+ All Categories
Home > Documents > Network Management Guide

Network Management Guide

Date post: 29-Oct-2015
Category:
Upload: ashok-sharma
View: 29 times
Download: 1 times
Share this document with a friend
Popular Tags:
180
Data ONTAP® 8.0 7-Mode Network Management Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 4-NETAPP Documentation comments: [email protected] Information Web: http://www.netapp.com Part number: 215-04484_A0 August 2009 Release Candidate Documentation—24 August 2009 Contents Subject to Change
Transcript
Page 1: Network Management Guide

Data ONTAP® 8.0 7-ModeNetwork Management Guide

NetApp, Inc.495 East Java DriveSunnyvale, CA 94089 U.S.A.Telephone: +1 (408) 822-6000Fax: +1 (408) 822-4501Support telephone: +1 (888) 4-NETAPPDocumentation comments: [email protected] Web: http://www.netapp.com

Part number: 215-04484_A0August 2009

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 2: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 3: Network Management Guide

Contents

Copyright information.................................................................................11Trademark information...............................................................................13About this guide............................................................................................15

Audience......................................................................................................................15

Accessing Data ONTAP man pages............................................................................16

Terminology.................................................................................................................16

Where to enter commands...........................................................................................17

Keyboard and formatting conventions.........................................................................18

Special messages.........................................................................................................19

How to send your comments.......................................................................................20

Network interfaces on your storage system................................................21How network interfaces are named.............................................................................21

Maximum number of network interfaces....................................................................23

The e0M interface........................................................................................................23

Standards and characteristics of Ethernet frames....................................25What jumbo frames are................................................................................................25

Network interface requirements for jumbo frames..........................................26

Guidelines to configure clients for jumbo frames...........................................26

Benefit of using jumbo frames........................................................................26

Flow control.................................................................................................................27

Network interface configuration.................................................................29Configuring network interfaces from the command-line interface.............................29

Configuring an IP address for a network interface..........................................30

Specifying a subnet mask for a network interface...........................................31

Specifying the prefix length for a network interface.......................................31

Specifying a broadcast address........................................................................32

Specifying a media type for a network interface.............................................32

Specifying an MTU size for a network interface.............................................33

Specifying the flow control type for a network interface................................33

Specifying whether a network interface is trusted...........................................34

Specifying the partner IP address in an HA pair.............................................35

Specifying the partner interface in an HA pair................................................35

Table of Contents | 3

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 4: Network Management Guide

Enabling or disabling automatic takeover for a network interface..................36

Removing a primary IP address from a network interface..............................36

Viewing network interface settings from the

command-line interface.............................................................................37

How to configure aliases for a network interface........................................................37

Creating or removing aliases...........................................................................38

How to change the status of a network interface.........................................................38

Changing the status of an interface..................................................................39

Viewing and modifying network interface settings using FilerView...........................39

How to block protocols on network interfaces............................................................40

Blocking protocols from network interfaces...................................................40

Network interface information you can view..............................................................41

Viewing statistics of all active TCP connections.............................................42

How to view network interface statistics.........................................................44

Viewing or clearing network interface statistics using the

command-line interface.............................................................................44

Viewing network interface information with FilerView..................................47

How routing in Data ONTAP works...........................................................49What fast path is..........................................................................................................49

How fast path works with NFS-over-UDP......................................................50

How fast path works with TCP........................................................................50

How fast path affects Telnet sessions and the ping utility...............................50

Fast path not compatible with asymmetric routing..........................................50

How to manage the routing table.................................................................................50

What the routed daemon does.........................................................................51

When the routed daemon should be turned off................................................51

Routing tables in a vFiler unit environment....................................................51

Circumstances that might alter the routing table.............................................52

How to specify the default route..................................................................................52

How to enable or disable routing mechanisms ...........................................................52

Enabling or disabling fast path........................................................................53

Enabling or disabling the routed daemon from the

command-line interface.............................................................................53

Enabling or disabling the routed daemon with FilerView...............................53

How to view the routing table and default route information......................................54

Viewing the routing table from the command-line interface...........................54

4 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 5: Network Management Guide

Viewing the default route information from the

command-line interface.............................................................................55

Viewing the routing table and routing information by

using FilerView..........................................................................................56

Modifying the routing table ........................................................................................56

How to maintain host-name information....................................................59How the /etc/hosts file works.......................................................................................59

Adding a host name in the /etc/hosts file.........................................................60

Hard limits for the /etc/hosts file ....................................................................61

Editing the /etc/hosts file with FilerView........................................................61

Changing the host name of a storage system...................................................61

How to configure DNS to maintain host information.................................................62

Configuring DNS from the command-line interface.......................................63

