This division ensures that further SOAP
Once determined in accordance with the procedure described in Annex 3 . When we discussed switches and routers earlier in this book, we mentioned ports. management can be configured. There are three ways of configuring the call
VLANs separate traffic from a network port (which could be an interface group) into logical segments defined on a switch port basis, rather than on physical boundaries. A logical port is one that is defined in software. Right-click a Port Surface or a Role Link, and then click New Configured Port. The second is the logical port, which A logical port is one that is defined in software. developer can, for example, define whether communication between the client
Assign Target system . An example of such a feature is the URL call
This policyRule.if block includes both the allOf and anyOf logical operators. a place (seaport or airport) where people and merchandise can enter or leave a country. What else should I check before I revert? Expert - Computing. At the software level, within an operating system, a port is a logical construct that identifies a specific process or a type of network service.A port is identified for each transport protocol and address combination by a 16-bit unsigned number, known as the . Hardware Port A hardware port is simply a connection to the computer. Enable automatic switchover for MetroCluster configurations, Verify user accounts that can access the Service Processor, Monitor risks with Active IQ Digital Advisor, Gain insights to help optimize your system, View hardware configurations and determine problems, Reboot, shut down, take over, and give back nodes, Access the cluster by using the serial port, Enable Telnet or RSH access to the cluster, Access of nodeshell commands and options in the clustershell, Methods of navigating CLI command directories, Methods of viewing command history and reissuing commands, Keyboard shortcuts for editing CLI commands, Methods of customizing show command output by using fields, Commands for managing records of CLI sessions, Commands for managing the automatic timeout period of CLI sessions, Display information about the nodes in a cluster, Display the status of cluster replication rings, Access a nodes log, core dump, and MIB files by using a web browser, Boot ONTAP at the boot environment prompt, What the Baseboard Management Controller does, Considerations for the SP/BMC network configuration, Enable the SP/BMC automatic network configuration, Methods of managing SP/BMC firmware updates, When the SP/BMC uses the network interface for firmware updates, Access the SP/BMC from an administration host, Access the SP/BMC from the system console, Relationship among the SP CLI, SP console, and system console sessions, Manage the IP addresses that can access the SP, About the threshold-based SP sensor readings and status values of the system sensors command output, About the discrete SP sensor status values of the system sensors command output, Manage the cluster time (cluster administrators only), How the node and cluster configurations are backed up automatically, Commands for managing configuration backup schedules, Commands for managing configuration backup files, Find a configuration backup file to use for recovering a node, Restore the node configuration using a configuration backup file, Find a configuration to use for recovering a cluster, Restore a cluster configuration from an existing configuration, Manage core dumps (cluster administrators only), Use AutoSupport and Active IQ Digital Advisor, When and where AutoSupport messages are sent, How AutoSupport creates and sends event-triggered messages, Types of AutoSupport messages and their content, Files sent in event-triggered AutoSupport messages, Files sent in weekly AutoSupport messages, How AutoSupport OnDemand obtains delivery instructions from technical support, Structure of AutoSupport messages sent by email, Information included in the AutoSupport manifest, AutoSupport case suppression during scheduled maintenance windows, Troubleshoot AutoSupport when messages are not received, Troubleshoot AutoSupport message delivery over HTTP or HTTPS, Troubleshoot AutoSupport message delivery over SMTP, How health alerts trigger AutoSupport messages and events, Receive system health alerts automatically, Example of responding to degraded system health, Configure discovery of cluster and management network switches, Verify the monitoring of cluster and management network switches, Commands for monitoring the health of your system, Commands for managing the web protocol engine, Troubleshoot issues with SAML configuration, Commands for managing mount points on the nodes, Verify digital certificates are valid using OCSP, View default certificates for TLS-based applications, Generate a certificate signing request for the cluster, Install a CA-signed server certificate for the cluster, Install a CA-signed client certificate for the KMIP server, Mirrored and unmirrored local tiers (aggregates), Determine the number of disks or disk partitions required for a local tier (aggregate), Decide which local tier (aggregate) creation method to use, Add (create) local tiers (aggregates) automatically, Add (create) local tiers (aggregates) manually, Set media cost of a local tier (aggregate), Determine drive and RAID group information for a local tier (aggregate), Assign local tiers (aggregates) to storage VMs (SVMs), Determine which volumes reside on a local tier (aggregate), Determine and control a volumes space usage in a local tier (aggregate), Determine space usage in a local tier (aggregate), Relocate local tier (aggregate) ownership within an HA pair, Commands for relocating local tiers (aggregates), Commands for managing local tiers (aggregates), Workflow to add capacity to a local tier (expanding an aggregate), Methods to create space in a local tier (aggregate), How low spare warnings can help you manage your spare disks, Additional root-data partitioning management options, When you need to update the Disk Qualification Package, Manually assign