ONTAP docs
Release notes
Release highlights
What's new in ONTAP 9.17.1
What's new in ONTAP 9.16.1
What's new in ONTAP 9.15.1
What's new in ONTAP 9.14.1
What's new in ONTAP 9.13.1
What's new in ONTAP 9.12.1
What's new in ONTAP 9.11.1
What's new in ONTAP 9.10.1
What's new in ONTAP 9.9.1
Changes to ONTAP defaults and limits
Release support
Get started
Learn about ONTAP
ONTAP platforms
ONTAP user interfaces
Integrate ONTAP System Manager with BlueXP
Cluster storage
High-availability pairs
AutoSupport and Digital Advisor
Network architecture
Overview
Logical ports
Support for industry-standard network technologies
RDMA
Client protocols
Disks and local tiers
Overview
RAID groups and local tiers
Mirrored and unmirrored local tiers
Root-data partitioning
Volumes, qtrees, files, and LUNs
Storage virtualization
Overview
SVM use cases
Cluster and SVM administration
Namespaces and junction points
Path failover
Overview
NAS path failover
SAN path failover
Load balancing
Replication
Snapshot copies
SnapMirror disaster recovery and data transfer
SnapMirror Cloud backups to object Storage
SnapVault archiving
Cloud backup and support for traditional backups
MetroCluster continuous availability
Storage efficiency
Overview
Thin provisioning
Deduplication
Compression
FlexClone volumes, files, and LUNs
Capacity measurements in ONTAP System Manager
Temperature sensitive storage
CPU or offload processor storage efficiency
Security
Client authentication and authorization
Administrator authentication and RBAC
Virus scanning
Encryption
WORM storage
ONTAP and VMware vSphere
Application aware data management
FabricPool
Quick start
Set up an ONTAP cluster
Workflow
Gather information
Create an a cluster and join nodes
Convert management LIFs from IPv4 to IPv6
Check your cluster with Active IQ Config Advisor
Synchronize the system time across the cluster
Upgrade and revert ONTAP
Upgrade ONTAP
Overview
When to upgrade ONTAP
Execute automated pre-upgrade checks before a planned upgrade
Prepare for an ONTAP upgrade
Determine how long an upgrade will take
Prepare to upgrade with Upgrade Advisor
Prepare to upgrade without Upgrade Advisor
Preparation summary
Choose your target ONTAP release
Confirm configuration support
Identify common configuration errors
Upgrade paths
Verify LIF failover configuration
Verify SVM routing configuration
Special considerations
Summary of special considerations
Mixed version clusters
MetroCluster upgrade requirements
SAN configurations
SnapMirror
Verify compatibility of ONTAP versions
DP-type relationships
Disable long-term retention snapshots
Verify licensing for SnapMirror S3 configurations
NetApp Storage Encryption
Netgroups
Assign an explicit value to the v4.2-xattrs option
LDAP clients using SSLv3
Adverse effects of session-oriented protocols
SSH public keys
Respond to ARP security warnings
Reboot SP or BMC
Download the ONTAP software image
ONTAP upgrade methods
Overview of upgrade methods
Automated upgrade
Manual upgrades
Install software package
Manual nondisruptive standard configuration
Manual nondisruptive MetroCluster (4 or 8 node)
Manual nondisruptive MetroCluster (2-node)
Manual disruptive
What to do after an ONTAP upgrade
Summary of post-upgrade verifications
Verify the cluster
Verify all LIFs are on home ports
Special configurations
Summary of post-upgrade special configurations
Network configuration
EMS LIF service
Networking and storage status
SAN configuration
KMIP server connections
Load-sharing mirror source volumes
User accounts that can access the Service Processor
Update the DQP
Firmware, system, and security updates
Overview
How automatic updates are scheduled for installation
Enable automatic updates
Modify automatic updates
Manage recommended automatic updates
Update firmware manually
Revert ONTAP
Do I need technical support?
ONTAP revert paths
Revert issues and limitations
Prepare for an ONTAP revert
Resources to review before a revert
System verifications
Perform ONTAP version specific pre-revert checks
Summary of pre-revert checks
Any ONTAP 9 version
SMB sessions
SnapMirror/SnapVault relationships
Deduplicated volumes
Snapshots
SnapLock
Automatic unplanned switchover for MetroCluster configurations
ONTAP 9.17.1
Anti-ransomware on SAN volumes
ONTAP 9.16.1
NVMe TLS configuration
Extended qtree performance monitoring
S3 CORS configuration
ONTAP 9.14.1
NFS trunking
ONTAP 9.12.1
S3 NAS buckets
NVMe in-band authentication
IPsec for MetroCluster configurations
ONTAP 9.11.1
Anti-ransomware licensing
ONTAP 9.6
SnapMirror Synchronous relationships
Download and install the revert software image
Revert a cluster
What to do after an ONTAP revert
Verify cluster and storage health
Enable automatic switchover for MetroCluster configurations
Enable and revert LIFs to home ports
Enable Snapshot copy policies
Verify IPv6 firewall entries
Verify user accounts that can access the Service Processor
Cluster administration
Cluster management with System Manager
Administration overview
Use System Manager to access ONTAP Clusters
Configure protocols
Enable new features
Download a cluster configuration
Assign tags to a cluster
View and submit support cases
Manage maximum capacity limit of a storage VM
Monitor cluster, tier, and SVM capacity
View hardware configurations and determine problems
Manage nodes
License management
Overview
Download NetApp License Files (NLFs)
Install ONTAP licenses
Manage ONTAP licenses
License types and licensed method
Commands for managing licenses
Cluster management with the CLI
Overview
Cluster and SVM administrators
Roles
Manage access to System Manager
What the cluster management server is
Types of SVMs
Access the cluster by using the CLI (cluster administrators only)
Access the cluster by using the serial port
Access the cluster using SSH
SSH login security
Enable Telnet or RSH access to the cluster
Access the cluster using Telnet
Access the cluster using RSH
Use the ONTAP command-line interface
Overview
Different shells for CLI commands (cluster administrators only)
Methods of navigating CLI command directories
Rules for specifying values in the CLI
Methods of viewing command history and reissuing commands
Keyboard shortcuts for editing CLI commands
Use of administrative privilege levels
Set the privilege level in the CLI
Set display preferences in the CLI
Methods of using query operators
Methods of using extended queries
Methods of customizing show command output by using fields
About positional parameters
Methods of accessing ONTAP man pages
Manage CLI sessions (cluster administrators only)
Cluster management (cluster administrators only)
Display information about the nodes in a cluster
Display cluster attributes
Modify cluster attributes
Display the status of cluster replication rings
About quorum and epsilon
What system volumes are
Manage nodes
Add nodes to the cluster
Remove nodes from the cluster
Access a node’s log, core dump, and MIB files by using a web browser
Access the system console of a node
Manage node root volumes and root aggregates
Start or stop a node
Manage a node by using the boot menu
Display node attributes
Modify node attributes
Rename a node
Manage single-node clusters
Configure the SP/BMC network
Isolate management network traffic
Considerations for the SP/BMC network configuration
Enable the SP/BMC automatic network configuration
Configure the SP/BMC network manually
Modify the SP API service configuration
Manage nodes remotely using the SP/BMC
Overview
About the Service Processor (SP)
About the Baseboard Management Controller (BMC)
Methods of managing SP/BMC firmware updates
When the SP/BMC uses the network interface for firmware updates
Accounts that can access the SP
Access the SP/BMC from an administration host
Access the SP/BMC from the system console
Relationship among the SP CLI, SP console, and system console sessions
Manage the IP addresses that can access the SP
Use online help at the SP/BMC CLI
Commands to manage a node remotely
About the threshold-based SP sensor readings and status values of the system sensors command output
About the discrete SP sensor status values of the system sensors command output
Commands for managing the SP from ONTAP
ONTAP commands for BMC management
BMC CLI commands
Manage the cluster time (cluster administrators only)
Manage the banner and MOTD
Overview
Create a banner
Manage the banner
Create an MOTD
Manage the MOTD
Manage jobs and schedules
Back up and restore cluster configurations (cluster administrators only)
What configuration backup files are
How the node and cluster configurations are backed up automatically
Commands for managing configuration backup schedules
Commands for managing configuration backup files
Find a configuration backup file to use for recovering a node
Restore the node configuration using a configuration backup file
Find a configuration to use for recovering a cluster
Restore a cluster configuration from an existing configuration
Synchronize a node with the cluster
Manage core dumps (cluster administrators only)
Disk and tier management
Overview
Manage local tiers
Learn about ONTAP local tier management
Add (create) a local tier
Workflow to add a local tier
Determine the number of disks or disk partitions required for a local tier
Decide which local tier creation method to use
Add (create) local tiers automatically
Add (create) local tiers manually
Add (create) local tiers with SyncMirror enabled
Manage the use of local tiers
Rename a local tier
Set media cost of a local tier
Manually fast zero drives
Manually assign disk ownership
Determine drive and RAID group information for a local tier
Assign local tiers to storage VMs (SVMs)
Determine which volumes reside on a local tier
Determine and control a volume’s space usage in a local tier
Determine space usage in a local tier
Relocate local tier ownership within an HA pair
Delete a local tier
Commands for relocating local tiers
Commands for managing local tiers
Add capacity (disks) to a local tier
Workflow to add capacity to a local tier
Methods to create space in a local tier
Add disks to a local tier
Add drives to a node or shelf
Correct misaligned spare partitions
Manage disks
How hot spare disks work
How low spare warnings can help you manage your spare disks
Additional root-data partitioning management options
Learn when to update the Disk Qualification Package
Disk and partition ownership
Manage the ownership of disks and partitions
Learn about auto-assignment of disk ownership
Display disk and partition ownership
Change auto-assignment settings for disk ownership
Manually assign ownership of unpartitioned disks
Manually assign ownership of partitioned disks
Set up an active-passive configuration on nodes using root-data partitioning
Set up an active-passive configuration on nodes using root-data-data partitioning
Remove ownership from a disk
Remove a failed disk
Disk sanitization
Learn about disk sanitization
When sanitization cannot be performed
What happens if sanitization is interrupted
Tips for managing local tiers containing data to be sanitized
Sanitize a disk
Commands for managing disks
Commands for displaying space usage information
Commands for displaying information about storage shelves
Manage RAID configurations
Default RAID policies for local tiers
RAID protection levels for disks
Drive and RAID group information for a local tier
Convert from RAID-DP to RAID-TEC
Convert RAID-TEC to RAID-DP
Considerations for sizing RAID groups
Customize the size of your RAID groups
Manage Flash Pool local tiers
Flash Pool local tier caching policies
Manage Flash Pool caching policies
Determine whether to modify the caching policy of Flash Pool local tiers
Modify caching policies of Flash Pool local tiers
Set the cache-retention policy for Flash Pool local tiers
Flash Pool SSD partitioning for Flash Pool local tiers using storage pools
Flash Pool candidacy and optimal cache size
Create a Flash Pool local tier using physical SSDs
Create a Flash Pool local tier using SSD storage pools
Determine whether a Flash Pool local tier is using an SSD storage pool
Add cache by adding an SSD storage pool
Create a Flash Pool using SSD storage pool allocation units
Determine the impact on cache size when SSDs are added to an SSD storage pool
Add SSDs to an SSD storage pool
Commands for managing SSD storage pools
FabricPool tier management
Overview
Requirements for using ONTAP FabricPool
Tier data efficiently with FabricPool policies
Learn about FabricPool configuration and management tasks
Configure FabricPool
Prepare for FabricPool configuration
Overview
Install a FabricPool license on an cluster
Install a CA certificate on an cluster for StorageGRID
Install a CA certificate on a cluster for S3
