configure external key management
            • Overview
            • Manage external keys with System Manager
            • Install SSL certificates on the cluster
            • Enable external key management in ONTAP 9.6 and later (NVE)
            • Enable external key management in ONTAP 9.5 and earlier
            • Manage keys with a cloud provider
            • Manage ONTAP keys with Barbican KMS
          • Enable onboard key management in ONTAP 9.6 and later (NVE)
          • Enable onboard key management in ONTAP 9.5 and earlier (NVE)
          • Enable onboard key management in newly added nodes
        • Encrypt volume data with NVE or NAE
          • Overview
          • Enable aggregate-level encryption with VE license
          • Enable encryption on a new volume
          • Enable encryption on an existing volume with the volume move start command
          • Enable encryption on the SVM root volume
          • Enable node root volume encryption
      • Configure NetApp hardware-based encryption
        • Overview
        • Configure external key management
          • Overview
          • Install SSL certificates on the cluster
          • Enable external key management in ONTAP 9.6 and later (HW-based)
          • Enable external key management in ONTAP 9.5 and earlier (HW-based)
          • Configure clustered external key server
          • Create authentication keys in ONTAP 9.6 and later
          • Create authentication keys in ONTAP 9.5 and earlier
          • Assign a data authentication key to a FIPS drive or SED (external key management)
        • Configure onboard key management
          • Enable onboard key management in ONTAP 9.6 and later
          • Enable onboard key management in ONTAP 9.5 and earlier
          • Assign a data authentication key to a FIPS drive or SED (onboard key management)
        • Assign a FIPS 140-2 authentication key to a FIPS drive
        • Enable cluster-wide FIPS-compliant mode for KMIP server connections
      • Manage NetApp encryption
        • Unencrypt volume data
        • Move an encrypted volume
        • Delegate authority to run the volume move command
        • Change the encryption key for a volume with the volume encryption rekey start command
        • Change the encryption key for a volume with the volume move start command
        • Rotate authentication keys for NetApp Storage Encryption
        • Delete an encrypted volume
        • Securely purge data on an encrypted volume
          • Overview
          • Securely purge data on an encrypted volume without a SnapMirror relationship
          • Securely purge data on an encrypted volume with an Asynchronous SnapMirror relationship
          • Scrub data on an encrypted volume with a Synchronous SnapMirror relationship
        • Change the onboard key management passphrase
        • Back up onboard key management information manually
        • Restore onboard key management encryption keys
        • Restore external key management encryption keys
        • Replace SSL certificates
        • Replace a FIPS drive or SED
        • Make data on a FIPS drive or SED inaccessible
          • Overview
          • Sanitize a FIPS drive or SED
          • Destroy a FIPS drive or SED
          • Emergency shredding of data on an FIPS drive or SED
        • Return a FIPS drive or SED to service when authentication keys are lost
        • Return a FIPS drive or SED to unprotected mode
        • Remove an external key manager connection
        • Modify external key management server properties
        • Transition to external key management from onboard key management
        • Transition to onboard key management from external key management
        • What happens when key management servers are not reachable during the boot process
        • Disable encryption by default
  • Data protection and disaster recovery
    • Cluster and SVM peering
      • Overview
      • Prepare for cluster and SVM peering
        • Peer basics
        • Prerequisites for cluster peering
        • Use shared or dedicated ports
        • Use custom IPspaces to isolate replication traffic
      • Configure intercluster LIFs
        • Configure intercluster LIFs on shared data ports
        • Configure intercluster LIFs on dedicated ports
        • Configure intercluster LIFs in custom IPspaces
      • Configure peer relationships
        • Create a cluster peer relationship
        • Create an intercluster SVM peer relationship
        • Add an intercluster SVM peer relationship
      • Enable cluster peering encryption on an existing peer relationship
      • Remove cluster peering encryption from an existing peer relationship
    • Manage local snapshots
      • Learn about local snapshots
      • Configure custom snapshot policies
