Vous êtes sur la page 1sur 0

NetApp University

Data ONTA Fundamentals P 7.3


Exercise Guide
NetApp University - Do Not Distribute
1 Data ONTAP 7.3 Fundamentals: Welcome
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
NETAPP UNIVERSITY
Data ONTAP 7.3 Fundamentals
Exercise Guide

Version Number: 5.0
Release Number: Data ONTAP 7.3
Course Number: STRSW-ED-ILT-DOTF-REV05
Catalog Number: STRSW-ED-ILT-DOTF-REV05-EG


































NetApp University - Do Not Distribute
2 Data ONTAP 7.3 Fundamentals: Welcome
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
ATTENTION
The information contained in this guide is intended for training use only. This guide contains information
and activities that, while beneficial for the purposes of training in a closed, non-production environment,
can result in downtime or other severe consequences and therefore are not intended as a reference
guide. This guide is not a technical reference and should not, under any circumstances, be used in
production environments. To obtain reference materials, please refer to the NetApp product
documentation located at www.now.com for product information.
COPYRIGHT
2008 NetApp. All rights reserved. Printed in the U.S.A. Specifications subject to change
without notice.
No part of this book covered by copyright may be reproduced in any form or by any meansgraphic,
electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval
systemwithout prior written permission of the copyright owner.
NetApp reserves the right to change any products described herein at any time and without notice.
NetApp assumes no responsibility or liability arising from the use of products or materials described
herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product or
materials does not convey a license under any patent rights, trademark rights, or any other intellectual
property rights of NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign patents,
or pending applications.
RESTRICTED RIGHTS LEGEND
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.277-7103
(October 1988) and FAR 52-227-19 (June 1987).
TRADEMARK INFORMATION
NetApp, the NetApp logo, and Go further, faster, FAServer, NearStore, NetCache, WAFL, DataFabric,
FilerView, SecureShare, SnapManager, SnapMirror, SnapRestore, SnapVault, Spinnaker Networks,
the Spinnaker Networks logo, SpinAccess, SpinCluster, SpinFS, SpinHA, SpinMove, SpinServer, and
SpinStor are registered trademarks of Network Appliance, Inc. in the United States and other countries.
Network Appliance, Data ONTAP, ApplianceWatch, BareMetal, Center-to-Edge, ContentDirector, gFiler,
MultiStore, SecureAdmin, Smart SAN, SnapCache, SnapDrive, SnapMover, Snapshot, vFiler, Web
Filer, SpinAV, SpinManager, SpinMirror, and SpinShot are trademarks of NetApp, Inc. in the United
States and/or other countries.
Apple is a registered trademark and QuickTime is a trademark of Apple Computer, Inc. in the United
States and/or other countries.
Microsoft is a registered trademark and Windows Media is a trademark of Microsoft Corporation in the
United States and/or other countries.
RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, and RealVideo are registered
trademarks and RealMedia, RealProxy, and SureStream are trademarks of RealNetworks, Inc. in the
United States and/or other countries.
All other brands or products are trademarks or registered trademarks of their respective holders and
should be treated as such.
NetApp is a licensee of the CompactFlash and CF Logo trademarks.


NetApp University - Do Not Distribute
3 Data ONTAP 7.3 Fundamentals: Welcome
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
EXERCISE & ANSWER TABLE OF CONTENTS
WELCOME ............................................................................................................................ 1
MODULE 1: OVERVIEW ................................................................................................... E1-1
MODULE 2: INSTALLATION AND CONFIGURATION ................................................... E2-1
MODULE 3: BASIC ADMINISTRATION .......................................................................... E3-1
MODULE 4: ADMINISTRATION SECURITY ................................................................... E4-1
MODULE 5: NETWORKING ............................................................................................. E5-1
MODULE 6: PHYSICAL STORAGE MANAGEMEN ........................................................ E6-1
MODULE 7: LOGICAL STORAGE MANAGEMENT ........................................................ E7-1
MODULE 8: CIFS .............................................................................................................. E8-1
MODULE 9: NFS ................................................................................................................ E9-1
MODULE 10: QTREES AND SECURITY STYLE ........................................................... E10-1
MODULE 11: SAN ............................................................................................................ E11-1
MODULE 12: SNAPSHOT COPIES ................................................................................ E12-1
MODULE 13: WRITE AND READ REQUEST PROCESSING......................................... E13-1
MODULE 14: SYSTEM DATA COLLECTION ................................................................. E14-1
MODULE 15: FLEXSHARE ............................................................................................. E15-1
MODULE 16: NDMP FUNDAMENTALS ......................................................................... E16-1
MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION .............................. E17-1
MODULE 18: FINAL WORDS .......................................................................................... E18-1
APPENDIX A: ANSWERS .................................................................................................. A-1


NetApp University - Do Not Distribute
O
v
e
r
v
i
e
w
NetApp University - Do Not Distribute
E1-1 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 1: OVERVIEW
Exercise
Module 1: Overview
Estimated Time: 45 minutes

EXERCISE
OVERVIEW
The goal of this exercise is to give you an opportunity to explore the current exercise
environment with the assistance of your instructor. If you do not have a storage system
environment, you will be redirected to the appendix for the simulator setup.
OBJECTIVES
At the conclusion of this exercise, you should be able to identify all the essential components
of your exercise environment.
TIME ESTIMATE
45 minutes


NetApp University - Do Not Distribute
E1-2 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
21 2008 NetApp. All rights reserved.
Topic Review
What are the two topologies supported by Data
ONTAP?
What are the three NetApp product series?
What is the main function of WAFL?
Where can you find supporting documents for
Data ONTAP?


22 2008 NetApp. All rights reserved.
Topic Review
What are some benefits of simulating Data
ONTAP?
How is SAN different than NAS?
What are some of the basic functions of Data
ONTAP?




NetApp University - Do Not Distribute
E1-3 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: EXPLORING THE EXERCISE ENVIRONMENT
OVERVIEW
The goal of this exercise is to give you an opportunity to explore the current exercise
environment with the assistance of your instructor. If you do not have a storage system
environment, you will be redirected to the appendix for the simulator setup.
This task familiarizes you with the exercise environment you will use for all exercises in this
course. If you dont have an appropriate storage system environment, see Appendix B to set
up the Data ONTAP simulator.
OBJECTIVES
At the conclusion of this exercise, you should be able to identify all the essential components
of your exercise environment.
TIME ESTIMATE
15 minutes

START OF TASK
STEP ACTION

1.

With the assistance of your instructor, identify the following essential equipment:

REMOTE DESKTOP CONNECTION

Name: _____________________________

IP address: __________________________

Local
Administrator
Password: ___________________________

Domain
Administrator
Password: ___________________________





Windows Workstation
NetApp University - Do Not Distribute
E1-4 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION


Name: ______________________________

Type: _______________________________

Internal
IP address: ___________________________

Terminal
IP address: ___________________________

Root
Password: ____________________________



END OF TASK

TASK 2: EXPLORING THE NOW SITE
OVERVIEW
This exercise provides hands-on experience using the NOW site.
OBJECTIVE
At the conclusion of this task, you should be able to use the NOW site to answer questions
about Data ONTAP.
TIME ESTIMATE
30 minutes

START OF TASK
STEP ACTION
1. a. Go to the NOW site at http://now.netapp.com.
b. Log in using your NetApp user ID and password.
c. Select the Service & Support option.
d.
Storage System
NetApp University - Do Not Distribute
E1-5 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
2. Examine the Service & Support page and notice the organization.
Observe the top of the page and notice the various options.
Click on the Sitemap/Tour link.
3. Find the Take a Tour link under the NOW site map. This is a nine-minute
multimedia tour of NOW. The tour is a little out of date, but you should take the
tour later when you have an opportunity.
4. Observe the NOW site organizational chart. Each box is linked to the related
information. Click on a few boxes and become familiar with this interface.
Notice that when you are redirected to a link, the map at the top of the page shows
you where you are. You can use these and other links in the top portion of the
screen to help you navigate.
Use the spaces below to note any locations you would like to examine more
carefully at another time.
__________________________________________________________

__________________________________________________________

__________________________________________________________

__________________________________________________________

5. Return to the Service & Support page. Notice the Info Flash section on the right
side of the Start page.
This information is dynamic and is periodically updated.
To go to a topic, click the image. Use your back button to return.
6. Before you logged in, you were instructed to select Service & Support as your start
page. Notice the other Start pages available at the top of the NOW page. Explore
these links, making note of any areas you would like to investigate further later on.

___________________________________________________________

___________________________________________________________

___________________________________________________________

___________________________________________________________


END OF TASK

NetApp University - Do Not Distribute
E1-6 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: LOCATING TECHNICAL ASSISTANCE AND DOCUMENTATION
OVERVIEW
NetApp technical documentation provides a wealth of both practical and theoretical
information. Because the documentation set is large, it is important to have some
understanding of what information is documented and how.
START OF TASK
STEP ACTION
1. Return to the Service & Support page.
Select the Access Product Documentation link.
Locate each of the following categories, familiarizing yourself with the
subcategories, and checking off each item.
NOTE: The following titles are listed alphabetically, instead of the order in which
they appear on NOW.
_____Best Practices guides
_____Configuration and Hardware guides
_____Storage system resources
_____Storage system and NetCache
_____General information
_____Interoperability
_____NetApp Library (white Papers, tech reports, and so on)
_____NetCache resources
_____Product Documentation & System Configuration (by product)
_____Other
2. Under Product Documentation & System Configuration, select Data ONTAP
Product Documentation & System Configuration.
Notice that the Data ONTAP Information Library page opens.
View all documents for the Data ONTAP for Filer/NearStore Release 7.3.
Open the Documentation Roadmap and browse the result.
What information does this provide?
___________________________________________________________
___________________________________________________________
___________________________________________________________
3. Return to the Data ONTAP for Filer/NearStore Release 7.3 page.
Open the Master Index.
NOTE: The Master Index is created when a release becomes Generally Available
(GA).
Using the index, determine where you can get information about setting up
anonymous FTP access.
___________________________________________________________
NetApp University - Do Not Distribute
E1-7 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. Return to the Access & Order Product Documentation page.
Locate the System Configuration Guide link and answer the following questions:
1. What is the size of NVRAM in the FAS3050?
___________________________________________________
2. What is the maximum number of drives for a single FAS6030?
_____________________________________________________
3. Which slots on an FAS6070 can be used as SCSI ports for tape drives?
_____________________________________________________


END OF TASK

TASK 4: ACESSING THE STORAGE SYSTEM
START OF TASK
STEP ACTION
1. Access the storage system using telnet. You can use TeraTerm Pro or PuTTY to
open a telnet session to your storage system.
To set up TeraTerm Pro as your telnet emulator (with SSH support):
a. Download the latest version of TeraTerm Pro from:
http://www.ayera.com/teraterm
b. Make sure you are using TeraTerm Pro version 3.1.3 or later.
TeraTerm Pro does not need an installation routine. When you download the
software, place the ttermpro.exe file in a folder thats easy to find (preferably on
the Desktop of your laptop computer).
NOTE: Before downloading TeraTerm Pro, check your desktop to see if it is
already installed.


2. To launch a TeraTerm Pro window, double-click the ttermpro.exe icon on the
desktop of your Windows machine, or in the folder where you extracted the
installation files. A TeraTerm Pro Configuration
window appears







NetApp University - Do Not Distribute
E1-8 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
3. Customize the terminal emulator to connect using telnet or SSH by typing the IP
address of your storage system in the Host text box, and then selecting the
appropriate radio button for Telnet (Port: 23) or SSH (Port: 22).
4. Enter root at the login prompt. Your instructor will give you the root password.

5. Arrange your displays so that both console and telnet sessions are visible.
6. Observe the echoing effects. Why do you see the same thing in both sessions?
___________________________________________________________

7. Why did you use port 23 to access the storage system through telnet and a different
port to access the console?
___________________________________________________________

8. Type sysconfig d. This command lists all of the disk HA.IDs (device names),
along with shelf, bay, and disk serial numbers.
9. To access the storage system Web interface, enter:
http://[Storage system IP}/na_admin
10. Select the FilerView link to access FilerView. Use the same user name and
password.
This task demonstrates how to access a storage system and assure that you have
access. You will be using these interfaces throughout the remainder of the course.
11. From FilerView, navigate to the telnet session by selecting NetApp > Use
Command Line.



NetApp University - Do Not Distribute
E1-9 Data ONTAP 7.3 Fundamentals: Overview
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
12. Are you able to launch the session?
Y or N
If no, why not?
____________________________________________________________


13. Close the telnet session through TeraTerm. Try again to initiate a telnet session
with FilerView. Was it successful?
Y or N

END OF TASK

NetApp University - Do Not Distribute
I
n
s
t
a
l
l

C
o
n
f
i
g
NetApp University - Do Not Distribute
E2-1 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 2: INSTALLATION AND CONFIGURATION
Exercise
Module 2: Installation and
Configuration
Estimated Time: 45 minutes

EXERCISE: SYSTEM CONFIGURATION
OVERVIEW
This exercise familiarizes you with the Configuration Worksheet, which aids in the setup of
your storage system.
When you boot up your new storage system for the first time, the storage system immediately
runs the setup command (see Task 2). But before you start, you must identity all the
relevant information that is needed for configuration. To do this, you need to record all
relevant information on the Configuration Worksheet so that this information is available
during setup when you are entering values.
OBJECTIVES
At the conclusion of this exercise, you should be able to:
Use the System Configuration Worksheet
Use the setup command
TIME ESTIMATE
20 minutes
REQUIRED HARDWARE, SOFTWARE, AND TOOLS
HardwareAny storage system
SoftwareData ONTAP 7.3.x
NetApp University - Do Not Distribute
E2-2 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
43 2008 NetApp. All rights reserved.
Topic Review
What links on the NOW site do you use to
help identify a storage systems current
configuration?
What is the name of the worksheet which
aids in storage system setup, and where do
you find it?
What command is immediately run when
you boot the storage system the first time?
What command simplifies Data ONTAP
upgrades?


NetApp University - Do Not Distribute
E2-3 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: USING THE CONFIGURATION WORKSHEET
START OF TASK
STEP ACTION
1. While the Configuration Worksheet is provided in this exercise module, you can
also find it at http://now.netapp.com. The worksheet can be found in Chapter 2 of
the Data ONTAP 7.3 Software Setup Guide.
2. To complete the worksheet, your instructor will provide you with the information
relevant to your environment.

END OF TASK

TASK 2: APPLYING CONFIGURATIONS
OVERVIEW
This task familiarizes you with how to use the configurations recorded on the Configuration
Worksheet to set up your storage system.
OBJECTIVE
At the conclusion of this task, you should be able to configure the Data ONTAP simulator.
START OF TASK
STEP ACTION
1. Use a telnet session to access the CLI, or from FilerView, select Filer > Use
Command Line.
2. When your storage system boots for the first time, it immediately initiates the
setup command. If you enter any incorrect values, complete the setup and then run
the setup command again with new values.
Enter the setup command at the storage system prompt.
Example:
system> setup
The setup command will rewrite the /etc/rc, /etc/exports,
/etc/hosts, /etc/hosts.equiv, /etc/dgateways,
/etc/nsswitch.conf,
and /etc/resolv.conf files, saving the original contents of
these files in .bak files (e.g. /etc/exports.bak).
Are you sure you want to continue? [yes] yes <enter>
3. The output of the sysconfig command is displayed, followed by a prompt for the
host name.
Record the value for the host name on the Configuration Worksheet and then press
Enter.
NetApp University - Do Not Distribute
E2-4 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
Example:
Are you sure you want to continue? [yes] yes
NetApp Release RironcityN_080118_2230: Sat Jan 19
01:37:34 PST 2008
System ID: 0101169724 (system); partner ID:
0101173126
(devslu20-f1)
System Serial Number: 1056896 (system)
System Rev: C0
slot 0: System Board
Processors: 4
Memory Size: 3072 MB
slot 0: Dual 10/100/1000 Ethernet Controller VI
e0a MAC Address: 00:a0:98:03:28:8e (auto-
1000t-fd-cfg_down)
e0b MAC Address: 00:a0:98:03:28:8f (auto-
1000t-fd-up)
e0c MAC Address: 00:a0:98:03:28:8c (auto-
unknown-cfg_down)
e0d MAC Address: 00:a0:98:03:28:8d (auto-
unknown-cfg_down)
slot 0: FC Host Adapter 0a
14 Disks: 952.0GB
1 shelf with ESH2
slot 0: FC Host Adapter 0b
14 Disks: 476.0GB
1 shelf with ESH2
slot 0: Fibre Channel Target Host Adapter 0c
slot 0: Fibre Channel Target Host Adapter 0d
slot 0: SCSI Host Adapter 0e
slot 0: NetApp ATA/IDE Adapter 0f (0x000001f0)
0f.0 245MB
slot 3: NVRAM
Memory Size: 512 MB
Please enter the new hostname [system]: <enter>

NetApp University - Do Not Distribute
E2-5 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. The next setup question is regarding virtual network interfaces. However, because
we are not using virtual interfaces at this time, press Enter to access the no default.
Example:
Do you want to configure virtual network interfaces? [n]: n
<enter>

5. The next step is to record the IP address.
Record the value on the Configuration Worksheet and then press Enter.
Example:
Please enter the IP address for Network Interface e0a
[10.254.134.36]: <enter>
6. The next step is to record the netmask.
Record the value on the Configuration Worksheet and then press Enter.
Example:
Please enter the netmask for Network Interface e0a
[255.255.252.0]: <enter>
7. The next question is regarding the IP address of the partner in active-active systems
(which will be covered later in this course).
Record the value on the Configuration Worksheet. Press n (for no), and then Enter.
Example:
Should interface e0a take over a partner IP address during
failover? [y]: n <enter>
8. The next step is to record the media type.
Record the value on the Configuration Worksheet and then press Enter.
Example:
Please enter media type for e0a {100tx-fd, tp-fd, 100tx, tp,
auto (10/100/1000)} [auto]: <enter>
Please enter flow control for e0a {none, receive, send, full}
[full]: <enter>
Please enter the IP address for Network Interface e0b
[]:<enter>

9. Depending on the way your student environment is set up, there could be several
more questions about the other interfaces on your system. You can enter n for no
and continue. The next prompt asks you if you would like to continue using the
Web interface.
Enter n for no.
Example:
Would you like to continue setup through the web interface?
[n]: n <enter>
NetApp University - Do Not Distribute
E2-6 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
10. The next step is to record the IP address for the default gateway.
Record the value on the Configuration Worksheet and then press Enter.
Example:
Please enter the name or IP address of the default gateway
[10.254.132.1]: <enter>
11. The next step is to record the name of the administration host.
Record the value on the Configuration Worksheet and then press Enter.
Example:
The administration host is given root access to the filer's
/etc files for system administration. To allow /etc root
access
to all NFS clients, enter 'all' below.
Please enter the name or IP address of the administration
host [10.254.134.38]: <enter>
12. The next step is to record the IP of the administration host.
Your instructor may have a specific value for you to enter. Record the value on the
Configuration Worksheet and then press Enter.
Example:
Please enter the name or IP address of the administration
host [10.254.134.38]: <enter>

13. The next step is to record the time zone for your system.
Your instructor may have a specific value for you to enter. Record the value on the
Configuration Worksheet and then press Enter.
Example:
Please enter timezone [US/Pacific]: <enter>

14. The next question is regarding the system location. This is a text field. Type in any
value you would like.
Example:
Where is the filer located? []: the best place <enter>

15. The next question is regarding system language. This value is used with the
multiprotocol features that are discussed later in this course.
To skip setting a language, press Enter.
Example:
What language will be used for multi-protocol files (Type ?
for list)?: <enter>

NetApp University - Do Not Distribute
E2-7 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
16. The next question is regarding DNS resolution. Your instructor will give you
information about DNS for your lab environment.
Type yes and press Enter.
Example:
Do you want to run DNS resolver? [y]: y <enter>

17. The next question is regarding the DNS domain name.
Record the value on the Configuration Worksheet and then press Enter.
Example:
Please enter DNS domain name [netappu.com]: netappu.com
<enter>
18. The next step is to record the IP of the name server.
Record the value on the Configuration Worksheet and then press Enter.
Example:
Please enter the IP address for first nameserver
[216.240.23.25]: <enter>
NOTE: You can enter up to three name servers.
19. The next question is about whether or not your storage system is an NIS client.
Press Enter to accept the default value.
Example:
Do you want to run NIS client? [n]:n <enter>
20. Students using a simulated environment are asked for the new password for root.
Type netapp and press Enter.
Re-enter the password for root.
21. The setup now is complete. Because the storage system has CIFS licensed, it
automatically initiates the cifs setup command.
22. The first question is regarding the use of WINS. Press Enter to accept the default
value. We are not using WINS.
23. The next question is regarding the use of multiprotocol (NTFS and UNIX File
System) or Microsoft Windows NTFS only.
Press Enter to accept the default value. We will be using multiprotocol.
24. The next two questions are regarding the password for root.
Type netapp and press Enter twice.
25. The system defaults the CIFS server name to the system host name. You are then
asked if you want to change this default.
Press Enter to accept the default.
26. The next question is regarding user authentication. In this environment, we will be
using Active Directory domain authentications.
Press Enter to accept the default.
NetApp University - Do Not Distribute
E2-8 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
27. The next question is regarding the name of the Active Directory domain. This is the
same as the DNS domain.
Press Enter to accept the default.
28. The next step is to configure the time services. Press Enter to accept the default.