ownership of partitioned disks, Configure automatic assignment of disk ownership, Set up an active-passive configuration on nodes using root-data partitioning, Set up an active-passive configuration on nodes using root-data-data partitioning, What happens if sanitization is interrupted, Tips for managing local tiers (aggregates) containing data to be sanitized, Commands for displaying space usage information, Commands for displaying information about storage shelves, Default RAID policies for local tiers (aggregates), Drive and RAID group information for a local tier (aggregate), Flash Pool local tier (aggregate) caching policies, Determine whether to modify the caching policy of Flash Pool local tiers (aggregates), Modify caching policies of Flash Pool local tiers (aggregates), Set the cache-retention policy for Flash Pool local tiers (aggregates), Flash Pool SSD partitioning for Flash Pool local tiers (aggregates) using storage pools, Flash Pool candidacy and optimal cache size, Create a Flash Pool local tier (aggregate) using physical SSDs, Determine whether a Flash Pool local tier (aggregate) is using an SSD storage pool, Create a Flash Pool using SSD storage pool allocation units, Determine the impact to cache size of adding SSDs to an SSD storage pool, Benefits of storage tiers by using FabricPool, Considerations and requirements for using FabricPool, Install a CA certificate if you use StorageGRID, Install a CA certificate if you use ONTAP S3, Set up Alibaba Cloud Object Storage as the cloud tier, Specify the AWS S3 configuration information, Set up Google Cloud Storage as the cloud tier, Set up IBM Cloud Object Storage as the cloud tier, Set up Azure Blob Storage for the cloud as the cloud tier, Set up object stores for FabricPool in a MetroCluster configuration, Determine how much data in a volume is inactive by using inactive data reporting, Check object tagging status on FabricPool volumes, Monitor the space utilization for FabricPool, Manage storage tiering by modifying a volumes tiering policy or tiering minimum cooling period, Use cloud migration controls to override a volumes default tiering policy, Promote all data from a FabricPool volume to the performance tier, Promote file system data to the performance tier, Check the status of a performance tier promotion, Replace an existing object store using a FabricPool mirror, Replace a FabricPool mirror on a MetroCluster configuration, Commands for managing aggregates with FabricPool, How automatic takeover and giveback works, Commands for enabling and disabling storage failover, Halt or reboot a node without initiating takeover, Balance loads by moving volumes to another tier, Use Ansible Playbooks to add or edit volumes or LUNs, Determine space usage in a volume or aggregate, Configure volumes to automatically provide more space when they are full, Configure volumes to automatically grow and shrink their size, Requirements for enabling both autoshrink and automatic Snapshot copy deletion, How the autoshrink functionality interacts with Snapshot copy deletion, Address FlexVol volume fullness and overallocation alerts, Address aggregate fullness and overallocation alerts, Considerations for setting fractional reserve, Control and monitoring I/O performance to FlexVol volumes by using Storage QoS, Protection against accidental volume deletion, Considerations and recommendations when moving volumes, Requirement for moving volumes in SAN environments, Split a FlexClone volume from its parent volume, Determine the space used by a FlexClone volume, Considerations for creating a FlexClone volume from a SnapMirror source or destination volume, View node capacity for creating and deleting FlexClone files and FlexClone LUNs, View the space savings due to FlexClone files and FlexClone LUNs, Methods to delete FlexClone files and FlexClone LUNs, Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs, Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted, Commands for configuring deletion of FlexClone files, Convert a directory to a qtree using a Windows client, Convert a directory to a qtree using a UNIX client, Commands for managing and configuring qtrees, Enable logical space reporting and enforcement, Differences among hard, soft, and threshold quotas, What quota rules, quota policies, and quotas are, Considerations for assigning quota policies, How default user and group quotas create derived quotas, How quotas work with special Windows groups, How quotas are applied to users with multiple IDs, How ONTAP determines user IDs in a mixed environment, How you link UNIX and Windows names for quotas, How user and group quotas work with qtrees, How default tree quotas on a FlexVol volume create derived tree quotas, How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume, How changing the security style of a qtree affects user quotas, When a full quota reinitialization is required, How you can use the quota report to see what quotas are in effect, Why enforced quotas differ from configured quotas, Use the quota report to determine which quotas limit writes to a specific file, Commands for displaying information about quotas, When to use the volume quota policy rule show and volume quota report commands, How a quota report accounts for disk space and file usage, How the ls command accounts for space usage, How the df command accounts for file size, How the du command accounts for space usage, Reinitialize quotas after making extensive changes, Commands to manage quota rules and quota policies, Manage automatic volume-level background deduplication on AFF systems, Manage aggregate-level inline deduplication on AFF systems, Manage aggregate-level background deduplication on AFF systems, Temperature-sensitive storage efficiency overview, View temperature sensitive storage efficiency physical footprint savings, Move between secondary compression and adaptive compression, Manage inline data compaction for AFF systems, Enable inline data compaction for FAS systems, Inline storage efficiency enabled by default on AFF systems, Assign a volume efficiency policy to a