How DNS resolves host names........................................................................64

DNS name caching..........................................................................................64

DNS information you can view.......................................................................64

How to use dynamic DNS to update host information................................................65

How dynamic DNS updates work in Data ONTAP.........................................66

Support for dynamic DNS updates in Data ONTAP.......................................66

Enabling or disabling dynamic DNS updates..................................................67

Disabling the transmission of DNS updates for an IP address........................67

Changing the time-to-live setting for DNS entries..........................................68

How to use NIS to maintain host information ............................................................68

How using NIS slaves can improve performance............................................69

How an NIS master is selected........................................................................69

Creating /etc/hosts from the NIS master..........................................................70

Guidelines for using NIS slaves.......................................................................70

NIS administrative commands.........................................................................71

How to configure NIS with Data ONTAP interfaces...................................................71

Enabling or disabling NIS using the command-line interface.........................72

Specifying the NIS domain name....................................................................72

Specifying NIS servers to bind to your storage system...................................73

Enabling an NIS slave on your storage system................................................73

What NIS information you can view...........................................................................74

Viewing NIS performance statistics................................................................75

Configuring DNS and NIS with FilerView.................................................................76

Table of Contents | 5

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 6: Network Management Guide

How to change the host-name search order.................................................................77

Changing the host-name search order with FilerView.....................................77

Changing the host-name search order.............................................................78

How to monitor your storage system with SNMP.....................................79Types of SNMP traps in Data ONTAP........................................................................79

What a MIB is..............................................................................................................80

What the SNMP agent does.........................................................................................80

How to configure the SNMP agent..............................................................................80

Enabling or disabling SNMP using the command-line

interface .....................................................................................................81

Configuring SNMPv3 users.............................................................................82

Setting SNMP access privileges......................................................................83

Viewing and modifying your SNMP configuration from

the command-line interface........................................................................83

Modifying your SNMP configuration with FilerView....................................84

SNMP command syntax..................................................................................84

SNMP security parameters..............................................................................85

Example: SNMP commands............................................................................86

User-defined SNMP traps............................................................................................88

How SNMP traps work....................................................................................88

How to define or modify a trap........................................................................89

Viewing or modifying trap values from the command-line interface..............89

Viewing or modifying trap values with FilerView..........................................89

Defining traps in a configuration file..............................................................90

Example: Trap definitions...............................................................................90

Command syntax for SNMP trap parameters..................................................91

SNMP trap parameters ....................................................................................92

How VLANs work.........................................................................................97VLAN membership.....................................................................................................97

How VLAN membership affects communication...........................................98

GARP VLAN Registration Protocol ...........................................................................99

GVRP configuration for VLAN interfaces......................................................99

VLAN tags...................................................................................................................99

Advantages of VLANs...............................................................................................100

Prerequisites for setting up VLANs...........................................................................101

Guidelines for setting up VLANs in Data ONTAP....................................................101

6 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 7: Network Management Guide

How to manage VLANs.............................................................................................102

How to create and configure a VLAN.......................................................................102

How to use VLANs for tagged and untagged network traffic.......................103

Creating a VLAN...........................................................................................103

Configuring a VLAN.....................................................................................105

How to add an interface to a VLAN..........................................................................105

Adding an interface to a VLAN.....................................................................106

How to delete a VLAN..............................................................................................106

Deleting all VLANs.......................................................................................107

Deleting a specific VLAN.............................................................................107

How to modify VLAN interfaces...............................................................................108

Modifying VLAN interfaces..........................................................................108

How to view VLAN statistics....................................................................................108

Viewing VLAN statistics...............................................................................109

Viewing statistics for a specific VLAN.........................................................109

How interface groups work in Data ONTAP...........................................111Network interfaces grouped into an interface group.................................................112

Types of interface groups ..........................................................................................112

Single-mode interface group..........................................................................113

Static multimode interface group...................................................................114

Dynamic multimode interface group.............................................................115

Load balancing in multimode interface groups.........................................................116

IP address and MAC address load balancing.................................................116

Round-robin load balancing..........................................................................117

How to manage interface groups ..............................................................................117

The ifgrp command...................................................................................................118

Creating a single-mode interface group.....................................................................118

How an active interface in a single-mode interface group is selected.......................120

Selecting an active interface..........................................................................120

Designating a nonfavored interface...........................................................................120

Creating a static multimode interface group..............................................................121

Creating a dynamic multimode interface group........................................................123

The LACP log file..........................................................................................124

How to add interfaces to an interface group..............................................................124

Adding interfaces to an interface group.........................................................124

How to delete interfaces from an interface group......................................................125

Table of Contents | 7

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 8: Network Management Guide

Deleting interfaces from an interface group..................................................125