29. The name of the time server should be the IP address of the Windows domain
controller.
Type the IP address of the Windows domain controller and press Enter.
30. Because there is only one time server, press Enter to accept the default.
31. To add the system account to Active Directory, you must authenticate as a domain
administrator,.
Press Enter to accept the default user.

32. Type in the password of the domain administrator (provided by your instructor) and
press Enter.
33. The next question is regarding the identification of the system in Active Directory.
Press Enter to accept the default of CN=computers.
34. The next question asks if the simulator should create the Windows local
administrator account in the local /etc/passwd file.
Press Enter to accept the default.
35. Type the password of the Windows administrator and press Enter.
Repeat this step to configure the password.
36. In this lab, we will not be using any other users or groups to administrate the
system. Press Enter to accept the default.
37. The CIFS service is now running.

END OF TASK







NetApp University - Do Not Distribute
E2-9 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
CONFIGURATION WORKSHEET
TYPES OF INFORMATION YOUR VALUES
MAC address for the storage system's
built-in Ethernet interface

Host name
Password
Time zone
Storage system location
Storage system
Language used for multiprotocol
storage systems

Host name Administration host
IP address
Link names (physical interface names,
such as e0, e5a, or e9b)

Number of links (number of physical
interfaces to include in the vif)

Virtual interfaces
Name of virtual interface (name of vif,
such as vif0

Interface name
IP address
Subnet mask
Partner IP address
Media type (network type)
Are jumbo frames supported?
Ethernet interfaces
MTU size for jumbo frames
Gateway name Router (if used)
IP address
Location of HTTP directory
Domain name
Server address 1
Server address 2
DNS
Server address 3
Domain name
Server name 1
Server name 2
NIS
Server name 3
Windows domain
1
2
WINS servers
3
Windows Active Directory domain administrator user name
Windows Active Directory domain administrator password
Active Directory (command line setup only)
RMC MAC address
IP address
Network mask (subnet mask)
Gateway
Media type
Mail host
RLM MAC address
IP address
Network mask (subnet mask)
NetApp University - Do Not Distribute
E2-10 Data ONTAP 7.3 Fundamentals: Installation and Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TYPES OF INFORMATION YOUR VALUES
Gateway
AutoSupport mail host
AutoSupport recipient(s)


NetApp University - Do Not Distribute
B
a
s
i
c

A
d
m
i
n
NetApp University - Do Not Distribute
E3-1 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 3: BASIC ADMINISTRATION
Exercise
Module 3: Basic Administration
Estimated Time: 60 minutes

EXERCISE: BASIC ADMINISTRATION
OVERVIEW
The purpose of this exercise is to give you an opportunity to initiate a console session to Data
ONTAP. After you are logged in, you will view console messages and execute commands on
the NetApp storage system. You will then view console messages and execute commands
through a terminal emulator and FilerView as if you were sitting at the console.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Log in and establish a remote login session (telnet)
Execute basic system commands on the storage system
List the options on a storage system
List the system configurations of a storage system
Use the sysconfig command to discover an add-on card and view its
documentation on the Parts Finder Web site
Configure AutoSupport
TIME ESTIMATE
60 minutes

NetApp University - Do Not Distribute
E3-2 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
39 2008 NetApp. All rights reserved.
Check Your Understanding
Name three ways to access a storage systems
CLI.
What is the URL to access FilerView?
How can you view the system configuration for
a FAS storage system?
How can you configure a FAS storage system
from a remote adminhost?
When are AutoSupport messages generated?















NetApp University - Do Not Distribute
E3-3 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: ACCESSING THE STORAGE SYSTEM
OVERVIEW
This task demonstrates methods of accessing the storage system through the console, telnet,
and FilerView. It is important to keep in mind that for the purpose of this exercise, the system
console is either the Data ONTAP simulator running in a Linux virtual environment, or your
assigned FAS storage system.

START OF TASK
STEP ACTION
1. Access the CLI using a telnet session or from FilerView.
system>
2. Enter help to see the available commands. Enter the ? character and compare this
to the help command. Do you see the same results?
______________

3. Try entering a command followed by the word help.
Example: license help
4. How is help by itself different from help appended to a command?
___________________________________________________________

5. View the manual page for the useradmin command from the command line.
___________________________________________________________

6. View the manual page for the useradmin command from FilerView. Compare this
with the output from the man command. Try this using a few other commands.
7. Examine the CLI privilege levels.
8. Read the man page for the priv command.
system> man priv
What does the q argument do? (Bonus: When would it be useful?)
___________________________________________________________

9. Look at the available command using help.
10. Run the disk command. Note which subcommands are available.
system> disk
Now change to the advanced level and issue the disk command again. Do you see
any new commands?
______________

NetApp University - Do Not Distribute
E3-4 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
system> priv set advanced
system*> disk
Hint: It might help to do something from a UNIX system like:

11. Return to the administrative mode.
system> priv set
12. Verify which services are available on your storage system by entering:
system> license
If NFS and CIFS are not licensed, you can license them by entering the following
command twice using the appropriate license code.
system> license add abxxggee (Obtain the license code from the
instructor)
View the newly added license(s).
system> license
13. If you have a storage system with only seven disks available, you must use the disks
economically. You will learn more about aggregates and the aggr command in
Module 6. Right now, you must make sure that aggr0 is a RAID 4 aggregate and
not a RAID-DP aggregate.
To change the aggr0 RAID type to RAID 4, at the storage system console, enter
the following.
system> aggr options aggr0 raidtype raid4
This command leaves your system with one non-zero spare if the aggregate was
RAID-DP. To prepare the disk for future use, execute the following command:
system> disk zero spares
14. Task complete. Proceed to the next task.
END OF TASK






NetApp University - Do Not Distribute
E3-5 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: EXPLORING STORAGE SYSTEM OPTIONS
OVERVIEW
This task demonstrates methods of displaying storage system options.

START OF TASK
STEP ACTION
1. Log in to the storage system and access the CLI.
2. Enter options. What happened?
___________________________________________________________
___________________________________________________________

3. At the prompt, enter man options. What happened?
______________________________________________________
______________________________________________________

4. Quit the man page by entering q.
5. At the prompt, enter options telnet. What happened?
______________________________________________________
______________________________________________________

6. Review the options list from Step 2. Be careful when making changes. You should
take note of any changes you make for later reference.
7. Task complete. Proceed to the next task.

END OF TASK
NetApp University - Do Not Distribute
E3-6 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: EXPLORING STORAGE SYSTEM CONFIGURATIONS
OVERVIEW
This task demonstrates methods of displaying storage system configurations.

START OF TASK
STEP ACTION
1. Log in to the storage system, access the CLI, and enter the sysconfig command.
What happened?
___________________________________________________________
___________________________________________________________

2. Enter man sysconfig and determine the correct argument to verify that the
expansion cards are in the appropriate slots.
___________________________________________________________

3. Compare the outputs of sysconfig a and sysconfig v. Do you notice any
differences?
___________________________________________________________
4. Access FilerView for this storage system.
Go to the Report link under Filer.
Observe the information displayed. How does this information compare to the
sysconfig command?
___________________________________________________________

5. Select the Show Status link.
What is the host name (model name) for this system?
___________________________________________________________

Accept the current setting.
6. Task complete. Proceed to the next task.

END OF TASK



NetApp University - Do Not Distribute
E3-7 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: EXPLORING PARTS FINDER
OVERVIEW
This task demonstrates how to use the sysconfig command to identify a part, and then
obtain information about the part on the Parts Finder Web site. You will then use the System
Configuration Guide Web site to verify the configuration of a storage system.

START OF TASK
STEP ACTION
1. Access the CLI.
2. Use the sysconfig command to display configuration information.
Notice that the information displayed does not indicate what is needed to obtain a
replacement.
3. Log in to the NOW site.
Locate and select the Parts Finder.









Notice that the Parts Finder Selection Criteria screen is displayed.
4. Return to the CLI and use the sysconfig command display detailed information
about the storage system configuration.
NOTE: If the storage system you are using does not have expansion slots, or if
these slots are not used, there will not be enough information displayed to make
using the Parts Finder or System Configuration Guide interesting. In this case, you
will be supplied with information.
5. Access the NOW site and open the Parts Finder.
6. Search by category for the following:
Category = Data Cables
Platform = [your storage system]
Notice that the results give you an opportunity to see each cable type.
7. Notice that there are two part numbers shown for each cable: x### and sp###. The
x### part number is for new parts, while the sp### is for spares (possibly reissued).
8. Click the link with the camera icon. What happens?
______________________________________________________
NetApp University - Do Not Distribute
E3-8 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
9. Do another search. This time, locate the part information for an NVRAM card for
an FAS3050. How many part numbers are available?
______________________________________________________

10. Go to NOW > Service and Support > Technical Assistance and Documentation >
Access & Order Product Documentation > System Configuration Guides.
1. Search Data ONTAP Release 7.2.
2. Select NetApp Storage Appliances.
3. Select both FAS6070 and Expansion slots/cards.
4. Select Expansion Slot Assignments for an FAS6070 in a single
configuration.
What happens?
______________________________________________________

11. Use the table and the explanations at the bottom of the table to answer questions 10
through 14.
12. Which is the preferred slot for the NVRAM card?
______________________________________________________

13. Which is the least preferred slot for a dual-port optical iSCSI target-mode interface?
______________________________________________________

14. Which adapter should never be installed in slot 4?
______________________________________________________

15. Task complete. Proceed to the next task.

END OF TASK







NetApp University - Do Not Distribute
E3-9 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 5: CONFIGURING AUTOSUPPORT
OVERVIEW
The purpose of this task is to give you some practice configuring the storage systems
AutoSupport feature. You will execute AutoSupport console commands, enter SNMP contact
and location information, verify the storage systems serial number, and test your
AutoSupport configuration. For the purposes of this task, the Linux Admin host will either be
the virtual machine running the Data ONTAP simulator, or a standalone machine. Ask your
instructor if you have any questions.

START OF TASK
STEP ACTION
1. Access the CLI.
2. At the console prompt, enter the following list of commands.
NOTE: <mailhost>, user#, and system# will be replaced with information
provided by your instructor.
Turn on autosupport:
system> options autosupport.enable on
Set the location of your mail server:
system> options autosupport.mailhost <mailhost>
Specify the recipient to send the AutoSupport e-mail:
system> options autosupport.to user#@<mailhost>
Specify the sender of the AutoSupport e-mail:
system> options autosupport.from user#@system#
Specify the recipient of an optional, shorter e-mail address:
system> options autosupport.noteto
user#@<mailhost>
3. At the console prompt, enter the following commands:
system> snmp contact Student#, 555-333-3333
system> snmp location NetApp Corp, Training Lab
snmp init 1
4. At the console prompt, enter the command:
system> options autosupport.doit testing
5. Telnet to mailhost where the UNIX Admin host IP address or host name is obtained
from the instructor.
6. Log in as user#.
7. Enter the password.
8. Enter /usr/ucb/mail.
You should see an e-mail message with the subject:
System Notification from system# (testing)
NetApp University - Do Not Distribute
E3-10 Data ONTAP 7.3 Fundamentals: Basic Administration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
9. Enter the message number of the testing message. For instance, if testing is
message 1, type 1.
The message opens.
10. On the first screen, verify that the SNMP_CONTACT and SNMP_LOCATION
information reflect what you entered. This information will also be shown in the
second section of the AutoSupport message.
11. Press the space bar to scroll forward in the message until the System Serial Number
line is displayed. For example, if your serial number is 3003908, you will see the
following:
Netapp-asup-serial-num: 3003908
12. Continue to scroll through the AutoSupport message to view the other information
AutoSupport sends to AutoSupport recipients.
13. Press q to exit.
14. Task complete.

END OF TASK

NetApp University - Do Not Distribute
A
d
m
i
n

S
e
c
u
r
i
t
y
NetApp University - Do Not Distribute
E4-1 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 4: ADMINISTRATION SECURITY
Exercise
Module 4: Administration Security
Estimated Time: 30 minutes

EXERCISE: CREATING USERS, GROUPS, AND ROLES
OVERVIEW
The purpose of this exercise is to set up a storage system with local user accounts. The user
account will be associated with groups, and the groups associated with roles.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Create a new role, new group, and new user account
Log in with a new user account
Log in with a guest account
TIME ESTIMATE
30 minutes
NetApp University - Do Not Distribute
E4-2 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
26 2008 NetApp. All rights reserved.
Check Your Understanding
How do you control administrative access to
the storage system?
Why would you use the useradmin
command?















NetApp University - Do Not Distribute
E4-3 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CREATING A LOCAL USER ACCOUNT ON THE STORAGE
SYSTEM
OVERVIEW
In this task, you will create a local user account on your storage system. In the lab
environment, all commands should be entered at the storage system prompt.

START OF TASK
STEP ACTION
1. From your workstation:
a. Open a telnet session to the storage system using the storage systems IP
address or name. You can use TeraTermPro or PuTTY to open the telnet
session.
b. Log in as root.
NOTE: Verify with the instructor the password for root.
2. Before adding a local user to the storage system, check the current security options
to determine password rules by entering the following command:
storage_sys> options security
What is the value for the security.passwd.rules.enable option?
__________________

If the security.passwd.rules.enable option is set to on, then you must have
a password to create a local user based on the following rules:
It must be at least eight characters long.
It must contain at least two alphabetic characters.
It must contain at lease one digit.
If security.passwd.rules.enable.option is set to off, then these
restrictions are not enforced when you create a password.
3. Create a new role that includes only the capability to log in to the storage system
through the console by entering the following command:
storage_sys> useradmin role add r_login a login-telnet
4. Create a new group on the storage system that is associated with the new role
created in step 3 (r_login) by entering the following command:
storage_sys> useradmin group add g_login r r_login
5. Add a local user (your name) in the g_login group to the storage system by
entering the following command:
NOTE: User names are not case sensitive.
storage_sys> useradmin user add your_name g g_login
Enter your password.
Record your password._______________________________________

NetApp University - Do Not Distribute
E4-4 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
6. Verify that the local user (your name) was added to the storage system by entering
the following command:
storage_sys> useradmin user list your_name
What are your allowed capabilities?
___________________________________________________________

7. Verify the allowed capabilities for the root account by entering the following
command:
storage_sys> useradmin user list root
What are the capabilities of the root user?
____________________________________________________________

8. View the list of all local storage system users by entering the following command:
storage_sys> useradmin user list
What local users are listed?
_____________________________________________________________

9. Task complete. Proceed to the next task.

END OF TASK

TASK 2: LOGGING IN AS THE NEW USER
OVERVIEW
In this task, you will log in with the new user account created in Task 1. In the lab
environment, all commands should be entered at the storage system prompt.

START OF TASK
STEP ACTION
1. Log out of your current telnet session by pressing Ctrl-C.
2. From your workstation:
a. Open a telnet session to the storage system using the storage systems IP
address or name. You can use TeraTerm Pro or PuTTY to open the telnet
session.
b. Log in as your_name and enter the password that you created earlier.
3. On the Linux virtual machine, notice the console message that appears advising you
that a new user has logged in through a telnet session.
NetApp University - Do Not Distribute
E4-5 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. At the storage system prompt, view the RAID group configuration by entering the
following command:
storage_sys> sysconfig -r
What was the response?
____________________________________________________________

What capability do you need to issue this command?
_____________________________________________________________

5. We are now going to modify the role to allow your user account to issue this
command.
Log out of your current telnet session by pressing Ctrl-C.
6. From your workstation:
a. Open a telnet session to the storage system using the storage systems IP
address or name. You can use TeraTermPro or PuTTY to open the telnet
session.
b. Log in as root.
NOTE: Verify with your instructor the password for root.

7. To grant your user the capability required to issue the sysconfig command,
modify the role by entering the following command:
storage_sys> useradmin role modify r_login a login-
telnet,cli-sysconfig
8. Log out of your current telnet session by pressing Ctrl-C.

9. From your workstation:
Open a telnet session to the storage system using the storage systems IP address or
name. You can use TeraTermPro or PuTTY to open the telnet session.
Log in as your_name and enter the password you created earlier.
10. At the storage system prompt, view the RAID group configuration by entering the
following command:
storage_sys> sysconfig -r
Did the command execute properly?

Y or N
______________

11. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E4-6 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: CREATING AND LOGGING IN AS GUEST USER
OVERVIEW
In this task, you will create a user that belongs to the guest group, and then observe the
results of logging in as the new guest user. In the lab environment, all commands should be
entered at the storage system prompt.

START OF TASK
STEP ACTION
1. Access the CLI.
2. Use the useradmin user list command to identify configured system users.
The default user is root.
3. Enter the useradmin help command to see the available useradmin
commands.
4. New users must be members of a group.
Use the useradmin user help add command to display the syntax and
command options associated with this command.
Permissions (access) are assigned to groups. Users inherit permissions from the
groups to which they belong.
5. Use the useradmin group list command to display the available groups and
the role that is assigned to each.
6. Use the command useradmin user add bob g guests to add a user named
bob to the guest group.
7. When the system prompts for a password, enter bob12345 (for this demonstration).
8. Use the useradmin user list command to verify that bob has been added as a
user.
9. Use the useradmin user list bob command to display the capabilities of user
bob, and notice that this user has no administrative rights.
10. To demonstrate the difference between assigning users to a group with few
capabilities and assigning them to a group with more capabilities, use the
useradmin user add dennis g administrators command to add a user
named dennis to the administrator group.
11. When the system prompts for a password, enter den12345 (for this
demonstration).
12. Use the useradmin user list command to verify that dennis has been added
as a user.
13. Use the useradmin user list dennis command to display the capabilities of
user dennis, and notice that this user has full administrative rights.
14. The prompt to create a password when adding users is controlled by a system
option that is configurable using the options security command.
NOTE: After a second user is added, all users will be authenticated on the storage
system.

