Where to find additional information
After you have successfully tested CIFS client access, you can perform advanced CIFS configuration or add SAN access. When protocol access is complete, you should protect the root volume of SVM. There are express guides, comprehensive guides, and technical reports to help you achieve these goals.
SMB/CIFS configuration
You can further configure CIFS access using the following comprehensive guides and technical reports:
SMB/CIFS File Access Reference Guide
Describes how to configure and manage file access using the CIFS/SMB protocol.
Root volume protection
After configuring protocols on the SVM, you should ensure that its root volume is protected:
Describes how to create a load-sharing mirrors to protect the SVM root volume, which is a Lenovo best practice for NAS-enabled SVMs. Also describes how to quickly recover from volume failures or losses by promoting the SVM root volume from a load-sharing mirror