Viewing interface group status..................................................................................126

What the interface group status information table contains..........................127

Viewing interface group statistics..............................................................................128

Destroying an interface group...................................................................................129

Second-level interface groups....................................................................................130

Guidelines for creating a second-level interface group.................................130

Creating a second-level interface group........................................................130

Enabling failover in a second-level interface group......................................132

Second-level interface groups in an HA pair.............................................................132

Creating a second-level interface group in an HA pair.................................133

How to diagnose network problems..........................................................137Diagnosing transport layer problems.........................................................................137

How to diagnose ping problems ...............................................................................138

Increasing the ping throttling threshold value...............................................138

Checking the ping throttling threshold status................................................139

Disabling ping throttling................................................................................139

Protecting your storage system from forged ICMP redirect attacks .........................139

Network interface statistics........................................................................141Statistics for Gigabit Ethernet controller VI, VII, and G20 interfaces.......................141

Statistics for Gigabit and 10 Gigabit Ethernet controllers T204,

T210, and T320 interfaces...................................................................................145

Statistics for the BGE 10/100/1000 Ethernet interface..............................................148

Ways to improve your storage system's performance ............................153IP port usage on a storage system.............................................................155

Host identification.....................................................................................................155

/etc/services NNTP and TTCP ports..........................................................................158

NFS-enabled ports.....................................................................................................158

Ports not listed in /etc/services..................................................................................159

FTP............................................................................................................................159

SSH............................................................................................................................160

Telnet.........................................................................................................................160

SMTP.........................................................................................................................161

Time service...............................................................................................................161

DNS...........................................................................................................................162

DHCP.........................................................................................................................162

8 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 9: Network Management Guide

TFTP..........................................................................................................................162

HTTP.........................................................................................................................163

Kerberos.....................................................................................................................163

NFS............................................................................................................................164

CIFS...........................................................................................................................164

SSL............................................................................................................................164

SNMP........................................................................................................................165

RSH...........................................................................................................................166

Syslog........................................................................................................................166

The routed daemon....................................................................................................166

NDMP........................................................................................................................167

SnapMirror and SnapVault........................................................................................167

Error codes for the netdiag command......................................................169Index.............................................................................................................173

Table of Contents | 9

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 10: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 11: Network Management Guide

Copyright information

Copyright © 1994–2009 NetApp, Inc. All rights reserved. Printed in the U.S.A.

No part of this document covered by copyright may be reproduced in any form or by any means—graphic,electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic retrievalsystem—without prior written permission of the copyright owner.

Software derived from copyrighted NetApp material is subject to the following license and disclaimer:

THIS SOFTWARE IS PROVIDED BY NETAPP "AS IS" AND WITHOUT ANY EXPRESS ORIMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIESOF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WHICH ARE HEREBYDISCLAIMED. IN NO EVENT SHALL NETAPP BE LIABLE FOR ANY DIRECT, INDIRECT,INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUTNOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANYTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OFTHIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

NetApp reserves the right to change any products described herein at any time, and without notice.NetApp assumes no responsibility or liability arising from the use of products described herein, exceptas expressly agreed to in writing by NetApp. The use or purchase of this product does not convey alicense under any patent rights, trademark rights, or any other intellectual property rights of NetApp.

The product described in this manual may be protected by one or more U.S.A. patents, foreign patents,or pending applications.

RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject torestrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Softwareclause at DFARS 252.277-7103 (October 1988) and FAR 52-227-19 (June 1987).

Copyright information | 11

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 12: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 13: Network Management Guide

Trademark information

All applicable trademark attribution is listed here.

NetApp, the Network Appliance logo, the bolt design, NetApp-the Network Appliance Company,Cryptainer, Cryptoshred, DataFabric, DataFort, Data ONTAP, Decru, FAServer, FilerView, FlexClone,FlexVol, Manage ONTAP, MultiStore, NearStore, NetCache, NOW NetApp on the Web, SANscreen,SecureShare, SnapDrive, SnapLock, SnapManager, SnapMirror, SnapMover, SnapRestore,SnapValidator, SnapVault, Spinnaker Networks, SpinCluster, SpinFS, SpinHA, SpinMove, SpinServer,StoreVault, SyncMirror, Topio, VFM, and WAFL are registered trademarks of NetApp, Inc. in theU.S.A. and/or other countries. gFiler, Network Appliance, SnapCopy, Snapshot, and The evolution ofstorage are trademarks of NetApp, Inc. in the U.S.A. and/or other countries and registered trademarksin some other countries. The NetApp arch logo; the StoreVault logo; ApplianceWatch; BareMetal;Camera-to-Viewer; ComplianceClock; ComplianceJournal; ContentDirector; ContentFabric; EdgeFiler;FlexShare; FPolicy; Go Further, Faster; HyperSAN; InfoFabric; Lifetime Key Management, LockVault;NOW; ONTAPI; OpenKey, RAID-DP; ReplicatorX; RoboCache; RoboFiler; SecureAdmin; ServingData by Design; Shadow Tape; SharedStorage; Simplicore; Simulate ONTAP; Smart SAN; SnapCache;SnapDirector; SnapFilter; SnapMigrator; SnapSuite; SohoFiler; SpinMirror; SpinRestore; SpinShot;SpinStor; vFiler; VFM Virtual File Manager; VPolicy; and Web Filer are trademarks of NetApp, Inc.in the U.S.A. and other countries. NetApp Availability Assurance and NetApp ProTech Expert areservice marks of NetApp, Inc. in the U.S.A.