volume, Disassociate a volume efficiency policy from a volume, Use checkpoints to resume efficiency operation, Run efficiency operations manually on existing data, Run efficiency operations depending on the amount of new data written, Run efficiency operations using scheduling, View efficiency statistics of a FlexVol volume, Information about removing space savings from a volume, Rehost volumes in a SnapMirror relationship, Features that do not support volume rehost, Determine the correct volume and LUN configuration combination for your environment, Configuration settings for space-reserved files or LUNs with thick-provisioned volumes, Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes, Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning, Considerations for changing the maximum number of files allowed on a FlexVol volume, Cautions for increasing the maximum directory size for FlexVol volumes, How deduplication works with FlexClone files and FlexClone LUNs, How Snapshot copies work with FlexClone files and FlexClone LUNs, How access control lists work with FlexClone files and FlexClone LUNs, How quotas work with FlexClone files and FlexClone LUNs, How FlexClone volumes work with FlexClone files and FlexClone LUNs, How NDMP works with FlexClone files and FlexClone LUNs, How volume SnapMirror works with FlexClone files and FlexClone LUNs, How volume move affects FlexClone files and FlexClone LUNs, How space reservation works with FlexClone files and FlexClone LUNs, How an HA configuration works with FlexClone files and FlexClone LUNs, FlexGroup volumes management with System Manager, Supported and unsupported configurations for FlexGroup volumes, Enable 64-bit NFSv3 identifiers on an SVM, Provision a FlexGroup volume automatically, Monitor the space usage of a FlexGroup volume, Configure FlexGroup volumes to automatically grow and shrink their size, Manage client rights to delete directories rapidly, Enable storage efficiency on a FlexGroup volume, Protect FlexGroup volumes using Snapshot copies, Move the constituents of a FlexGroup volume, Use aggregates in FabricPool for existing FlexGroup volumes, Create a SnapMirror relationship for FlexGroup volumes, Create a SnapVault relationship for FlexGroup volumes, Create a unified data protection relationship for FlexGroup volumes, Create an SVM disaster recovery relationship for FlexGroup volumes, Transition an existing FlexGroup SnapMirror relationship to SVM DR, Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship, Considerations for creating SnapMirror cascade and fanout relationships for FlexGroups, Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes, Monitor SnapMirror data transfers for FlexGroup volumes, Activate the destination FlexGroup volume, Reactivate the original source FlexGroup volume after disaster, Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery, Expand the source FlexGroup volume of a SnapMirror relationship, Expand the destination FlexGroup volume of a SnapMirror relationship, Perform a SnapMirror single file restore from a FlexGroup volume, Restore a FlexGroup volume from a SnapVault backup, Disable SVM protection on a FlexGroup volume, Enable SVM protection on a FlexGroup volume, Convert a FlexVol volume to a FlexGroup volume, Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship, FlexCache volumes management with System Manager, Supported and unsupported features for FlexCache volumes, Considerations for auditing FlexCache volumes, View the connection status of a FlexCache relationship, Synchronize properties of a FlexCache volume from an origin volume, Update the configurations of a FlexCache relationship, About NAS path failover for ONTAP 9.8 and later, Worksheet for NAS path failover configuration, Set up NAS path failover (ONTAP 9.0-9.7 CLI), Determine which ports can be used for a broadcast domains, Verify your networking configuration after upgrading to ONTAP 9.8 or later, Relationship between broadcast domains, failover groups, and failover policies, Combine physical ports to create interface groups, Modify MTU setting for interface group ports, Monitor the reachability of network ports in ONTAP 9.8 and later, Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity, Removing a NIC from the node on ONTAP 9.7 or earlier, Removing a NIC from the node on ONTAP 9.8 or later, About broadcast domains for ONTAP 9.8 and later, Add or remove ports from a broadcast domain, Change the MTU value for ports in a broadcast domain, About broadcast domains for ONTAP 9.7 and earlier, Commands for managing failover groups and policies, ONTAP 9.8 or later-Recover from an incorrectly configured cluster LIF, Manage the hosts table (cluster administrators only), Add or remove a LIF from a load balancing zone, Configure network security using Federal Information Processing Standards (FIPS), Configure IP security (IPsec) over wire encryption, Commands for managing firewall service and policies, Create an SNMP community and assign it to a LIF, Configure traphosts to receive SNMP notifications, Remove dynamic routes from routing tables, Display information about a VLAN (cluster administrators only), Display interface group information (cluster administrators only), Display DNS host table entries (cluster administrators only), Display information about failover groups, Display network connectivity with neighbor discovery protocols, Decide where to provision new NFS storage capacity, Worksheet for gathering NFS configuration information, Verify that the NFS protocol is enabled on the SVM, Open the export policy of the SVM root volume, Verify the status of netgroup definitions, Install the self-signed root CA certificate on the SVM, Associate the LDAP client configuration with SVMs, Verify LDAP sources in the name service switch table, Verify permissions for Kerberos configuration, Create an NFS Kerberos realm configuration, Configure NFS Kerberos permitted encryption types, Manage the processing order of export rules, Verify NFS client access from the cluster, Comparison of exports in 7-Mode and ONTAP, What the typical NAS namespace