Set up an object store as the cloud tier for FabricPool
Overview
Set up StorageGRID as the FabricPool cloud tier
Set up S3 as the FabricPool cloud tier
Set up Alibaba Cloud Object Storage as the FabricPool cloud tier
Set up Amazon S3 as the FabricPool cloud tier
Set up Google Cloud Storage as the FabricPool cloud tier
Set up IBM Cloud Object Storage as the FabricPool cloud tier
Set up Azure Blob Storage as the FabricPool cloud tier
Set up object stores for FabricPool in a MetroCluster configuration
Test the cloud tier latency and throughput performance
Associate the cloud tier with a local tier
Tier data to local S3 bucket
Manage FabricPool
Analyze inactive data with inactive data reporting
Manage volumes for FabricPool
Create a volume on a FabricPool-enabled local tier
Move a volume to a FabricPool-enabled local tier
Enable volumes in FabricPool to write directly to the cloud
Enable volumes in FabricPool to perform aggressive read-aheads
Manage FabricPool volumes with user-created custom tags
Monitor space utilization of a FabricPool-enabled local tier
Modify a volume's tiering policy and minimum cooling period
Archive volumes with FabricPool (video)
Modify a volume's default FabricPool tiering policy
Set thresholds on FabricPool per-node put rate
Customize FabricPool object deletion and defragmentation
Promote data to the performance tier
Manage FabricPool mirrors
Overview
Create a FabricPool mirror
Display FabricPool mirror details
Promote a FabricPool mirror
Remove a FabricPool mirror
Replace an existing object store with a FabricPool mirror
Replace a FabricPool mirror in a MetroCluster configuration
Commands for managing FabricPool resources
SVM data mobility
Overview
Migrate an SVM
Monitor migration
Pause and resume migration
Cancel migration
Manually cut over clients
Manually remove source SVM
HA pair management
Learn about HA pair management in ONTAP clusters
Learn about hardware-assisted takeovers in ONTAP clusters
Learn about automatic takeover and giveback in ONTAP clusters
ONTAP automatic takeover commands
ONTAP automatic giveback commands
ONTAP manual takeover commands
ONTAP manual giveback commands
Testing takeover and giveback in ONTAP clusters
ONTAP commands for monitoring an HA pair
ONTAP commands for enabling and disabling storage failover
Halt or reboot ONTAP nodes without initiating takeover
REST API management with System Manager
Rest log overview
Access the REST API log
Volume administration
Volume and LUN management with System Manager
Overview
Manage volumes
Manage ONTAP volumes with System Manager
Add a volume
Assign tags to a volume
Recover deleted volumes
Manage LUNs
Expand volumes and LUNs
Save storage space
Balance load by moving LUNs
Balance loads by moving volumes to another tier
Use Ansible Playbooks to add or edit volumes or LUNs
Manage storage efficiency policies
Manage resources using quotas
Limit resource use
Clone data with FlexClone
Search, filter, and sort
Logical storage management with the CLI
Overview
Create and manage volumes
Create a volume
Enable large volume and large file support
SAN volumes
Overview of SAN volume provisioning
Configure volume provisioning options
Determine space usage in a volume or aggregate
Enable automatic snapshot and LUN deletion to manage space
Configure volumes to automatically provide more space when they are full
Configure volumes to automatically grow and shrink their size
Requirements for enabling both autoshrink and automatic Snapshot copy deletion
Autoshrink functionality and snapshot copy deletion
Address FlexVol volume fullness and overallocation alerts
Address aggregate fullness and overallocation alerts
Considerations when setting fractional reserve
Determine file and inode usage for a volume
Control and monitor FlexVol volume I/O performance with Storage QoS
Delete a FlexVol volume
Protection against accidental volume deletion
Commands for managing FlexVol volumes
Commands for displaying space usage information
Move and copy volumes
Move a FlexVol volume overview
Considerations and recommendations when moving volumes
Requirements for moving volumes in a SAN environment
Move a volume
Commands for moving volumes
Methods for copying a volume
Use FlexClone volumes to create efficient copies of your FlexVol volumes
Overview
Create a FlexClone volume
Split a FlexClone volume from its parent volume
Determine the space used by a FlexClone volume
Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
Overview
Create a FlexClone file or FlexClone LUN
View node capacity for creating and deleting FlexClone files and FlexClone LUNs
View the space savings due to FlexClone files and FlexClone LUNs
Methods to delete FlexClone files and FlexClone LUNs
How a FlexVol volume can reclaim free space with autodelete setting
Overview
Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
Prevent automatic deletion of a FlexClone file or FlexClone LUN
Commands for configuring deletion of FlexClone files
Use qtrees to partition your FlexVol volumes
Qtrees and FlexVol volume partitioning
Obtain a qtree junction path
Directory to qtree conversions
Convert a directory to a qtree
Convert a directory to a qtree using a Windows client
Convert a directory to a qtree using a UNIX client
Logical space reporting and enforcement for volumes
Overview
Logical space enforcement
Logical space reporting
Enable logical space reporting and enforcement
Manage SVM capacity
Use quotas to restrict or track resource usage
Overview of the quota process
Understand quotas, quota rules, and quota policies
Benefits of using quotas
Quota process
Differences among hard, soft, and threshold quotas
About quota notifications
Quota targets and types
Special kinds of quotas
How default quotas work
How you use explicit quotas
How derived quotas work
Use tracking quotas
How quotas are applied
Considerations for assigning quota policies
How quotas work with users and groups
Overview
Specify UNIX users for quotas
Specify Windows users for quotas
How default user and group quotas create derived quotas
How quotas are applied to the root user
How quotas work with special Windows groups
How quotas are applied to users with multiple IDs
How ONTAP determines user IDs in a mixed environment
How quotas work with multiple users
UNIX and Windows name linking for quotas
How tree quotas work
Overview
How user and group quotas work with qtrees
How default tree quotas on a FlexVol volume create derived tree quotas
How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume
How qtree changes affect quotas
How quotas are activated
Overview
Understand when to use resizing
When a full quota reinitialization is required
How you can view quota information
Overview
See what quotas are in effect using the quota report
Why enforced quotas differ from configured quotas
Use the quota report to determine which quotas limit writes to a specific file
Commands for displaying information about quotas
When to use the volume quota policy rule show and volume quota report commands
Difference in space usage displayed by a quota report and a UNIX client
Overview
Disparity between ls command and quota report for space usage
How the df command accounts for file size
How the du command accounts for space usage
Examples of quota configuration
Set up quotas on an SVM
Modify (or Resizing) quota limits
Reinitialize quotas after making extensive changes
Commands to manage quota rules and quota policies
Commands to activate and modify quotas
Use deduplication, data compression, and data compaction to increase storage efficiency
Overview
Enable deduplication on a volume
Disable deduplication on a volume
Automatic volume-level background deduplication on AFF systems
Manage aggregate-level inline deduplication on AFF systems
Manage aggregate-level background deduplication on AFF systems
Temperature-sensitive storage efficiency overview
Storage efficiency behavior with volume move and SnapMirror
Set storage efficiency modes
Change volume inactive data compression threshold
Check volume efficiency mode
Change volume efficiency mode
View volume footprint savings with or without temperature-sensitive storage efficiency
Enable data compression on a volume
Move between secondary compression and adaptive compression
Disable data compression on a volume
Manage inline data compaction for AFF systems
Enable inline data compaction for FAS systems
Inline storage efficiency enabled by default on AFF systems
Enable storage efficiency visualization
Create a volume efficiency policy to run efficiency operations
Create a volume efficiency policy
Assign a volume efficiency policy to a volume
Modify a volume efficiency policy
View a volume efficiency policy
Disassociate a volume efficiency policy from a volume
Delete a volume efficiency policy
Manage volume efficiency operations manually
Overview
Run an efficiency operation manually
Checkpoints and efficiency operations
Resume a halted efficiency operation
Run an efficiency operation manually on existing data
Manage volume efficiency operations using schedules
Run an efficiency operation based on the amount of new data written
Run an efficiency operation using scheduling
Monitor volume efficiency operations
View efficiency operations and status
View efficiency space savings
View efficiency statistics of a FlexVol volume
Stop volume efficiency operations
Additional information about removing space savings from a volume
Rehost a volume from one SVM to another SVM
Prepare
Rehost an SMB volume
Rehost an NFS volume
Rehost a SAN volume
Rehost a volume in a SnapMirror relationship
Features that do not support volume rehost
Recommended volume and file or LUN configuration combinations
Overview
Determine the correct volume and LUN configuration combination for your environment
Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
Settings for non-space-reserved files or LUNs with thin-provisioned volumes
Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
Cautions and considerations for changing file or directory capacity
The maximum number of files allowed for FlexVol volumes
Maximum directory size for FlexVol volumes
Restrictions on node root volumes and root aggregates
Relocate a root volume to new aggregates
Features supported by FlexClone files and FlexClone LUNs
Overview
Deduplication with FlexClone files and FlexClone LUNs
How Snapshot copies work with FlexClone files and FlexClone LUNs
Inheritance of access control lists by FlexClone files and FlexClone LUNs
How quotas work with FlexClone files and FlexClone LUNs
FlexClone volumes and associated FlexClone files and FlexClone LUNs
NDMP and FlexClone files and LUNs
How volume SnapMirror works with FlexClone files and FlexClone LUNs
How space reservation works with FlexClone files and FlexClone LUNs
How an HA configuration works with FlexClone files and FlexClone LUNs
FlexGroup volumes management
Overview
Learn about ONTAP FlexGroup volumes
Supported and unsupported configurations for FlexGroup volumes
FlexGroup volume setup
Workflow
Enable 64-bit NFSv3 identifiers on ONTAP SVMs with FlexGroups
Provision a FlexGroup volume automatically
Create a FlexGroup volume
Provision NAS storage for large file systems using FlexGroup volumes
Manage FlexGroup volumes
Monitor the space usage of a FlexGroup volume
Increase the size of a FlexGroup volume
Reduce the size of a FlexGroup volume
Configure FlexGroup volumes to automatically grow and shrink their size
Delete directories asynchronously from FlexGroup volumes
Manage client rights to delete ONTAP directories asynchronously with FlexGroups
Create qtrees with FlexGroup volumes
Use quotas for FlexGroup volumes
Enable storage efficiency on a FlexGroup volume
Protect FlexGroup volumes using Snapshot copies
Move the constituents of a FlexGroup volume
Use aggregates in FabricPool for existing FlexGroup volumes
Balance FlexGroup volumes by redistributing file data
Rebalance FlexGroup volumes by moving files
Data protection for FlexGroup volumes
Workflow
Create a SnapMirror relationship for FlexGroup volumes
Create a SnapVault relationship for FlexGroup volumes
Create a unified data protection relationship for FlexGroup volumes
Create an SVM disaster recovery relationship for FlexGroup volumes
Transition an existing FlexGroup SnapMirror relationship to SVM DR
Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship
Considerations for creating SnapMirror cascade and fanout relationships for FlexGroup volumes
Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes
Monitor SnapMirror data transfers for FlexGroup volumes
Manage data protection operations for FlexGroup volumes
Disaster recovery for FlexGroup volumes
Workflow
Activate the destination FlexGroup volume