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International BusinessMachines Corporation in the United States, other countries, or both. A complete and current list of otherIBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml.

Apple is a registered trademark and QuickTime is a trademark of Apple, Inc. in the U.S.A. and/or othercountries. Microsoft is a registered trademark and Windows Media is a trademark of MicrosoftCorporation in the U.S.A. and/or other countries. RealAudio, RealNetworks, RealPlayer, RealSystem,RealText, and RealVideo are registered trademarks and RealMedia, RealProxy, and SureStream aretrademarks of RealNetworks, Inc. in the U.S.A. and/or other countries.

All other brands or products are trademarks or registered trademarks of their respective holders andshould be treated as such.

NetApp, Inc. is a licensee of the CompactFlash and CF Logo trademarks.

NetCache is certified RealSystem compatible.

Trademark information | 13

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 14: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 15: Network Management Guide

About this guide

You can use your product more effectively when you understand this document's intended audienceand the conventions that this document uses to present information.

This guide describes how to configure and manage network interfaces, interface groups, virtual LANs(VLANs), routing, and SNMP on storage systems that run Data ONTAP. This guide also describeshost-name resolution and SNMP.

This guide describes all storage system models; however, some models do not support all the networkinginterfaces. See the hardware guide for your storage system to identify which interfaces are supportedon your system.

Note: This guide applies to systems running Data ONTAP 8.0 7-Mode, including V-Series systems.The Data ONTAP 8.0 7-Mode release family has the features and functionality you are used to ifyou have been using the Data ONTAP 7.1, 7.2, or 7.3 release families. If you are a Data ONTAP 8.0Cluster-Mode user, use the Data ONTAP 8.0 Cluster-Mode guides plus any Data ONTAP 8.0 7-Modeguides for functionality you might want to access with 7-Mode commands through the nodeshell.

Next topics

Audience on page 15

Accessing Data ONTAP man pages on page 16

Terminology on page 16

Where to enter commands on page 17

Keyboard and formatting conventions on page 18

Special messages on page 19

How to send your comments on page 20

AudienceThis document is written with certain assumptions about your technical knowledge and experience.

This document is for systems administrators who are familiar with operating systems that run on DataONTAP storage system clients such as UNIX, MAC OSX, and Windows. It also assumes that you arefamiliar with how Network File System (NFS), Common Internet File System (CIFS), and HyperTextTransfer Protocol (HTTP) are used for file sharing or transfers.

About this guide | 15

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 16: Network Management Guide

Accessing Data ONTAP man pagesYou can use the Data ONTAP manual (man) pages to access technical information.

About this task

Data ONTAP manual pages are available for the following types of information. They are grouped intosections according to standard UNIX naming conventions.

Man page sectionTypes of information

1Commands

4Special files

5File formats and conventions

8System management and services

Step

1. View man pages in the following ways:

• Enter the following command at the console command line:

man command_or_file_name

• Click the manual pages button on the main Data ONTAP navigational page in the FilerViewuser interface.

Note: All Data ONTAP 8.0 7-Mode man pages are stored on the system in files whose namesare prefixed with the string "na_" to distinguish them from other man pages. The prefixednames sometimes appear in the NAME field of the man page, but the prefixes are not part ofthe command, file, or service.

TerminologyTo understand the concepts in this document, you might need to know how certain terms are used.

16 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 17: Network Management Guide

Storage terms

Refers to the component of a storage system that runs the Data ONTAP operatingsystem and controls its disk subsystem. Storage controllers are also sometimes

storage controller

called controllers, storage appliances, appliances, storage engines, heads, CPUmodules, or controller modules.

Refers to the hardware device running Data ONTAP that receives data from andsends data to native disk shelves, third-party storage, or both. Storage systems

storage system

that run Data ONTAP are sometimes referred to as filers, appliances, storageappliances, V-Series systems, or systems.

