Skip to main content

Where to find additional information

After you have successfully tested SMB client access, you can perform additional SMB configuration or add SAN access. When protocol access is complete, you should protect the root volume of the SVM. There are express guides, comprehensive guides, and technical reports to help you achieve these goals.

SMB configuration

You can further configure SMB access using the following comprehensive guides and technical reports:

  • SMB/CIFS File Access Reference Guide

    Describes how to configure SMB servers and manage file access using the SMB protocol, including security, file policy management, and SMB client- and server-based services.

Antivirus configuration

After configuring the SMB protocol on the SVM, you should ensure that its data is protected by using the following guide:

Networking configuration

You can further configure networking features and name services using the following comprehensive guides and technical reports:

NFS and SMB multiprotocol configuration

If you want to provide or modify NFS access to the new SVM, you can use the following express guide:

Root volume protection

After configuring protocols on the SVM, you should ensure that its root volume is protected:

  • Data Protection Power Guide

    Describes how to create a load-sharing mirror to protect the SVM root volume, which is a best practice for NAS-enabled SVMs. Also describes how to quickly recover from volume failures or losses by promoting the SVM root volume from a load-sharing mirror.