Reactivate the original source FlexGroup volume after disaster
Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery
Expand FlexGroup volumes in a SnapMirror relationship
Overview
Expand the source FlexGroup volume of a SnapMirror relationship
Expand the destination FlexGroup volume of a SnapMirror relationship
Perform a SnapMirror single file restore from a FlexGroup volume
Restore a FlexGroup volume from a SnapVault backup
Disable SVM protection on a FlexGroup volume
Enable SVM protection on a FlexGroup volume
Convert FlexVol volumes to FlexGroup volumes
Overview
Convert a FlexVol volume to a FlexGroup volume
Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship
FlexCache volumes management
Overview
FlexCache volumes supported protocols and features
Guidelines for sizing a FlexCache volume
Create a FlexCache volume
FlexCache write-back
Overview
Guidelines
Architecture
Use cases
Prerequisites
Interoperability
Enable and manage write-back
FAQ
Manage FlexCache volumes
Learn about auditing FlexCache volumes
Synchronize properties of a FlexCache volume from an origin volume
Update the configurations of a FlexCache relationship
Enable file access time updates
Enable global file locking
Prepopulate a FlexCache volume
Delete a FlexCache relationship
FlexCache for hotspot remediation
Overview
Architecture
Determine FlexCache array density
Decide on inter-SVM or intra-SVM HDFAs
Configure HDFAs and data LIFs
Client configuration
Network management
Get started
Visualize the ONTAP network using System Manager
Networking components of an ONTAP cluster
Network cabling guidelines
Determine which LIF failover policy to use
NAS path failover workflow
Configure NAS path failover on the ONTAP network
Worksheet for NAS path failover on the ONTAP network
Network ports
Learn about ONTAP network port configuration
Configure network ports
Combine physical ports to create ONTAP interface groups
Configure ONTAP VLANs over physical ports
Modify ONTAP network port attributes
Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity
Configure UTA X1143A-R6 ports for the ONTAP network
Convert the UTA2 port in the ONTAP network
Convert the CNA/UTA2 optical modules
Remove NICs from ONTAP cluster nodes
Monitor network ports
Monitor the health of network ports
Monitor the reachability of network ports
Port usage on the ONTAP network
ONTAP internal ports
IPspaces
IPspace configuration
Create IPspaces
View IPspaces
Delete IPspaces
Broadcast domains
Learn about ONTAP broadcast domains
Create broadcast domains
Add or remove ports from an ONTAP broadcast domain
Repair port reachability
Move broadcast domains into IPspaces
Split broadcast domains
Merge broadcast domains
Change the MTU value for ports in a broadcast domain
View broadcast domains
Delete a broadcast domain
Failover groups and policies
Learn about LIF failover on ONTAP networks
Create ONTAP failover groups
Configure failover settings on a LIF
Commands for managing failover groups and policies
Subnets (cluster administrators only)
Overview
Create subnets
Add or remove IP addresses from a subnet
Change subnet properties
View subnets
Delete subnets
SVMs
Logical interfaces (LIFs)
LIF overview
Learn about LIF configuration
LIF compatibility with port types
Supported LIF service policies and roles
LIFs and service policies
Manage LIFs
Configure LIF service policies
Create LIFs (network interface)
Modify LIFs
Migrate LIFs
Revert a LIF to its home port
Recover an incorrectly configured cluster LIF
Delete LIFs
Virtual IP (VIP) LIFs
Balance network loads
Optimize network traffic (cluster administrators only)
DNS load balancing overview
Create DNS load balancing zones
Add or remove a LIF from a load balancing zone
Configure DNS services
Configure dynamic DNS services
Host name resolution
Learn about host name resolution
Configure DNS for host-name resolution
Commands to manage the hosts table
Secure your network
Configure network security using federal information processing standards (FIPS)
Configure IPsec in-flight encryption
Prepare to use IPsec
Configure IPsec
Configure firewall policies for LIFs
Commands to manage firewall service and policies
QoS marking (cluster administrators only)
Learn about QoS marking
Modify QoS marking values
View QoS marking values
Manage SNMP (cluster administrators only)
Learn about SNMP
Create SNMP communities and assigning it to a LIF
Configure SNMPv3 users in a cluster
Configure traphosts to receive SNMP notifications
Test SNMP polling
Commands to manage SNMP
Manage routing in an SVM
Learn about SVM routing
Create static routes
Enable multipath routing
Delete static routes
View routing information
Remove dynamic routes from routing tables
ONTAP network information
View ONTAP network information
View network port information (cluster administrators only)
View information about a VLAN (cluster administrators only)
View interface group information (cluster administrators only)
View LIF information
View routing information
View DNS host table entries (cluster administrators only)
View DNS domain configurations
View information about failover groups
View LIF failover targets
View LIFs in a load balancing zone
View cluster connections
Commands to diagnose network problems
View network connectivity with neighbor discovery protocols
Neighbor discovery protocol overview
Use CDP to detect network connectivity
Use LLDP to detect network connectivity
NAS storage management
Manage NAS protocols with System Manager
NAS storage overview
VMware datastores
Home directories
Linux servers
Export policies
Windows servers
Both Windows and Linux
Secure client access with Kerberos
Provide client access with name services
Manage directories and files
Manage host-specific users and groups
Monitor NFS active clients
Enable NAS storage
Enable Linux servers
Enable Windows servers
Enable Both Windows and Linux
Configure NFS with the CLI
Learn about NFS configuration with the CLI
Learn about NFS configuration workflow
Preparation
Assess NFS physical storage requirements
Assess NFS network configuration requirements
Learn about NFS storage capacity provisioning
NFS configuration worksheet
Configure NFS access to an SVM
Create SVMs for NFS data access
Verify NFS protocol enablement on the SVM
Open NFS client access on the SVM
Create NFS servers
Create NFS LIFs
Enable DNS for NFS SVM host-name resolution
Configure name services
Learn about NFS name services
Configure the NFS name service switch table
Configure local UNIX users and groups
Learn about local UNIX users and groups for NFS SVMs
Create local UNIX users on NFS SVMs
Load local UNIX user lists on NFS SVMs
Create local UNIX groups on NFS SVMs
Add users to local UNIX group on NFS SVMs
Load local UNIX groups from URIs on NFS SVMs
Work with netgroups
Learn about netgroups on NFS SVMs
Load netgroups from URIs on NFS SVMs
Verify NFS SVM netgroup definitions
Create NIS domain configurations for NFS SVMs
Use LDAP
Learn about using LDAP name services on NFS SVMs
Create new LDAP client schemas for NFS SVMs
Create LDAP client configurations for NFS access
Associate LDAP client configurations with NFS SVMs
Verify LDAP sources for NFS SVMs
Use Kerberos with NFS for strong security
Learn about using Kerberos with NFS for security authentication
Verify UNIX permissions for NFS Kerberos configurations on SVMs
Create NFS Kerberos realm configurations on SVMs
Configure NFS Kerberos permitted encryption types for SVMs
Enable NFS Kerberos on LIFs
Add storage capacity to an NFS-enabled SVM
Learn about adding storage capacity to an NFS-enabled SVM
Create an NFS export policy
Add a rule to an NFS export policy
Create a volume or qtree storage container
Create an NFS volume
Create an NFS qtree
Secure NFS access using export policies
Learn about securing NFS access using export policies
Manage the processing order of NFS export rules
Assign an NFS export policy to a volume
Assign an NFS export policy to a qtree
Verify NFS client access from the cluster
Test NFS access from client systems
Where to find additional NFS information
How ONTAP exports differ from 7-Mode exports
Overview
Learn about 7-Mode and NFS export comparisons
Learn about NFS export policy examples
Manage NFS with the CLI
Learn about file access for the NFS protocol
Understand NAS file access
Namespaces and junction points
Learn about NAS namespaces and junction points
Learn about NAS namespace architectures
How ONTAP controls access to files
Learn about NAS file access control
Learn about authentication-based restrictions for NAS SVMs
Learn about file-based restrictions for NAS SVMs
How ONTAP handles NFS client authentication
Learn about authentication for NAS clients
Learn how ONTAP uses name services
Grant SMB file access from NFS clients
How the NFS credential cache works
Create and manage data volumes in NAS namespaces
Create NAS volumes with specified junction points
Create NAS volumes without specific junction points
Mount or unmount NFS volumes in the NAS namespace
Display NAS volume mount and junction point information
Configure security styles
How security styles affect data access
Learn about NAS security styles
Learn about security styles on NFS FlexVol volumes
Decide which security style to use on NAS SVMs
Learn about NFS security style inheritance
Learn about NFS UNIX permission preservation
Manage UNIX permissions on NFS SVMs using the Windows Security tab
Configure security styles on NFS SVM root volumes
Configure security styles on NFS FlexVol volumes
Configure security styles on NFS qtrees
Set up file access using NFS
Learn about setting up NFS file access on SVMs
Secure NFS access using export policies
How export policies control client access to NFS volumes or qtrees
Default export policies for NFS SVMs
How NFS export rules work
Manage SVM access for NFS clients with unlisted security types
How security types determine NFS client access levels
Learn about managing NFS superuser access requests
Learn about NFS export policy caches
Learn about NFS access caches
Learn about NFS access cache parameters
Remove export policies from NFS qtrees
Validate NFS qtree IDs for qtree file operations
Export policy restrictions and nested junctions for NFS FlexVol volumes
Using Kerberos with NFS for strong security
NFS support for Kerberos
Requirements for configuring Kerberos with NFS
Specify the user ID domain for NFSv4
Configure name services
Learn about NFS name service switch configuration
Use LDAP
Learn about LDAP for NFS SVMs
Learn about LDAP signing and sealing for NFS SVMs
Learn about LDAPS for NFS SVMs
Enable LDAP RFC2307bis support for NFS SVMs
NFS configuration options for LDAP directory searches
Improve performance of LDAP directory netgroup-by-host searches for NFS SVMs
Use LDAP fast bind for nsswitch authentication for NFS SVMs
Display LDAP statistics for NFS SVMs
Configure name mappings
Learn about name mapping configuration for NAS SVMs
Learn about name mappings for NAS SVMs
Multidomain searches for UNIX to Windows user name mappings on NAS SVMs
Name mapping conversion rules for NAS SVMs
Create name mappings for NAS SVMs
Configure the default user for NAS SVMs
Commands for managing NFS name mappings
Enable access for Windows NFS clients for SVMs
Enable the display of exports on NFS clients for SVMs
Manage file access using NFS
Enable or disable NFSv3 for SVMs
Enable or disable NFSv4.0 for SVMs
Enable or disable NFSv4.1 for SVMs
Manage NFSv4 storepool limits
Enable or disable pNFS for SVMs
Control NFS access over TCP and UDP for SVMs
Control NFS requests from nonreserved ports for SVMs
Handle NFS access to NTFS volumes or qtrees for unknown UNIX users
Considerations for clients that mount NFS exports on nonreserved ports
Perform stricter access checking for netgroups by verifying domains for NFS SVMs
Modify ports used for NFSv3 services for SVMs
Commands for managing NFS servers
Troubleshoot name service issues for NAS SVMs
Verify name service connections for NAS SVMs
Commands for managing NAS name service switch entries
Commands for managing NAS name service cache
Commands for managing name mappings
Commands for managing NAS local UNIX users
Commands for managing NAS local UNIX groups
Limits for local UNIX users, groups, and group members for NFS SVMs
Manage limits for local UNIX users and groups for NFS SVMs
Commands for managing NFS local netgroups
Commands for managing NFS NIS domain configurations
Commands for managing NFS LDAP client configurations
Commands for managing NFS LDAP configurations
Commands for managing NFS LDAP client schema templates
Commands for managing NFS Kerberos interface configurations
Commands for managing NFS Kerberos realm configurations
Commands for managing export policies