In Data ONTAP 8.0, refers to a single virtual interface that is created by groupingtogether multiple physical interfaces. In the Data ONTAP 7.2 and 7.3 releasefamilies, this functionality is referred to as a vif.

interface group

Cluster and high-availability terms

cluster• In Data ONTAP 8.0 Cluster-Mode, refers to a group of connected nodes (storage

systems) that share a global namespace and that you can manage as a singlevirtual server or multiple virtual servers, providing performance, reliability, andscalability benefits.

• In the Data ONTAP 7.1 release family and earlier releases, refers to an entirelydifferent functionality: a pair of storage systems (sometimes called nodes)configured to serve data for each other if one of the two systems stops functioning.

In Data ONTAP 8.0, refers to the recovery capability provided by a pair of nodes(storage systems), called an HA pair, that are configured to serve data for each otherif one of the two nodes stops functioning.

HA (highavailability)

In Data ONTAP 8.0, refers to a pair of nodes (storage systems) configured to servedata for each other if one of the two nodes stops functioning. In the Data ONTAP

HA pair

7.3 and 7.2 release families, this functionality is referred to as an active/activeconfiguration.

Where to enter commandsYou can use your product more effectively when you understand how this document uses commandconventions to present information.

You can perform common administrator tasks in one or more of the following ways:

Note: Data ONTAP commands shown in this document are for Data ONTAP 8.0 7-Mode and theData ONTAP 7.x release families. However, some of these commands might also be available at the

About this guide | 17

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 18: Network Management Guide

nodeshell prompt on systems running Data ONTAP 8.0 Cluster-Mode. See the Data ONTAP 8.0Cluster-Mode Administration Reference for more information.

• You can enter commands either at the system console or from any client computer that can obtainaccess to the storage system using a Telnet or Secure Shell (SSH) session.In examples that illustrate command execution, the command syntax and output shown might differfrom what you enter or see displayed, depending on your version of the operating system.

• You can use the FilerView graphical user interface.For information about accessing your system with FilerView, see the Data ONTAP 8.0 7-ModeSystem Administration Guide.

• You can enter Windows, ESX, HP-UX, AIX, Linux, and Solaris commands at the applicable clientconsole.In examples that illustrate command execution, the command syntax and output shown might differfrom what you enter or see displayed, depending on your version of the operating system.

• You can use the client graphical user interface.Your product documentation provides details about how to use the graphical user interface.

• You can enter commands either at the switch console or from any client that can obtain access tothe switch using a Telnet session.In examples that illustrate command execution, the command syntax and output shown might differfrom what you enter or see displayed, depending on your version of the operating system.

Keyboard and formatting conventionsYou can use your product more effectively when you understand how this document uses keyboardand formatting conventions to present information.

Keyboard conventions

What it meansConvention

Refers to NetApp On the Web at http://now.netapp.com/.The NOW site

• Used to refer to the key that generates a carriage return; the key is named Returnon some keyboards.

• Used to mean pressing one or more keys on the keyboard and then pressing theEnter key, or clicking in a field in a graphical interface and then typing informationinto the field.

Enter, enter

18 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 19: Network Management Guide

What it meansConvention

Used to separate individual keys. For example, Ctrl-D means holding down the Ctrlkey while pressing the D key.

hyphen (-)

Used to mean pressing one or more keys on the keyboard.type

Formatting conventions

What it meansConvention

• Words or characters that require special attention.

• Placeholders for information that you must supply.

For example, if the guide says to enter the arp -d hostname command, youenter the characters "arp -d" followed by the actual name of the host.

• Book titles in cross-references.

Italic font

• Command names, option names, keywords, and daemon names.

• Information displayed on the system console or other computer monitors.

• Contents of files.

• File, path, and directory names.

Monospaced font

Words or characters you type. What you type is always shown in lowercase letters,unless your program is case-sensitive and uppercase letters are necessary for it to workproperly.

Bold monospaced

font

Special messagesThis document might contain the following types of messages to alert you to conditions that you needto be aware of.

Note: A note contains important information that helps you install or operate the system efficiently.

Attention: An attention notice contains instructions that you must follow to avoid a system crash,loss of data, or damage to the equipment.

About this guide | 19

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 20: Network Management Guide

How to send your commentsYou can help us to improve the quality of our documentation by sending us your feedback.

Your feedback is important in helping us to provide the most accurate and high-quality information. Ifyou have suggestions for improving this document, send us your comments by e-mail [email protected]. To help us direct your comments to the correct division, include in thesubject line the name of your product and the applicable operating system. For example, FAS6070—DataONTAP 7.3, or Host Utilities—Solaris, or Operations Manager 3.8—Windows.

