Skip to main content

Where to find additional information

After you have successfully tested NFS client access, you can perform additional NFS configuration or add SAN access. When protocol access is complete, you should protect the root volume of storage virtual machine (SVM). There are express guides, comprehensive guides, and technical reports to help you achieve these goals.

NFS configuration

You can further configure NFS access using the following comprehensive guides and technical reports:

Networking configuration

You can further configure networking features and name services using the following comprehensive guides and technical reports:

SAN protocol configuration

If you want to provide or modify SAN access to the new SVM, you can use any of the FC or iSCSI configuration express guides, which are available for multiple host operating systems.

ThinkSystem Storage Documentation Center: ONTAP software

Root volume protection

After configuring protocols on the SVM, you should ensure that its root volume is protected:

  • Data Protection Power Guide

    Describes how to create a load-sharing mirror to protect the SVM root volume, which is a Lenovo best practice for NAS-enabled SVMs. Also describes how to quickly recover from volume failures or losses by promoting the SVM root volume from a load-sharing mirror.