NetApp University - Do Not Distribute
E4-7 Data ONTAP 7.3 Fundamentals: Administration Security
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
15. Exit your telnet and console session. Open a new telnet session and log in as guest
user bob. Are you successful?
Y or N
______________
16. Log in as bob and access FilerView. (If you have FilerView open already, close the
browser and open a new one.)
Are you able to access FilerView as bob?
Y or N
______________
17. Open a new telnet session and log in as the administrator user dennis. Are you
successful?
Y or N
______________
18. Access FilerView and log in as dennis. What are the results?
____________________________________________________________

19. From FilerView, view the syslog and locate the log of your login attempts.
Filer > Syslog Messages

END OF TASK
NetApp University - Do Not Distribute
N
e
t
w
o
r
k
i
n
g
NetApp University - Do Not Distribute
E5-1 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 5: NETWORKING
Exercise
Module 5: Networking
Estimated Time: 45 minutes

EXERCISE: NETWORK CONFIGURATION
OVERVIEW
The purpose of this exercise is to give you an opportunity to configure network settings and
host name resolution on the Data ONTAP simulator.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Configure network settings from FilerView
Configure network settings from the CLI
Describe and configure virtual interfaces
TIME ESTIMATE
45 minutes
NetApp University - Do Not Distribute
E5-2 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
48 2008 NetApp. All rights reserved.
Check Your Understanding
Where can you set or change a host name
locally on the storage system?
How do you configure host-name resolution for
a storage system?
What is the difference between single-mode
and multimode trunks?
Single-modefailover
Multimodeimproved bandwidth
What are the benefits of a VLAN?


NetApp University - Do Not Distribute
E5-3 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CONFIGURING NETWORK SETTINGS FROM FILERVIEW
OVERVIEW
This task demonstrates the use of FilerView to configure the simulators network interfaces.

START OF TASK
STEP ACTION
1. Use FilerView to view and configure network settings.
FilerView > Network > Configure
Record the network setting for each of the following:
Route Enabled: ____________________________________________
Default Gateway: ___________________________________________
MTU Discovery: ____________________________________________
IP Match Any Address: _______________________________________
FTPD Enabled: ______________________________________________
RSH Enabled: _______________________________________________

2. Use FilerView to display and configure network interfaces.
FilerView > Network > Manage Interfaces
NOTE: Preserve ns0. The second interface, ns1, will be used.

3. Under Operations for ns1, select Modify.

4. Configure this interface using the following information:
IP Address: ____________________________________ (supplied by instructor)
NetMask: ______________________________________ (supplied by instructor)
Broadcast (leave blank)
Media Type: 10/100/1000 Auto-negotiate
MTU Size: Accept the default (1500)
Flow Control: Full
Trusted: Selected
WINS: Select Use WINS

Click Apply.



NetApp University - Do Not Distribute
E5-4 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
5. Verify that the modifications to the interface were accepted.
FilerView > Network> Manage Interfaces > Show Interface Details
6. What must you do to use this interface?
___________________________________________________________

7. Verify host name resolution on the simulator.
8. Use FilerView to view the /etc/hosts file.
FilerView > Network > Manage Hosts File
How many entries are there in the /etc/hosts file?
___________________________________________________________

9. Configure host name resolution.
FilerView > Network > Configure Host Name Resolution (DNS and NIS)
Step through the wizard and observe the configured information.
(If required, your instructor will supply DNS server information.)
10. Notice that the last step in the process displays host name resolution information
configuration.
Record the information here:
DNS Domain Name: __________________________________________
DNS Dynamic Update Interval: __________________________________
Dynamic DNS Updates: ________________________________________
DNS Cache: __________________________________________________
DNS Name Servers:____________________________________________
____________________________________________
Either commit the information or select Cancel (because you didnt change
anything).
11. Select Network > Report and review the information displayed.
12. Task complete. Proceed to the next task.
END OF TASK





NetApp University - Do Not Distribute
E5-5 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: CONFIGURING NETWORK SETTINGS FROM THE CLI
OVERVIEW
This task demonstrates the use of system commands to configure the simulators network
interfaces.

START OF TASK
STEP ACTION
1. Connect to the storage systems console.
Do not try to telnet to your storage system.
2. At the command prompt, enter:
ifconfig a
3. Interface names may have different designations.
Ensure that the display is similar to the following:
NetApp> ifconfig -a

e0: flags=848043<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.41.66.130 netmask 0xffffff00 broadcast 10.41.66.255

lo: flags=948049<UP,LOOPBACK,RUNNING,MULTICAST,TCPCKSUM> mtu
9188 inet 127.0.0.1 netmask 0xff000000 broadcast 127.0.0.1
4. At the command prompt, enter:
ifconfig
5. The following ifconfig syntax is displayed:
NetApp> ifconfig
usage: ifconfig [ -a | [ <interface>
[ [ alias | -alias ] <address> ] [ up | down ]
[ netmask <mask> ] [ broadcast <address> ]
[ mtusize <size> ]
[ mediatype { tp | tp-fd | 100tx | 100tx-fd 1000fx | auto }
]
[ flowcontrol { none | receive | send | full } ]
[ trusted | untrusted ]
[ wins | -wins ]
[ [ partner { <address> | <interface> } ] | [ -partner ] ] ]
]
6. At the command prompt, enter:
ifconfig <onboard interface from step #3>

NetApp University - Do Not Distribute
E5-6 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
7. Record the displayed values below.

Interface name: ______________________________________________
Is the interface up or down? ____________________________________
IP address: __________________________________________________
Netmask value: _______________________________________________
Media type: __________________________________________________

8. At the command prompt, enter:
ifconfig <interface> 10.10.10.XX
where XX is the last octet of your storage systems IP address
9. At the command prompt, enter:
ifconfig <interface> down
10. From your workstation:
a. Open a telnet session to the storage system using the storage system IP
address or name. You can use TeraTerm Pro or PuTTY to open the telnet
session.
b. Log in as root.
NOTE: Verify with your instructor the password for root.
Were you able to connect? ___________

11. From the console, enter:
ifconfig <interface> the_original_ip netmask
the_original_netmask
12. From the console, enter:
ifconfig <interface> up
13. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E5-7 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: LEARNING MORE ABOUT VIRTUAL INTERFACES
OVERVIEW
This task helps you learn more about configuring a storage system for virtual interfaces.

START OF TASK
STEP ACTION
1. What is the purpose of a single-mode virtual interface?
a. A single-mode virtual interface provides failover if one port fails.
b. A single-mode virtual interface provides load-balancing capabilities.
c. A single-mode virtual interface provides security.
d. A single-mode virtual interface allows you to configure the interface to
work for only one client at a time, thus improving performance.
2. What is the purpose of a multi-mode virtual interface?
a. A multi-mode virtual interface provides failover if one port fails.
b. A multi-mode virtual interface allows for switching between interfaces.
c. A multi-mode virtual interface provides more security options.
d. A multi-mode virtual interface enables faster throughput by having links
that share network loads.
3. What is the maximum number of interfaces in a single-mode virtual interface for an
FAS270? (Hint: Use FilerView Help.)
a. 1
b. 2
c. 3
d. 4
4. How many interfaces can you configure in a multi-mode virtual interface?
a. 1
b. 2 or more
5. You will now create and manage a single-mode vif from the CLI.
From your workstation:
a. Open a telnet session to the storage system using the storage system IP
address or name. You can use TeraTerm Pro or PuTTY to open the telnet
session.
b. Log in as root.
NOTE: Verify with your instructor the password for root.
6. At the command prompt, enter:
ifconfig a
7. At the command prompt, enter:
vif create
NetApp University - Do Not Distribute
E5-8 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
View the syntax.
8. At the command prompt, enter:
vif create single singletrunk1 <interface> <interface>
9. At the command prompt, enter:
ifconfig singletrunk1
10. At the command prompt, enter:
ifconfig singletrunk1 <original IP of filer> up netmask
<original Netmask of filer>
11. Telnet to the IP address used in step 5 and then enter:
vif status
12. Connect to the console or enter the next commands in the console connection
window that has been established.
13. At the command prompt, enter:
ifconfig a
14. At the command prompt, enter:
vif destroy singletrunk1
NOTE: You cannot destroy a vif in the up state.
15. At the command prompt, enter:
ifconfig singletrunk1 down
16. At the command prompt, enter:
vif destroy singletrunk1
17. At the command prompt, enter:
ifconfig -a
18. Next, you will create a single-mode vif using FilerView.
19. This task can be performed only on a system with a quad Ethernet card installed.
Skip to next task if your system is a FAS2XX system.
Open Internet Explorer and enter the following URL:
http://ip_address_of_storage_system/na_admin
For example:
http://10.32.69.15/na_admin
20. Select Network > Add Virtual Interface.
NetApp University - Do Not Distribute
E5-9 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION

Enter the following information:
Virtual Interface name = SingleTrunk1
Network Interfaces = any two available
Trunk Mode = Single
Click Apply.
21. View the vif in FilerView.
After viewing the details, delete SingleTrunk1.
22. Finally, you will create a multi-trunk mode from the CLI.
23. View the configured interfaces by entering at the command prompt:
ifconfig a
24. At the command prompt, enter:
vif create
View the syntax.
25. At the command prompt, enter:
vif create multi MultiTrunk1 b ip <interface>
<interface>
26. At the command prompt, enter:
ifconfig MultiTrunk1

NetApp University - Do Not Distribute
E5-10 Data ONTAP 7.3 Fundamentals: Networking
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
27. At the command prompt, enter:
ifconfig MultiTrunk1 <IP obtained in previous
exercises> up netmask <Netmask obtained in previous
exercises>
28. At the command prompt, enter:
vif status
What is the load balancing policy?_______________________________
How many links are active?____________________________________
What is the vif type?__________________________________________


END OF TASK


NetApp University - Do Not Distribute
P
h
y
s
i
c
a
l

S
t
o
r
a
g
e
NetApp University - Do Not Distribute
E6-1 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 6: PHYSICAL STORAGE MANAGEMENT
Exercise
Module 6: Physical Storage
Management
Estimated Time: 60 minutes

EXERCISE: CONFIGURING DISKS AND AGGREGATES
OVERVIEW
The purpose of this exercise is to give you an opportunity to explore how disks and
aggregates work on a storage system using both the CLI and FilerView.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Plan a disk configuration for an FAS storage system
Explore how disk sizing affects usable disk space
Turn on disk scrub and understand the impact it has on a storage system
Fail a disk in an FAS storage system
Create an aggregate
Add disks to an aggregate
TIME ESTIMATE
60 minutes



NetApp University - Do Not Distribute
E6-2 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
48 2008 NetApp. All rights reserved.
Check Your Understanding
What is a RAID group?
Why use double parity?
How many RAID groups does the following
command create?
What is the minimum size of a RAID-DP
group?















NetApp University - Do Not Distribute
E6-3 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: PLANNING DISK CONFIGURATION
OVERVIEW
The purpose of this exercise is to check your knowledge of requirements for RAID group size
and composition. Based on the lecture information and the diagram below, answer the
following questions.

START OF TASK
STEP ACTION


1. Which of the volumes would best be used only for administration?
___________________________________________________________

2. Which volume/RAID group contains the maximum number of disks?
___________________________________________________________

3. Which volume/RAID group contains the minimum recommended number of disks
(for a non-admin volume)?
___________________________________________________________

4. Which volume/RAID group contains the default number of disks assigned when a
new volume is created?
___________________________________________________________
/vol0 /aggr1 /aggr2
NetApp University - Do Not Distribute
E6-4 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION

5. Which volume/RAID group contains an optimum number of disks?
___________________________________________________________

6. What are the recommendations regarding disk size and RAID group capacity?
____________________________________________________________
____________________________________________________________

7. When should you add RAID groups and/or disks?
___________________________________________________________
___________________________________________________________

8. Task complete. Proceed to the next task.

END OF TASK

TASK 2: SIZING
OVERVIEW
This task demonstrates how disk sizing creates usable disk space on a flexible volume.

START OF TASK
STEP ACTION
1. In this next exercise, you will calculate how much usable space would be available
if you added a full shelf of 72-GB FC drives to a flexible volume.



2. How many disks are contained in a full DS-14 shelf? ____________________

If you add all these disks to a single aggregate with one RAID-DP group, how
many data disks are there? ____________________


3. These FC data disks are right sized.
What is the right-size space per 72 GB? ___________
NetApp University - Do Not Distribute
E6-5 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION

Multiply this number by the number of disks you calculated in Step 2.
___________

4. Subtract the amount of space reserved for the file system (WAFL).
What is the percentage you need to subtract? ________________

Right-sized amount total = (WAFL reserved percentage * right-sized amount total)
The usable disk size is: _________________

5. Your aggregate snap reserve is turned on. What is the default percentage for
aggregate snap reserve? ________________

Multiply this percentage by the usable disk size, and then subtract it from the total
usable disk size.
Usable disk size = (percent of aggregate snap reserve * usable disk size)
The total space available to any flexible volume is: ________________

6. Finally, you have the volume snap reserve turned on in your new flexible volume.
What is the default percentage for volume snap reserve? __________________

Multiply this percentage by the total space available to the flexible volume, and
then subtract it from the total from step 5.
(Total available to flexvol) = (percent of vol snap reserve * total available to
flexvol)
This is the amount of disk space that a full disk shelf of 72-GB drives adds to a
flexible volume with both aggregate Snapshot protection, and volume Snapshot
protection with RAID-DP. ______________________

7. Task complete. Proceed to the next task.

END OF TASK





NetApp University - Do Not Distribute
E6-6 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: EXPLORING THE CURRENT DISK CONFIGURATION
OVERVIEW
This task demonstrates methods of verifying the storage systems current disk configuration
using the CLI and FilerView. For the purposes of this exercise, the system console is either
the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS
storage system.

START OF TASK
STEP ACTION
1. Open FilerView and select:
Storage > Disks > Manage
2. Use the drop-down list. How many spare disks are available?
______________

3. View All Disks.
How many parity disks are there? ______________

4. Log in to the storage system, access the CLI, and then enter:
sysconfig v
5. Review the output and answer the following questions:
Which slot is being used for the disk controller? ________________
How many shelves are there? _________________
What are the disk sizes? __________________

6. Enter:
sysconfig d
Compare the results with the previous output.
7. Enter:
fcstat device_map
Can you see where each of your disks is located in the shelf?
Y or N
_______________
8. Task complete. Proceed to the next task.

END OF TASK


NetApp University - Do Not Distribute
E6-7 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: DISK SCRUB
OVERVIEW
This task demonstrates methods of configuring disk scrubbing using the CLI and FilerView.
You will then run the disk scrub command and view disk status from FilerView.

START OF TASK
Identify whether statements 1 through 7 are true or false.
STEP ACTION
1. Disk scrubbing identifies media errors and rewrites information to another location
on the disk.
_________________

2. Increasing the time interval that the system operates in degraded mode is a smart
and safe way of handling the system so that you dont need to reboot every 24
hours.
__________________

3. An unqualified disk is one that is too large for the shelf on which it is placed.
__________________

4. A RAID group of six or more disks is more fault-tolerant for critical data than a
RAID group of 20.
_________________

5. Data ONTAP automatically identifies an unqualified disk.
_________________

6. The parity disk must be at least as large as the largest disk in a RAID group.
_________________

7. A RAID group with 18 disks is recommended for optimal performance and fault
tolerance.
_________________
8. Which option enables you to set scrub performance?
a. options raid.reconstruct_speed
b. options raid.scrub.perf_impact
c. options disk scrub
d. options disk.performance.cpu
NetApp University - Do Not Distribute
E6-8 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
9. Which option enables you to change the amount of system resources allocated to
the reconstruction of data? (Default is set to medium.)
a. options raid.reconstruct_speed
b. options raid.reconstruct.perf_impact
c. options raid.scrub.perf_impact
d. options disk_reconstruct_speed
10. Is scrub enabled by default?
________________

11. What is the command to fail a disk?
a. disk fail
b. disk RAID disable
c. zero spares
d. options raid.timeout
12. Task complete. Proceed to the next task.

END OF TASK

TASK 5: IMPACT OF DISK SCRUBBING
OVERVIEW
This task demonstrates the impact of the disk scrub command on performance.

START OF TASK
STEP ACTION
1. Issue the following command to view system statistics every second:
NetApp > sysstat 1
Can you confirm that the disks are in use from the output?
_____________

2. Issue the command to view the manual page for the sysstat command.
NetApp > sysstat x s 1
What does this command do?
____________________________________________________________

3. Start the disk scrubbing by entering:
NetApp University - Do Not Distribute
E6-9 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
NetApp> disk scrub start
Is there any visible sign that the scrub has begun?
___________________________________________________________

4. While the disk scrub is running, issue the following command:
sysstat
How does this output compare to the one before the disk scrub?
NetApp> sysstat 1
___________________________________________________________

5. View the system statistics from FilerView. How would you accomplish this?
____________________________________________________________

6. How does FilerView compare to using the command line?
___________________________________________________________

7. Enter the command to stop the scrub.
NetApp> disk scrub stop
8. View the disks using FilerView.
FilerView > Storage > Disks > Manage
Can you see the failed disks?
________________

9. View the spare disks using FilerView.
How many spares are there?
________________

10. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute
E6-10 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 6: CREATING AN AGGREGATE
OVERVIEW
This task demonstrates how to create an aggregate using FilerView. For the purpose of this
lab, the system console is the Data ONTAP simulator running in a Linux virtual environment.

START OF TASK
STEP ACTION
1. Access FilerView for your storage system.
2. In the FilerView left navigation pane under Aggregates, click Manage to view the
aggregates that already exist.
3. Click Add to launch the Aggregate Wizard.
4. Name the aggregate aggr1.
5. Notice the default parity option. Why is that the default for the aggregate?
___________________________________________________________

What can you do to conserve disks?
____________________________________________________________

Select the option that uses the least number of disks.


6. Use the ? character to determine the minimum RAID group size for your system,
and then record that number.
______________
7. Use the Automatic option.
What safeguard is built into the FilerView automatic disk selection? (Hint: Use the
help option.)
____________________________________________________________

8. What disk size options do you have?
____________________________________________________________

Select any size.
9. Select the minimum number of disks for this volume type and parity choice.
_______________


NetApp University - Do Not Distribute
E6-11 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
10. Review your changes and commit them if they are correct.
Close the wizard.
11. Use Aggregates > Manage to view your changes. You might need to refresh the
display.
12. How many disks have been assigned to your new aggregate? Why?
___________________________________________________________

13. Task complete. Proceed to the next task.

END OF TASK

TASK 7: FAILING A DISK
OVERVIEW
This task demonstrates how to fail a disk.

START OF TASK
STEP ACTION
1. To view the disk ID numbers for aggr1, at the storage system console, enter:
aggr status aggr1 r
or
sysconfig r
Record the ID of a disk in aggr1.
_______________
Are there any failed disks?
________________

2. At the storage system console, enter:
NetApp> options raid.reconstruct.perf_impact high
3. At the storage system prompt, enter:
Netapp> disk fail [device_id from step 1]
What messages were displayed on the console?
____________________________________________________________
____________________________________________________________
____________________________________________________________

NetApp University - Do Not Distribute
E6-12 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
If the disk fail command is used without options, the disk is first marked as
``prefailed.'' If an appropriate spare is available, it will be selected for Rapid RAID
Recovery. In that process, the prefailed disk is copied to the spare. At the end of the
copy process, the prefailed disk is removed from the RAID configuration. The filer
then spins the disk down so it can be removed from the shelf. (The disk swap
command must be used when physically removing SCSI disks.)
The disk being removed is marked as broken,'' so that if it remains in the disk
shelf, it will not be used by the filer as a spare disk. If the disk is moved to another
filer, that filer will use it as a spare. This is not a recommended course of action, as
the reason that the disk was failed might have been because it needed to be
replaced.

4. What would happen if you failed a disk in aggr1 with no hot spare available?
___________________________________________________________
___________________________________________________________

5. What is the difference between the information provided by the vol status
command and the sysconfig command?
___________________________________________________________
___________________________________________________________
___________________________________________________________

6. Make sure that the failed (broken) disk is available for use later on in the class by
entering the following at the storage system console:
Netapp> priv set advanced
Netapp> disk unfail [device_id from step 1]
Netapp> priv set
7. Task complete. Proceed to the next task.