20 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 21: Network Management Guide

Network interfaces on your storage system

Your storage system supports physical network interfaces, such as Ethernet and Gigabit Ethernetinterfaces, and virtual network interfaces, such as interface groups and VLANs. Each of these networkinterface types has its own naming convention.

Your storage system supports the following types of physical network interfaces:

• 10/100/1000 Ethernet

• Gigabit Ethernet (GbE)

• 10 Gigabit Ethernet

In addition, some storage system models include a physical network interface named e0M. The e0Minterface is used only for Data ONTAP management activities.

Your storage system also supports the following virtual network interface types:

• Interface group

• Virtual local area network (VLAN)

Next topics

How network interfaces are named on page 21

Maximum number of network interfaces on page 23

The e0M interface on page 23

Related concepts

Network interface configuration on page 29

How network interfaces are namedInterfaces are named in several ways, depending on their type: physical, interface group, or VLAN.

Ethernet adapters can support one or multiple ports. Ethernet interfaces are identified by a name consistingof "e," the slot number of the adapter, and the port on the adapter (if multi-port adapter). A multiportadapter has letters or numbers imprinted next to its ports.

Physical interfaces are automatically assigned names based on the slot where the network adapter isinstalled.

• e<slot_number> if the adapter or slot has only one port

• e<slot_number><port_letter> if the adapter or slot has multiple ports

Network interfaces on your storage system | 21

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 22: Network Management Guide

Interface group names are user specified. An interface group's name should meet the following criteria:

• It must begin with a letter.

• It must not contain any spaces.

• It must not contain more than 15 characters.

• It must not already be in use for an interface group.

VLAN interface names are in the following format:

• <physical_interface_name>-<vlan_ID>

• <ifgrp_name>-<vlan_ID>

The following table lists interface types, interface name formats, and example of names that use theseidentifiers.

Examples of namesInterface name formatInterface type

e0

e1

e<slot_number>Physical interface on asingle-port adapter or slot

e0a

e0b

e0c

e0d

e1a

e1b

e<slot_number><port_letter>Physical interface on amultiple-port adapter orslot

web_ifgrp

ifgrp1

Any user-specified string that meets certain criteria.Interface group

e8-2

ifgrp1-3

<physical_interface_name>-<vlan-ID> or<ifgrp_name>-<vlan_ID>

VLAN

Host names

When you run the setup command on a storage system for the first time , Data ONTAP creates a hostname for each installed interface by appending the interface name to the host name of the storage system.

The following table shows examples of host names appended with the interface names.

Host nameInterface type

toaster-e0Single-port Ethernet interface in slot 0

22 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 23: Network Management Guide

Host nameInterface type

toaster-e1a

toaster-e1b

toaster-e1c

toaster-e1d

Quad-port Ethernet interface in slot 1

Maximum number of network interfacesBeginning with Data ONTAP 7.3, storage systems can accommodate from 256 to 1,024 networkinterfaces per system depending on the storage system model, system memory, and whether they arein an HA pair.

You should run the sysconfig command and check the Memory size field displayed for the slot 0system board of the storage system to determine your storage system memory.

The number of physical interfaces depends on the storage system model. Up to 16 interface groups canbe supported by each storage system. The maximum number of VLANs that can be supported equalsthe maximum number of network interfaces shown in the following table minus the total number ofphysical interfaces, interface groups, vh, and loopback interfaces supported by the storage system.

The maximum number of network interfaces that each system can have is shown in the following table.The total number of interfaces can include physical, interface group, VLAN, vh, and loopback interfaces.

Maximum number of network interfacesStorage system memory

1282 GB or less

2562 GB or less in an HA pair

2566 GB or less

5126 GB or less in an HA pair

512More than 6 GB

1,024More than 6 GB in an HA pair

The e0M interfaceSome storage system models include an interface named e0M. The e0M interface is dedicated to DataONTAP management activities. It enables you to separate management traffic from data traffic on yourstorage system for security and throughput benefits.

Network interfaces on your storage system | 23

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 24: Network Management Guide

On a storage system that includes the e0M interface, the Ethernet port that is indicated by a wrenchicon on the rear of the chassis connects to an internal Ethernet switch. The internal Ethernet switch thenprovides connectivity to the e0M interface and the Remote LAN Module (RLM). The following diagramillustrates the connections.

When you set up a system that includes the e0M interface, the Data ONTAP setup script informs youthat, for environments that use dedicated LANs to isolate management traffic from data traffic, e0M isthe preferred interface for the management LAN. The setup script then prompts you to configure e0M.The e0M configuration is separate from the RLM configuration. Both configurations require unique IPaddresses to allow the Ethernet switch to direct traffic to either the e0M interface or the RLM. Forinformation about how to set up the e0M interface, see the Data ONTAP 8.0 7-Mode Software SetupGuide.