        • Learn about configuring custom snapshot policies
        • When to configure a custom snapshot policy
        • Create a snapshot job schedule
        • Create a snapshot policy
      • Manage snapshots manually
        • Create and delete snapshots manually
        • Calculate reclaimable space
      • Manage the snapshot reserve
        • Learn about managing the snapshot reserve
        • Monitor snapshot disk consumption
        • Check available snapshot reserve on a volume
        • Modify the snapshot reserve
        • Autodelete snapshots
      • Restore files from snapshots
        • Restore a file from a snapshot on an NFS or SMB client
        • Enable and disable NFS and SMB client access to snapshot directory
        • Restore a single file from a snapshot
        • Restore part of a file from a snapshot
        • Restore the contents of a volume from a snapshot
    • SnapMirror volume replication
      • Learn about SnapMirror volume replication
        • Learn about SnapMirror asynchronous disaster recovery
        • Learn about SnapMirror synchronous disaster recovery
        • Default data protection policies
        • Learn about workloads supported by StrictSync and Sync policies
        • Learn about vault archiving using SnapMirror technology
        • Learn about SnapMirror unified replication
        • When a destination volume grows automatically
        • Learn about data protection fan-out and cascade deployments
        • Learn about SnapMirror licensing
        • Learn about DPO systems feature enhancements
        • Learn about path name pattern matching in SnapMirror commands
        • Learn about extended queries for SnapMirror relationship operations
        • Compatible ONTAP versions for SnapMirror relationships
        • Learn about SnapMirror limitations
      • Configure SnapMirror volume replication
        • SnapMirror replication workflow
        • Configure a replication relationship in one step
        • Configure a replication relationship one step at a time
          • Create a SnapMirror destination volume
          • Create a SnapMirror replication job schedule
          • Customize a SnapMirror replication policy
            • Create a custom SnapMirror replication policy
            • Define a rule for a SnapMirror policy
            • Define a SnapMirror schedule to create a local copy on the destination
          • Create a SnapMirror replication relationship
          • Initialize a SnapMirror replication relationship
          • Ensure a common snapshot in a mirror-vault deployment
          • Example of how to configure a SnapMirror vault-vault cascade
      • Manage SnapMirror volume replication
        • Convert an existing SnapMirror DP-type relationship to XDP
        • Convert the type of a SnapMirror relationship
        • Convert the mode of a SnapMirror synchronous relationship
        • Create and delete a SnapMirror failover test volumes
        • Serve data from a SnapMirror DR destination volume
          • Make the SnapMirror destination volume writeable
          • Configure the SnapMirror destination volume for data access
          • Reactivate the original SnapMirror source volume
        • Restore files from a SnapMirror destination volume
          • Restore a single file, LUN, or NVMe namespace from a SnapMirror destination
          • Restore volume contents from a SnapMirror destination
        • Update a SnapMirror replication relationship manually
        • Resynchronize a SnapMirror replication relationship
        • Delete a SnapMirror volume replication relationship
        • Manage storage efficiency on SnapMirror volumes
        • Use SnapMirror global throttling
    • Manage SnapMirror SVM replication
      • Learn about SnapMirror SVM replication
      • Replicate SVM configurations
        • SnapMirror SVM replication workflow
        • Criteria for placing volumes on SnapMirror destination SVMs
        • Replicate an entire SVM configuration
        • Exclude LIFs and related network settings from SnapMirror SVM replication
        • Exclude network, name service, and other settings from SnapMirror SVM replication
        • Specify local tiers to use for SVM DR relationships
        • SMB only: Create a SMB server
        • Exclude volumes from a SnapMirror SVM replication
      • Serve data from a SnapMirror SVM DR destination
        • SnapMirror SVM disaster recovery workflow
        • Make SnapMirror SVM destination volumes writeable
      • Reactivate the SnapMirror source SVM
        • SnapMirror source SVM reactivation workflow
        • Reactivate the original SnapMirror source SVM
        • Reactivate the original SnapMirror source SVM (FlexGroup volumes only)
        • Resynchronize a destination SnapMirror storage VM