architectures are, How ONTAP grants SMB file access from NFS clients, Create data volumes with specified junction points, Creating data volumes without specifying junction points, Mounting or unmounting existing volumes in the NAS namespace, Displaying volume mount and junction point information, What the security styles and their effects are, Decide which security style to use on SVMs, Manage UNIX permissions using the Windows Security tab, Configure security styles on SVM root volumes, Configure security styles on FlexVol volumes, How export policies control client access to volumes or qtrees, Manage clients with an unlisted security type, How security types determine client access levels, Validating qtree IDs for qtree file operations, Export policy restrictions and nested junctions for FlexVol volumes, Requirements for configuring Kerberos with NFS, How ONTAP name service switch configuration works, Configuration options for LDAP directory searches, Improve performance of LDAP directory netgroup-by-host searches, Use LDAP fast bind for nsswitch authentication, Multidomain searches for UNIX user to Windows user name mappings, Enable the display of NFS exports on NFS clients, Controlling NFS requests from nonreserved ports, Handling NFS access to NTFS volumes or qtrees for unknown UNIX users, Considerations for clients that mount NFS exports using a nonreserved port, Performing stricter access checking for netgroups by verifying domains, Commands for managing name service switch entries, Limits for local UNIX users, groups, and group members, Manage limits for local UNIX users and groups, Commands for managing NIS domain configurations, Commands for managing LDAP client configurations, Commands for managing LDAP configurations, Commands for managing LDAP client schema templates, Commands for managing NFS Kerberos interface configurations, Commands for managing NFS Kerberos realm configurations, Reasons for modifying the NFS credential cache time-to-live, Configure the time-to-live for cached NFS user credentials, Display the export policy netgroup queue and cache, Checking whether a client IP address is a member of a netgroup, How ONTAP differs from Windows on handling locks on share path components, How FPolicy first-read and first-write filters work with NFS, Modifying the NFSv4.1 server implementation ID, Enable or disable modification of NFSv4 ACLs, How ONTAP uses NFSv4 ACLs to determine whether it can delete a file, Modifying the maximum ACE limit for NFSv4 ACLs, Enable or disable NFSv4 read file delegations, Enable or disable NFSv4 write file delegations, Specifying the NFSv4 locking lease period, Specifying the NFSv4 locking grace period, Enable or disable VMware vStorage over NFS, NFSv3 and NFSv4 performance improvement by modifying the TCP transfer size, Modifying the NFSv3 and NFSv4 TCP maximum transfer size, Configure the number of group IDs allowed for NFS users, Controlling root user access to NTFS security-style data, Characters a file or directory name can use, Case-sensitivity of file and directory names in a multiprotocol environment, How ONTAP creates file and directory names, How ONTAP handles multi-byte file, directory, and qtree names, Configure character mapping for SMB file name translation on volumes, Commands for managing character mappings for SMB file name translation, Decide where to provision new SMB storage capacity, Worksheet for gathering SMB configuration information, Verify that the SMB protocol is enabled on the SVM, Create an SMB server in an Active Directory domain, Create keytab files for SMB authentication, Requirements and considerations for creating an SMB share, Configure NTFS file permissions in a share, Configure NIS or LDAP name services on the SVM, Configure the grant UNIX group permission to SMB users, Configure access restrictions for anonymous users, Enable or disable the presentation of NTFS ACLs for UNIX security-style data, How ONTAP handles SMB client authentication, Guidelines for SMB server security settings in an SVM disaster recovery configuration, Display information about CIFS server security settings, Enable or disable required password complexity for local SMB users, Modify the CIFS server Kerberos security settings, Set the CIFS server minimum authentication security level, Configure strong security for Kerberos-based communication by using AES encryption, Enable or disable AES encryption for Kerberos-based communication, How SMB signing policies affect communication with a CIFS server, Recommendations for configuring SMB signing, Guidelines for SMB signing when multiple data LIFS are configured, Enable or disable required SMB signing for incoming SMB traffic, Determining whether SMB sessions are signed, Enable or disable required SMB encryption for incoming SMB traffic, Determine whether clients are connected using encrypted SMB sessions, Enable LDAP signing and sealing on the CIFS server, Export a copy of the self-signed root CA certificate, Configure SMB Multichannel for performance and redundancy, Display information about what types of users are connected over SMB sessions, Command options to limit excessive Windows client resource consumption, Write cache data-loss considerations when using oplocks, Enable or disable oplocks when creating SMB shares, Commands for enabling or disabling oplocks on volumes and qtrees, Enable or disable oplocks on existing SMB shares, Requirements for using GPOs with your CIFS server, Enable or disable GPO support on a SMB server, Manually updating GPO settings on the CIFS server, Display information about GPO configurations, Display detailed information about restricted group GPOs, Display information about central access policies, Display information about central access policy rules, Commands for managing CIFS servers computer account passwords, Display information about discovered servers, Commands for managing preferred domain controllers, Enable SMB2 connections to domain controllers, Enable encrypted connections to domain controllers, How the storage system provides null session access, Grant null users access