The e0M interface does not support interface groups, VLANs, and jumbo frames.

After you have set up the e0M interface, you can use it to access the storage system with the followingprotocols, if they have been enabled:

• Telnet

• RSH

• HTTP or HTTPS

• SSH

• SNMP

24 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 25: Network Management Guide

Standards and characteristics of Ethernet frames

The standard Ethernet (IEEE 802.3) frame size is 1,518 bytes. You can change the default frame sizeon Gigabit Ethernet network interfaces.

Two commonly used terms to describe frame characteristics are frame size and Maximum TransmissionUnit (MTU) size.

The frame size of a standard Ethernet frame (defined by RFC 894) is the sum of the Ethernet header(14 bytes), the payload (IP packet, usually 1,500 bytes), and the Frame Check Sequence (FCS) field (4bytes).

The MTU size specifies the maximum number of bytes of data (the payload) that can be encapsulatedin an Ethernet frame. For example, the MTU size of a standard Ethernet frame is 1,500 bytes; this isthe default for storage systems. However, a jumbo frame, with an MTU size of 9,000 bytes, can alsobe configured.

Next topics

What jumbo frames are on page 25

Flow control on page 27

What jumbo frames areJumbo frames are larger than standard frames and require fewer frames. Therefore, you can reduce theCPU processing overhead by using jumbo frames with your network interfaces.

Jumbo frames are packets that are longer than the standard Ethernet (IEEE 802.3) frame size of 1,518bytes. The frame size definition for jumbo frames is vendor-specific because jumbo frames are not partof the IEEE standard. The most commonly used jumbo frame size is 9,018 bytes.

Jumbo frames can be used for all Gigabit and 10 Gigabit Ethernet interfaces that are supported on yourstorage system. The interfaces must be operating at or above 1,000 Mbps.

You can set up jumbo frames on your storage system in the following two ways:

• During initial setup, the setup command prompts you to configure jumbo frames if you have aninterface that supports jumbo frames on your storage system.

• If your system is already running, you can enable jumbo frames by setting the MTU size on aninterface.

Next topics

Network interface requirements for jumbo frames on page 26

Guidelines to configure clients for jumbo frames on page 26

Standards and characteristics of Ethernet frames | 25

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 26: Network Management Guide

Benefit of using jumbo frames on page 26

Network interface requirements for jumbo framesBefore you enable jumbo frames on your storage system, clients and intermediate routers on the networkmust have jumbo frames enabled.

The following network infrastructure requirements (as appropriate) must be met before you enablejumbo frames on your storage system:

• The switch ports must have jumbo frames enabled.

• If your storage system and the client are on different subnets, the next -hop router must be configuredfor jumbo frames.

• Jumbo frames must be enabled on client interfaces.

Guidelines to configure clients for jumbo framesYou should follow certain guidelines when you configure clients for jumbo frames.

The guidelines for configuring clients for jumbo frames are as follows:

• Configure jumbo frames on the client and on your storage system. Find how to configure jumboframes on your client by checking the network adapter documentation for your client.

• Enlarge the client's TCP window size. The minimum value for the client's window size should betwo times the MTU size, minus 40, and the maximum value can be the highest value your systemallows. Typically, the maximum value you can set for your client's TCP window is 65,535. If yourstorage system is configured to support jumbo frames and the client is not, the communicationbetween the storage system and the client occurs at the client's frame size.

• User Datagram Protocol (UDP) systems do not negotiate the MTU size. Therefore, your storagesystem and clients should be configured to have the same MTU size; otherwise, the storage systemmight send packets that the clients cannot receive.

• Check the MTU size of any intermediate subnets if your storage system and the client are on differentsubnets. If the storage system and the client (both configured to use jumbo frames) are on differentsubnets and an intermediate subnet does not support jumbo frames, the intermediate router fragmentsthe IP packets and the advantages of using jumbo frames are lost.

Benefit of using jumbo framesBy using jumbo frames with a Gigabit or 10 Gigabit Ethernet infrastructure, you can signficantlyimprove performance depending on the network traffic.

26 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 27: Network Management Guide

Flow controlFlow control enables you to manage the flow of frames between two directly connected link-partners.To achieve flow control, you can specify a flow control option that causes packets called Pause framesto be used as needed.

For example, link-partner A sends a Pause On frame to link-partner B when its receive buffers arenearly full. Link-partner B suspends transmission until it receives a Pause Off frame from link-partnerA or a specified timeout threshold is reached. Therefore, flow control can reduce or eliminate droppedpackets due to overrun.