      • Convert SnapMirror volume replication relationships to an SVM replication relationship
      • Delete a SnapMirror SVM replication relationship
    • Manage SnapMirror root volume replication
      • Learn about SnapMirror root volume replication
      • Create and initializing load-sharing mirror relationships
      • Update a load-sharing mirror relationship
      • Promote a load-sharing mirror
    • Back up to the cloud
      • Install a SnapMirror cloud license
      • Back up data to the cloud using SnapMirror
      • Back up data using BlueXP backup and recovery
    • Archive and compliance using SnapLock technology
      • Learn about SnapLock
      • Configure SnapLock
        • Overview
        • Initialize the Compliance Clock
        • Create a SnapLock aggregate
        • Create and mount a SnapLock volume
        • Set the retention time
        • Create an audit log
        • Verify SnapLock settings
      • Manage WORM files
        • Overview
        • Commit files to WORM
        • Commit snapshots to WORM on a vault destination
        • Mirror WORM files for disaster recovery
        • Retain WORM files during litigation
        • Delete WORM files
      • Move a SnapLock volume
      • Tamperproof snapshot locking
      • SnapLock APIs
    • Consistency groups
      • Overview
      • Learn about consistency group limits
      • Configure a single consistency group
      • Configure a hierarchical consistency group
      • Protect a consistency group
      • Modify a consistency group
      • Modify consistency group geometry
      • Modify application and component tags
      • Clone a consistency group
      • Delete a consistency group
    • SnapMirror active sync
      • Introduction
        • Overview
        • Architecture
        • Use cases
        • Deployment strategy
      • Plan
        • Prerequisites
        • Interoperability
        • Limits
      • Configure
        • Configure ONTAP clusters for SnapMirror active sync
        • Configure ONTAP Mediator
        • Prepare to configure ONTAP Cloud Mediator
        • Configure ONTAP Cloud Mediator
        • Configure protection
        • Convert to SnapMirror active sync
        • Convert to symmetric active/active
      • Manage SnapMirror active sync and protect data
        • Create a common snapshot copy
        • Perform a planned failover
        • Recover from automatic unplanned failover operations
        • Monitor SnapMirror active sync
        • Add and remove volumes to a consistency group
        • Upgrade and revert
        • Remove a SnapMirror active sync configuration
        • Remove ONTAP Mediator or ONTAP Cloud Mediator
      • Troubleshoot
        • SnapMirror delete operation fails in takeover state
        • Failure creating a SnapMirror relationship and initializing consistency group
        • Planned failover unsuccessful
        • Mediator not reachable or Mediator quorum status is false
        • ONTAP Cloud Mediator is reachable but responding slowly
        • Automatic unplanned failover not triggered on Site B
        • Link between Site B and Mediator down and Site A down
        • Link between Site A to Mediator Down and Site B down
        • SnapMirror delete operation fails when fence is set on destination volumes
        • Volume move operation stuck when primary site is down
        • Release operation fails when unable to delete Snapshot copy
        • Volume move reference Snapshot copy shows as the newest
    • ONTAP Mediator for MetroCluster and SnapMirror active sync
      • Overview
      • What's new
      • Install or upgrade
        • Workflow
        • Prepare to install or upgrade
        • Upgrade host OS and Mediator
        • Enable access to repositories
        • Download install package
        • Verify code signature
        • Install Mediator package
        • Verify installation
        • Post-installation configuration
      • Manage ONTAP Mediator
      • Host maintenance
    • Learn about MetroCluster IP site management with System Manager
    • Data protection using tape backup
      • Tape backup overview
      • Tape backup and restore workflow
      • Use cases for choosing a tape backup engine
      • Manage tape drives
        • Overview
        • Commands for managing tape drives, media changers, and tape drive operations
        • Use a nonqualified tape drive
        • Assign tape aliases
        • Remove tape aliases
        • Enable or disable tape reservations
        • Commands for verifying tape library connections
      • About tape drives
        • Qualified tape drives overview
        • Format of the tape configuration file
        • How the storage system qualifies a new tape drive dynamically
        • Tape devices overview
          • Overview
          • Tape device name format
          • Supported number of simultaneous tape devices