to file system shares, Add a list of NetBIOS aliases to the CIFS server, Remove NetBIOS aliases from the NetBIOS alias list, Display the list of NetBIOS aliases on CIFS servers, Determine whether SMB clients are connected using NetBIOS aliases, Modify the dynamic DNS domain on the SVM before moving the SMB server, Display information about NetBIOS over TCP connections, Support for IPv6 with SMB access and CIFS services, How CIFS servers use IPv6 to connect to external servers, Enable IPv6 for SMB (cluster administrators only), Monitor and display information about IPv6 SMB sessions, Create data volumes without specifying junction points, Mount or unmount existing volumes in the NAS namespace, Display volume mount and junction point information, Enable or disable multidomain name mapping searches, Display information about discovered trusted domains, Add, remove, or replace trusted domains in preferred trusted domain lists, Display information about the preferred trusted domain list, What the default administrative shares are, Directory case-sensitivity requirements when creating shares in a multiprotocol environment, Add or remove share properties on an existing SMB share, Optimize SMB user access with the force-group share setting, Create an SMB share with the force-group share setting, View information about SMB shares using the MMC, Guidelines for managing SMB share-level ACLs, Commands for managing SMB share access control lists, Configure advanced NTFS file permissions using the Windows Security tab, Configure NTFS file permissions using the ONTAP CLI, How UNIX file permissions provide access control when accessing files over SMB, Supported Dynamic Access Control functionality, Considerations when using Dynamic Access Control and central access policies with CIFS servers, Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled, Configure central access policies to secure data on CIFS servers, Display information about Dynamic Access Control security, Revert considerations for Dynamic Access Control, Where to find additional information about configuring and using Dynamic Access Control and central access policies, How export policies are used with SMB access, Examples of export policy rules that restrict or allow access over SMB, Enable or disable export policies for SMB access, Use cases for using Storage-Level Access Guard, Workflow to configure Storage-Level Access Guard, Display information about Storage-Level Access Guard, Reasons for creating local users and local groups, Guidelines for using SnapMirror on SVMs that contain local groups, What happens to local users and groups when deleting CIFS servers, How you can use Microsoft Management Console with local users and groups, Guidelines for using BUILTIN groups and the local administrator account, Predefined BUILTIN groups and default privileges, Enable or disable local user authentication, Display information about group memberships for local users, Display information about members of local groups, Update domain user and group names in local databases, Add privileges to local or domain users or groups, Remove privileges from local or domain users or groups, Reset privileges for local or domain users and groups, Display information about privilege overrides, Allow users or groups to bypass directory traverse checking, Disallow users or groups from bypassing directory traverse checking, Display information about file security on NTFS security-style volumes, Display information about file security on mixed security-style volumes, Display information about file security on UNIX security-style volumes, Display information about NTFS audit policies on FlexVol volumes using the CLI, Display information about NFSv4 audit policies on FlexVol volumes using the CLI, Ways to display information about file security and audit policies, Use cases for using the CLI to set file and folder security, Limits when using the CLI to set file and folder security, How security descriptors are used to apply file and folder security, Guidelines for applying file-directory policies that use local users or groups on the SVM disaster recovery destination, Add NTFS DACL access control entries to the NTFS security descriptor, Add NTFS SACL access control entries to the NTFS security descriptor, Considerations when managing security policy jobs, Commands for managing NTFS security descriptors, Commands for managing NTFS DACL access control entries, Commands for managing NTFS SACL access control entries, Commands for managing security policy tasks, Commands for managing security policy jobs, Configure the lifetime of SMB metadata cache entries, Determine which statistics objects and counters are available, Configure offline files support on SMB shares using the CLI, Configure offline files support on SMB shares by using the Computer Management MMC, Requirements for using folder redirection, Access the ~snapshot directory from Windows clients using SMB 2.x, Requirements for using Microsoft Previous Versions, Use the Previous Versions tab to view and manage Snapshot copy data, Determine whether Snapshot copies are available for Previous Versions use, Create a Snapshot configuration to enable Previous Versions access, Guidelines for restoring directories that contain junctions, How ONTAP enables dynamic home directories, Home directory shares require unique user names, What happens to static home directory share names after upgrading, Create a home directory configuration using the %w and %d variables, Configure home directories using the %u variable, Display information about an SMB users home directory path, Manage accessibility to users' home directories, How ONTAP enables you to provide SMB client access to UNIX symbolic links, Limits when configuring UNIX symbolic links for SMB access, Control automatic DFS advertisements in ONTAP with a CIFS server option, Configure UNIX symbolic link support on SMB shares, Create symbolic link mappings for SMB shares, Commands for managing symbolic link mappings, ONTAP and Windows hosts version requirements, Reasons ONTAP invalidates