Commands for managing export rules
Configure the NFS credential cache
Reasons for modifying the NFS credential cache time-to-live for SVMs
Configure the time-to-live for cached NFS user credentials for SVMs
Manage export policy caches
Flush export policy caches for NAS SVMs
Display the export policy netgroup queue and cache for NFS SVMs
Check whether a client IP address is a member of an NFS netgroup
Optimize access cache performance for NFS SVMs
Manage file locks
Learn about file locking between protocols for NFS SVMs
Learn about read-only bits for NFS SVMs
Learn how NFS and Windows differ on handling locks on share path components
Display information about locks for NFS SVMs
Breaking file locks for NFS SVMs
Learn how FPolicy first-read and first-write filters work with NFS
Modify the NFSv4.1 server implementation ID for SVMs
Manage NFSv4 ACLs
Learn about the benefits of enabling NFSv4 ACLs for SVMs
Learn about NFSv4 ACLs for SVMs
Enable or disable NFSv4 ACL modification for SVMs
Learn how ONTAP uses NFSv4 ACLs to determine whether it can delete files
Enable or disable NFSv4 ACLs for SVMs
Modify the maximum ACE limit for NFSv4 ACLs for SVMs
Manage NFSv4 file delegations
Enable or disable NFSv4 read file delegations for SVMs
Enable or disable NFSv4 write file delegations for SVMs
Configure NFSv4 file and record locking
Learn about NFSv4 file and record locking for SVMs
Specify the NFSv4 locking lease period for SVMs
Specify the NFSv4 locking grace period for SVMs
Learn about NFSv4 referrals for SVMs
Enable or disable NFSv4 referrals for SVMs
Display statistics for NFS SVMs
Display DNS statistics for NFS SVMs
Display NIS statistics for NFS SVMs
Learn about support for VMware vStorage over NFS
Enable or disable VMware vStorage over NFS
Enable or disable rquota support on NFS SVMs
Learn about NFSv3 and NFSv4 performance improvements and TCP transfer size for SVMs
Modify the NFSv3 and NFSv4 TCP maximum transfer size for SVMs
Configure the number of group IDs allowed for NFS users for SVMs
Control root user access to NTFS security-style data for SVMs
Supported NFS versions and clients
Learn about supported NFS versions and clients
Learn about support for NFSv4.0 functionality
Learn about support limitations for NFSv4
Learn about support for NFSv4.1
Learn about support for NFSv4.2
Learn about support for parallel NFS
Learn about NFS hard mounts
NFS and SMB file and directory naming dependencies
Learn about NFS and SMB file and directory naming dependencies
Learn about valid characters in different operating systems for NFS SVMs
Learn about case-sensitivity of file and directory names in an NFS multiprotocol environment
Learn about creating NFS file and directory names
Learn about NFS handling of multi-byte file, directory, and qtree names
Configure character mapping for SMB file name translation on NFS volumes
NFS commands for managing character mappings for SMB file name translation
Manage NFS trunking
Learn about ONTAP NFS trunking
Configure a new NFS server and exports for trunking
Create a trunking-enabled NFS server on an ONTAP SVM
Prepare your network for ONTAP NFS trunking
Create an ONTAP volume export policy
Mount ONTAP volumes or data shares for NFS trunking
Adapt existing NFS exports for trunking
Adapt single-path exports for ONTAP NFS trunking
Enable trunking on an ONTAP NFS server
Update your network for ONTAP NFS trunking
Modify ONTAP volume export policies
Remount ONTAP volumes or data shares for NFS trunking
Manage NFS over RDMA
Overview
Configure NICs and NFS
Configure LIFs
Modify the NFS settings
Configure SMB with the CLI
Learn about SMB configuration with the ONTAP CLI
SMB configuration workflow
Preparation
Assess SMB physical storage requirements
Assess SMB networking requirements
Learn about SMB storage capacity provisioning
SMB configuration worksheet
Configure SMB access to an SVM
Learn about configuring SMB access to SVMs
Create SVMs to provide SMB data access
Verify that the SMB protocol is enabled on the SVM
Open the SMB export policy of the SVM root volume
Create SMB LIFs
Enable DNS for SMB host-name resolution
Set up an SMB server in an Active Directory domain
Configure time services for SMB servers
Commands for managing symmetric authentication on NTP servers
Create SMB servers in an Active Directory domain
Create keytab files for SMB authentication
Set up an SMB server in a workgroup
Learn about SMB server configuration in workgroups
Create SMB servers on the SVM with specified workgroups
Create local SMB user accounts
Create local SMB groups
Manage local SMB group membership
Verify enabled SMB versions
Map SMB servers on the DNS server
Configure SMB client access to shared storage
Overview
Create a volume or qtree storage container
Create SMB volumes
Create SMB qtrees
Requirements and considerations when creating SMB shares
Create SMB shares
Verify SMB client access
Create SMB share access control lists
Configure NTFS file permissions in SMB shares
Verify SMB user share access
Manage SMB with the CLI
Learn about SMB
SMB server support
Learn about ONTAP SMB server support
Supported SMB versions and functionality
Unsupported Windows features in ONTAP SMB
Configure NIS or LDAP name services on ONTAP SMB SVMs
Learn about ONTAP SMB name service switch configuration
Manage SMB servers
Modify ONTAP SMB servers
Use options to customize SMB servers
Available ONTAP SMB server options
Configure ONTAP SMB server options
Configure the grant UNIX group permission to ONTAP SMB users
Configure ONTAP SMB access restrictions for anonymous users
Manage how file security is presented to SMB clients for UNIX security-style data
Overview
Configure the presentation of NTFS ACLs to ONTAP SMB clients for UNIX security-style data
Learn about preserving UNIX permissions for SMB FlexVol volumes
Manage UNIX permissions using the Windows Security tab for SMB SVMs
Manage SMB server security settings
Learn about handling ONTAP SMB client authentication
Learn about SMB server security settings for ONTAP SVM disaster recovery configuration
Display information about ONTAP SMB server security settings
Configure ONTAP password complexity for local SMB users
Modify the ONTAP SMB server Kerberos security settings
Set the ONTAP SMB server minimum authentication security level
Configure strong ONTAP SMB security for Kerberos-based communication using AES encryption
Configure AES encryption for ONTAP SMB Kerberos-based communication
Use SMB signing to enhance network security
Learn about using ONTAP SMB signing to enhance network security
Learn how signing policies affect communication with ONTAP SMB servers
Learn about the performance impact of ONTAP SMB signing
ONTAP SMB signing configuration recommendations
Learn about ONTAP SMB signing configuration for multiple data LIFS
Configure ONTAP signing for incoming SMB traffic
Determine whether ONTAP SMB sessions are signed
Monitor ONTAP SMB signed session statistics
Configure required SMB encryption on SMB servers for data transfers over SMB
Learn about ONTAP SMB encryption
Learn about the performance impact of ONTAP SMB encryption
Configure ONTAP SMB encryption for incoming traffic
Determine whether clients are connected using encrypted ONTAP SMB sessions
Monitor ONTAP SMB encryption statistics
Secure LDAP session communication
Learn about ONTAP SMB LDAP signing and sealing
Enable LDAP signing and sealing on ONTAP SMB servers
Configure LDAP over TLS
Export self-signed root CA certificates for ONTAP SMB SVMs
Install self-signed root CA certificates on the ONTAP SMB SVM
Enable LDAP over TLS on the ONTAP SMB server
Configure ONTAP SMB Multichannel for performance and redundancy
Configure default Windows user to UNIX user mappings on the SMB server
Configure the default ONTAP SMB UNIX user
Configure the guest ONTAP SMB UNIX user
Map administrator groups to the ONTAP SMB root
Display information about what types of users are connected over ONTAP SMB sessions
ONTAP command options to limit excessive Windows client resource consumption
Improve client performance with traditional and lease oplocks
Learn about improving ONTAP SMB client performance with traditional and lease oplocks
Learn about writing ONTAP SMB cache data-loss considerations when using oplocks
Configure oplocks when creating ONTAP SMB shares
ONTAP commands for enabling or disabling oplocks on SMB volumes and qtrees
Configure oplocks on existing ONTAP SMB shares
Monitor ONTAP SMB oplock status
Apply Group Policy Objects to SMB servers
Learn about applying Group Policy Objects to ONTAP SMB servers
Learn about supported ONTAP SMB GPOs
ONTAP SMB server requirements for GPOs
Enable or disable GPO support on ONTAP SMB servers
How GPOs are updated on the SMB server
Learn about updating GPOs on ONTAP SMB servers
What to do if GPO updates are failing
Manually update GPO settings on ONTAP SMB servers
Display information about ONTAP SMB GPO configurations
Display information about ONTAP SMB restricted group GPOs
Display information about ONTAP SMB central access policies
Display information about ONTAP SMB central access policy rules
Learn about the ONTAP commands for managing SMB server computer account passwords
Manage domain controller connections
Display information about ONTAP SMB discovered servers
Reset and rediscover ONTAP SMB servers
Manage ONTAP SMB domain controller discovery
Add preferred ONTAP SMB domain controllers
ONTAP commands for managing preferred SMB domain controllers
Enable encrypted connections to ONTAP SMB domain controllers
Use null sessions to access storage in non-Kerberos environments
Use ONTAP SMB null sessions to access storage in non-Kerberos environments
Learn how ONTAP SMB storage systems provide null session access
Grant null users access to ONTAP SMB file system shares
Manage NetBIOS aliases for SMB servers
Learn about managing NetBIOS aliases for ONTAP SMB servers
Add NetBIOS alias lists to ONTAP SMB servers
Remove NetBIOS aliases from the list for ONTAP SMB servers
Display the NetBIOS aliases list for ONTAP SMB servers
Determine whether ONTAP SMB clients are connected using NetBIOS aliases
Manage miscellaneous SMB server tasks
Stop or start ONTAP SMB servers
Move ONTAP SMB servers to different OUs
Modify the dynamic DNS domain before moving SMB servers
Join SMB SVMs to Active Directory domains
Display information about SMB NetBIOS over TCP connections
Commands for managing SMB servers
Enable the SMB NetBios name service
Use IPv6 for SMB access and SMB services
Learn about the SMB requirements for IPv6
Learn about support for IPv6 with SMB access and CIFS services
Learn how SMB servers use IPv6 to connect to external servers
Enable IPv6 for SMB servers
Learn about disabling IPv6 for SMB servers
Monitor and display information about IPv6 SMB sessions
Set up file access using SMB
Configure security styles
How security styles affect data access
Learn about SMB security styles and their effects
Learn about where and when to set SMB security styles
Decide which SMB security styles to use on SVMs
Learn about SMB security style inheritance
Learn about preserving UNIX permissions for SMB FlexVol volumes
Manage UNIX permissions using the Windows Security tab for SMB SVMs
Configure SMB security styles on SVM root volumes
Configure SMB security styles on FlexVol volumes
Configure SMB security styles on qtrees
Create and manage data volumes in NAS namespaces
Learn about creating and managing SMB data volumes in NAS namespaces
Create SMB data volumes with specified junction points
Create SMB data volumes without specifying junction points
Mount or unmount existing SMB volumes in the NAS namespace
Display SMB volume mount and junction point information
Configure name mappings
Learn about SMB name mappings configuration
Learn about SMB name mapping
Learn about SMB multidomain searches for UNIX user to Windows user name mappings
Learn about SMB name mapping conversion rules
Create SMB name mapping
Configure the default SMB user
Commands for managing SMB name mappings
Configure multidomain name-mapping searches
Enable or disable SMB multidomain name mapping searches
Reset and rediscover trusted SMB domains
Display information about discovered trusted SMB domains
Add, remove, or replace trusted SMB domains in preferred lists
Display information about the preferred trusted SMB domain list
Create and configure SMB shares
Learn about creating and configuring SMB shares
Learn about the default administrative SMB shares
Learn about SMB share naming requirements
Learn about SMB directory case-sensitivity requirements when creating shares in a multiprotocol environment
Use SMB share properties
Learn about using SMB share properties
Add or remove share properties on existing SMB shares