        • Tape aliasing
          • Overview
          • What physical path names are
          • What serial numbers are
        • Considerations when configuring multipath tape access
        • How you add tape drives and libraries to storage systems
        • What tape reservations are
      • Transfer data between storage systems
        • Transfer data using ndmpcopy
        • Options for the ndmpcopy command
      • NDMP for FlexVol volumes
        • About NDMP for FlexVol volumes
        • About NDMP modes of operation
          • Overview
          • What node-scoped NDMP mode is
          • What SVM-scoped NDMP mode is
        • Considerations when using NDMP
        • Environment variable
          • Overview
          • Environment variables supported by ONTAP
        • Common NDMP tape backup topologies
        • Supported NDMP authentication methods
        • NDMP extensions supported by ONTAP
        • NDMP restartable backup extension for a dump supported by ONTAP
        • What enhanced DAR functionality is
        • Scalability limits for NDMP sessions
      • About NDMP for FlexGroup volumes
      • About NDMP with SnapLock volumes
      • Manage node-scoped NDMP mode for FlexVol volumes
        • Overview
        • Commands for managing node-scoped NDMP mode
        • User authentication in a node-scoped NDMP mode
      • Manage SVM-scoped NDMP mode for FlexVol volumes
        • Overview
        • Commands for managing SVM-scoped NDMP mode
        • What Cluster Aware Backup extension does
        • Availability of volumes and tape devices for backup and restore on different LIF types
        • What affinity information is
        • NDMP server supports secure control connections in SVM-scoped mode
        • NDMP data connection types
        • User authentication in the SVM-scoped NDMP mode
        • Generate an NDMP-specific password for NDMP users
        • How tape backup and restore operations are affected during disaster recovery in MetroCluster configuration
      • About dump engine for FlexVol volumes
        • About
        • How a dump backup works
        • Types of data that the dump engine backs up
        • What increment chains are
        • What the blocking factor is
        • When to restart a dump backup
        • How a dump restore works
        • Types of data that the dump engine restores
        • Considerations before restoring data
        • Scalability limits for dump backup and restore sessions
        • Tape backup and restore support between Data ONTAP operating in 7-Mode and ONTAP
        • Delete restartable contexts
        • How dump works on a SnapVault secondary volume
        • How dump works with storage failover and ARL operations
        • How dump works with volume move
        • How dump works when a FlexVol volume is full
        • How dump works when volume access type changes
        • How dump works with SnapMirror single file or LUN restore
        • How dump backup and restore operations are affected in MetroCluster configurations
      • About SMTape engine for FlexVol volumes
        • About
        • Use Snapshot copies during SMTape backup
        • SMTape capabilities
        • Features not supported in SMTape
        • Scalability limits for SMTape backup and restore sessions
        • What tape seeding is
        • How SMTape works with storage failover and ARL operations
        • How SMTape works with volume move
        • How SMTape works with volume rehost operations
        • How NDMP backup policy are affected during ADB
        • How SMTape backup and restore operations are affected in MetroCluster configurations
      • Monitor tape backup and restore operations for FlexVol volumes
        • Overview
        • Access the event log files
        • What the dump and restore event log message format is
          • Overview
          • What logging events are
          • What dump events are
          • What restore events are
        • Enable or disable event logging
      • Error messages for tape backup and restore of FlexVol volumes
        • Backup and restore error messages
          • Resource limitation: no available thread
          • Tape reservation preempted
          • Could not initialize media
          • Maximum number of allowed dumps or restores (maximum session limit) in progress
          • Media error on tape write
          • Tape write failed
          • Tape write failed - new tape encountered media error
          • Tape write failed - new tape is broken or write protected
          • Tape write failed - new tape is already at the end of media
          • Tape write error
          • Media error on tape read
          • Tape read error
          • Already at the end of tape
          • Tape record size is too small. Try a larger size.