END OF TASK







NetApp University - Do Not Distribute
E6-13 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 8: ADDING DISKS TO AN AGGREGATE
OVERVIEW
This task demonstrates how to add disks to an existing aggregate using the CLI.

START OF TASK
STEP ACTION
1. Access the storage system console.
To determine the availability of hot spares, enter:
vol status -r
2. To view automatic disk selection, enter:
NetApp> aggr add aggr1 n 1
What output is returned on the console?
___________________________________________________________
NOTE: The above command does not add a disk to the aggregate aggr1.

3. Copy the returned command and enter it at the storage system prompt. View the
output.

4. To verify the addition of two disks, enter:
sysconfig r

5. To view the aggregates options, enter:
NetApp> aggr options aggr1

6. To change the aggr1 RAID type to double parity, at the storage system console,
enter:
NetApp> aggr options aggr1 raidtype dp

7. Note that there are no volumes created in this aggregate yet. You will do that in the
next module.
However, if you had created a volume for this aggregate, you could enter the
following at the storage system console to view the activity for the RAID-type
change.
NetApp> sysstat 1
The output from this command would show two to three times more reads than
writes. The system is computing the double parity and writing it to the dp disk.
Press Crtl-C to stop the display.

NetApp University - Do Not Distribute
E6-14 Data ONTAP 7.3 Fundamentals: Physical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
8. To change the aggr1 RAID type to RAID 4, at the storage system console, enter:
NetApp> aggr options aggr1 raidtype raid4
This command aborts the conversion to RAID-DP. It also leaves your system with
one non-zero spare. You can proceed to the next exercise with a dirty spare or
you can execute the following command:
NetApp> disk zero spares
9. Task complete.
END OF TASK
NetApp University - Do Not Distribute
L
o
g
i
c
a
l

S
t
o
r
a
g
e
NetApp University - Do Not Distribute

E7-1 Data ONTAP 7.3 Fundamentals: Logical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 7: LOGICAL STORAGE MANAGEMENT
Exercise
Module 7: Logical Storage
Management
Estimated Time: 40 minutes

EXERCISE: CONFIGURING VOLUMES, QTREES, AND QUOTAS
OVERVIEW
The purpose of this exercise is to give you an opportunity to create traditional and flexible
volumes on the storage system, and create a qtree and define quotas for those volumes.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Create a traditional volume
Create a flexible volume
Destroy a volume
Create a qtree
Define and manage quotas on a storage system
TIME ESTIMATE
40 minutes
NetApp University - Do Not Distribute

E7-2 Data ONTAP 7.3 Fundamentals: Logical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
36 2008 NetApp. All rights reserved.
Check Your Understanding
How does a traditional volume compare to an
aggregate?
What is the difference between a traditional
volume and a flexible volume?
What is the name of the root volume?

NetApp University - Do Not Distribute

E7-3 Data ONTAP 7.3 Fundamentals: Logical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CREATING A TRADITIONAL VOLUME
OVERVIEW
This task demonstrates how to create a traditional volume using FilerView. For the purposes
of this exercise, the system console is either the Data ONTAP simulator running in a Linux
virtual environment, or your assigned FAS storage system.

START OF TASK
STEP ACTION
1. Access FilerView for your storage system by entering:
http://[IP address]/na_admin
2. In the FilerView left navigation pane under Volumes, click Add to launch the
Volume Wizard.

3. Create a traditional volume.

4. You can name this volume anything except vol0. Why?
___________________________________________________________

5. Review the language choices, but accept the default, POSIX.

6. We want to conserve disks. What type of parity uses a single-parity disk?
___________________________________________________________

7. Use the ? character to determine the minimum RAID group size for your system
and enter that number. (Three is the minimum for all systems.)

8. Use the automatic option.
What safeguard is built into the FilerView automatic disk selection?
___________________________________________________________

(Hint: use the help option.)

9. What disk size options do you have?
___________________________________________________________
Select any size.


NetApp University - Do Not Distribute

E7-4 Data ONTAP 7.3 Fundamentals: Logical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
10. Select the minimum number of disks for this volume type and parity choice.
______________

11. Review your changes and commit them if they are correct.
If necessary, how would you make a correction?
____________________________________________________________

12. Use the Volumes > Manage selection to review your changes.

13. Using the filter, display the different views of your volumes.

14. Task complete. Proceed to the next task.


END OF TASK

TASK 2: CREATE A FLEXIBLE VOLUME
OVERVIEW
This task demonstrates how to create and resize a flexible volume using FilerView.

START OF TASK
STEP ACTION
1. Access FilerView for your storage system.

2. In the FilerView left navigation pane under Volumes, click Add to launch the
Volume Wizard.

3. You can name this volume anything except vol0. Why?
___________________________________________________________


For the purposes of this task, name your volume FLEXSAN. You will use this
flexible volume when we get to the SAN module.


NetApp University - Do Not Distribute

E7-5 Data ONTAP 7.3 Fundamentals: Logical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. Accept the default, POSIX, as the language choice.

5. There is no parity option offered. Why?
___________________________________________________________

6. Select an online aggregate (such as aggr1) from the previous exercise.
______________

7. If we need 100 MB of available data storage in this volume, how large should you
set the total volume size? _______________
8. Select the space guarantee that is the equivalent to a traditional volume.
___________________________________________________________

Select any size.
9. Review your changes and commit them if they are correct.
If necessary, how would you make a correction?
____________________________________________________________

10. When you have finished, review the results in the Manage Volumes display.
Did you calculate correctly? Do you have 100 GB available?

11. Using the filter, observe the different views of your volumes.
12. In the management view, notice that the name of your new volume is a link. What
happens when you click this link?
__________________________________________________________

13. Click Modify and review the Modify Volume Wizard. You may make changes or
simply review the options.
Return to the Volume Management window and select the volume link again.
14. Select Show Aggregate and observe some of the things you can change.
Return to the Aggregate Properties window.
15. Return to the Volumes Management window either by selecting Show Volume on
the Aggregate Properties window, or from FilerView.
16. Repeat this task and create another flexible volume named FLEXTREE in aggr1.
17. Task complete. Proceed to the next task.

END OF TASK
NetApp University - Do Not Distribute

E7-6 Data ONTAP 7.3 Fundamentals: Logical Storage Management
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: DESTROYING A VOLUME
OVERVIEW
This task demonstrates how to destroy a volume using FilerView.

START OF TASK
STEP ACTION
1. Access FilerView.
2. Go to Manage Volumes.
3. What must be done before a volume or aggregate can be destroyed?
___________________________________________________________

4. Select the traditional volume you have already created and try to destroy it without
taking it offline. What happens?
___________________________________________________________
5. Destroy the traditional volume, making sure not to destroy the FLEXSAN volume,
which will be used in the SAN module, or FLEXTREE, which will be used in the
next module.
6. Try to destroy the root volume. What happens?
___________________________________________________________

7. Task complete. Proceed to the next task.

END OF TASK



NetApp University - Do Not Distribute
C
I
F
S
NetApp University - Do Not Distribute

E8-1 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 8: CIFS
Exercise
Module 8: CIFS
Estimated Time: 20 minutes

EXERCISE: CONFIGURING CIFS, CREATING AND MAPPING SHARES
OVERVIEW
The purpose of this exercise is to give you an opportunity to configure a Common Internet
File System (CIFS) on a storage system.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Verify CIFS setup
Create a Windows domain user
View and create shares using the CLI
Create shares using Windows Computer Management
Map a drive
Modify user permissions
Display CIFS sessions
Terminate CIFS sessions
TIME ESTIMATE
45 minutes
NetApp University - Do Not Distribute

E8-2 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
38 2008 NetApp. All rights reserved.
Check Your Understanding
What is the purpose of CIFS?
In what server environments can a storage
system participate?
What are the steps to set up CIFS?

NetApp University - Do Not Distribute

E8-3 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: VERIFYING CIFS SETUP
OVERVIEW
This task demonstrates how to verify CIFS setup on a storage system. For the purposes of this
exercise, the system console is either the Data ONTAP simulator running in a Linux virtual
environment, or your assigned FAS storage system.

START OF TASK
STEP ACTION
1. At the storage system prompt, test the CIFS setup using the following commands:
NetApp> cifs testdc
NetApp> cifs domaininfo
List preferred DCs:
____________________________________________________________

List favored DCs:
____________________________________________________________


List other DCs:
___________________________________________________________

2. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute

E8-4 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: CREATING A WINDOWS DOMAIN USER
OVERVIEW
This task demonstrates how to create a new Windows domain user.

START OF TASK
STEP ACTION
1. Open Active Directory by clicking:
Start Programs Administrative Tools Active Directory Users and
Computers
If the Active Directory Users and Computers option is not present, check with your
instructor.
Click Action, select New, and then select User.
Create UserX, where X is the number of your storage system. (For example, if your
storage system name is Storage System10, create User10.)
NOTE: Do not create UserX without replacing the X with a number. If you are
not sure what user to create, ask your instructor.













Click Next, and then set the user password the same as the user name.

END OF TASK

NetApp University - Do Not Distribute

E8-5 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: VIEWING SHARES AND CREATING A NEW SHARE USING THE
CLI
OVERVIEW
This task demonstrates how to view shares and create a new share from the CLI.

START OF TASK
STEP ACTION
1. View the shares on the storage system by entering the following command:
NetApp> cifs shares
Name Mount Point Description
---- ----------- -----------
ETC$ /etc Remote Administration
BUILTIN\Administrators / Full Control
HOME /vol/vol0/home Default Share
everyone / Full Control
C$ / Remote Administration
BUILTIN\Administrators / Full Control
These are the default shares.
2. Open Computer Management by clicking:
Start Programs Administrative Tools Computer Management
3. Click Action, and then select Connect to another computer. Highlight the name of
your storage system.
4. In the left pane, click:
System Tools Shared folders Shares
5. Observe the list of currently shared directories on the right.
6. Create a qtree named cifs_tree in vol0 and change security to ntfs by
entering:
NetApp> qtree create /vol/vol0/cifs_tree
NetApp> qtree security /vol/vol0/cifs_tree ntfs
7. View the qtree information. (You might see other qtrees from previous exercises.)
NetApp>qtree status
Volume Tree Style Oplocks Status
------ -------- ----- -------- ---------
FLEXTREE mixed enabled normal
vol0 mixed enabled normal
vol0 cifs_tree ntfs enabled normal

NetApp University - Do Not Distribute

E8-6 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
8. Access the storage system console and enter the following:
NetApp> cifs shares add cifs_tree /vol/vol0/cifs_tree
Answer yes to the following question:
The share name 'cifs_tree' will not be accessible by some MS-
DOS workstations.
Are you sure you want to use this share name? [n]:Y
9. To view the new share, enter:
NetApp> cifs shares cifs_tree
Name Mount Point Description
---- ----------- -----------
cifs_tree /vol/vol0/cifs_tree
everyone / Full Control
10. To add a comment to the share, enter:
NetApp> cifs shares -change cifs_tree -comment 'Share
created via CLI'

11. To view the change to the share, enter:
NetApp> cifs shares cifs_tree
Name Mount Point Description
---- ----------- -----------
cifs_tree /vol/vol0/cifs_tree Share created via CLI
everyone / Full Control
12. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute

E8-7 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: CREATING A NEW SHARE WITH COMPUTER MANAGEMENT
OVERVIEW
This task demonstrates how to create a new share with Windows Computer Management.

START OF TASK
STEP ACTION
1. Right-click the Shares folder, and then select New File Share.

2. Enter the following information:
Folder to share: C:\vol\FLEXTREE
Share name: FLEXTREE
Share Description: Share for FLEXTREE
Click Next to continue.

3. Select the option, Customize share and folder permissions, and then click Custom.




















NetApp University - Do Not Distribute

E8-8 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. Add UserX from the previous exercise with Full Control.

















Click OK.
5. Click Finish. Notice that the selection is displayed in the Share Permissions
window.
6. Select No to create another share.
7. Notice that the new shared directory, FLEXTREE, is displayed in the shared
directories for the storage system.
8. Close the Computer Management dialog box.
9. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute

E8-9 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 5: MAPPING THE NEW SHARES TO A DRIVE LETTER
OVERVIEW
This task demonstrates how to map new shares to a drive letter.

START OF TASK
STEP ACTION
1. From the Windows desktop, right-click My Network Places, and then select Map
Network Drive.
2. Enter the following information in the appropriate fields:
Drive: <an unused letter>
Path: \\Storage_System_name\FLEXTREE
Click Finish to accept the changes and close the window.
3. Map the CLI share to a different drive letter.
4. Task complete. Proceed to the next task.

END OF TASK

TASK 6: USER PERMISSIONS
OVERVIEW
This task demonstrates how to modify permissions.

START OF TASK
STEP ACTION
1. Access the storage system console and enter the following:
NetApp> cifs access FLEXTREE userX rwx
where userX is the user created previously
2. To verify the result, on the console, enter:
cifs shares
3. To view the access change in Windows Computer Management, select
Start Programs Administrative Tools Computer Management
4. Select your storage system.
5. Select System Tools Shared folders Shares.
6. Select FLEXTREE.
7. Click Properties Permissions.
8. Note that the permission is set to Full Control.
NetApp University - Do Not Distribute

E8-10 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
9. Go back to step 1 and enter the following:
NetApp> cifs access FLEXTREE userX read
10. Enter:
cifs shares
Observe the effect.
11. Use Windows Computer Management to review the permissions for UserX on
FLEXTREE.
12. Task complete. Proceed to the next task.

END OF TASK

TASK 7: DISPLAYING CIFS SESSIONS
OVERVIEW
This task demonstrates how to display CIFS sessions on a storage system.

START OF TASK
STEP ACTION
1. Open Computer Management.
2. Select your storage system.
3. Select System Tools Shared Folders Sessions.
4. Review the displayed information.
5. Open the storage system console.
6. Enter:
cifs sessions
7. Compare the results of step 6 with the results of step 3.
8. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute

E8-11 Data ONTAP 7.3 Fundamentals: CIFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 8: TERMINATING CIFS SESSIONS
OVERVIEW
This task demonstrates how to terminate a CIFS session on a storage system.

START OF TASK
STEP ACTION
1. Open Computer Management.
2. Select your storage system.
3. Select System Tools Shared Folders Sessions.
4. Right-click a session, and then select Close Session.
5. Close the dialog boxes and Windows.
6. Go to the storage system console.
7. Enter:
cifs sessions
Observe the effect of terminating the session.
8. Enter:
cifs terminate
9. Observe the effect of this command and compare it with step 4.
10. To restart the CIFS service, on the storage system console, enter:
cifs restart
11. When comparing the results of step 4 with the results of step 8, what is the
difference?
____________________________________________________________

12. Task complete.

END OF TASK




NetApp University - Do Not Distribute
N
F
S
NetApp University - Do Not Distribute
E9-1 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 9: NFS
Exercise
Module 9: NFS
Estimated Time: 45 minutes

EXERCISE: CONFIGURING NFS, CREATING AND MOUNTING EXPORTS
OVERVIEW
The purpose of this exercise is to give you an opportunity to configure Network File System
(NFS) on a storage system.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
License and mount a volume
Edit and modify the /etc/exports file using the CLI
Configure the /etc/exports file using FilerView
Create an export with vi
TIME ESTIMATE
45 minutes
NetApp University - Do Not Distribute
E9-2 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
30 2008 NetApp. All rights reserved.
Check Your Understanding
What does NFS stand for?
What is the format for the /etc/exports file?
What is the purpose of export options?
What command would you use to view what is
exported from the storage appliance?















NetApp University - Do Not Distribute
E9-3 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: LICENSING NFS AND MOUNTING A VOLUME
OVERVIEW
This task demonstrates how to start the NFS daemon on a storage system. For the purposes of
this exercise, the system console is either the Data ONTAP simulator running in a Linux
virtual environment, or your assigned FAS storage system.

START OF TASK
STEP ACTION
1. Telnet to your assigned storage system.
2. At the storage system console, license the NFS protocol by entering:
NetApp> license
NetApp> license add abcdefg
(Obtain the license code from your instructor)
View the newly added license by entering:
NetApp> license
3. Verify the content of the /etc/exports file by entering:
NetApp>rdfile /etc/exports
4. At the storage system console, view the exported file systems by entering:
NetApp> exportfs
Notice that just by licensing NFS, all volumes and qtrees in the /etc/exports
file have been exported.
5. Telnet to the adminhost and create a directory for your filer.
In the example below, use your actual filer name for filer_name. Do not create a
directory with the name filer_name.
# mkdir /mnt/filer_name
6. Create the vol0 directory under the filer_name directory created in step 5 by
entering:
# mkdir /mnt/filer_name/vol0
7. Mount the filers root volume to the directory you just created and view the
contents. When mounting the filer, use the filer_name or IP address.
# mount IP_address:/vol/vol0/ /mnt/filer_name/vol0
# cd /mnt/filer_name/vol0
You should now be able to view the directory structure of your storage appliance by
entering:
# ls al
8. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute
E9-4 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: EDITING AND MODIFYING THE /ETC/EXPORTS FILE USING THE
CLI
OVERVIEW
This task demonstrates how to configure an export on a storage system using the CLI. For the
purposes of this exercise, the system console is the Data ONTAP simulator running in a
Linux virtual environment.

START OF TASK
STEP ACTION
1. Create a qtree named nfs_tree1 from the filers console by entering:
NetApp>qtree create /vol/vol0/nfs_tree1
View the qtree by entering:
NetApp>qtree status
2. Export the qtree using the rdfile and exportfs commands.
In the example below, use your actual adminhost name instead of
UNIX_adminhost. (Do not type UNIX_adminhost.)
NetApp>rdfile /etc/exports
NetApp>wrfile /etc/exports
Copy and paste all the exports from the CLI window, and then add the following
line:
/vol/vol0/nfs_tree1 -rw=UNIX_adminhost,root=
UNIX_adminhost
NOTE: Add a carriage return <Enter> after the nfs_tree1 line, and then press
Ctrl-C. The following error message is displayed:
read: error reading standard input: Interrupted system call
NetApp>exportfs a
To ensure that the qtree was exported, at the storage system prompt, enter:
NetApp>exportfs
3. Telnet to the UNIX adminhost, and then create and mount the qtree by entering:
# mkdir /mnt/filer_name/nfs_tree1
# mount IP_address:/vol/vol0/nfs_tree1
/mnt/filer_name/nfs_tree1
# cd /mnt/filer_name/nfs_tree1
4. Task complete. Proceed to the next task.

END OF TASK



NetApp University - Do Not Distribute
E9-5 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: CONFIGURING THE /ETC/EXPORTS FILE USING FILERVIEW
OVERVIEW
This task demonstrates how to configure an export on a storage system using FilerView. For
the purposes of this exercise, the system console is the Data ONTAP simulator running in a
Linux virtual environment.

START OF TASK
STEP ACTION
1. At the storage system console, use the following qtree create command to
create a qtree named nfs_tree2.
NetApp> qtree create /vol/vol0/nfs_tree2
2. Use FilerView to add an export.
http://IP_address_of_storage_appliance/na_admin
Navigate to NFS and click Add Export.

NetApp University - Do Not Distribute
E9-6 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
Enable read-write and root access.


















NetApp University - Do Not Distribute
E9-7 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
Enter /vol/vol0/nfs_tree2 and click Next.

Click Add.


NetApp University - Do Not Distribute
E9-8 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
Enter the name of the UNIX adminhost and click OK.

The Adminhost is added. Click Next.











NetApp University - Do Not Distribute
E9-9 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
Click Add.