Optimize SMB user access with the force-group share setting
Create SMB shares with the force-group share setting
View information about SMB shares using the MMC
Commands for managing SMB shares
Secure file access by using SMB share ACLs
Learn about managing SMB share-level ACLs
Create SMB share access control lists
Commands for managing SMB share access control lists
Secure file access by using file permissions
Configure advanced NTFS file permissions using the Windows Security tab
Configure NTFS file permissions using the ONTAP CLI
How UNIX file permissions provide access control when accessing files over SMB
Secure file access by using Dynamic Access Control (DAC)
Overview
Supported Dynamic Access Control functionality
Considerations when using Dynamic Access Control and central access policies with CIFS servers
Enable or disable Dynamic Access Control
Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled
Configure central access policies to secure data on CIFS servers
Display information about Dynamic Access Control security
Revert considerations for Dynamic Access Control
Secure SMB access using export policies
How export policies are used with SMB access
How export rules work
Examples of export policy rules that restrict or allow access over SMB
Enable or disable export policies for SMB access
Secure file access by using Storage-Level Access Guard
Overview
Use cases for using Storage-Level Access Guard
Workflow to configure Storage-Level Access Guard
Configure Storage-Level Access Guard
Effective SLAG matrix
Display information about Storage-Level Access Guard
Remove Storage-Level Access Guard
Manage file access using SMB
Use local users and groups for authentication and authorization
How ONTAP uses local users and groups
Local users and groups concepts
Reasons for creating local users and local groups
How local user authentication works
How user access tokens are constructed
Guidelines for using SnapMirror on SVMs that contain local groups
What happens to local users and groups when deleting CIFS servers
How you can use Microsoft Management Console with local users and groups
Guidelines for reverting
What local privileges are
List of supported privileges
Assign privileges
Guidelines for using BUILTIN groups and the local administrator account
Requirements for local user passwords
Predefined BUILTIN groups and default privileges
Enable or disable local users and groups functionality
Overview
Enable or disable local users and groups
Enable or disable local user authentication
Manage local user accounts
Modify local user accounts
Enable or disable local user accounts
Change local user account passwords
Display information about local users
Display information about group memberships for local users
Delete local user accounts
Manage local groups
Modify local groups
Display information about local groups
Manage local group membership
Display information about members of local groups
Delete a local group
Update domain user and group names in local databases
Manage local privileges
Add privileges to SMB local or domain users or groups
Remove privileges from SMB local or domain users or groups
Reset privileges for SMB local or domain users and groups
Display information about SMB privilege overrides
Configure bypass traverse checking
Learn about configuring SMB bypass traverse checking
Allow users or groups to bypass SMB directory traverse checking
Disallow users or groups from bypassing SMB directory traverse checking
Display information about file security and audit policies
Learn about viewing SMB file security and audit policies
Display information about SMB file security on NTFS security-style volumes
Display information about SMB file security on mixed security-style volumes
Display information about SMB file security on UNIX security-style volumes
Commands to display information about NTFS audit policies on SMB FlexVol volumes
Commands to display information about NFSv4 audit policies on SMB FlexVol volumes
Learn about the ways to display information about SMB file security and audit policies
Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
Commands for managing SMB NTFS file security, NTFS audit policies, and Storage-Level Access Guard
Commands to set SMB file and folder security
Learn about the limits when using commands to set SMB file and folder security
Use security descriptors to apply SMB file and folder security
Learn about applying file-directory policies that use local SMB users or groups on the SVM disaster recovery destination
Configure and apply file security on NTFS files and folders using the CLI
Create NTFS security descriptors on SMB servers
Add NTFS DACL access control entries to NTFS security descriptors on SMB servers
Create SMB security policies
Add a task to the security policy
Apply security policies
Monitor SMB security policy jobs
Verify SMB file security
Configure and apply audit policies to NTFS files and folders using the CLI
Commands to configure and apply SMB audit policies to NTFS files and folders
Create NTFS security descriptors on SMB servers
Add NTFS SACL access control entries to NTFS security descriptors on SMB servers
Create SMB security policies
Add tasks to the SMB security policy
Apply SMB security policies
Monitor SMB security policy jobs
Verify SMB audit policies
Learn about managing SMB security policy jobs
Commands for managing NTFS security descriptors on SMB servers
Commands for managing NTFS DACL access control entries on SMB servers
Commands for managing NTFS SACL access control entries on SMB servers
Commands for managing SMB security policies
Commands for managing SMB security policy tasks
Commands for managing SMB security policy jobs
Configure the metadata cache for SMB shares
Learn about SMB metadata caching
Enable the SMB metadata cache
Configure the lifetime of SMB metadata cache entries
Manage file locks
Learn about SMB file locking between protocols
Learn about SMB read-only bits
How ONTAP differs from Windows in handling locks on share path components
Display information about SMB locks
Break SMB locks
Monitor SMB activity
Display SMB session information
Display information about open SMB files
Determine which statistics objects and counters are available on SMB servers
Display SMB statistics
Deploy SMB client-based services
Use offline files to allow caching of files for offline use
Learn about using offline files to allow caching of SMB files for offline use
Learn about requirements for using offline SMB files
Guidelines for deploying offline SMB files
Commands to configure offline SMB file support
Configure offline files support on SMB shares by using the Computer Management MMC
Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
Learn about using roaming profiles to store SMB user profiles centrally
Learn about requirements for using roaming SMB profiles
Configure roaming SMB profiles through the Active Directory Users and Computers MMC
Use folder redirection to store data on a SMB server
Learn about using folder redirection to store data on SMB servers
Learn about requirements for using SMB folder redirection
Configure SMB folder redirection using Windows Properties
Learn about accessing the ~snapshot directory from Windows clients using SMB 2.x
Recover files and folders using Previous Versions
Learn about recovering SMB files and folders using previous versions
SMB requirements for using Microsoft Previous Versions
View and manage SMB snapshot data with the Windows Previous Versions tab
Determine whether SMB snapshots are available for Previous Versions use
Create SMB snapshot configurations to enable Previous Versions access
Learn about restoring Previous Versions directories that contain SMB junctions
Deploy SMB server-based services
Manage home directories
Learn about enabling dynamic home directories on SMB servers
Home directory shares
Add SMB home directory shares
Learn about unique SMB user name requirements for home directory shares
Learn about what happens to static SMB home directory share names after upgrading
Add SMB home directory search paths
Create SMB home directory configurations using the %w and %d variables
Configure SMB home directories using the %u variable
Learn about additional SMB home directory configurations
Commands for managing SMB search paths
Display information about SMB user home directory paths
Manage accessibility to SMB user home directories
Configure SMB client access to UNIX symbolic links
Learn about providing SMB client access to UNIX symbolic links
Limits when configuring UNIX symbolic links for SMB access
Control automatic DFS advertisements on SMB servers
Configure UNIX symbolic link support on SMB shares
Create symbolic link mappings for SMB shares
Commands for managing SMB symbolic link mappings
Windows backup applications and Unix-style symlinks on SMB servers
Use BranchCache to cache SMB share content at a branch office
Learn about using BranchCache to cache SMB share content at a branch office
Requirements and guidelines
Learn about SMB BranchCache version support
Learn about SMB network protocol support requirements
Learn about SMB and Windows hosts version requirements
Learn about the reasons SMB invalidates BranchCache hashes
Learn about choosing the SMB hash store location
Learn about SMB BranchCache recommendations
Configure BranchCache
Learn about SMB BranchCache configuration
Requirements for configuring SMB BranchCache
Configure BranchCache on SMB servers
Learn about configuring BranchCache at the remote office in SMB
Configure BranchCache-enabled SMB shares
Learn about configuring BranchCache-enabled SMB shares
Create BranchCache-enabled SMB shares
Enable BranchCache on existing SMB shares
Manage and monitor the BranchCache configuration
Modify BranchCache configurations on SMB shares
Display information about BranchCache configurations on SMB shares
Change the SMB BranchCache server key
Pre-compute BranchCache hashes on specified SMB paths
Flush hashes from the SMB SVM BranchCache hash store
Display SMB BranchCache statistics
Learn about SMB support for BranchCache Group Policy Objects
Display information about SMB BranchCache Group Policy Objects
Disable BranchCache on SMB shares
Learn about disabling BranchCache on SMB shares
Disable BranchCache on a single SMB share
Stop automatic caching on all SMB shares
Disable or enable BranchCache on the SVM
Learn what happens when you disable or reenable BranchCache on SMB servers
Disable or enable BranchCache on SMB shares
Delete the BranchCache configuration on SVMs
Learn what happens when you delete the BranchCache configuration on SMB shares
Delete the BranchCache configuration on SMB shares
Learn what happens to SMB BranchCache when reverting
Improve Microsoft remote copy performance
Learn about Microsoft remote copy performance improvements on SMB servers
Learn about ODX on SMB servers
Requirements for using ODX on SMB servers
Guidelines for using ODX on SMB servers
Use cases for ODX on SMB servers
Enable or disable ODX on SMB servers
Improve client response time by providing SMB automatic node referrals with Auto Location
Learn about improving client response time by providing SMB automatic node referrals with Auto Location
Requirements and guidelines for using automatic node referrals on SMB servers
Support for SMB automatic node referrals
Enable or disable SMB automatic node referrals
Use statistics to monitor SMB automatic node referral activity
Monitor client-side SMB automatic node referral information using a Windows client
Provide folder security on shares with access-based enumeration
Provide SMB folder security on shares with access-based enumeration
Enable or disable access-based enumeration on SMB shares
Enable or disable access-based enumeration from a Windows client on SMB shares
NFS and SMB file and directory naming dependencies
Learn about NFS and SMB file and directory naming dependencies
Learn about valid characters for SMB file or directory names
Case-sensitivity of SMB file and directory names in a multiprotocol environment
Learn about creating SMB file and directory names
Learn about SMB multi-byte file, directory, and qtree names
Configure character mapping for SMB file name translation on volumes
Commands for managing character mappings for SMB file name translation
Provide S3 client access to NAS data
Overview
NAS data requirements
Enable S3 multi-protocol access
Create S3 NAS bucket
Enable S3 client users
SMB configuration for Microsoft Hyper-V and SQL Server
Overview
Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions
Nondisruptive operations for Hyper-V and SQL Server over SMB
What are nondisruptive operations?