          • Tape record size should be block_size1 and not block_size2
          • Tape record size must be in the range between 4KB and 256KB
        • NDMP error messages
          • Network communication error
          • Message from Read Socket: error_string
          • Message from Write Dirnet: error_string
          • Read Socket received EOF
          • ndmpd invalid version number: version_number ``
          • ndmpd session session_ID not active
          • Could not obtain vol ref for Volume volume_name
          • Data connection type ["NDMP4_ADDR_TCP"|"NDMP4_ADDR_TCP_IPv6"] not supported for ["IPv6"|"IPv4"] control connections
          • DATA LISTEN: CAB data connection prepare precondition error
          • DATA CONNECT: CAB data connection prepare precondition error
          • Error:show failed: Cannot get password for user '<username>'
        • Dump error messages
          • Destination volume is read-only
          • Destination qtree is read-only
          • Dumps temporarily disabled on volume, try again
          • NFS labels not recognized
          • No files were created
          • Restore of the file <file name> failed
          • Truncation failed for src inode <inode number>…​
          • Unable to lock a snapshot needed by dump
          • Unable to locate bitmap files
          • Volume is temporarily in a transitional state
        • SMTape error messages
          • Chunks out of order
          • Chunk format not supported
          • Failed to allocate memory
          • Failed to get data buffer
          • Failed to find snapshot
          • Failed to create snapshot
          • Failed to lock snapshot
          • Failed to delete snapshot
          • Failed to get latest snapshot
          • Failed to load new tape
          • Failed to initialize tape
          • Failed to initialize restore stream
          • Failed to read backup image
          • Image header missing or corrupted
          • Internal assertion
          • Invalid backup image magic number
          • Invalid backup image checksum
          • Invalid input tape
          • Invalid volume path
          • Mismatch in backup set ID
          • Mismatch in backup time stamp
          • Job aborted due to shutdown
          • Job aborted due to Snapshot autodelete
          • Tape is currently in use by other operations
          • Tapes out of order
          • Transfer failed (Aborted due to MetroCluster operation)
          • Transfer failed (ARL initiated abort)
          • Transfer failed (CFO initiated abort)
          • Transfer failed (SFO initiated abort)
          • Underlying aggregate under migration
          • Volume is currently under migration
          • Volume offline
          • Volume not restricted
    • NDMP configuration
      • Learn about NDMP configuration
      • Learn about NDMP configuration workflow
      • Prepare NDMP configurations
      • Verify NDMP tape device connections
      • Enable tape reservations for NDMP backup operations
      • Configure SVM-scoped NDMP
        • Enable SVM-scoped NDMP on the cluster
        • Enable backup users for NDMP authentication
        • Configure LIFs for SVM-scoped NDMP
      • Configure node-scoped NDMP
        • Enable node-scoped NDMP on the cluster
        • Configure LIFs for node-scoped NDMP
      • Configure backup applications for NDMP configuration
    • Replication between NetApp Element software and ONTAP
  • Event, performance, and health monitoring
    • Monitor cluster performance with System Manager
      • Monitor cluster performance using ONTAP System Manager
      • Dashboard tour
      • Identify hot objects
      • Modify QoS
      • Monitor risks with Digital Advisor
      • Optimize system with insights
      • Configure native FPolicy
    • Monitor and manage cluster performance using the CLI
      • Overview
      • Monitor performance
        • Workflow
        • Verify that your VMware environment is supported
        • Active IQ Unified Manager worksheet
        • Install Active IQ Unified Manager
          • Download and deploy Active IQ Unified Manager
          • Configure initial Active IQ Unified Manager settings
        • Specify the clusters to be monitored
        • Set up basic monitoring tasks
          • Perform daily monitoring
          • Use weekly and monthly performance trends to identify performance issues
          • Use performance thresholds to generate event notifications
          • Set performance thresholds
          • Add alerts