Enter the name of the UNIX adminhost and click OK.











NetApp University - Do Not Distribute
E9-10 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
The UNIX adminhost is added. Click Next.


View the summary for accuracy, and then click Commit.

NetApp University - Do Not Distribute
E9-11 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
Click Close.




















NetApp University - Do Not Distribute
E9-12 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
The NFS export wizard automatically exports the volume/qtree when you are
finished. Use the exportfs command from the filer command line to view the
export by entering:
NetApp> exportfs

3. Mount the export through the UNIX adminhost.
# mkdir /mnt/filer_name/nfs_tree2
# mount IP_address:/vol/vol0/nfs_tree2
/mnt/filer_name/nfs_tree2
# cd /mnt/filer_name/nfs_tree2
#ls -a

END OF TASK

NetApp University - Do Not Distribute
E9-13 Data ONTAP 7.3 Fundamentals: NFS
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: CREATING AN EXPORT WITH VI
OVERVIEW
This task demonstrates how to configure an export on a storage system from vi. For the
purposes of this exercise, the system console is the Data ONTAP simulator running in a
Linux virtual environment.

START OF TASK
STEP ACTION
1. Access the storage system console and create a qtree in vol0 named nfs_tree3
by entering:
Netapp> qtree create /vol/vol0/nfs_tree3
2. From the adminhost, verify that the present working directory is the storage
systems etc directory on the root volume.
# pwd
If this is not the case, enter the following command:
# cd /mnt/filer_name/vol0/etc
Now edit the filers exports file using the following command:
# vi exports
Add the following line to the exports file:
/vol/vol0/nfs_tree3 -rw=<UNIX Admin host>,root=<UNIX
Admin host>
Save and exit /etc/exports using the following vi commands:
<Esc>
:wq or :wq!
3. Access the storage system console to export the new entry.
4. Enter the following command:
NetApp> exportfs a
5. Mount the export through the UNIX adminhost by entering:
# mkdir /mnt/filer_name/nfs_tree3
# mount IP_address:/vol/vol0/nfs_tree3
/mnt/filer_name/nfs_tree3
# cd /mnt/filer_name/nfs_tree3
#ls -a
6. Task complete.

END OF TASK


NetApp University - Do Not Distribute
Q
t
r
e
e
s
NetApp University - Do Not Distribute
E10-1 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 10: QTREES AND SECURITY STYLES
Exercise
Module 10: Qtrees and Security
Styles
Estimated Time: 60 minutes

EXERCISE: QTREES AND SECURITY STYLES
OVERVIEW
The purpose of this exercise is to give you an opportunity to create a qtree and define quotas
for that qtree.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Create a qtree
Define and manage quotas on a storage system
Create and manage a quota
Modify the /etc/quotas file and implement the quota changes
Generate a quota report
Practice creating qtrees and quotas
REQUIRED HARDWARE, SOFTWARE, AND TOOLS
HardwareAny storage system
SoftwareData ONTAP 7.3
TIME ESTIMATE
60 minutes
NetApp University - Do Not Distribute
E10-2 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
38 2008 NetApp. All rights reserved.
Check Your Understanding
What is a qtree?
What are security styles?
Does a security style prevent protocols from
accessing the volume or qtree?
What are the functions of a quota?
Name three quota targets.















NetApp University - Do Not Distribute
E10-3 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CREATING AND MANAGING A QUOTA
In the following task, you should continue to use the aggregate, flexible volume, and qtrees
from previous exercises.
START OF TASK
STEP ACTION
1. Verify that the qtrees tree1 and tree2 exist:
FilerView > Volumes > Manage > Qtrees > Manage
If these qtrees do not exist, create them:
FilerView > Volumes > Manage > Qtrees > Manage > Qtrees > Add
2. Use FilerView to share tree1:
FilerView > CIFS > Shares > Add a Share
Share Name: tree1
Mountpoint: /vol/vol0/tree1
Share Description: Quota lab tree
Max. Users: Leave blank
Force Group: Leave blank
Click Add.
3. Map the storage system root volume to your student workstation. The root
volume is shared by default.
My Computer > Tools > Map Network Drive
Drive: R (choose a letter not in use)
Folder: \\<IP of Storage System>\C$
Uncheck Reconnect at login.
Click OK.
4. From the client system, edit the /etc/quotas file using wordpad.
Add the following:
/vol/vol0/tree1 tree 10k 5 2k
* user - - -
NOTE: For this task, we are intentionally using small restrictions.
5. Use FilerView to enable quotas:
FilerView > Volumes > Quotas > Manage
Check the box for vol0.
On
The message, Enable quotas on Selected Volume(s)? is displayed.
OK
Alternately, you can return to the storage system CLI and turn on quotas for the
volume using the quota on nfsflex command.

NetApp University - Do Not Distribute
E10-4 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
6. After enabling quotas, verify the status.
What do you see?

Alternately, you can return to the storage system CLI and issue the quota status
command.
Initializing, scanning (0% done)
7. Use FilerView to view your changes to the /etc/quotas file.
FilerView > Volumes > Quotas > Manage > Edit Rules
8. Return to the client.
Map tree1 to your student workstation.
My Computer > Tools > Map Network Drive
Drive: Q (choose a letter not in use)
Folder: \\<IP of Storage System>\tree1
Uncheck Reconnect at login.
Connect using a different user name.
Username: <domain>\administrator
Password: <password>
Click OK.

9. Create at least six small files in the tree1 directory.
(Hint: You can do this easily by copying files from the local C: drive to the mapped
drive.)
10. When you exceed the soft limit for the file quota, what do you see on the client?

Cannot copy <filename>: There is not enough free disk space.
Delete one or more files to free disk space and then try again.
11. What message appears on the storage system console?
FilerView > Filer > Syslog Messages

Fri Oct 20 12:24:17 EST [wafl.quota.qtree.exceeded:notice]: tid 3: tree quota
exceeded on volume vol_quotaslab. Additional warnings will be suppressed for
approximately 60 minutes or until a 'quota resize' is performed.
Fri Oct 20 12:25:54 EST [quota.softlimit.exceeded:notice]: Threshold exceeded for
tree 3 on volume vol_quotaslab.

END OF TASK



NetApp University - Do Not Distribute
E10-5 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: PRODUCING A QUOTA REPORT
START OF TASK
STEP ACTION
1. Display a list of quotas:
FilerView > Volumes > Quotas > Report
From the storage system CLI, issue the command quota report.
2. How much disk space is being used by all users on your storage system?
___________________________________________________________

3. How many files were created on your storage system for tree1?
___________________________________________________________


END OF TASK

TASK 3: MODIFYING THE /ETC/QUOTAS FILE AND IMPLEMENTING
QUOTA CHANGES

START OF TASK
STEP ACTION
1. From the client system, edit the /etc/quotas file.
Make the modifications shown in bold.
/vol/vol0/tree1 tree 10k 2048 4k
* user - - -

2. Do your changes take effect automatically?
____________________________________________________________

3. Use FilerView to issue the resize command.
FilerView > Volumes > Quotas > Manage >
Check vol0 and click Resize.
Alternately, use the quota resize <vol> command to implement changes.

4. Verify that the new quota rules are in effect before moving on to the next step.
FilerView > Volumes > Quotas > Manage > Report

NetApp University - Do Not Distribute
E10-6 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
5. Use FilerView to edit the quotas for a qtree.
FilerView > Volumes > Quotas > Manage > Edit Rule
Are you able to do this?
___________________________________________________________

6. The quota report command provides more detail than FilerView.
Read the manual for the quota report command and give a brief description of
the following arguments:

-q ________________________________________________________

-s ________________________________________________________

-t ________________________________________________________

-u _________________________________________________________

-x _________________________________________________________

7. Continue to review the manual page for the quota command.
What is the purpose of the logmsg sub-command?
____________________________________________________________


END OF TASK

TASK 4: PRACTICE CREATING QTREES AND QUOTAS
START OF TASK
STEP ACTION
1. Create two qtrees in the nfsflex volume using either FilerView or the CLI.
Name the first qtree cobra and the second qtree firebird.
The following is an example of using the CLI to create qtrees:
system> qtree create /vol/nfsflex/cobra
system> qtree create /vol/nfsflex/firebird
2. View the qtrees you just created. What is the security style?
___________________________________________________________
NetApp University - Do Not Distribute
E10-7 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
3. Edit the correct file to give the cobra qtree a size limit of 50 M with a threshold of
45 M, and the firebird qtree a limit of 20 M with a threshold of 18 M, and limit
the files on firebird to 10. Use tree for the type on both quotas.
What file did you edit?
___________________________________________________________

Record the entries you create.
# TARGET TYPE DISK FILE THRESHOLD SDISK SFILE




4. How did you edit the file?
___________________________________________________________

5. What does the entry look like that gives the /vol/nfsflex flexible volume a
default quota of 150 M of disk space with a threshold of 145 M for any user?
# TARGET TYPE DISK FILE THRESHOLD SDISK SFILE


6. Before enabling quotas, set the interval for the log to two hours on
/vol/nfsflex/eng by entering:
system> quota logmsg on /vol/nfsflex 120
7. What is the command to enable quotas on the /vol/nfsflex?
___________________________________________________________

8.
What is the command to view the threshold for all quotas?
___________________________________________________________

9. Change the quotas for the qtree firebird to the same settings as cobra.
When you change the size of a quota, what command do you enter for changes to
take effect?
___________________________________________________________


END OF TASK
NetApp University - Do Not Distribute
S
A
N
NetApp University - Do Not Distribute
E11-1 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 11: SAN
Exercise
Module 11: SAN
Estimated Time: 45 minutes

EXERCISE: CREATING ISCSI LUNS FOR WINDOWS
OVERVIEW
The purpose of this exercise is to give you an opportunity to set up an iSCSI LUN for
Windows on a storage system.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Enable iSCSI services on the storage system
Configure iSCSI for Windows
Create a LUN on the storage system
Access the LUN from Windows
TIME ESTIMATE
45 minutes
NetApp University - Do Not Distribute
E11-2 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
40 2008 NetApp. All rights reserved.
Check Your Understanding
What are the two protocols NetApp supports in
the SAN environment?
What are the functions of a LUN?
What are the methods of creating a LUN?
Why would you use SnapDrive in a SAN
environment?















NetApp University - Do Not Distribute
E11-3 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: ENABLING ISCSI SERVICES
OVERVIEW
This task demonstrates how to enable iSCSI services on a storage system. For the purposes of
this exercise, the storage system is either the Data ONTAP simulator running in a Linux
virtual environment, or your assigned FAS storage system.

START OF TASK
STEP ACTION
1. From your workstation:
a. Open a telnet session to the storage system using the storage system IP
address or name. You can use TeraTerm Pro or PuTTY to open a telnet
session.
b. Log in as root.
NOTE: Verify with your instructor the password for root.
2. You must first license iSCSI before enabling it.
To view the current license, at the prompt enter:
license
The Data ONTAP simulator comes with iSCSI licensed. If it is not, ask your
instructor for a valid license code.
3. To configure and manage iSCSI, use the iscsi command.
To determine if the iSCSI service is running, at the prompt enter:
iscsi status.

4. If the service is not running, enter:
iscsi start
Then use the iscsi status command to verify that the service is running.
5. Task complete. Proceed to the next task.

END OF TASK






NetApp University - Do Not Distribute
E11-4 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: CONFIGURING ISCSI ON WINDOWS
OVERVIEW
This task demonstrates how to configure the Windows iSCSI software initiator.
START OF TASK
STEP ACTION
1. The Microsoft iSCSI software initiator is already installed in your Windows client
environment. You can locate the software initiator at:
http://go.microsoft.com/fwlink/?LinkId=44352
After it is installed, open the Windows Control Panel:
Start > Control Panel
2. From the Control Panel, open the Microsoft iSCSI Initiator. The iSCSI Initiator
Properties dialog box is displayed.










NetApp University - Do Not Distribute
E11-5 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
3. Select the Discovery tab and then click Add. Enter the IP address of your storage
systems ns0 interface. Leave the default port and then click OK.

















NetApp University - Do Not Distribute
E11-6 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. From the iSCSI Initiator Properties dialog box, select the Targets tab. Make sure
you can see the simulators iqn WWNN. If you cant, click Refresh. After the
simulators iqn appears, select it, and then click Log On.

















NetApp University - Do Not Distribute
E11-7 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
5. Select the check box, Automatically restore this connection when the system
boots.. Enabling this option places this connection in the Persistent Targets tab in
the iSCSI Initiator Properties dialog box. Click OK.


6. Click OK again to close the iSCSI Initiator Properties dialog box.
7. Task complete. Proceed to the next task.

END OF TASK







NetApp University - Do Not Distribute
E11-8 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: CREATING A LUN
OVERVIEW
This task demonstrates how to create a LUN using the system console lun setup
command.
START OF TASK
STEP ACTION
1. From your workstation:
a. Open a telnet session to the storage system using the storage system IP
address or name. You can use TeraTerm Pro or PuTTY to open the telnet
session.
b. Log in as root.
NOTE: Verify with your instructor the password for root.
2. To view the current LUNs on the simulator, enter:
lun show - m.
(There probably are no LUNs to view.)
3. You can create LUNs several different ways:
FilerView
lun create and lun setup commands
SnapDrive
We will be using the lun setup command for this exercise.
At the prompt, enter:
lun setup
The lun setup wizard begins.
4. The LUN wizard asks if you want to create a LUN. Enter Y.
5. The next question is regarding the LUNs multiprotocol type. Since we are going to
use this LUN in a Windows environment, enter:
windows
6. The wizard requests the LUN path. You should place the LUN on the FlexSAN
volume you created earlier by entering:
/vol/FLEXSAN/lunSAN
NOTE: The name of the new LUN is lunSAN.
7. The wizard asks if you want to turn on space reservation for the LUN. Enter Y.
8. The wizard requests the LUN size. Because you are working on the simulator,
space is an issue. For this exercise, we will create a very small LUN (32 MB).
Enter 32m.
9. The wizard asks you to add a comment to describe the LUN. Type any comment
and press Enter.

10. The wizard asks you for an initiator group or igroup. You can type ? to list the
NetApp University - Do Not Distribute
E11-9 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
current igroup or enter the name of an existing igroup to map the new LUN to. If
this is a new simulator, there may not be any existing igroups. Enter:
myigroup
11. An igroup not only contains the initiators, but it also defines the protocol that will
be used to access the LUN. The wizard asks you if you will be grouping FCP
initiators or iSCSI initiators in this igroup. Enter:
iscsi
12. The wizard requests the iqn of your initiators. You can type ? to list the current
initiators connected to the simulator. (This is why you performed Task 2 before
creating your LUN.) Enter:
?
13. The iqn WWNN for your Microsoft Software iSCSI initiator appears. Enter the iqn
WWNN.
NOTE: The node name begins with iqn.1991-05.microsoft.com
14. Press Enter again to finish adding initiators to this igroup.
15. The wizard requests the OS type for the igroup. Enter:
windows
16. Finally, the wizard requests the LUN ID for the new LUN. Enter:
0
17. The wizard lists all previous configurations for the new LUN. At this point, the
LUN is not yet created. The wizard then asks you whether you want to accept these
configurations. Enter Y.
18. The last question the wizard asks is whether you want to create another LUN. Enter
N.
19. The LUN is now created. To verify the LUN creation, enter:
lun show -m
20. Task complete. Proceed to the next task.

END OF TASK







NetApp University - Do Not Distribute
E11-10 Data ONTAP 7.3 Fundamentals: SAN
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: ACCESSING THE LUN
OVERVIEW
This task demonstrates how to access your newly created LUN from Windows.
START OF TASK
STEP ACTION
1. From the Windows client environment, open Windows Explorer. Right-click My
Computer (in the tree pane) and select Manage. The Computer Management MMC
appears.
2. Under the Storage node, click Disk Management.
3. A list of all the present disks associated with this system is displayed. Click the
Action menu item and then Rescan Disks to make sure your new LUN appears
properly. The LUN should appear as an unallocated disk.
4. Select the LUN disk and click:
Action > All Tasks > Initialize Disk
5. The Initialize Disk dialog box appears. Make sure the disk check box is selected,
and then click OK. The disk is now online.
6. Right-click the unallocated disk. To start the wizard, select New Partition from the
drop-down menu.
7. Click Next.
8. You are going to create a new primary partition, so accept the default and then click
Next.
9. In the Partition Size step, accept the default by clicking Next.
10. In the Assign Drive Letter or Path step, accept the default by clicking Next.
11. In the Format Partition step, accept the default by clicking Next.
12. Accept the wizard configurations by clicking Finish. The LUN will be ready to use
after a moment or two.
13. Open up Windows Explorer, do you see your new drive?
_______________
Can you create files in it?
_______________
14. Task complete.

END OF TASK

NetApp University - Do Not Distribute
S
n
a
p
s
h
o
t

C
o
p
i
e
s
NetApp University - Do Not Distribute
E12-1 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 12: SNAPSHOT COPIES
Exercise
Module 12: Snapshot Copies
Estimated Time: 45 minutes

EXERCISE: MANAGING SNAPSHOT COPIES
OVERVIEW
The purpose of this exercise is to give you the opportunity to create and manage Snapshot
copies, which are a key feature of the WAFL file system.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Create Snapshot copies
Restore Windows files from a Snapshot copy
Restore UNIX files from a Snapshot copy
Mange Snapshot copies from FilerView
Use SnapRestore to restore an entire volume
TIME ESTIMATE
45 minutes
NetApp University - Do Not Distribute
E12-2 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
49 2008 NetApp. All rights reserved.
Check Your Understanding
What is a Snapshot copy?
What are some of the NetApp products that
are based on Snapshot technology?
What are some of the Snapshot commands?
What is the Snapshot schedule syntax?

NetApp University - Do Not Distribute
E12-3 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CREATING SNAPSHOT COPIES
OVERVIEW
This task demonstrates how to create a Snapshot copy, list existing Snapshot copies, and
delete a Snapshot copy. For the purposes of this exercise, the system console is either the
Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS
storage system.

START OF TASK
STEP ACTION
1. From FilerView, view the existing Snapshot copies.
FilerView > Volumes > Snapshots > Manage
2. To choose a FLEXTREE volume, from the drop-down menu, select Change View,
and then click View.
3. Click Add Snapshot, or navigate to:
FilerView > Volumes > Snapshot > Add
4. For the volume, choose FLEXTREE.
For the Snapshot Name, use snap1.
Click Add.
5. What are the results?
____________________________________________________________

6. Return to FilerView > Volumes > Snapshots > Manage.
Can you find the listing for snap1? _______________

7. Repeat the process to manually create a Snapshot copy. Name this Snapshot copy
snap2.
8. Task complete. Proceed to the next task.

END OF TASK

NetApp University - Do Not Distribute
E12-4 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: RESTORING A WINDOWS FILE FROM A SNAPSHOT COPY
OVERVIEW
This task demonstrates how to create a Snapshot copy, list existing Snapshot copies, and
delete a Snapshot copy.

START OF TASK
STEP ACTION
1. From the Windows environment, click Start > Run. In the textbox, enter:
\\ip_address_of_storage_system\C$
Click OK.
Navigate to the /etc directory.
Locate the cifsconfig_share.bak file and delete it.
2. Navigate to the ~snapshot directory and locate the file in the /etc directory.
If the ~snapshot directory is not displayed, at the console prompt, enter:
options cifs.show_snapshot on
Copy the file back to its original location at /etc/cifsconfig_share.bak.
3. Task complete. Proceed to the next task.

END OF TASK

TASK 3: RESTORING A UNIX FILE FROM A SNAPSHOT COPY
OVERVIEW
This task demonstrates how to create a Snapshot copy, list existing Snapshot copies, and
delete a Snapshot copy. For the purposes of this exercise, the UNIX Admin host could be the
Linux virtual machine or a standalone machine. Consult your instructor if you have any
questions.