Protocols that enable nondisruptive operations over SMB
Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB
How SMB 3.0 functionality supports nondisruptive operations over SMB shares
What the Witness protocol does to enhance transparent failover
How the Witness protocol works
Share-based backups with Remote VSS
Overview
Remote VSS concepts
Example of a directory structure used by Remote VSS
How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB
How ODX copy offload is used with Hyper-V and SQL Server over SMB shares
Configuration requirements and considerations
ONTAP and licensing requirements
Network and data LIF requirements
SMB server and volume requirements for Hyper-V over SMB
SMB server and volume requirements for SQL Server over SMB
Continuously available share requirements and considerations for Hyper-V over SMB
Continuously available share requirements and considerations for SQL Server over SMB
Remote VSS considerations for Hyper-V over SMB configurations
ODX copy offload requirements for SQL Server and Hyper-V over SMB
Recommendations for SQL Server and Hyper-V over SMB configurations
Plan the Hyper-V or SQL Server over SMB configuration
Complete the volume configuration worksheet
Complete the SMB share configuration worksheet
Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
Overview
Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares)
Verify that domain accounts map to the default UNIX user
Verify that the security style of the SVM root volume is set to NTFS
Verify that required CIFS server options are configured
Configure SMB Multichannel for performance and redundancy
Create NTFS data volumes
Create continuously available SMB shares
Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares)
Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares)
Manage Hyper-V and SQL Server over SMB configurations
Configure existing shares for continuous availability
Enable or disable VSS shadow copies for Hyper-V over SMB backups
Use statistics to monitor Hyper-V and SQL Server over SMB activity
Determine which statistics objects and counters are available
Display SMB statistics
Verify that the configuration is capable of nondisruptive operations
Use health monitoring to determine whether nondisruptive operation status is healthy
Display nondisruptive operation status by using system health monitoring
Verify the continuously available SMB share configuration
Verify LIF status
Determine whether SMB sessions are continuously available
Display SMB session information
Display information about open SMB files
SAN storage management
SAN concepts
SAN provisioning with iSCSI
iSCSI service management
Overview
How iSCSI authentication works
iSCSI initiator security management
iSCSI endpoint isolation
What CHAP authentication is
How using iSCSI interface access lists to limit initiator interfaces can increase performance and security
iSNS server registration requirement
SAN provisioning with FC
SAN provisioning with NVMe
SAN volumes
Overview
Configure volume provisioning options
SAN volume configuration options
Requirement for moving volumes in SAN environments
Considerations for setting fractional reserve
SAN host-side space management
igroups
Specify initiator WWPNs and iSCSI node names for an igroup
Storage virtualization with VMware and Microsoft copy offload
Overview
How LUN access works in a virtualized environment
Considerations for LIFs in cluster SAN environments
Improve VMware VAAI performance for ESX hosts
Microsoft Offloaded Data Transfer (ODX)
SAN administration
SAN provisioning
Overview
Learn about ASA configurations
Configure switches for FCoE
System requirements
What to know before you create a LUN
Verify or add the FC or iSCSI license
Provision SAN storage
NVMe provisioning
Overview
License requirements
NVMe support and limitations
Configure an SVM for NVMe
Provision NVMe storage
Map an NVMe namespace to a subsystem
Manage LUNs
Edit LUN QoS Policy
Convert a LUN into a namespace
Take a LUN offline
Resize a LUN
Move a LUN
Delete a LUN
What to know before copying LUNs
Examine configured and used space of a LUN
Control and monitor I/O performance to LUNs using Storage QoS
Tools available to effectively monitor your LUNs
Capabilities and restrictions of transitioned LUNs
I/O misalignments on properly aligned LUNs
Ways to address issues when LUNs go offline
Troubleshoot iSCSI LUNs not visible on the host
Manage igroups and portsets
Ways to limit LUN access with portsets and igroups
Manage igroups and initiators
Create nested igroup
Map igroup to multiple LUNs
Create a portset and bind to an igroup
Manage portsets
Selective LUN Map
Manage iSCSI protocol
Configure your network for best performance
Configure an SVM for iSCSI
Define a security policy method for an initiator
Delete an iSCSI service for an SVM
Get more details in iSCSI session error recoveries
Register the SVM with an iSNS server
Resolve iSCSI error messages on the storage system
iSCSI LIF failover for ASA platforms
Manage FC protocol
Configure an SVM for FC
Delete an FC service for an SVM
Recommended MTU configurations for FCoE jumbo frames
Manage NVMe protocol
Start the NVMe/FC service for an SVM
Delete NVMe/FC service from an SVM
Resize a NVMe namespace
Convert a namespace into a LUN
Set up in-band authentication over NVMe
Disable in-band authentication over NVMe
Set up TLS secure channel for NVMe/TCP
Disable TLS secure channel for NVMe/TCP
Change NVMe host priority
Manage automated host discovery for NVMe/TCP
Disable NVMe VMID
Manage systems with FC adapters
Overview
Commands for managing FC adapters
Configure FC adapters
View adapter settings
Change the UTA2 port from CNA mode to FC mode
Change the CNA/UTA2 target adapter optical modules
Supported port configurations for X1143A-R6 adapters
Configure X1143A-R6 adapter ports
Prevent loss of connectivity when using the X1133A-R6 adapter
Manage LIFs for all SAN protocols
Overview
Configure an NVMe LIF
What to know before moving a SAN LIF
Remove a SAN LIF from a port set
Move a SAN LIF
Delete a LIF in a SAN environment
SAN LIF requirements for adding nodes to a cluster
Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation
Enable space allocation for SAN protocols
Recommended volume and file or LUN configuration combinations
Overview
Determine the correct volume and LUN configuration combination for your environment
Calculate rate of data growth for LUNs
Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
SAN data protection
Learn about data protection methods for SAN environments
Restore a single LUN from a snapshot
Restore all LUNs in a volume from a snapshot
Protect your data with ONTAP FlexClone LUNs
Configure and use SnapVault backups in a SAN environment
Learn about SnapVault backups in a SAN environment
Access a read-only LUN from a SnapVault backup
Restore a single LUN from a SnapVault backup
Restore all LUNs in a volume from a SnapVault backup
Recommended configuration to connect a host backup system
Use a host backup system to protect a LUN
SAN configuration reference
Learn about SAN configuration
iSCSI configurations
Configure iSCSI networks
Benefits of using VLANs in iSCSI configurations
FC configurations
Configure FC & FC-NVMe fabrics
FC switch configuration best practices
Recommended FC target port configuration and speeds
Configure FC adapters ports
Commands for managing FC adapters
Avoid connectivity loss when using the X1133A-R6 adapter
FCoE configurations
Configure FCoE fabrics
Supported FCoE initiator and target port combinations
FC and FCoE zoning
Learn about FC and FCoE zoning
Recommended FC and FCoE zoning configurations
Requirements for SAN hosts connected to ONTAP and non-NetApp systems
SAN configurations in a MetroCluster environment
Supported SAN configurations in a MetroCluster environment
Avoid port overlap during MetroCluster switchover and switchback
Support for SAN host multipathing
Configuration limits
Determine the maximum supported nodes and SAN hosts per cluster
ASA Array configuration limits and support
FC switch configuration limits
Maximum supported FC and FCoE hop counts
Calculate queue depth for FC hosts
Modify queue depths
S3 object storage management
Learn about S3 support in ONTAP 9
Overview
Architecture
Use cases
Plan
ONTAP version support for S3 object storage
ONTAP S3 supported actions
ONTAP S3 interoperability
ONTAP S3 validated third-party solutions
Configure
About the S3 configuration process
Workflow
Assess physical storage requirements
Assess networking requirements
Decide where to provision new S3 storage capacity
Configure S3 access to an SVM
Create an SVM for S3
Create and install a CA certificate on the SVM
Create an S3 service data policy
Create data LIFs
Create intercluster LIFs for remote FabricPool tiering
Create the S3 object store server
Add storage capacity to an S3-enabled SVM
Create a bucket
Manage bucket size
Create a bucket on a mirrored or unmirrored aggregate in a MetroCluster configuration
Create a bucket lifecycle rule
Create an S3 user
Create or modify S3 groups
Regenerate keys and modify their retention period
Create or modify access policy statements
About bucket and object store server policies
Modify a bucket policy
Create or modify an object store server policy
Configure S3 access for external directory services
Enable LDAP or domain users to generate S3 access keys
Enable client access to S3 object storage
Enable ONTAP S3 access for remote FabricPool tiering
Enable ONTAP S3 access for local FabricPool tiering
Enable client access from an S3 app
Storage service definitions
CORS integration with ONTAP
Protect buckets with SnapMirror S3
Learn about SnapMirror S3
Mirror and backup protection on a remote cluster
Create mirror for new bucket
Create mirror for existing bucket
Takeover from destination
Restore from destination
Mirror and backup protection on the local cluster
Create mirror for new bucket
Create mirror for existing bucket
Takeover from destination
Restore from destination
Backup protection with cloud targets
Requirements for cloud targets
Create backup for new bucket
Create backup for existing bucket
Restore from cloud target
Modify mirror policy
Protect S3 data with snapshots
Learn about S3 snapshots
Create S3 snapshots
View and restore S3 snapshots
Delete S3 snapshots
Audit S3 events
Learn about auditing S3 events
Plan a configuration
Create and enable a configuration
Select buckets for auditing
Modify a configuration
Show configurations
Authentication and access control
Authentication and access control
Manage administrator authentication and RBAC
Learn about administrator authentication and RBAC
Workflow
Configuration worksheets
Create login accounts
Learn about creating login accounts
Enable local account access
Learn about enabling local account access
Enable password account access
Enable SSH public key accounts
Enable multifactor authentication (MFA) accounts
Learn about multifactor authentication
Enable MFA with SSH and TOTP
Configure local user account for MFA with TOTP
Reset TOTP secret key
Disable TOTP secret key
Enable SSL certificate accounts
Enable Active Directory account access
Enable LDAP or NIS account access
Manage access-control roles
Learn about managing access-control roles
Modify the role assigned to an administrator
Define custom roles
Predefined roles for cluster administrators
Predefined roles for SVM administrators
Manage administrator access with System Manager
Access JIT privilege elevation in ONTAP
Configure JIT privilege elevation in ONTAP
Manage administrator accounts
Learn about managing administrator accounts
Associate a public key with an administrator account
Manage SSH public keys and X.509 certificates for an administrator account
Configure Cisco Duo 2FA for SSH logins
Generate and install a CA-signed server certificate
Manage certificates with System Manager
Configure Active Directory domain controller access
Configure LDAP or NIS server access
Change an administrator password
Lock and unlock an administrator account
Manage failed login attempts
Enforce SHA-2 on administrator account passwords
Diagnose and correct file access issues with System Manager
Manage multi-admin verification
Learn about multi-admin verification
Manage administrator groups
Enable and disable multi-admin verification
Manage protected operation rules
Request execution of protected operations
Manage protected operation requests
Manage dynamic authorization
Learn about dynamic authorization
Enable or disable dynamic authorization
Customize dynamic authorization
Authentication and authorization using OAuth 2.0
Overview
Concepts
Authorization servers and tokens
Client authorization
Overview and options
Self-contained scopes
External role mapping
How ONTAP determines access
Deployment scenarios
Client authentication using mTLS
Configure and deploy
Prepare to deploy OAuth 2.0
Deploy OAuth 2.0 in ONTAP
Issue a REST API call
Authentication and authorization using SAML
Working with OAuth 2.0 or SAML IdP groups
Authentication and authorization using WebAuthn MFA
Learn about WebAuthn multi-factor authentication
Enable WebAuthn MFA
Disable WebAuthn MFA
View WebAuthn MFA settings and manage credentials
Manage web services
Overview
Manage access to web services
Manage the web protocol engine
Commands for managing the web protocol engine
Configure access to web services
Commands for managing web services
Commands for managing mount points on the nodes
Manage SSL
Use HSTS for web services
Troubleshoot web service access problems
Verify the identity of remote servers using certificates
Overview
Verify digital certificates are valid using OCSP
View default certificates for TLS-based applications
Mutually authenticate the cluster and a KMIP server
Overview
Generate a certificate signing request for the cluster
Install a CA-signed server certificate for the cluster
Install a CA-signed client certificate for the KMIP server
Security and data encryption
Autonomous Ransomware Protection
Overview
Use cases and considerations
Enable Autonomous Ransomware Protection
Enable Autonomous Ransomware Protection by default
Enable ARP/AI
Update ARP/AI
Switch from learning mode to active mode
Learn about the entropy evaluation period for SAN volumes
Pause protection
Manage attack detection parameters
Respond to abnormal activity
Recover data after an attack
Adjust automatic ARP snapshot settings
Virus protection with Vscan
Learn about antivirus configuration
About NetApp antivirus protection
Learn about NetApp virus scanning
Virus scanning workflow
Antivirus architecture
Learn about ONTAP Vscan partner solutions