          • Configure alert settings
        • Identify performance issues in Active IQ Unified Manager
      • Use Digital Advisor to view system performance
      • Manage performance issues
        • Workflow
        • Perform basic infrastructure checks
          • Check protocol settings on the storage system
            • Check the NFS TCP maximum transfer size
            • Check the iSCSI TCP read/write size
            • Check the CIFS multiplex settings
            • Check the FC adapter port speed
          • Check the network settings on the data switches
          • Check the MTU network setting on the storage system
          • Check disk throughput and latency
          • Check throughput and latency between nodes
        • Manage workloads
          • Identify remaining performance capacity
          • Identify high-traffic clients or files
          • Guarantee throughput with QoS
            • Overview
            • Enable or disable throughput floors v2
            • Storage QoS workflow
            • Set a throughput ceiling with QoS
            • Set a throughput floor with QoS
            • Use adaptive QoS policy groups
            • Set adaptive policy group template
    • Monitor cluster performance with Unified Manager
    • Monitor cluster performance with Data Infrastructure Insights
    • Audit logging
      • How ONTAP implements audit logging
      • Changes to audit logging in ONTAP 9
      • Display audit log contents
      • Manage audit GET request settings
      • Enable cross-cluster audits
      • Manage audit log destinations
    • AutoSupport
      • Learn about AutoSupport
        • About AutoSupport
        • About Digital Advisor and AutoSupport
        • When and where AutoSupport messages are sent
        • How AutoSupport creates and sends event-triggered messages
        • Types of AutoSupport messages and their content
        • View AutoSupport subsystems
        • AutoSupport size and time budgets
        • Files sent in event-triggered AutoSupport messages
        • Log files sent in AutoSupport messages
        • Files sent in weekly AutoSupport messages
        • How AutoSupport OnDemand obtains delivery instructions from technical support
        • Structure of AutoSupport messages sent by email
        • AutoSupport severity types
        • Get AutoSupport message descriptions
        • Commands for managing AutoSupport
        • Information included in the AutoSupport manifest
      • Plan
        • Prepare to use AutoSupport
        • Set up AutoSupport
      • Configure
        • Manage AutoSupport settings
        • Suppress AutoSupport case creation during scheduled maintenance windows
      • Upload files using AutoSupport
        • Upload core dump files
        • Upload performance archive files
      • Troubleshoot
        • Troubleshoot AutoSupport when messages are not received
        • Troubleshoot AutoSupport message delivery over HTTPS
        • Troubleshoot AutoSupport message delivery over SMTP
        • Troubleshoot the AutoSupport subsystem
    • Health monitoring
      • Overview
      • How health monitoring works
      • Ways to respond to system health alerts
      • System health alert customization
      • How health alerts trigger AutoSupport messages and events
      • Available cluster health monitors
      • Receive system health alerts automatically
      • Respond to degraded system health
      • Example of responding to degraded system health
      • Commands for monitoring the health of your system
      • Display environmental information
    • File System Analytics
      • Overview
      • Enable File System Analytics
      • View ONTAP file system activity
      • Enable Activity Tracking
      • Enable usage analytics
      • Take corrective action based on analytics
      • Role-based access control
      • Considerations
    • EMS configuration
      • Overview
      • Configure EMS event notifications with System Manager
      • Configure EMS event notifications with the CLI
        • Workflow
        • Configure EMS events to send email notifications
        • Configure EMS events to forward notifications to a syslog server
        • Configure SNMP traphosts to receive event notifications
        • Configure EMS events to forward notifications to a webhook application
      • Update deprecated EMS event mapping
        • EMS event mapping models
        • Update EMS event mapping from deprecated ONTAP commands
  • ONTAP manual pages
  • Legal notices