START OF TASK
STEP ACTION
1. Telnet to the <UNIX Admin host>.
2. Log in to <UNIX Admin host> as root using the password provided by your
instructor.
3. Navigate to the storage system /etc directory and delete the hosts.bak file:
# cd /mnt
# mkdir <storage_name>
# cd /mnt/<storage_name>
NetApp University - Do Not Distribute
E12-5 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
# mkdir vol0
# mount <storage_system_ip>:/vol/vol0
/mnt/<storage_name>/vol0
# cd /mnt/<storage_name>/vol0/etc
# pwd
/mnt/<storage_name>/vol0/etc
# rm hosts.bak

NOTE: If you cannot find the hosts.bak file, you are probably in the wrong
directory.
4. Change directory (cd) to the .snapshot directory at the root of the mount point:
# cd /mnt/<storage_name>/vol0/.snapshot/snap1/etc
# pwd
/mnt/filer_name/vol0/.snapshot/vol0snap /etc
# cp hosts.bak /mnt/<storage_name>/vol0/etc
# cd /mnt/<storage_name>/vol0/etc
# ls l hosts.bak
5. Task complete. Proceed to the next task.

END OF TASK

TASK 4: MANAGING SNAPSHOT COPIES
OVERVIEW
This task demonstrates how to schedule Snapshot copies using FilerView, and how to use
FilerView to monitor disk usage.

START OF TASK
STEP ACTION
1. From FilerView, view the existing Snapshot copies:
Filerview > Volumes > Snapshots > Configure
2. Configure hourly Snapshot copies for the FLEXTREE volume to occur at 10 a.m., 12
p.m., 2 p.m., and 5 p.m.
Click Apply.
3. Do hourly Snapshot copies occur every hour?
___________________________________________________________

NetApp University - Do Not Distribute
E12-6 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. How can you view the Snapshot copy schedule for the root volume?
___________________________________________________________

Use the drop-down menu to choose the volume, and then scroll down to see the
settings.
5. Can you change the percentage for the Snapshot reserve?
___________________________________________________________

6. From FilerView, view the available and used space in your volumes and
aggregates:
FilerView > Volumes > Manage
7. View the amount of space used by a Snapshot copy.
FilerView > Volumes > Snapshots > Manage
8. Record the totals for snap1 and snap2 below.
snap1 Total _______________
snap1 Used _______________
snap2 Total _______________
snap2 Used _______________

9. Task complete. Proceed to the next task.

END OF TASK

TASK 5: REVERTING A VOLUME USING SNAPRESTORE
OVERVIEW
This task demonstrates how to revert a volume using SnapRestore.

START OF TASK
STEP ACTION
1. Create a new flexible volume named FLEXCOPY on aggr1. The vol2 size must be
equal to the FLEXTREE size. FLEXTREE is the volume you created in the previous
exercise.
NetApp>vol create FLEXCOPY aggr1 25m
2. Create a file (for example, named filetest) in FLEXTREE that contains the
following text:
This is line 1.
NetApp University - Do Not Distribute
E12-7 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
The purpose of this text is to modify and then use SnapRestore to recover it.
NetApp>wrfile /vol/FLEXTREE/filetest
This is line 1
^c
read: error reading standard input: Interrupted system call
3. Verify that SnapRestore is licensed. If necessary, enter the license code for
SnapRestore. (Your instructor will provide the code.)
4. Create a copy of FLEXTREE on FLEXCOPY.
Restrict FLEXCOPY by entering:
NetApp>vol restrict FLEXCOPY
Make a copy of FLEXTREE on FLEXCOPY by entering:
NetApp>vol copy start FLEXTREE FLEXCOPY
After the restore operation is complete, enter make FLEXCOPY online:
NetApp>vol online FLEXCOPY
5. View the Snapshot copies that currently exist on FLEXCOPY by entering:
NetApp>snap list FLEXCOPY
Volume FLEXCOPY
working...
%/used %/total date name
---------- ---------- ------------ --------
0% ( 0%) 0% ( 0%) Aug 31 08:33 snapshot_for_volcopy.1
6. View the contents of filetest on FLEXCOPY. Enter the following:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
7. Create a Snapshot copy of FLEXCOPY by entering:
NetApp>snap create FLEXCOPY snap1
8. Overwrite the contents of filetest on FLEXCOPY by entering:
NetApp>wrfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 2

^c
read: error reading standard input: Interrupted system call

View the contents of filetest on FLEXCOPY by entering:
NetApp>rdfile /vol/FLEXCOPY/filetest
NetApp University - Do Not Distribute
E12-8 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
This is line 1
This is line 2
Going to take snapshot 2
9. Create another Snapshot copy of FLEXCOPY by entering:
NetApp>snap create FLEXCOPY snap2
10. Overwrite the contents of filetest on FLEXCOPY again by entering:
NetApp>wrfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 3

^c
read: error reading standard input: Interrupted system
call
11. Create a third Snapshot copy of FLEXCOPY by entering:
NetApp>snap create FLEXCOPY snap3
12. View the Snapshot copies that currently exist on FLEXCOPY by entering:
NetApp>snap list FLEXCOPY
Volume FLEXCOPY
working...
%/used %/total date name
---------- ---------- ------------ --------
0% ( 0%) 0% ( 0%) Aug 31 09:02 snap3
0% ( 0%) 0% ( 0%) Aug 31 09:00 snap2
0% ( 0%) 0% ( 0%) Aug 31 08:53 snap1
0% ( 0%) 0% ( 0%) Aug 31 08:33 snapshot_for_volcopy.1
13. Overwrite the contents of the file on FLEXCOPY again by entering:
NetApp>wrfile /vol/FLEXCOPY/filetest
^c
read: error reading standard input: Interrupted system
call
14. Ensure that the contents of the file are empty by entering:
NetApp>rdfile /vol/FLEXCOPY/filetest
15. Perform a volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp University - Do Not Distribute
E12-9 Data ONTAP 7.3 Fundamentals: Snapshot Copies
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 3
Which Snapshot did you use? ___________________________________
16. Perform a second volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 2
Which Snapshot did you use? ___________________________________
17. Perform a third volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
Which Snapshot did you use? ___________________________________
18. Finally, perform a volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 2
Which Snapshot were you able to use? ____________________________

Why? ______________________________________________________
____________________________________________________________
19. Task complete.

END OF TASK


NetApp University - Do Not Distribute
W
r
i
t
e
s

R
e
a
d
s
NetApp University - Do Not Distribute
E13-1 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 13: WRITE AND READ REQUEST PROCESSING
Exercise
Module 13: Write and Read Request
Processing
Estimated Time: 10 minutes

EXERCISE: EXPLORING WAFL
OVERVIEW
The purpose of this exercise is to reinforce how Data ONTAP and its file system WAFL
executes write and read requests.
OBJECTIVE
At the conclusion of this exercise, you should be able to understand writes and reads.
TIME ESTIMATE
10 minutes
NetApp University - Do Not Distribute
E13-2 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
22 2008 NetApp. All rights reserved.
Check Your Understanding
What is a consistency point?
What is the purpose of RAID?
What is the storage layer?

NetApp University - Do Not Distribute
E13-3 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: UNDERSTANDING WAFL
OVERVIEW
This task demonstrates how Data ONTAP executes write and read requests.

START OF TASK
Answer the following true or false questions.
STEP ACTION
1. WAFL write requests are stored in a buffer in memory and a copy is journaled in
NVLOG RAM.
_____________

2. The RAID manager determines where data will go on the disk.
_____________

3. The RAID manager creates a stripe that represents 4 K across each disk, where one
disk is the parity. (Assuming RAID 4)
______________

4. The RAID layer transfers data to the physical disks.
______________

5. WAFL determines how data will be laid out on disks using columns and rows. This
layout is called a tetris.
______________


6. WAFL acknowledges a write request when the data is physically stored to disk and
a consistency point is complete.
________________

7. Read requests are always processed from the disk.
________________

8. A consistency point is a completely self-consistent image of the entire file system
that is taken when all the data is written to the disks and a new root inode is
determined.
________________

NetApp University - Do Not Distribute
E13-4 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
9. A consistency point is initiated when the NVLOG is half full, every 10 seconds, or
when Data ONTAP has initiated it for other reasons.
________________

10. NVRAM logs are flushed when a consistency point is completed.
________________

11. Task complete.

END OF TASK



NetApp University - Do Not Distribute
D
a
t
a

C
o
l
l
e
c
t
i
o
n
NetApp University - Do Not Distribute

E14-1 Data ONTAP 7.3 Fundamentals: System Data Collection
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 14: SYSTEM DATA COLLECTION
Exercise
Module 14: System Data Collection
Estimated Time: 30 minutes

EXERCISE: PERFORMANCE TROUBLESHOOTING
OVERVIEW
The purpose of this exercise is to demonstrate how to retrieve statistical information about the
Data ONTAP simulator.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
Identify commands useful for troubleshooting and problem solving
Execute the statit command on a storage system
Execute the wafl_susp command on a storage system
TIME ESTIMATE
30 minutes
NetApp University - Do Not Distribute

E14-2 Data ONTAP 7.3 Fundamentals: System Data Collection
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
42 2008 NetApp. All rights reserved.
Check Your Understanding
What command(s) would you use to display
disk utilization?
What command(s) would you use to monitor
connectivity?
What command(s) would you use to help
detect impending disk problems before they
occur?

NetApp University - Do Not Distribute

E14-3 Data ONTAP 7.3 Fundamentals: System Data Collection
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: IDENTIFYING COMMANDS FOR TROUBLESHOOTING AND
PROBLEM SOLVING
OVERVIEW
The purpose of this task is to check your understanding of the various commands used for
gathering information about MAC, TCP/IP, and protocol issues.

START OF TASK
Fill in the blanks in the table below.
COMMAND WHY USE IT?
ifconfig a

ifstat a

arp a

netstat r

nfsstat

exportfs

cifs stat

nbtstat

cifs testdc

Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute

E14-4 Data ONTAP 7.3 Fundamentals: System Data Collection
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: EXECUTING THE STATIT COMMAND ON A STORAGE SYSTEM
OVERVIEW
This task demonstrates the use of the CLI commands and FilerView to view system stats, disk
utilization data, and performance data for various system operations. This information is used
to help optimize system write performance. For the purposes of this exercise, the system
console is either the Data ONTAP simulator running in a Linux virtual environment, or your
assigned FAS storage system.
Execute the following commands to view system information.

START OF TASK
STEP ACTION
1. Access FilerView:
http://[filers IP address]/na_admin
2. Select Filer node > Show System Status.
3. Select the Utilization and Show Summary options.
4. Scroll down to see the results. Explain what these results mean.
____________________________________________________________
____________________________________________________________
____________________________________________________________

5. Enter statit b to begin capturing data. Wait a couple of minutes.
Enter statit e to end the data capture and display a report.
6. Review the results.
What percentage of the time were disks busy?
_____________
What RAID groups show activity?
_____________

7. Task complete. Proceed to the next task.

END OF TASK





NetApp University - Do Not Distribute

E14-5 Data ONTAP 7.3 Fundamentals: System Data Collection
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: EXECUTING THE PERFMON COMMAND TO CONNECT TO
STORAGE SYSTEM DATA

START OF TASK
STEP ACTION
1. Open a command window on your Windows system.
Start > Run > cmd
2. Issue perfmon:
C:> perfmon
3. Click on the plus sign (+). A pop-up appears.


4. Click to select counter from computer. Enter the IP address or name of your storage
system. Click on Performance Object and observe the list of objects from the drop-
down menu. These are all Data ONTAP objects.
NetApp University - Do Not Distribute

E14-6 Data ONTAP 7.3 Fundamentals: System Data Collection
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION

5. Task complete.

END OF TASK


NetApp University - Do Not Distribute
F
l
e
x
S
h
a
r
e
NetApp University - Do Not Distribute
E15-1 Data ONTAP 7.3 Fundamentals: FlexShare
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 15: FLEXSHARE
Exercise
Module 15: FlexShare
Estimated Time: 30 minutes

EXERCISE: FLEXSHARE
OVERVIEW
The purpose of this exercise is to give you an opportunity to configure FlexShare and test the
results.
OBJECTIVE
At the conclusion of this exercise, you should be able to:
Configure and test FlexShare
Assign priority to system operations relative to user operations
Set the volume buffer cache policy
TIME ESTIMATE
30 minutes

NetApp University - Do Not Distribute
E15-2 Data ONTAP 7.3 Fundamentals: FlexShare
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CONFIGURING AND TESTING FLEXSHARE
START OF TASK
STEP ACTION
1. Create two flexible volumes or choose two existing volumes by entering:
nfsvol
cifsvol
2. The volume create command automatically exports volumes when NFS is
licensed.
If necessary, export or share each using FilerView.
3. Set up two clients and create some load by copying files and removing files to
perform reads and writes to each volume.
4. Configure each volume priority as Low:
priority set volume volname option=value [option=value
...]
{VeryHigh, High, Medium, Low, or VeryLow}
system> priority set volume nfsvol level=VeryLow
system> priority set volume cifsvol level=VeryLow
system> sysstat x 1
5. Enter:
priority show volume
What do you see?
____________________________________________________________

6. Enter:
system> priority on
7. Copy files to create some activity on the client.
8. Monitor the transfer of data by each protocol using:
system> sysstat x 1
What do you see?
____________________________________________________________

9. Enter:
system> priority set volume nfsvol level= VeryHigh
What happens?
___________________________________________________________

10. Enter:
NetApp University - Do Not Distribute
E15-3 Data ONTAP 7.3 Fundamentals: FlexShare
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
system> priority set volume nfsvol level= VeryLow
What happens?
____________________________________________________________

11. Enter:
system> priority set volume cifsvol level= VeryHigh
What happens?
____________________________________________________________


END OF TASK
TASK 2: ASSIGNING PRIORITY TO SYSTEM OPERATIONS RELATIVE
TO USER OPERATIONS
START OF TASK
STEP ACTION
1. Ensure that FlexShare is enabled for your storage system by entering:
priority on
2.
Specify the priority for system operations for the volume by entering:
priority set volume cifsvol system=priority_level
where vol_name is the name of the volume for which you want to set the
priority of system operations, and priority_level is one of the
following values:
VeryHigh, High, Medium, Low, VeryLow, or a number from 1 to 100
The number indicates the priority of system operations. When both user and system
operations are requested, system operations are selected over user operations 1 to
100 percent of the time, and the other percentage of user operations are selected.
NOTE: Setting the priority of system operations to 30 does not mean that 30
percent of storage system resources are devoted to system operations. Rather, when
both user and system operations are requested, the system operations are selected
over the user operations 30 percent of the time, and the other 70 percent of the time,
the user operation is selected.
3.
You can optionally verify volume priority levels by entering:
priority show volume [-v] cifsvol

END OF TASK


NetApp University - Do Not Distribute
E15-4 Data ONTAP 7.3 Fundamentals: FlexShare
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: SETTING THE VOLUME BUFFER CACHE POLICY
OVERVIEW
The purpose of this task is to demonstrate how to use FlexShare to influence how Data
ONTAP determines when to reuse buffers.

START OF TASK
STEP ACTION
1. If you havent already done so, ensure that FlexShare is enabled for your storage
system by entering:
priority on
2. Specify the cache buffer policy for the volume by entering:
priority set volume cifsvol cache=policy
Example: The following command sets the cache buffer policy for the testvol1
volume to keep, which instructs Data ONTAP not to reuse buffers for this volume
when possible.
priority set volume cifsvol cache=keep
3. You can optionally verify volume priority levels by entering:
priority show volume [-v] cifsvol

END OF TASK



NetApp University - Do Not Distribute
N
D
M
P
NetApp University - Do Not Distribute
E16-1 Data ONTAP 7.3 Fundamentals: NDMP Fundamentals
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 16: NDMP FUNDAMENTALS
Exercise
Module 16: NDMP Fundamentals
Estimated Time: 30 minutes

EXERCISE: NDMPCOPY
OVERVIEW
The purpose of this exercise is to demonstrate how to transfer data from one source volume to
a destination volume on the same system using the ndmpcopy command.
TIME ESTIMATE
15 minutes
NetApp University - Do Not Distribute
E16-2 Data ONTAP 7.3 Fundamentals: NDMP Fundamentals
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
29 2008 NetApp. All rights reserved.
Check Your Understanding
What is NDMP?
What types of tape devices can be used with
NDMP?
What is the command to check NDMP status?
What are some limitations of ndmpcopy?
What is the syntax of the ndmpcopy
command?
















NetApp University - Do Not Distribute
E16-3 Data ONTAP 7.3 Fundamentals: NDMP Fundamentals
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: USING NDMPCOPY TO COPY A VOLUME
OVERVIEW
In this task, you will create two flexible volumes on top of the same aggregate, aggr1
(created in a previous exercise), and copy the data from one volume to the other using the
ndmpcopy command.
The following steps must be performed on a single storage system that acts as the source and
the destination system.

START OF TASK
STEP ACTION
1. Log in to the storage system and ensure that the WAFL default security style is set
to ntfs (using the options command):
system>options wafl.default_security_style
2. Enable and configure NDMP using the following options:
system>options ndmpd.enable on
system>options ndmpd.access all
3. Create the source flexible volume on top of aggregate aggr1:
system>vol create src_vol aggr1 1g
Verify that the volume is available and online:
system>vol status src_vol
4. Create the destination flexible volume on top of aggregate aggr1:
system>vol create dst_vol aggr1 1g
Verify that the volume is available and online:
system>vol status dst_vol
5. Create a CIFS share for the source and destination volumes:
system>cifs shares add <sharename> /vol/src_vol
system>cifs shares add <sharename> /vol/dst_vol
Copy and paste some files into the source volume.
6. Perform the data transfer from the source volume to the destination volume using
the following ndmpcopy command syntax:
system>ndmpcopy src_hostname:/vol/src_vol
dst_hostname:/vol/dst_vol
When the ndmpcopy command is running on the same storage system as the
source storage system or destination storage system, you can omit the -sa or -da
options.
7. Verify that the data was copied to the destination volume.

END OF TASK

NetApp University - Do Not Distribute
A
c
t
i
v
e
-
A
c
t
i
v
e
NetApp University - Do Not Distribute
E17-1 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION
Exercise
Module 17: Active-Active Controller
Configuration
Estimated Time: 30 minutes

EXERCISE: ACTIVE-ACTIVE STORAGE CONTROLLERS
OVERVIEW
The purpose of this exercise is to give you and opportunity to enable an active-active
configuration and observe how it works.
OBJECTIVES
At the conclusion of this exercise, you should be able to do the following:
License and configure active-active storage controller configurations
Perform a cluster failover
Perform a cluster giveback
Restart a CIFS client connection after a failover
TIME ESTIMATE
30 minutes
NetApp University - Do Not Distribute
E17-2 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
25 2008 NetApp. All rights reserved.
Check Your Understanding
What are three modes of operation for an active-active
controller configuration?
What is the purpose of using an active-active controller
configuration?
What happens during a takeover?
True or False:
Options must be set the same on both nodes
License must be set the same on both nodes
Both nodes must have the same number of disks
Both nodes must be part of the same domain
Name three active-active storage controller
configurations:
What are some of the requirements for setting up a
standard active-active controller configuration?