Vscan server installation and configuration
ONTAP Vscan server installation and configuration
Install ONTAP Vscan Antivirus Connectors
Configure ONTAP Vscan Antivirus Connector
Configure scanner pools
Learn about configuring scanner pools
Create a scanner pool on a single cluster
Create scanner pools in MetroCluster configurations
Apply a scanner policy on a single cluster
Apply scanner policies in MetroCluster configurations
ONTAP commands for managing scanner pools in Vscan
Configure on-access scanning
Create ONTAP Vscan on-access policies
Enable ONTAP Vscan on-access policies
Modify ONTAP Vscan file-operations profile for SMB shares
ONTAP Vscan commands for managing on-access policies
Configure on-demand scanning
Learn about configuring on-demand scanning
Create on-demand tasks
Schedule on-demand tasks
Run ONTAP Vscan on-demand tasks immediately
ONTAP Vscan commands for managing on-demand tasks
Best practices for configuring off-box antivirus functionality
Enable virus scanning on SVM ONTAP Vscan
Reset status of ONTAP Vscan scanned files
View Vscan event log information
Monitor and troubleshoot connectivity issues
Potential connectivity issues involving the scan-mandatory option
ONTAP commands for viewing Vscan server connection status
Troubleshoot virus ONTAP Vscan scanning
Monitor ONTAP Vscan status and performance activities
Audit NAS events on SVMs
Overview
How auditing works
Basic auditing concepts
How the ONTAP auditing process works
Auditing requirements and considerations
Limitations for the size of audit records on staging files
What the supported audit event log formats are
View audit event logs
SMB events that can be audited
Overview
Determine what the complete path to the audited object is
Considerations when auditing symlinks and hard links
Considerations when auditing alternate NTFS data streams
NFS file and directory access events that can be audited
Plan the auditing configuration
Create a file and directory auditing configuration on SVMs
Create the auditing configuration
Enable auditing on the SVM
Verify the auditing configuration
Configure file and folder audit policies
Overview
Configure audit policies on NTFS security-style files and directories
Configure auditing for UNIX security style files and directories
Display information about audit policies applied to files and directories
Display information about audit policies using the Windows Security tab
Display information about NTFS audit policies on FlexVol volumes using the CLI
Ways to display information about file security and audit policies
CLI change events that can be audited
Overview
Manage file-share event
Manage audit-policy-change event
Manage user-account event
Manage security-group event
Manage authorization-policy-change event
Manage auditing configurations
Manually rotate the audit event logs
Enable and disable auditing on SVMs
Display information about auditing configurations
Commands modifying auditing configurations
Delete an auditing configuration
Understand cluster revert implications
Troubleshoot auditing and staging volume space issues
Use FPolicy for file monitoring and management on SVMs
Understand FPolicy
Learn about two part ONTAP FPolicy solutions
ONTAP FPolicy synchronous and asynchronous notifications
ONTAP FPolicy persistent stores
ONTAP FPolicy configuration types
Cluster component roles in ONTAP FPolicy implementation
How ONTAP FPolicy works with external FPolicy servers
Node-to-external ONTAP FPolicy server communication process
Learn about ONTAP FPolicy services across SVM namespaces
How FPolicy passthrough-read enhances usability for hierarchical storage management
Plan the FPolicy configuration
Requirements, considerations, and best practices for configuring FPolicy
Set up ONTAP FPolicy configurations
Plan the FPolicy external engine configuration
Plan ONTAP FPolicy external engine configurations
Additional information about configuring FPolicy external engines to use SSL authenticated connections
Certificates do not replicate in SVM disaster recovery relationships with a non-ID-preserve configuration
Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster recovery configurations
Complete ONTAP FPolicy external engine configuration worksheets
Plan the FPolicy event configuration
Overview
Supported file operation and filter combinations that FPolicy can monitor for SMB
Supported file operation and filter combinations that FPolicy can monitor for NFSv3
Supported file operation and filter combinations that FPolicy can monitor for NFSv4
Complete ONTAP FPolicy event configuration worksheets
Plan the FPolicy policy configuration
Learn about ONTAP FPolicy policy configurations
Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine
Complete ONTAP FPolicy policy worksheets
Plan the FPolicy scope configuration
Learn about ONTAP FPolicy scope configurations
Complete ONTAP FPolicy scope worksheets
Create the FPolicy configuration
Create ONTAP FPolicy external engines
Create ONTAP FPolicy events
Create ONTAP FPolicy persistent stores
Create ONTAP FPolicy policies
Create ONTAP FPolicy scopes
Enable ONTAP FPolicy policies
Manage FPolicy configurations
Modify FPolicy configurations
Commands for modifying FPolicy configurations
Enable or disable ONTAP FPolicy policies
Display information about FPolicy configurations
Learn about ONTAP FPolicy show commands
Commands for displaying information about FPolicy configurations
Display information about FPolicy policy status
Display information about enabled ONTAP FPolicy policies
Manage FPolicy server connections
Connect to external FPolicy servers
Disconnect from external FPolicy servers
Display information about connections to external ONTAP FPolicy servers
Display information about ONTAP FPolicy passthrough-read connection status
Verify access using security tracing
Learn about ONTAP security traces
Types of access checks security traces monitor
Considerations when creating security traces
Perform security traces
Learn to perform ONTAP security traces
Create security trace filters
Display information about security trace filters
Display security trace results
Modify security trace filters on ONTAP SVMs
Delete security trace filters
Delete security trace records
Delete all security trace records
Interpret ONTAP security trace results
Where to find additional information
Manage encryption with System Manager
Encrypt stored data (software)
Encrypt stored data (hardware)
Manage encryption with the CLI
Overview
Configure NetApp volume and aggregate encryption
Overview
NetApp Volume Encryption workflow
Configure NVE
Determine whether your cluster version supports NVE
Install the license
Configure external key management
Overview
Manage external keys with System Manager
Install SSL certificates on the cluster
Enable external key management in ONTAP 9.6 and later (NVE)
Enable external key management in ONTAP 9.5 and earlier
Manage keys with a cloud provider
Manage ONTAP keys with Barbican KMS
Enable onboard key management in ONTAP 9.6 and later (NVE)
Enable onboard key management in ONTAP 9.5 and earlier (NVE)
Enable onboard key management in newly added nodes
Encrypt volume data with NVE or NAE
Overview
Enable aggregate-level encryption with VE license
Enable encryption on a new volume
Enable encryption on an existing volume with the volume move start command
Enable encryption on the SVM root volume
Enable node root volume encryption
Configure NetApp hardware-based encryption
Overview
Configure external key management
Overview
Install SSL certificates on the cluster
Enable external key management in ONTAP 9.6 and later (HW-based)
Enable external key management in ONTAP 9.5 and earlier (HW-based)
Configure clustered external key server
Create authentication keys in ONTAP 9.6 and later
Create authentication keys in ONTAP 9.5 and earlier
Assign a data authentication key to a FIPS drive or SED (external key management)
Configure onboard key management
Enable onboard key management in ONTAP 9.6 and later
Enable onboard key management in ONTAP 9.5 and earlier
Assign a data authentication key to a FIPS drive or SED (onboard key management)
Assign a FIPS 140-2 authentication key to a FIPS drive
Enable cluster-wide FIPS-compliant mode for KMIP server connections
Manage NetApp encryption
Unencrypt volume data
Move an encrypted volume
Delegate authority to run the volume move command
Change the encryption key for a volume with the volume encryption rekey start command
Change the encryption key for a volume with the volume move start command
Rotate authentication keys for NetApp Storage Encryption
Delete an encrypted volume
Securely purge data on an encrypted volume
Overview
Securely purge data on an encrypted volume without a SnapMirror relationship
Securely purge data on an encrypted volume with an Asynchronous SnapMirror relationship
Scrub data on an encrypted volume with a Synchronous SnapMirror relationship
Change the onboard key management passphrase
Back up onboard key management information manually
Restore onboard key management encryption keys
Restore external key management encryption keys
Replace SSL certificates
Replace a FIPS drive or SED
Make data on a FIPS drive or SED inaccessible
Overview
Sanitize a FIPS drive or SED
Destroy a FIPS drive or SED
Emergency shredding of data on an FIPS drive or SED
Return a FIPS drive or SED to service when authentication keys are lost
Return a FIPS drive or SED to unprotected mode
Remove an external key manager connection
Modify external key management server properties
Transition to external key management from onboard key management
Transition to onboard key management from external key management
What happens when key management servers are not reachable during the boot process
Disable encryption by default
Data protection and disaster recovery
Cluster and SVM peering
Overview
Prepare for cluster and SVM peering
Peer basics
Prerequisites for cluster peering
Use shared or dedicated ports
Use custom IPspaces to isolate replication traffic
Configure intercluster LIFs
Configure intercluster LIFs on shared data ports
Configure intercluster LIFs on dedicated ports
Configure intercluster LIFs in custom IPspaces
Configure peer relationships
Create a cluster peer relationship
Create an intercluster SVM peer relationship
Add an intercluster SVM peer relationship
Enable cluster peering encryption on an existing peer relationship
Remove cluster peering encryption from an existing peer relationship
Manage local snapshots
Learn about local snapshots
Configure custom snapshot policies
Learn about configuring custom snapshot policies
When to configure a custom snapshot policy
Create a snapshot job schedule
Create a snapshot policy
Manage snapshots manually
Create and delete snapshots manually
Calculate reclaimable space
Manage the snapshot reserve
Learn about managing the snapshot reserve
Monitor snapshot disk consumption
Check available snapshot reserve on a volume
Modify the snapshot reserve
Autodelete snapshots
Restore files from snapshots
Restore a file from a snapshot on an NFS or SMB client
Enable and disable NFS and SMB client access to snapshot directory
Restore a single file from a snapshot
Restore part of a file from a snapshot
Restore the contents of a volume from a snapshot
SnapMirror volume replication
Learn about SnapMirror volume replication
Learn about SnapMirror asynchronous disaster recovery
Learn about SnapMirror synchronous disaster recovery
Default data protection policies
Learn about workloads supported by StrictSync and Sync policies
Learn about vault archiving using SnapMirror technology
Learn about SnapMirror unified replication
When a destination volume grows automatically
Learn about data protection fan-out and cascade deployments
Learn about SnapMirror licensing
Learn about DPO systems feature enhancements
Learn about path name pattern matching in SnapMirror commands
Learn about extended queries for SnapMirror relationship operations
Compatible ONTAP versions for SnapMirror relationships
Learn about SnapMirror limitations
Configure SnapMirror volume replication
SnapMirror replication workflow
Configure a replication relationship in one step
Configure a replication relationship one step at a time
Create a SnapMirror destination volume
Create a SnapMirror replication job schedule
Customize a SnapMirror replication policy
Create a custom SnapMirror replication policy
Define a rule for a SnapMirror policy
Define a SnapMirror schedule to create a local copy on the destination
Create a SnapMirror replication relationship
Initialize a SnapMirror replication relationship
Ensure a common snapshot in a mirror-vault deployment
Example of how to configure a SnapMirror vault-vault cascade
Manage SnapMirror volume replication
Convert an existing SnapMirror DP-type relationship to XDP
Convert the type of a SnapMirror relationship
Convert the mode of a SnapMirror synchronous relationship
Create and delete a SnapMirror failover test volumes
Serve data from a SnapMirror DR destination volume
Make the SnapMirror destination volume writeable
Configure the SnapMirror destination volume for data access
Reactivate the original SnapMirror source volume
Restore files from a SnapMirror destination volume
Restore a single file, LUN, or NVMe namespace from a SnapMirror destination
Restore volume contents from a SnapMirror destination
Update a SnapMirror replication relationship manually
Resynchronize a SnapMirror replication relationship
Delete a SnapMirror volume replication relationship
Manage storage efficiency on SnapMirror volumes
Use SnapMirror global throttling
Manage SnapMirror SVM replication
Learn about SnapMirror SVM replication
Replicate SVM configurations
SnapMirror SVM replication workflow
Criteria for placing volumes on SnapMirror destination SVMs
Replicate an entire SVM configuration
Exclude LIFs and related network settings from SnapMirror SVM replication
Exclude network, name service, and other settings from SnapMirror SVM replication
Specify local tiers to use for SVM DR relationships
SMB only: Create a SMB server
Exclude volumes from a SnapMirror SVM replication
Serve data from a SnapMirror SVM DR destination
SnapMirror SVM disaster recovery workflow
Make SnapMirror SVM destination volumes writeable
Reactivate the SnapMirror source SVM
SnapMirror source SVM reactivation workflow
Reactivate the original SnapMirror source SVM
Reactivate the original SnapMirror source SVM (FlexGroup volumes only)
Resynchronize a destination SnapMirror storage VM
Convert SnapMirror volume replication relationships to an SVM replication relationship
