This course combines CIFS, NFS, and performance analysis topics into a single, in-depth one-week course. It provides the knowledge and skills that you need to administer CIFS version 1.x to 2.x and NFS versions 3, 4, and 4.1 in a clustered Data ONTAP� operating system. You also learn the skills you need to collect and analyze performance data from NetApp� storage systems.
By the end of this course, you should be able to:
Describe CIFS and NFS protocols
Describe configuration in the clustered Data ONTAP operating system
Use the Data ONTAP PowerShell Toolkit to write PowerShell scripts
Use Data ONTAP operating system to configure home directories
Review performance management for CIFS and NFS environments
Explain troubleshooting techniques for NetApp storage systems and for clients who use the CIFS and NFS protocols
Describe how data flows through the network and protocol layers of clustered Data ONTAP
Define performance-related terms and describe basic methodologies
Identify the methods that can be used to monitor and analyze storage system performance
Explain how methods and tools can be used to collect performance data
Use command output to analyze system performance
Use command output from case studies to identify performance bottlenecks
Implement configuration for recommended practices for resiliency and performance
Locate resources and information that help you maximize system performance
Who Can Benefit
Professionals who manage NetApp storage systems and need a deeper understanding of protocols and performance in a clustered Data ONTAP environment.
The courses below are recommended before attending the Manage NAS and Performance on clustered Data ONTAP class.
Clustered Data ONTAP Administration
Hands-on experience with Data ONTAP
(three to six months)
Managing NAS and Performance on Clustered Data ONTAP
Module 1 How a NetApp Storage System Works
Describe the layers within the Data ONTAP architecture
List the advantages that are provided by the ability of WAFL to optimize writes
Explain the purpose of NVRAM
Diagram the flow of read and write requests through the network and protocol layers of Data ONTAP
Describe the benefits that RAID provides
Module 2 Performance Overview
Define performance-related terms, such as baseline, bottleneck, Littles law, and latency
Describe baseline performance guidelines and methodologies as they relate to NetApp storage systems
Module 3 Clustered Storage System Workloads and Bottlenecks
Gather information about the workload of an existing storage system
Identify the storage system components that can affect performancebecome bottlenecks
Module 4 Cluster Performance Monitoring and Analysis
Describe the performance analysis tools and commands that are commonly used for cluster health checks
Identify the key performance commands and describe the command output that they produce
Explain how to use NetApp tools for performance measurement
Describe the benefits of using the AutoSupport support tool for performance analysis
Module 5 OnCommand Management Tools
List the three categories of performance tools
Explain the features and functions of Insight Perform
Explain the features and functions of OnCommand Balance
Use OnCommand management tools to view performance data
Module 6 Storage QoS
Discuss how the Storage Quality of Service (QoS) feature works in a clustered Data ONTAP environment
Identify the commands that are used to manage policy groups
Monitor workload performance
Module 7 NFS Overview
List use cases for NFS
Differentiate between NFS protocol versions
Discuss the two implementations of Data ONTAPNetAppModule 8 NFS Version 3Discuss NFS version 3 (NFSv3) features
Describe Data ONTAP support for NFSv3
Explain use cases for NFSv3
Configure Data ONTAP operating in 7-Mode to use the NFSv3 protocol
Configure clustered Data ONTAP to use the NFSv3 protocol
Describe NFSv3 securityModule 9 NFS Version 4
Discuss NFS version 4 (NFSv4) features
Describe Data ONTAP support for NFSv4
Explain use cases for NFSv4
Configure Data ONTAP operating in 7-Mode to use the NFSv4 protocol
Configure clustered Data ONTAP to use the NFSv4 protocol
Describe NFSv4 security2NetAppModule 10 NFS Version 4.1
Discuss NFS version 4.1 (NFSv4.1) and parallel NFS (pNFS) features
Describe Data ONTAP support for NFSv4.1 and pNFS
Explain use cases for NFSv4.1 and pNFS
Configure clustered Data ONTAP to use the NFSv4.1 protocol
Configure a Linux host to use the NFSv4.1 protocolModule 11 Performance and Basic Troubleshooting
Discuss the factors that influence NFS performance
List the tools that are used to capture NFS performance statistics
Recognize areas in which issues might arise
Explain the interactions between CIFS and NFS name mapping
Describe basic NFS troubleshooting between storage systems, the Linux client, and the network
Discuss troubleshooting NFS locks and leasesModule 12 CIFS Overview
Differentiate between CIFS protocol versions
List the CIFS supported environments
Explain how CIFS authenticates resources in a workgroup environment and a domain environment
Discuss the two implementations of Data ONTAPModule 13 SMB Setup
Configure workgroup authentication for a storage system with Data ONTAP operating in 7-Mode
Set up a storage system with clustered Data ONTAP for Windows domain authentication
Configure Windows domain authentication for a storage system with Data ONTAP operating in 7-ModeModule 14 Shares and Sessions
List the default shares
Display all shares that are available on the storage system
Configure a client machine to access any share
Define sparse files and set their attributes
Identify the CIFS sessions that are established by accessing a share on the storage system
Add, modify, and delete sharesModule 15 Access Control
Use the CLI, OnCommand System Manager, or Microsoft tools to add, delete, and modify the access permissions of shares
Use Microsoft tools to add, delete, and modify the access permissions of files and folders
Use access-based enumeration
Create local users
Create local groups
Determine and verify user mappings for CIFS users that access NTFS and UNIX volumes or qtrees
Classes begin promptly at 9:00 am, and typically end at 5:00 pm.
Does the course schedule include a Lunchbreak?
Lunch is normally an hour long and begins at noon. Coffee, tea, hot chocolate and juice are available all day in the kitchen. Fruit, muffins and bagels are served each morning. There are numerous restaurants near each of our centers, and some popular ones are indicated on the Area Map in the Student Welcome Handbooks - these can be picked up in the lobby or requested from one of our ExitCertified staff.
How can someone reach me during class?
If someone should need to contact you while you are in class, please have them call the center telephone number and leave a message with the receptionist.
What languages are used to deliver training?
Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.
What does GTR stand for?
GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.
Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.
What does vendor-authorized training mean?
As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.
Is the training too basic, or will you go deep into technology?
It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.
How up-to-date are your courses and support materials?
We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.
Are your instructors seasoned trainers who have deep knowledge of the training topic?
ExitCertified instructors have an average of 27 years of practical IT experience. They have also served as consultants for an average of 15 years. To stay up to date, instructors will at least spend 25 percent of their time learning new emerging technologies and courses.
Do you provide hands-on training and exercises in an actual lab environment?
Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.
Will you customize the training for our company’s specific needs and goals?
We will work with you to identify training needs and areas of growth. We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.
How do I get started with certification?
Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact firstname.lastname@example.org.
Will I get access to content after I complete a course?
You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.
Very interactive and in-depth course that really got me ready for the industry
vary good online learning. instructor is vary good the way he explained every thing.
Instructor was great, course was mostly very good except for too much focus on pricing
The tool provided to practice the course teachings is very functional and easy to use.
Thank Tech Data for sponsoring this course you really take care of your partners.