BranchCache hashes, Guidelines for choosing the hash store location, Where to find information about configuring BranchCache at the remote office, Enable BranchCache on an existing SMB share, Display information about BranchCache configurations, Pre-computing BranchCache hashes on specified paths, Flush hashes from the SVM BranchCache hash store, Support for BranchCache Group Policy Objects, Display information about BranchCache Group Policy Objects, Disable BranchCache on a single SMB share, What happens when you disable or reenable BranchCache on the CIFS server, What happens when you delete the BranchCache configuration, What happens to BranchCache when reverting, Requirements and guidelines for using automatic node referrals, Enable or disable SMB automatic node referrals, Use statistics to monitor automatic node referral activity, Monitor client-side SMB automatic node referral information using a Windows client, Enable or disable access-based enumeration on SMB shares, Enable or disable access-based enumeration from a Windows client, Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions, Protocols that enable nondisruptive operations over SMB, Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB, How SMB 3.0 functionality supports nondisruptive operations over SMB shares, What the Witness protocol does to enhance transparent failover, Example of a directory structure used by Remote VSS, How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB, How ODX copy offload is used with Hyper-V and SQL Server over SMB shares, SMB server and volume requirements for Hyper-V over SMB, SMB server and volume requirements for SQL Server over SMB, Continuously available share requirements and considerations for Hyper-V over SMB, Continuously available share requirements and considerations for SQL Server over SMB, Remote VSS considerations for Hyper-V over SMB configurations, ODX copy offload requirements for SQL Server and Hyper-V over SMB, Recommendations for SQL Server and Hyper-V over SMB configurations, Complete the volume configuration worksheet, Complete the SMB share configuration worksheet, Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares), Verify that domain accounts map to the default UNIX user, Verify that the security style of the SVM root volume is set to NTFS, Verify that required CIFS server options are configured, Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares), Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares), Configure existing shares for continuous availability, Enable or disable VSS shadow copies for Hyper-V over SMB backups, Use health monitoring to determine whether nondisruptive operation status is healthy, Display nondisruptive operation status by using system health monitoring, Verify the continuously available SMB share configuration, Examine configured and used space of a LUN, Control and monitor I/O performance to LUNs using Storage QoS, Tools available to effectively monitor your LUNs, Capabilities and restrictions of transitioned LUNs, I/O misalignments on properly aligned LUNs, Ways to address issues when LUNs go offline, Troubleshoot iSCSI LUNs not visible on the host, Ways to limit LUN access with portsets and igroups, Determine whether SLM is enabled on a LUN map, Configure your network for best performance, Define a security policy method for an initiator, Get more details in iSCSI session error recoveries, Resolve iSCSI error messages on the storage system, Recommended MTU configurations for FCoE jumbo frames, Change the UTA2 port from CNA mode to FC mode, Change the CNA/UTA2 target adapter optical modules, Supported port configurations for X1143A-R6 adapters, Prevent loss of connectivity when using the X1133A-R6 adapter, SAN LIF requirements for adding nodes to a cluster, Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation, Restore a single LUN from a Snapshot copy, Restore all LUNs in a volume from a Snapshot copy, Delete one or more existing Snapshot copies from a volume, Create FlexClone LUNs from a Snapshot copy in a volume, Access a read-only LUN copy from a SnapVault backup, Restore a single LUN from a SnapVault backup, Restore all LUNs in a volume from a SnapVault backup, How you can connect a host backup system to the primary storage system, Back up a LUN through a host backup system, SAN configurations in a MetroCluster environment, How using iSCSI interface access lists to limit initiator interfaces can increase performance and security, Automatic host-side space management with SCSI thinly provisioned LUNs, Enable space allocation for SCSI thinly provisioned LUNs, Simplified host management with SnapCenter, Specify initiator WWPNs and iSCSI node names for an igroup, How LUN access works in a virtualized environment, Considerations for LIFs in cluster SAN environments, Improve VMware VAAI performance for ESX hosts, Ways to configure iSCSI SAN hosts with single nodes, Ways to configure iSCSI SAN hosts with HA pairs, Benefits of using VLANs in iSCSI configurations, Considerations for FC-NVMe configurations, Ways to configure FC and FC-NVMe SAN hosts with single nodes, Ways to configure FC & FC-NVMe SAN hosts with HA pairs, FC Target port configuration recommendations, Display information about an FC target adapter, Zoning restrictions for Cisco FC and FCoE switches, Requirements for shared SAN configurations, When host multipathing software is required, Recommended number of paths from host to nodes in cluster, Determine the number of supported nodes for SAN configurations, Determine the number of supported hosts per cluster in FC and FC-NVMe configurations, Determine the supported number of hosts in iSCSI configurations, Considerations for SAN configurations in a MetroCluster environment, ONTAP version support for S3 object storage, Decide where to provision new S3 storage capacity, Create and install a CA certificate on the SVM, Create intercluster LIFs for remote FabricPool tiering, About bucket and object store server policies, Create or modify an object store server policy, Enable ONTAP S3 access for remote FabricPool tiering, Enable ONTAP