Delete a SnapMirror SVM replication relationship
Manage SnapMirror root volume replication
Learn about SnapMirror root volume replication
Create and initializing load-sharing mirror relationships
Update a load-sharing mirror relationship
Promote a load-sharing mirror
Back up to the cloud
Install a SnapMirror cloud license
Back up data to the cloud using SnapMirror
Back up data using BlueXP backup and recovery
Archive and compliance using SnapLock technology
Learn about SnapLock
Configure SnapLock
Overview
Initialize the Compliance Clock
Create a SnapLock aggregate
Create and mount a SnapLock volume
Set the retention time
Create an audit log
Verify SnapLock settings
Manage WORM files
Overview
Commit files to WORM
Commit snapshots to WORM on a vault destination
Mirror WORM files for disaster recovery
Retain WORM files during litigation
Delete WORM files
Move a SnapLock volume
Tamperproof snapshot locking
SnapLock APIs
Consistency groups
Overview
Learn about consistency group limits
Configure a single consistency group
Configure a hierarchical consistency group
Protect a consistency group
Modify a consistency group
Modify consistency group geometry
Modify application and component tags
Clone a consistency group
Delete a consistency group
SnapMirror active sync
Introduction
Overview
Architecture
Use cases
Deployment strategy
Plan
Prerequisites
Interoperability
Limits
Configure
Configure ONTAP clusters for SnapMirror active sync
Configure ONTAP Mediator
Prepare to configure ONTAP Cloud Mediator
Configure ONTAP Cloud Mediator
Configure protection
Convert to SnapMirror active sync
Convert to symmetric active/active
Manage SnapMirror active sync and protect data
Create a common snapshot copy
Perform a planned failover
Recover from automatic unplanned failover operations
Monitor SnapMirror active sync
Add and remove volumes to a consistency group
Upgrade and revert
Remove a SnapMirror active sync configuration
Remove ONTAP Mediator or ONTAP Cloud Mediator
Troubleshoot
SnapMirror delete operation fails in takeover state
Failure creating a SnapMirror relationship and initializing consistency group
Planned failover unsuccessful
Mediator not reachable or Mediator quorum status is false
ONTAP Cloud Mediator is reachable but responding slowly
Automatic unplanned failover not triggered on Site B
Link between Site B and Mediator down and Site A down
Link between Site A to Mediator Down and Site B down
SnapMirror delete operation fails when fence is set on destination volumes
Volume move operation stuck when primary site is down
Release operation fails when unable to delete Snapshot copy
Volume move reference Snapshot copy shows as the newest
ONTAP Mediator for MetroCluster and SnapMirror active sync
Overview
What's new
Install or upgrade
Workflow
Prepare to install or upgrade
Upgrade host OS and Mediator
Enable access to repositories
Download install package
Verify code signature
Install Mediator package
Verify installation
Post-installation configuration
Manage ONTAP Mediator
Host maintenance
Learn about MetroCluster IP site management with System Manager
Data protection using tape backup
Tape backup overview
Tape backup and restore workflow
Use cases for choosing a tape backup engine
Manage tape drives
Overview
Commands for managing tape drives, media changers, and tape drive operations
Use a nonqualified tape drive
Assign tape aliases
Remove tape aliases
Enable or disable tape reservations
Commands for verifying tape library connections
About tape drives
Qualified tape drives overview
Format of the tape configuration file
How the storage system qualifies a new tape drive dynamically
Tape devices overview
Overview
Tape device name format
Supported number of simultaneous tape devices
Tape aliasing
Overview
What physical path names are
What serial numbers are
Considerations when configuring multipath tape access
How you add tape drives and libraries to storage systems
What tape reservations are
Transfer data between storage systems
Transfer data using ndmpcopy
Options for the ndmpcopy command
NDMP for FlexVol volumes
About NDMP for FlexVol volumes
About NDMP modes of operation
Overview
What node-scoped NDMP mode is
What SVM-scoped NDMP mode is
Considerations when using NDMP
Environment variable
Overview
Environment variables supported by ONTAP
Common NDMP tape backup topologies
Supported NDMP authentication methods
NDMP extensions supported by ONTAP
NDMP restartable backup extension for a dump supported by ONTAP
What enhanced DAR functionality is
Scalability limits for NDMP sessions
About NDMP for FlexGroup volumes
About NDMP with SnapLock volumes
Manage node-scoped NDMP mode for FlexVol volumes
Overview
Commands for managing node-scoped NDMP mode
User authentication in a node-scoped NDMP mode
Manage SVM-scoped NDMP mode for FlexVol volumes
Overview
Commands for managing SVM-scoped NDMP mode
What Cluster Aware Backup extension does
Availability of volumes and tape devices for backup and restore on different LIF types
What affinity information is
NDMP server supports secure control connections in SVM-scoped mode
NDMP data connection types
User authentication in the SVM-scoped NDMP mode
Generate an NDMP-specific password for NDMP users
How tape backup and restore operations are affected during disaster recovery in MetroCluster configuration
About dump engine for FlexVol volumes
About
How a dump backup works
Types of data that the dump engine backs up
What increment chains are
What the blocking factor is
When to restart a dump backup
How a dump restore works
Types of data that the dump engine restores
Considerations before restoring data
Scalability limits for dump backup and restore sessions
Tape backup and restore support between Data ONTAP operating in 7-Mode and ONTAP
Delete restartable contexts
How dump works on a SnapVault secondary volume
How dump works with storage failover and ARL operations
How dump works with volume move
How dump works when a FlexVol volume is full
How dump works when volume access type changes
How dump works with SnapMirror single file or LUN restore
How dump backup and restore operations are affected in MetroCluster configurations
About SMTape engine for FlexVol volumes
About
Use Snapshot copies during SMTape backup
SMTape capabilities
Features not supported in SMTape
Scalability limits for SMTape backup and restore sessions
What tape seeding is
How SMTape works with storage failover and ARL operations
How SMTape works with volume move
How SMTape works with volume rehost operations
How NDMP backup policy are affected during ADB
How SMTape backup and restore operations are affected in MetroCluster configurations
Monitor tape backup and restore operations for FlexVol volumes
Overview
Access the event log files
What the dump and restore event log message format is
Overview
What logging events are
What dump events are
What restore events are
Enable or disable event logging
Error messages for tape backup and restore of FlexVol volumes
Backup and restore error messages
Resource limitation: no available thread
Tape reservation preempted
Could not initialize media
Maximum number of allowed dumps or restores (maximum session limit) in progress
Media error on tape write
Tape write failed
Tape write failed - new tape encountered media error
Tape write failed - new tape is broken or write protected
Tape write failed - new tape is already at the end of media
Tape write error
Media error on tape read
Tape read error
Already at the end of tape
Tape record size is too small. Try a larger size.
Tape record size should be block_size1 and not block_size2
Tape record size must be in the range between 4KB and 256KB
NDMP error messages
Network communication error
Message from Read Socket: error_string
Message from Write Dirnet: error_string
Read Socket received EOF
ndmpd invalid version number: version_number ``
ndmpd session session_ID not active
Could not obtain vol ref for Volume volume_name
Data connection type ["NDMP4_ADDR_TCP"|"NDMP4_ADDR_TCP_IPv6"] not supported for ["IPv6"|"IPv4"] control connections
DATA LISTEN: CAB data connection prepare precondition error
DATA CONNECT: CAB data connection prepare precondition error
Error:show failed: Cannot get password for user '<username>'
Dump error messages
Destination volume is read-only
Destination qtree is read-only
Dumps temporarily disabled on volume, try again
NFS labels not recognized
No files were created
Restore of the file <file name> failed
Truncation failed for src inode <inode number>…
Unable to lock a snapshot needed by dump
Unable to locate bitmap files
Volume is temporarily in a transitional state
SMTape error messages
Chunks out of order
Chunk format not supported
Failed to allocate memory
Failed to get data buffer
Failed to find snapshot
Failed to create snapshot
Failed to lock snapshot
Failed to delete snapshot
Failed to get latest snapshot
Failed to load new tape
Failed to initialize tape
Failed to initialize restore stream
Failed to read backup image
Image header missing or corrupted
Internal assertion
Invalid backup image magic number
Invalid backup image checksum
Invalid input tape
Invalid volume path
Mismatch in backup set ID
Mismatch in backup time stamp
Job aborted due to shutdown
Job aborted due to Snapshot autodelete
Tape is currently in use by other operations
Tapes out of order
Transfer failed (Aborted due to MetroCluster operation)
Transfer failed (ARL initiated abort)
Transfer failed (CFO initiated abort)
Transfer failed (SFO initiated abort)
Underlying aggregate under migration
Volume is currently under migration
Volume offline
Volume not restricted
NDMP configuration
Learn about NDMP configuration
Learn about NDMP configuration workflow
Prepare NDMP configurations
Verify NDMP tape device connections
Enable tape reservations for NDMP backup operations
Configure SVM-scoped NDMP
Enable SVM-scoped NDMP on the cluster
Enable backup users for NDMP authentication
Configure LIFs for SVM-scoped NDMP
Configure node-scoped NDMP
Enable node-scoped NDMP on the cluster
Configure LIFs for node-scoped NDMP
Configure backup applications for NDMP configuration
Replication between NetApp Element software and ONTAP
Event, performance, and health monitoring
Monitor cluster performance with System Manager
Monitor cluster performance using ONTAP System Manager
Dashboard tour
Identify hot objects
Modify QoS
Monitor risks with Digital Advisor
Optimize system with insights
Configure native FPolicy
Monitor and manage cluster performance using the CLI
Overview
Monitor performance
Workflow
Verify that your VMware environment is supported
Active IQ Unified Manager worksheet
Install Active IQ Unified Manager
Download and deploy Active IQ Unified Manager
Configure initial Active IQ Unified Manager settings
Specify the clusters to be monitored
Set up basic monitoring tasks
Perform daily monitoring
Use weekly and monthly performance trends to identify performance issues
Use performance thresholds to generate event notifications
Set performance thresholds
Add alerts
Configure alert settings
Identify performance issues in Active IQ Unified Manager
Use Digital Advisor to view system performance
Manage performance issues
Workflow
Perform basic infrastructure checks
Check protocol settings on the storage system
Check the NFS TCP maximum transfer size
Check the iSCSI TCP read/write size
Check the CIFS multiplex settings
Check the FC adapter port speed
Check the network settings on the data switches
Check the MTU network setting on the storage system
Check disk throughput and latency
Check throughput and latency between nodes
Manage workloads
Identify remaining performance capacity
Identify high-traffic clients or files
Guarantee throughput with QoS
Overview
Enable or disable throughput floors v2
Storage QoS workflow
Set a throughput ceiling with QoS
Set a throughput floor with QoS
Use adaptive QoS policy groups
Set adaptive policy group template
Monitor cluster performance with Unified Manager
Monitor cluster performance with Data Infrastructure Insights
Audit logging
How ONTAP implements audit logging
Changes to audit logging in ONTAP 9
Display audit log contents
Manage audit GET request settings
Enable cross-cluster audits
Manage audit log destinations
AutoSupport
Learn about AutoSupport
About AutoSupport
About Digital Advisor and AutoSupport
When and where AutoSupport messages are sent
How AutoSupport creates and sends event-triggered messages
Types of AutoSupport messages and their content
View AutoSupport subsystems
AutoSupport size and time budgets
Files sent in event-triggered AutoSupport messages
Log files sent in AutoSupport messages
Files sent in weekly AutoSupport messages
How AutoSupport OnDemand obtains delivery instructions from technical support
Structure of AutoSupport messages sent by email
AutoSupport severity types
Get AutoSupport message descriptions
Commands for managing AutoSupport
Information included in the AutoSupport manifest
Plan
Prepare to use AutoSupport
Set up AutoSupport
Configure
Manage AutoSupport settings
Suppress AutoSupport case creation during scheduled maintenance windows
Upload files using AutoSupport
Upload core dump files
Upload performance archive files
Troubleshoot
Troubleshoot AutoSupport when messages are not received
Troubleshoot AutoSupport message delivery over HTTPS
Troubleshoot AutoSupport message delivery over SMTP
Troubleshoot the AutoSupport subsystem
Health monitoring
Overview
How health monitoring works
Ways to respond to system health alerts
System health alert customization
How health alerts trigger AutoSupport messages and events
Available cluster health monitors
Receive system health alerts automatically
Respond to degraded system health
Example of responding to degraded system health
Commands for monitoring the health of your system
Display environmental information
File System Analytics
Overview
Enable File System Analytics
View ONTAP file system activity
Enable Activity Tracking
Enable usage analytics
Take corrective action based on analytics
Role-based access control
Considerations
EMS configuration
Overview
Configure EMS event notifications with System Manager
Configure EMS event notifications with the CLI
Workflow
Configure EMS events to send email notifications
Configure EMS events to forward notifications to a syslog server
Configure SNMP traphosts to receive event notifications
Configure EMS events to forward notifications to a webhook application
Update deprecated EMS event mapping
EMS event mapping models
Update EMS event mapping from deprecated ONTAP commands
ONTAP manual pages
Legal notices