NetApp University - Do Not Distribute
E17-3 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: LICENSING AND CONFIGURING ACTIVE-ACTIVE STORAGE
CONTROLLER CONFIGURATIONS
START OF TASK
STEP ACTION
1. Look at the hardware on your system. Do you see any indication that your storage
system is cabled for active-active?
What command will give you information about the hardware installed on your
storage system?
___________________________________________________________

2. License and then reboot each system. Your instructor will help you identify the
system that is cabled as the partner for your system.
Example:
systemA> license add ABCDEFG
systemA> cf status
systemA> reboot

systemB> license add ABCDEFG
systemB> cf status
systemB> reboot

What does the cf status command tell you before you reboot?
____________________________________________________________
3. Enable active-active on one of the systems. How does this affect the other system?
Example:
systemA> cf status
____________________________________________________________
systemA> cf enable
____________________________________________________________
systemA> cf status
____________________________________________________________
systemB> cf status
____________________________________________________________

____________________________________________________________
____________________________________________________________


NetApp University - Do Not Distribute
E17-4 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION
4. On Partner A, locate the files for a failover test from your Windows and UNIX
hosts.
From your Windows hosts, view the mapped drive for the /nfsflex/cifstree
and then view the drive associated with the iSCSI LUN on your storage system.
Use Windows Explorer to view these drives. Try copying a file or two to each of
these drives.
From your UNIX host, view the mounted file systems from Partner A. Determine
where you mounted /nfsflex/tree1.
Example:
# cd /mnt/<system>/nfsflex
# cat /etc/hosts > Newfile
# ls l
5. Halt Partner A to cause a takeover. Time the takeover process and note how long it
takes to complete.
6. Halt PartnerA:
Example:
systemA> halt
How long did it take for Partner B to complete the takeover? ______________

What happens to the Windows client connection? ______________

What happens to the UNIX client connection?______________

What caused the difference between NFS and CIFS connections during takeover?
___________________________________________________________
7. Run the following commands on both Partner A and Partner B. Compare the output.
(Remember to access your partner storage system.)
systemA(takeover)>
sysconfig r
sysconfig v
sysstat 1
Example:
systemA(takeover)> sysconfig r
systemA(takeover)> partner
systemA/systemB>> sysconfig r

systemA/systemB>> partner
systemA(takeover)> sysconfig v
NetApp University - Do Not Distribute
E17-5 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
STEP ACTION

systemA(takeover)> partner
systemA/systemB>> sysconfig v

systemA/systemB>> partner
systemA(takeover)> sysstat -1
systemA(takeover)> partner
systemA/systemB>> sysstat -1

Was there a difference between the two storage system outputs?
____________________________________________________________
____________________________________________________________

8. Restore the halted storage system to service. What steps do you take to bring the
halted storage system back into the active-active relationship?
___________________________________________________________
___________________________________________________________


END OF TASK

NetApp University - Do Not Distribute
A
p
p
e
n
d
i
x
NetApp University - Do Not Distribute

A-1 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
NETAPP UNIVERSITY
Data ONTAP Fundamentals
Appendix A: Answer Key

Version Number: 5.0
Release Number: Data ONTAP 7.3
Course Number: STRSW-ED-ILT-DOTF-REV05
Catalog Number: STRSW-ED-ILT-DOTF-REV05-EG
NetApp University - Do Not Distribute

A-2 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
APPENDIX TABLE OF CONTENTS
WELCOME ............................................................................................................................ 1
MODULE 1: OVERVIEW ................................................................................................... A1-1
MODULE 2: INSTALLATION AND CONFIGURATION ................................................... A2-1
MODULE 3: BASIC ADMINISTRATION .......................................................................... A3-1
MODULE 4: ADMINISTRATION SECURITY ................................................................... A4-1
MODULE 5: NETWORKING ............................................................................................. A5-1
MODULE 6: PHYSICAL STORAGE MANAGEMEN ........................................................ A6-1
MODULE 7: LOGICAL STORAGE MANAGEMENT ........................................................ A7-1
MODULE 8: CIFS .............................................................................................................. A8-1
MODULE 9: NFS ................................................................................................................ A9-1
MODULE 10: QTREES AND SECURITY STYLE ........................................................... A10-1
MODULE 11: SAN ............................................................................................................ A11-1
MODULE 12: SNAPSHOT COPIES ................................................................................ A12-1
MODULE 13: WRITE AND READ REQUEST PROCESSING......................................... A13-1
MODULE 14: SYSTEM DATA COLLECTION ................................................................. A14-1
MODULE 15: FLEXSHARE ............................................................................................. A15-1
MODULE 16: NDMP FUNDAMENTALS ......................................................................... A16-1
MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION .............................. A17-1
MODULE 18: FINAL WORDS .......................................................................................... A18-1


NetApp University - Do Not Distribute

A-3 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 1: OVERVIEW
Answers
Module 1: Data ONTAP
Fundamentals


23 2008 NetApp. All rights reserved.
Check Your Understanding
What are the two topologies supported by Data
ONTAP?
NAS, SAN
What are three NetApp product series?
FAS2000, FAS3000, FAS6000
What is the main function of WAFL?
WAFL (Write Anywhere File Layout) makes decisions
on how to write data to disk
Where can you find supporting documents for
Data ONTAP?
NOW site

NetApp University - Do Not Distribute

A-4 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: LOCATING TECHNICAL ASSISTANCE AND DOCUMENTATION
2. Under Product Documentation & System Configuration, select Data ONTAP
Product Documentation & System Configuration.
Notice that the Data ONTAP Information Library page opens.
View all documents for the Data ONTAP for Filer/NearStore Release 7.3.
Open the Documentation Roadmap and browse the result.
What information does this provide?
Each table in the roadmap lists documentation to help you complete
one of the following major tasks:
I nstalling new storage systems, on page 2
Configuring new storage systems, on page 3
Upgrading Data ONTAP on storage systems, on page 3
Managing storage systems, on page 4
Diagnosing and troubleshooting problems, on page 5
Customizing or automating processes, on page 6

3. Return to the Data ONTAP for Filer/NearStore Release 7.3 page.
Open the Master Index.
NOTE: The Master Index is created when a release becomes Generally Available
(GA).
Using the index, determine where you can get information about setting up
anonymous FTP access.
FTP anonymous user File Access Mgmt pp.182

4. Return to the Access & Order Product Documentation page.
Locate the System Configuration Guide link and answer the following questions:
1. What is the size of NVRAM in the FAS3050?
The FAS3050 comes standard with a maximum of 512 MB of NVRAM
memory on the NVRAM5 adapter.
2. What is the maximum number of drives for a single FAS6030?
672
3. Which slots on an FAS6070 can be used as SCSI ports for tape drives?
See the NOW Site.

NetApp University - Do Not Distribute

A-5 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: ACCESSING THE STORAGE SYSTEM
6. Observe the echoing effects. Why do you see the same thing in both sessions?
Both methods connect you to the same session on the storage system.
Data ONTAP does not allow multiple interactive logins by default.
7. Why did you use port 23 to access the storage system through telnet and a
different port to access the console?
Port 23 is the well known port for telnet. The other port is the
physical port that the files console is cabled to on the Terminal
Server.
12. Are you able to launch the session?
Y or N
If no, why not?
There is only one telnet session allowed to the console. You already
have a telnet session open with your emulator.
NetApp University - Do Not Distribute

A-6 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 2: INSTALLATION AND CONFIGURATION
Answers
Module 2: Installation and
Configuration




44 2008NetApp. All rights reserved.
Topic Review
What links on the NOW site do you use to help
identify a storage systems current configuration?
Configuration Guide, Parts Finder
What is the name of the worksheet which aids in
storage system setup, and where do you find it?
The Configuration Worksheet
Currently, in chapter 2 of the Software Setup
Guide
What command is immediately run when you boot
the storage system the first time?
setup
What command simplifies Data ONTAP upgrades?
software update
NetApp University - Do Not Distribute

A-7 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 3: BASIC ADMINISTRATION
Answers
Module 3: Basic Administration


40 2008 NetApp. All rights reserved.
Check Your Understanding
Name three ways to access a storage systems CLI.
Console, Telnet, RLM, RSH, SecureShare, and the FilerView CLI
What is the URL to access FilerView?
http://[system name or IP]/na_admin
How can you view the system configuration for a FAS storage
system?
sysconfig [-v]
FilerView
How can you configure a FAS storage system from a remote
adminhost?
For UNIX, set up NFS and a mount an export of the root directory
For Windows, set up CIFS and access the \\filer\C$ share
When are AutoSupport messages generated?
Messages are generated when:
Events occur on the storage system that require corrective action
The storage system reboots
You initiate a test message
Once a week, usually after 12 a.m. on Sundays

NetApp University - Do Not Distribute

A-8 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: COMMAND LINE INTERFACE
2. Enter help to see the available commands. Enter the ? character and compare
this to the help command. Do you see the same results?
Yes
4. How is help by itself different from help appended to a command?
When you enter help after a command, the subcommands available
for this command are displayed. When you enter just help, a listing
of Data ONTAP commands is displayed.
5. View the manual page for the useradmin command from the command line.
man useradmin
8. Read the man page for the priv command.
system> man priv
What does the q argument do? (Bonus: When would it be useful?)
-q stands for quiet. This argument suppresses the warning message
when you switch to the advanced or diagnostic level. This would be
useful when scripting and when using the rsh command.
10. Run the disk command. Note which subcommands are available.
system> disk
Now change to the advanced level and issue the disk command again. Do you
see any new commands?
______________

system> priv set advanced
system*> disk
Hint: It might help to do something from a UNIX system like:
#rsh<filer-ip>disk >first
#rsh <filer-ip>priv set advanced q | disk >second
#diff first second
TASK 2: EXPLORING STORAGE SYSTEM OPTIONS
2. Enter options. What happened?
The current system configuration information is displayed.
3. At the prompt, enter man options. What happened?
The man page for the options command is displayed.
5. At the prompt, enter options telnet. What happened?
The configurable options related to telnet are displayed with their
current values.

NetApp University - Do Not Distribute

A-9 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: EXPLORING STORAGE SYSTEM CONFIGURATIONS
1. Log in to the storage system, access the CLI, and enter the sysconfig
command. What happened?
Without any arguments, the output includes the Data ONTAP
version number and a separate line for each I /O device on the
storage system.
2. Enter man sysconfig and determine the correct argument to verify that the
expansion cards are in the appropriate slots.
-c
3. Compare the outputs of sysconfig a and sysconfig v. Do you notice any
differences?
The a output contains more information, but it is difficult to see
what is different.
4. Access FilerView for this storage system.
Go to the Report link under Filer.
Observe the information displayed. How does this information compare to the
sysconfig command?
The summary information is provided in FilerView, but the detailed
information is not shown.
5. Select the Show Status link.
What is the host name (model name) for this system?
Answers vary.
TASK 4: EXPLORING PARTS FINDER
8. Click the link with the camera icon. What happens?
Part details for the part are displayed along with a photograph of the
part.
9. Do another search. This time, locate the part information for an NVRAM card for
an FAS3050. How many part numbers are available?
Two X3145A and SP3145A
10. Go to NOW > Service and Support > Technical Assistance and Documentation >
Access & Order Product Documentation > System Configuration Guides.
1. Search Data ONTAP Release 7.2.
2. Select NetApp Storage Appliances.
3. Select both FAS6070 and Expansion slots/cards.
4. Select Expansion Slot Assignments for an FAS6070 in a single
configuration.
What happens?
Expansion slot assignments for an FAS6070 in a single
configuration is displayed for this storage system.
12. Which is the preferred slot for the NVRAM card?
Expansion slot 2.

NetApp University - Do Not Distribute

A-10 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
13. Which is the least preferred slot for a dual-port optical iSCSI target-mode
interface?
Expansion slot 9.
14. Which adapter should never be installed in slot 4?
Single-port copper GbE TOE or quad-port copper GbE TOE cards.
NetApp University - Do Not Distribute

A-11 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 4: ADMINISTRATION SECURITY
Answers
Module 4: Administration Security


27 2008 NetApp. All rights reserved.
Check Your Understanding
How do you control administrative access to
the storage system?
By creating users with the useradmin
command and assigning users to a role
Why would you use the useradmin
command?
To create and manage:
Administrator user accounts
Groups
Roles

NetApp University - Do Not Distribute

A-12 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CREATING A LOCAL USER ACCOUNT ON THE STORAGE SYSTEM
6. Verify that the local user (your name) was added to the storage system by
entering the following command:
storage_sys> useradmin user list your_name
What are your allowed capabilities?
The group g_login is associated with the role r_login. This role has
the login through telnet capability.
7. Verify the allowed capabilities for the root account by entering the following
command:
storage_sys> useradmin user list root
What are the capabilities of the root user?
The administrator has the login-*, cli-*, api-*, and security-*
capabilities.
8. View the list of all local storage system users by entering the following
command:
storage_sys> useradmin user list
What local users are listed?
This might vary, but you should at least see the administrator, root,
and local user.
TASK 2: LOGGING IN AS THE NEW USER
4. At the storage system prompt, view the RAID group configuration by entering the
following command:
storage_sys> sysconfig -r
What was the response?
The command fails because of lack of security.
What capability do you need to issue this command?
Your user account must have the cli-sysconfig capability to execute
the command.
10. At the storage system prompt, view the RAID group configuration by entering the
following command:
storage_sys> sysconfig -r
Did the command execute properly?

Y or N
Yes



NetApp University - Do Not Distribute

A-13 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 3: CREATING AND LOGGING IN AS GUEST USER
15. Exit your telnet and console session. Open a new telnet session and log in as
guest user bob. Are you successful?
Y or N
No. bob does not have the rights to log in to the filer console.
16. Log in as bob and access FilerView. (If you have FilerView open already, close
the browser and open a new one.)
Are you able to access FilerView as bob?
Y or N
No. bob does not have the rights to use FilerView.
17. Open a new telnet session and log in as the administrator user dennis. Are you
successful?
Y or N
Yes. dennis belongs to the administrators group with the rights to
access the storage system through the command line.
18. Access FilerView and log in as dennis. What are the results?
has the rights to administer the storage system through FilerView.

NetApp University - Do Not Distribute

A-14 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 5: NETWORKING
Answers
Module 5: Networking


49 2008 NetApp. All rights reserved.
Check Your Understanding
Where can you set or change a host name
locally on the storage system?
FilerView > Network > Manage Hosts File
/etc/hosts
How do you configure host-name resolution for
a storage system?
FilerView > Network > Host Name Resolution
Modifying
/etc/hosts
DNS, NIS commands
/etc/nsswitch.conf

NetApp University - Do Not Distribute

A-15 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
50 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
What is the difference between single-mode
and multimode trunks?
Single-modefailover
Multimodeimproved bandwidth
What are the benefits of a VLAN?
Increased security
Improved packet routing

TASK 1: CONFIGURING NETWORK SETTINGS FROM FILERVIEW
6. What must you do to use this interface?
Select the Up link and respond to the confirmation question.
8. Use FilerView to view the /etc/hosts file.
FilerView > Network > Manage Hosts File
How many entries are there in the /etc/hosts file?
Answer varies.
TASK 3: LEARNING MORE ABOUT VIRTUAL INTERFACES
1. What is the purpose of a single-mode virtual interface?
a. A single-mode virtual interface provides failover should one port fail.
b. A single-mode virtual interface provides load balancing capabilities.
c. A single-mode virtual interface provides security.
d. A single-mode virtual interface allows you to configure the interface to
work for only one client at a time, thus improving performance.
a




2. What is the purpose of a multi-mode virtual interface?
NetApp University - Do Not Distribute

A-16 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
a. A multi-mode virtual interface provides failover if one port fails.
b. A multi-mode virtual interface allows for switching between interfaces.
c. A multi-mode virtual interface provides more security options.
d. A multi-mode virtual interface enables faster throughput by having links
that share network loads.
a
3. What is the maximum number of interfaces in a single-mode virtual interface for
an FAS270? (Hint: Use FilerView Help.)
a. 1
b. 2
c. 3
d. 4
b
4. How many interfaces can you configure in a multi-mode virtual interface?
a. 1
b. 2 or more
b
NetApp University - Do Not Distribute

A-17 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 6: PHYSICAL STORAGE MANAGEMENT
Answers
Module 6: Physical Storage
Management


49 2008 NetApp. All rights reserved.
Check Your Understanding
What is a RAID group?
A collection of disks organized to protect data
that includes:
One or more data disks
Data striped for performance
One or two parity disks for protection
Why use double parity?
To protect against a double-disk failure

NetApp University - Do Not Distribute

A-18 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
50 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
How many RAID groups does the following
command create?
aggr create newaggr 32
Assuming a default RAID group size of 16, this
creates two RAID groups
What is the minimum size of a RAID-DP
group?
Three disks (one data, two parity)


TASK 3: EXPLORING THE CURRENT DISK CONFIGURATION
2. Use the drop-down list. How many spare disks are available?
______________
Answers vary.
3. View All Disks.
How many parity disks are there?
Answers vary.
5. Review the output and answer the following questions:
Which slot is being used for the disk controller? ________________
How many shelves are there? _________________
What are the disk sizes? __________________
Answers vary depending on the hardware used.
7. Enter:
fcstat device_map
Can you see where each of your disks is located in the shelf?
Y or N
Yes, the first disk on the left facing the shelf.


NetApp University - Do Not Distribute

A-19 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 4: DISK SCRUB
1. Disk scrubbing identifies media errors and rewrites information to another
location on the disk.
True
2. Increasing the time interval that the system operates in degraded mode is a smart
and safe way of handling the system so that you dont need to reboot every 24
hours.
False
3. An unqualified disk is one that is too large for the shelf on which it is placed.
False
4. A RAID group of six or more disks is more fault-tolerant for critical data than a
RAID group of 20.
True
5. Data ONTAP automatically identifies an unqualified disk.
True
6. The parity disk must be at least as large as the largest disk in a RAID group.
True
7. A RAID group with 18 disks is recommended for optimal performance and fault
tolerance.
False
8. Which option enables you to set scrub performance?
a. options raid.reconstruct_speed
b. options raid.scrub.perf_impact
c. options disk scrub
d. options disk.performance.cpu
b
9. Which option enables you to change the amount of system resources allocated to
the reconstruction of data? (Default is set to medium.)
a. options raid.reconstruct_speed
b. options raid.reconstruct.perf_impact
c. options raid.scrub.perf_impact
options disk_reconstruct_speed
b
10. Is scrub enabled by default?
Yes
11. What is the command to fail a disk?
a. disk fail
b. disk RAID disable
c. zero spares
d. options raid.timeout
a
NetApp University - Do Not Distribute

A-20 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 5: IMPACT OF DISK SCRUBBING
2. Issue the command to view the manual page for the sysstat command.
NetApp > sysstat x s 1
What does this command do?
The x displays the extended output. The s displays the summary,
and 1 is the interval.
3. Start the disk scrubbing by entering:
NetApp> disk scrub start
Is there any visible sign that the scrub has begun?
No, the command continues in the background. However, using the
sysstat command will give you information.
4. While the disk scrub is running, issue the following command:
sysstat
How does this output compare to the one before the disk scrub?
NetApp> sysstat 1
The Disk/Read column shows high usage. The CPU is higher than
before.
5. View the system statistics from FilerView. How would you accomplish this?
FilerView >Filer >Show System Status
6. How does FilerView compare to using the command line?
FilerView works like using the c option (for count) where you need
to provide the number of iterations.
Example:
NetApp>sysstat c 30 1
Where 30 equals the number of iterations and 1 equals the interval.
9. View the spare disks using FilerView.
How many spares are there?
Select Filerview >Storage >Disks >Manage, choose Spare Disks
from the drop-down menu, and then click View.
TASK 6: CREATING AN AGGREGATE
5. Notice the default parity option. Why is that the default for the aggregate?
Double parity is the best protection against disk failure offered.
What can you do to conserve disks?
Uncheck the double parity option.
Select the option that uses the least number of disks.