S3 access for local FabricPool tiering, Enable SSH multifactor authentication (MFA), Modify the role assigned to an administrator, Predefined roles for cluster administrators, Associate a public key with an administrator account, Create an SVM computer account on the domain, Enforce SHA-2 on administrator account passwords, Enable and disable multi-admin verification, Request execution of protected operations, Vscan server installation and configuration, Create a scanner pool on a single cluster, Create scanner pools in MetroCluster configurations, Apply a scanner policy on a single cluster, Apply scanner policies in MetroCluster configurations, Modify the Vscan file-operations profile for an SMB share, Potential connectivity issues involving the scan-mandatory option, Commands for viewing Vscan server connection status, Limitations for the size of audit records on staging files, What the supported audit event log formats are, Determine what the complete path to the audited object is, Considerations when auditing symlinks and hard links, Considerations when auditing alternate NTFS data streams, NFS file and directory access events that can be audited, Configure audit policies on NTFS security-style files and directories, Configure auditing for UNIX security style files and directories, Display information about audit policies using the Windows Security tab, Display information about auditing configurations, Commands for modifying auditing configurations, Troubleshoot auditing and staging volume space issues, What the two parts of the FPolicy solution are, What synchronous and asynchronous notifications are, Roles that cluster components play with FPolicy implementation, How control channels are used for FPolicy communication, How privileged data access channels are used for synchronous communication, How FPolicy connection credentials are used with privileged data access channels, What granting super user credentials for privileged data access means, What the node-to-external FPolicy server communication process is, How FPolicy services work across SVM namespaces, How FPolicy passthrough-read enhances usability for hierarchical storage management, Requirements, considerations, and best practices for configuring FPolicy, What the steps for setting up an FPolicy configuration are, Additional information about configuring FPolicy external engines to use SSL authenticated connections, Certificates do not replicate in SVM disaster recovery relationships with a non-ID-preserve configuration, Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster recovery configurations, Complete the FPolicy external engine configuration worksheet, List of supported file operation and filter combinations that FPolicy can monitor for SMB, Supported file operation and filter combinations that FPolicy can monitor for NFSv3, Supported file operation and filter combinations that FPolicy can monitor for NFSv4, Complete the FPolicy event configuration worksheet, Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine, Commands for modifying FPolicy configurations, Commands for displaying information about FPolicy configurations, Display information about FPolicy policy status, Display information about enabled FPolicy policies, Display information about connections to external FPolicy servers, Display information about the FPolicy passthrough-read connection status, Types of access checks security traces monitor, Considerations when creating security traces, Display information about security trace filters, Determine whether your cluster version supports NVE, Enable external key management in ONTAP 9.6 and later (NVE), Enable external key management in ONTAP 9.5 and earlier, Manage keys with Azure or Google key managements services, Enable onboard key management in ONTAP 9.6 and later (NVE), Enable onboard key management in ONTAP 9.5 and earlier (NVE), Enable onboard key management in newly added nodes, Enable aggregate-level encryption with VE license, Enable encryption on an existing volume with the volume encryption conversion start command, Enable encryption on an existing volume with the volume move start command, Collect network information in ONTAP 9.2 and earlier, Enable external key management in ONTAP 9.6 and later (HW-based), Create authentication keys in ONTAP 9.6 and later, Create authentication keys in ONTAP 9.5 and earlier, Assign a data authentication key to a FIPS drive or SED (external key management), Enable onboard key management in ONTAP 9.6 and later, Enable onboard key management in ONTAP 9.5 and earlier, Assign a data authentication key to a FIPS drive or SED (onboard key management), Assign a FIPS 140-2 authentication key to a FIPS drive, Enable cluster-wide FIPS-compliant mode for KMIP server connections, Delegate authority to run the volume move command, Change the encryption key for a volume with the volume encryption rekey start command, Change the encryption key for a volume with the volume move start command, Rotate authentication keys for NetApp Storage Encryption, Securely purge data on an encrypted volume without a SnapMirror relationship, Securely purge data on an encrypted volume with an Asynchronous SnapMirror relationship, Scrub data on an encrypted volume with a Synchronous SnapMirror relationship, Change the onboard key management passphrase, Back up onboard key management information manually, Restore onboard key management encryption keys, Restore external key management encryption keys, Emergency shredding of data on an FIPS drive or SED, Return a FIPS drive or SED to service when authentication keys are lost, Return a FIPS drive or SED to unprotected mode, Remove an external key manager connection, Modify external key management server properties, Transition to external key management from onboard key management, Transition to onboard key management from external key management, What happens when key management servers are not reachable during the boot process, Disable encryption by default with ONTAP 9.7 and later, Enable or disable client access to Snapshot copy directory, Restore a volume