NetApp University - Do Not Distribute

A-21 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
6. Use the ? character to determine the minimum RAID group size for your system,
and then enter that number.
3 is the minimum for all systems.
7. Use the Automatic option.
What safeguard is built into the FilerView automatic disk selection? (Hint: Use
the help option.)
FilerView prevents you from accidentally selecting the last spare. For
automatic disk selection, the number of disks displayed is the number
of available disks minus one spare.
8. What disk size options do you have?
Answers vary, but FAS270 storage systems that are used in training
typically have 68-GB disks. I f you are using a Data ONTAP
simulator, the disk size was set when the simulator was installed.
Select any size.
9. Select the minimum number of disks for this volume type and parity choice.
2
12. How many disks have been assigned to your new aggregate? Why?
0. The aggregate is initializing the disks. Two disks appear after the
initialization is complete.
TASK 7: FAILING A DISK
1. To view the disk ID numbers for aggr1, at the storage system console, enter:
aggr status aggr1 r
or
sysconfig r
Record the ID of a disk in aggr1.
Are there any failed disks?
Answers vary depending on the hardware used.
NetApp University - Do Not Distribute

A-22 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 7: LOGICAL STORAGE MANAGEMENT
Answers
Module 7: Logical Storage
Management


37 2008 NetApp. All rights reserved.
Check Your Understanding
How does a traditional volume compare to an
aggregate?
An aggregate defines physical disks, while the
term volume relates to the logical collection of
information.
A traditional volume cannot share disks with
other volumes; therefore, a traditional volume
fully occupies the aggregate containing it,
making the two terms functionally synonymous.

NetApp University - Do Not Distribute

A-23 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
38 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
What is the difference between a traditional volume
and a flexible volume?
Shares aggregate
Change size to limits of storage
Minimum of 20 MB added in 4-MB
increments
Each volume administered separately
Dedicated aggregate
Disks dedicated to volume
Size is changed by adding disks
Disks organized into RAID groups
Minimum size depends on RAID type
Flexible Volume Traditional Volume


39 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
What is the name of the root volume?
vol0

NetApp University - Do Not Distribute

A-24 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: CREATING A TRADITIONAL VOLUME
4. You can name this volume anything except vol0. Why?
Vol0 is the root volume.
6. We want to conserve disks. What type of parity uses a single-parity disk?
RAI D 4, or dont select Double Parity.
8. Use the automatic option.
What safeguard is built into the FilerView automatic disk selection?
FilerView prevents you from accidentally selecting the last spare. For
automatic disk selection, the number of disks displayed is the number
of available disks minus one spare.
(Hint: use the help option.)
9. What disk size options do you have?
Answers vary, but FAS270 storage systems currently used in training
typically have 68-GB disks.
Select any size.
10. Select the minimum number of disks for this volume type and parity choice.
2
11. Review your changes and commit them if they are correct.
If necessary, how would you make a correction?
Use the Back button. Click Commit. Close the wizard.
TASK 2: CREATE A FLEXIBLE VOLUME
3. You can name this volume anything except vol0. Why?
Vol0 is the root volume.
For the purposes of this task, name your volume FLEXSAN. You will use this
flexible volume when we get to the SAN module.
5. There is no parity option offered. Why?
The flexible volume exists inside an aggregate, and the parity was
configured for the aggregate.
6. Select an online aggregate (such as aggr1) from the previous exercise.
The new aggregate created in the last exercise might not be ready for
use.
7. If we need 100 MB of available data storage in this volume, how large should you
set the total volume size?
100MB =80% of 125 M; therefore, you should set to 125 MB.
8. Select the space guarantee that is the equivalent to a traditional volume.
Volume
Select any size.
NetApp University - Do Not Distribute

A-25 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
9. Review your changes and commit them if they are correct.
If necessary, how would you make a correction?
Use the Back button. Click Commit. Close the wizard.
12. In the management view, notice that the name of your new volume is a link. What
happens when you click this link?
A new window opens showing the specification for this volume.
TASK 3: DESTROYING A VOLUME
3. What must be done before a volume or aggregate can be destroyed?
I t must be taken offline.
4. Select the traditional volume you have already created and try to destroy it
without taking it offline. What happens?
Failed to destroy get an error:
Failure on volume 'flex2': Volume 'flex2' cannot be destroyed
because it is online. I t must be taken offline before destroying it.
6. Try to destroy the root volume. What happens?
Failed to destroy Cannot take the root volume off line - get an
error:
Failure on volume 'vol0': Offlining root volume 'vol0' is not allowed.
NetApp University - Do Not Distribute

A-26 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 8: CIFS
Answers
Module 8: CIFS


39 2008 NetApp. All rights reserved.
Check Your Understanding
What is the purpose of CIFS?
In a CIFS environment, an application that
processes network I/O can access and
manipulate files on remote servers similar to
the way they are accessed locally
In what server environments can a storage
system participate?
Windows workgroup, non-Windows workgroup,
Active Directory domain, and Windows NT 4
domain
What are the steps to set up CIFS?
1. License CIFS
2. Set up the CIFS environment

NetApp University - Do Not Distribute

A-27 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 8: TERMINATING CIFS SESSIONS
11. When comparing the results of step 4 with the results of step 8, what is the
difference?
Not all sessions can be terminated from Computer Management
because Computer Management uses a CI FS session. You can only
terminate all sessions through the console or FilerView.
NetApp University - Do Not Distribute

A-28 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 9: NFS
Answers
Module 9: NFS


31 2008 NetApp. All rights reserved.
Check Your Understanding
What does NFS stand for?
Network File System
What is the format for the /etc/exports file?
path -{export_option}
What is the purpose of export options?
To set access rights and host access
What command would you use to view what is
exported from the storage appliance?
exportfs



NetApp University - Do Not Distribute

A-29 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 10: QTREES AND SECURITY STYLES
Answers
Module 10: Qtrees and Security
Styles


39 2008 NetApp. All rights reserved.
Check Your Understanding
What is a qtree?
A logically defined file system or a sub volume
What are security styles?
Permissions for the qtree
Does a security style prevent protocols from
accessing the volume or qtree?
No, they only define which rules to apply

NetApp University - Do Not Distribute

A-30 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
40 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
What are the functions of a quota?
Limit amount of disk space that can be used
Track disk space usage
Warn of excessive usage
Name three quota targets.
Users, groups, and qtrees

TASK 1: CREATING AND MANAGING A QUOTA

6.
After enabling quotas, verify the status of the quotas.
What do you see?

Alternately, you can return to the storage system CLI and issue the quota
status command.
I nitializing, scanning (0% done)
TASK 2: PRODUCING A QUOTA REPORT
2. How much disk space is being used by all users on your storage system?
Answer varies.
3. How many files were created on your storage system for tree1?
Answer varies.
TASK 4: PRACTICE CREATING QTREES AND QUOTAS
2. View the qtrees you just created. What is the security style?
By default, it will be UNI X.
3. Edit the correct file to give the cobra qtree a size limit of 50 M with a threshold
of 45 M, and the firebird qtree a limit of 20 M with a threshold of 18 M, and
limit the files on firebird to 10. Use tree for the type on both quotas.
What file did you edit?
/etc/quotas
NetApp University - Do Not Distribute

A-31 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
Record the entries you create.
# TARGET TYPE DISK FILE THRESHOLD SDISK SFILE
/vol/nfsflex/cobra Tree 50M - 45M - -
/vol/nfsflex/firebird Tree 20M 10 18M - -
4. How did you edit the file?
Using CI FS, map the root volume and use Wordpad to create and
edit the file.
Using NFS, mount the root volume and use vi or any UNI X editor to
edit the file.
Without administrative access from a client, you can use rdfile to
view the file and wrfile to add entries.
5. What does the entry look like that gives the /vol/nfsflex flexible volume a
default quota of 150 M of disk space with a threshold of 145 M for any user?
#
TARGET
TYPE DISK FILE THRESHOLD SDISK SFILE
* user@/vol/nfsf
lex
150M - 145M - -

7. What is the command to enable quotas on the /vol/nfsflex?
quota on nfsflex
8.
What is the command to view the threshold for all quotas?
quota report t
9. Change the quotas for the qtree firebird to the same settings as cobra.
When you change the size of a quota, what command do you enter for changes to
take effect?
quota resize nfsflex
NetApp University - Do Not Distribute

A-32 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 11: SAN
Answers
Module 11: SAN


41 2008 NetApp. All rights reserved.
Check Your Understanding
What are the two protocols NetApp supports in
the SAN environment?
FCP
iSCSI
What are the functions of a LUN?
Logical representation of storage
Configured as a single disk
Appear as local disks on the host
Managed at the block level

NetApp University - Do Not Distribute

A-33 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
42 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
What are the methods of creating a LUN?
Using the lun create command from a
storage system
Using the lun setup command from a storage
system
Using FilerView from a host
Using SnapDrive from a host
Why would you use SnapDrive in a SAN
environment?
It is integrated with Microsoft Management
Console
It ensures a consistent LUN Snapshot



NetApp University - Do Not Distribute

A-34 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 12: SNAPSHOT COPIES
Answers
Module 12: Snapshot Copies


50 2008 NetApp. All rights reserved.
Check Your Understanding
What is a Snapshot copy?
A read-only image of the file system
What are some of the NetApp products that
are based on Snapshot technology?
SnapRestore
SnapMirror
SnapVault
SnapManager
SnapDrive
FlexClone

NetApp University - Do Not Distribute

A-35 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
51 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
What are some of the Snapshot commands?
snap list
snap create
snap delete
snap delta
snap reclaimable
What is the Snapshot schedule syntax?
snap sched vol0 2 6 8@8,12,16,20

TASK 1: CREATING SNAPSHOT COPIES
5. What are the results?
You will see Success and Created snapshot snap1 on
volume FLEXTREE.
6. Return to FilerView > Volumes > Snapshots > Manage.
Can you find the listing for snap1?
Yes.
TASK 4: MANAGING SNAPSHOT COPIES
3. Do hourly Snapshot copies occur every hour?
No, they occur at the times checked.
4. How can you view the Snapshot copy schedule for the root volume?
Under Filer >Volumes >Snapshots >Configure
Use the drop-down menu to choose the volume, and then scroll down to see the
settings.
5. Can you change the percentage for the Snapshot reserve?
Yes. You can use any percentage between 0 to 100.



8. Record the totals for snap1 and snap2 below.
NetApp University - Do Not Distribute

A-36 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
snap1 Total _______________
snap1 Used _______________
snap2 Total _______________
snap2 Used _______________
Answers vary.
TASK 5: REVERTING A VOLUME USING SNAPRESTORE
15. Perform a volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 3
Which Snapshot did you use?
snap3
16. Perform a second volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 2
Which Snapshot did you use?
snap2
17. Perform a third volume restore by entering:
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
Which Snapshot did you use?
snap1



18. Finally, perform a volume restore by entering:
NetApp University - Do Not Distribute

A-37 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
NetApp>snap restore t vol /vol/FLEXCOPY
When asked to select a Snapshot copy, enter the Snapshot copy name that returns
the following results from the file:
NetApp>rdfile /vol/FLEXCOPY/filetest
This is line 1
This is line 2
Going to take snapshot 2
Which Snapshot were you able to use?
None.
Why?
When you used snap1 for a SnapRestore, it released snapshots that
were taken after that Snapshot copy was created. The Snapshot copy
snap2 no longer exists. For more information, see the Data ONTAP
Data Protection and Retention course.

NetApp University - Do Not Distribute

A-38 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 13: WRITE AND READ REQUEST PROCESSING
Answers
Module 13: Write and Read Request
Processing


23 2008 NetApp. All rights reserved.
Check Your Understanding
What is a consistency point?
A completely self-consistent image of the entire
file system
What is the purpose of RAID?
To protect dataRAID striping is the method
used to protect disk data by which a parity value
is calculated across the disks in 4-Kb blocks
What is the storage layer?
Handles the I/Os to disk and checks for disk
failures

NetApp University - Do Not Distribute

A-39 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: UNDERSTANDING WAFL
1. WAFL write requests are stored in a buffer in memory and a copy is journaled in
NVLOG RAM.
True.
2. The RAID manager determines where data will go on the disk.
False. This is determined by WAFL.
3. The RAID manager creates a stripe that represents 4 K across each disk, where
one disk is the parity. (Assuming RAID 4)
True.
4. The RAID layer transfers data to the physical disks.
False. The storage layer transfers data to physical disks.
5. WAFL determines how data will be laid out on disks using columns and rows.
This layout is called a tetris.
True.
6. WAFL acknowledges a write request when the data is physically stored to disk
and a consistency point is complete.
False. WAFL acknowledges receipt as requests are received.
7. Read requests are always processed from the disk.
False. WAFL might be able to satisfy the request for a Read cache
buffer.
8. A consistency point is a completely self-consistent image of the entire file system
that is taken when all the data is written to the disks and a new root inode is
determined.
True.
9. A consistency point is initiated when the NVLOG is half full, every 10 seconds,
or when Data ONTAP has initiated it for other reasons.
True.
10. NVRAM logs are flushed when a consistency point is completed.
True.
NetApp University - Do Not Distribute

A-40 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 14: SYSTEM DATA COLLECTION
Answers
Module 14: System Data Collection


43 2008 NetApp. All rights reserved.
Check Your Understanding
What command(s) would you use to display
disk utilization?
statit
What command(s) would you use to monitor
connectivity?
ifconfig, ifstat, arp, ping,
netstat
What command(s) would you use to help
detect impending disk problems before they
occur?
disk shm_stat

NetApp University - Do Not Distribute

A-41 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 2: EXECUTING THE STATIT COMMAND ON A STORAGE SYSTEM
4. Scroll down to see the results. Explain what these results mean.
Answers vary.
NetApp University - Do Not Distribute

A-42 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 15: FLEXSHARE
Answers
Module 15: FlexShare


TASK 1: CONFIGURING AND TESTING FLEXSHARE
5. Enter:
priority show volume
What do you see?
system>priority show volume
Volume Priority Relative Sys Priority
Service Priority (vs User)
nfsflex on VeryHigh Medium
cifstree on VeryLow Medium
8. Monitor the transfer of data by each protocol using:
system> sysstat x 1
What do you see?
NFS and CI FS are roughly comparable. Not much is happening in a
typical classroom environment.
9. system> priority set volume nfsvol level= VeryHigh
What happens?
NFS should go up.

NetApp University - Do Not Distribute

A-43 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
10. system> priority set volume nfsvol level= VeryLow
What happens?
NFS and CI FS are roughly comparable.
11. system> priority set volume cifsvol level= VeryHigh
What happens?
CI FS should go up.
NetApp University - Do Not Distribute

A-44 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 16: NDMP FUNDAMENTALS
Answers
Module 16: NDMP Fundamentals


30 2008 NetApp. All rights reserved.
Check Your Understanding
What is NDMP?
Network Data Management Protocolthe standard
protocol for controlling data transfers between primary
and secondary storage devices
What types of tape devices can be used with NDMP?
Tape drives, libraries, or stackers
What is the command to check NDMP status?
ndmp status [session #]
What are some limitations of ndmpcopy?
Cannot copy individual files
Increments limited to two levels
Works only with NetApp storage appliances
What is the syntax of the ndmpcopy command?
ndmpcopy [options] [source] [destination]

NetApp University - Do Not Distribute

A-45 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION
Answers
Module 17: Active-Active Controller
Configuration


26 2008 NetApp. All rights reserved.
Check Your Understanding
What are three modes of operation for an active-active
controller configuration?
Normal, Takeover, Giveback
What is the purpose of using an active-active controller
configuration?
Fault tolerance
Nondisruptive software upgrades
Nondisruptive hardware maintenance
What happens during a takeover?
Surviving partner has two identities:
Each identity can only access appropriate volumes and
networks
The failed node can be accessed using rsh and telnet
commands

NetApp University - Do Not Distribute

A-46 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
27 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
True or False:
Options must be set the same on both nodes
True
License must be set the same on both nodes
True
Both nodes must have the same number of
disks
True
Both nodes must be part of the same domain
False


28 2008 NetApp. All rights reserved.
Check Your Understanding (Cont.)
Name three active-active storage controller
configurations:
Standard
MetroCluster
SyncMirror
What are some of the requirements for setting up a
standard active-active controller configuration?
Architecture compatibility
Storage capacity
Disks and disk shelf compatibility
Cluster interconnect adapters and cables installed
Nodes attached to the same networks
Same software licensed and enabled


NetApp University - Do Not Distribute

A-47 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
TASK 1: LICENSING AND CONFIGURING ACTIVE-ACTIVE STORAGE CONTROLLER
CONFIGURATIONS
1. Look at the hardware on your system. Do you see any indication that your storage
system is cabled for active-active?
What command will give you information about the hardware installed on your
storage system?
sysconfig -a
Example from sysconfig a from a FAS3050
slot 3: NVRAM (NetApp NVRAM V)
Revision: F0
Serial Number: 506428
Memory Size: 512 MB
Battery Status: OK (4086 mV)
Charger Status: OFF
Running Firmware: 7 (3.5.0)
Cluster I nterconnect Port 1: copper
Cluster I nterconnect Port 2: copper
memory mapped I /O base 0xe1000000, size 0x100000
prefetchable memory base 0xe0800000, size 0x800000
prefetchable memory base 0xc0000000, size
0x20000000
2. License and then reboot each system. Your instructor will help you identify the
system that is cabled as the partner for your system.
Example:
systemA> license add ABCDEFG
systemA> cf status
systemA> reboot

systemB> license add ABCDEFG
systemB> cf status
systemB> reboot
What does cf status tell you before you reboot?
Cluster must be licensed and the system rebooted before using this
command.



3. Enable active-active on one of the systems. How does this affect the other
NetApp University - Do Not Distribute

A-48 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
system?
Example:
systemA> cf status
Cluster disabled.
systemA> cf enable
Sat May 24 01:47:38 GMT [DEVSLU20-F2:
cf.misc.operatorEnable:warning]: Cluster monitor: operator initiated
enabling of cluster
Sat May 24 01:47:39 GMT [DEVSLU20-F2:
cf.fsm.takeoverOfPartnerEnabled:notice]: Cluster monitor: takeover
of DEVSLU20-F1
enabled
Sat May 24 01:47:39 GMT [DEVSLU20-F2:
cf.fsm.takeoverByPartnerEnabled:notice]: Cluster monitor: takeover
of DEVSLU20-F2
by DEVSLU20-F1 enabled
systemA> cf status
Cluster enabled, DEVSLU20-F1 is up
systemB> cf status
Cluster enabled, DEVSLU20-F2 is up
Both systems now have the active-active service enabled.
7. Run the following commands on both Partner A and Partner B. Compare the
output. (Remember to access your partner storage system.)
systemA(takeover)>
sysconfig r
sysconfig v
sysstat 1
Example:
systemA(takeover)> sysconfig r
systemA(takeover)> partner
systemA/systemB>> sysconfig r

systemA/systemB>> partner
systemA(takeover)> sysconfig v

systemA(takeover)> partner
systemA/systemB>> sysconfig v

systemA/systemB>> partner
NetApp University - Do Not Distribute

A-49 Data ONTAP 7.3 Fundamentals: Appendix
2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes.
systemA(takeover)> sysstat -1
systemA(takeover)> partner
systemA/systemB>> sysstat -1

Was there a difference between the two storage system outputs?
The Windows client connection to the storage system was stateful;
the Windows client and the storage system had an established session
that was broken when Partner A was halted. This session needed to
be restarted with Partner B. The UNI X client connection was
stateless; therefore, there was no established session that was broken.
The next request from the UNI X client was not dependant on the
previous request, so the UNI X client was able to wait for the takeover
of Partner B to allow you access to your files.
8. Restore the halted storage system to service. What steps do you take to bring the
halted storage system back into the active-active relationship?
Connect to the halted system console and boot the system. When the
system is ready to finish booting, you will see the following message:
Waiting for giveback...(Press Ctrl-C to abort wait)
On the partner, issue the following command:
systemB (takeover)>cf giveback
cf status
NetApp University - Do Not Distribute

Vous aimerez peut-être aussi