from an earlier Snapshot copy, Reverse resynchronize a protection relationship, Back up data to the cloud using SnapMirror, Use custom IPspaces to isolate replication traffic, Configure intercluster LIFs on shared data ports, Configure intercluster LIFs on dedicated ports, Configure intercluster LIFs in custom IPspaces, Create an intercluster SVM peer relationship, Add an intercluster SVM peer relationship, Enable cluster peering encryption on an existing peer relationship, Remove cluster peering encryption from an existing peer relationship, When to configure a custom Snapshot policy, When to increase the Snapshot copy reserve, How deleting protected files can lead to less file space than expected, Check available Snapshot copy reserve on a volume, Restore a file from a Snapshot copy on an NFS or SMB client, Enable and disable NFS and SMB client access to Snapshot copy directory, Restore a single file from a Snapshot copy, Restore part of a file from a Snapshot copy, Restore the contents of a volume from a Snapshot copy, Asynchronous SnapMirror disaster recovery basics, SnapMirror Synchronous disaster recovery basics, About workloads supported by StrictSync and Sync policies, Vault archiving using SnapMirror technology, XDP replaces DP as the SnapMirror default, When a destination volume grows automatically, Fan-out and cascade data protection deployments, Configure a replication relationship in one step, Define a schedule for creating a local copy on the destination, Convert an existing DP-type relationship to XDP, Convert the type of a SnapMirror relationship, Convert the mode of a SnapMirror Synchronous relationship, Configure the destination volume for data access, Restore a single file, LUN, or NVMe namespace from a SnapMirror destination, Restore the contents of a volume from a SnapMirror destination, Update a replication relationship manually, Criteria for placing volumes on destination SVMs, Exclude LIFs and related network settings from SVM replication, Exclude network, name service, and other settings from SVM replication, Specify aggregates to use for SVM DR relationships, Reactivate the original source SVM (FlexGroup volumes only), Convert volume replication relationships to an SVM replication relationship, Create and initializing load-sharing mirror relationships, Update a load-sharing mirror relationship, Use extended queries to act on many SnapMirror relationships, Ensure a common Snapshot copy in a mirror-vault deployment, Compatible ONTAP versions for SnapMirror relationships, Set the retention time for a file explicitly, Reset the ComplianceClock for an NTP-configured system, Use a command or program to create a WORM appendable file, Use volume append mode to create WORM appendable files, Delete WORM files using privileged delete, Use the Event Based Retention (EBR) feature, Create a SnapLock security administrator account, Configure a hierarchical consistency group, Configure protection for business continuity, Reestablish original protection relationship after unplanned failover, Install ONTAP Mediator Service and confirm the ONTAP cluster configuration, Add and remove volumes in a consistency group, Resume protection in a fan-out configuration, Convert existing relationships to SM-BC relationships, SnapMirror delete operation fails in takover state, Failure creating a SnapMirror relationship and initializing consistency group, Mediator not reachable or Mediator quorum status is false, Automatic unplanned failover not triggered on Site B, Link between Site B and Mediator down and Site A down, Link between Site A to Mediator Down and Site B down, SM-BC SnapMirror delete operation fails when fence is set on destination volumes, Volume move operation stuck when primary site is down, Release operation fails when unable to delete Snapshot copy, Volume move reference Snapshot copy shows as the newest, Perform MetroCluster switchover and switchback, Modify address, netmask, and gateway in a MetroCluster IP, Troubleshoot problems with a MetroCluster, Use cases for choosing a tape backup engine, Commands for managing tape drives, media changers, and tape drive operations, Commands for verifying tape library connections, How the storage system qualifies a new tape drive dynamically, Supported number of simultaneous tape devices, Considerations when configuring multipath tape access, How you add tape drives and libraries to storage systems, NDMP restartable backup extension for a dump supported by ONTAP, Commands for managing node-scoped NDMP mode, User authentication in a node-scoped NDMP mode, Commands for managing SVM-scoped NDMP mode, Availability of volumes and tape devices for backup and restore on different LIF types, NDMP server supports secure control connections in SVM-scoped mode, User authentication in the SVM-scoped NDMP mode, Generate an NDMP-specific password for NDMP users, How tape backup and restore operations are affected during disaster recovery in MetroCluster configuration, Types of data that the dump engine backs up, Types of data that the dump engine restores, Scalability limits for dump backup and restore sessions, Tape backup and restore support between Data ONTAP operating in 7-Mode and ONTAP, How dump works on a SnapVault secondary volume, How dump works with storage failover and ARL operations, How dump works when a FlexVol volume is full, How dump works when volume access type changes, How dump works with SnapMirror single file or LUN restore, How dump backup and restore operations are affected in MetroCluster configurations, Scalability limits for SMTape backup and restore sessions, How SMTape works with storage failover and ARL operations, How SMTape works with volume rehost operations, How NDMP backup policy are affected during ADB, How SMTape backup and restore operations are affected in MetroCluster configurations, Maximum number of allowed dumps or restores (maximum session limit) in progress, Tape write failed - new tape encountered media error, Tape write failed - new tape is broken or write protected, Tape write failed - new tape is already at the end of media.