Standards and characteristics of Ethernet frames | 27

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 28: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 29: Network Management Guide

Network interface configuration

Configuring network interfaces involves assigning IP addresses, setting network parameters andhardware-dependent values, specifying network interfaces, and viewing your storage system's networkconfiguration.

When you configure network interfaces, you can do any or all of the following:

• Assign an IP address to a network interface.

• Set parameters such as network mask, broadcast address, and prefix length.

• Set hardware-dependent values such as media type, MTU size, and flow control.

• Specify whether the interface should be attached to a network with firewall security protection.

• Specify whether the network interface must be registered with Windows Internet Name Services(WINS), if CIFS is running and at least one WINS server has been configured.

• Specify the IP address of an interface or specify the interface name on an HA pair partner for thetakeover mode.

• View the current configuration of a specific interface or all interfaces that exist on your storagesystem.

Next topics

Configuring network interfaces from the command-line interface on page 29

How to configure aliases for a network interface on page 37

How to change the status of a network interface on page 38

Viewing and modifying network interface settings using FilerView on page 39

How to block protocols on network interfaces on page 40

Network interface information you can view on page 41

Related concepts

Network interfaces on your storage system on page 21

Configuring network interfaces from the command-lineinterface

You can use the ifconfig command to assign initial configuration values to your network interfaces.

During the system setup, you can configure the IP addresses for the network interfaces. An ifconfigcommand is included in the /etc/rc file of the root volume for each network interface that youconfigured during the system setup. After your storage system has been set up, the ifconfig commandsin the /etc/rc file are used to configure the network interfaces on subsequent storage system reboots.

Network interface configuration | 29

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 30: Network Management Guide

You can use the ifconfig command to change values of parameters for a network interface whenyour storage system is operating. However, such changes are not automatically included in the /etc/rcfile. If you want your configuration modifications to be persistent after a reboot, you must include theifconfig command values in the /etc/rc file.

Next topics

Configuring an IP address for a network interface on page 30

Specifying a subnet mask for a network interface on page 31

Specifying the prefix length for a network interface on page 31

Specifying a broadcast address on page 32

Specifying a media type for a network interface on page 32

Specifying an MTU size for a network interface on page 33

Specifying the flow control type for a network interface on page 33

Specifying whether a network interface is trusted on page 34

Specifying the partner IP address in an HA pair on page 35

Specifying the partner interface in an HA pair on page 35

Enabling or disabling automatic takeover for a network interface on page 36

Removing a primary IP address from a network interface on page 36

Viewing network interface settings from the command-line interface on page 37

Configuring an IP address for a network interfaceYou can use the ifconfig command to configure an IP address for a network interface.

About this task

By default, your storage system creates a network mask based on the class of the address (Class A, B,C, or D).

Step

1. To configure an IP address for a network interface, enter the following command:

ifconfig interface_name IP_address

interface_name is the name of the network interface.

IP_address is the IP address that you want to assign to the network interface.

Example

To configure a quad-port Ethernet interface e3a to use the IPv4 address 192.0.2.10, enter thefollowing command:

ifconfig e3a 192.0.2.10

30 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 31: Network Management Guide

Specifying a subnet mask for a network interfaceYou can specify a subnet mask for a network interface by using the ifconfig command. You mustspecify a subnet mask if you have created subnets that do not match the class boundary of the IPv4address of the network interface.

About this task

Step

1. To specify a subnet mask, enter the following command:

ifconfig interface_name netmask mask

interface_name is the name of the network interface.

mask is the subnet mask.

Example

To configure a 24-bit mask for the interface e3a configured in the previous example, enter thefollowing command:

ifconfig e3a netmask 255.255.255.0

Specifying the prefix length for a network interfaceYou can specify the prefix length for a network interface by using the ifconfig command. Prefixlength specifies the number of bits in the IP address that are to be used as the subnet mask.

About this task

For an IPv4 address, the prefix length must be less than or equal to 32 bits.

Step

1. To specify the prefix length, enter the following command:

ifconfig interface_name ip_address prefixlen length

ip_address is the IP address assigned to the network interface.

length is the prefix length for the network interface.

Example

To configure a prefix length of 24 bits, enter the following command:

Network interface configuration | 31

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 32: Network Management Guide

ifconfig e0a 192.0.2.16 prefixlen 24

Specifying a broadcast addressYou can specify a broadcast address by using the ifconfig command. You can use the broadcastaddress to send a message to all the machines on a subnet.

Step

1. To specify a broadcast address, enter the following command:

ifconfig interface_name broadcast address

interface_name is the name of the network interface.

address is the broadcast address.

Example

To set a broadcast address of 192.0.2.25 for the network 192.0.2.10 with subnet mask255.255.255.0, enter the following command:

ifconfig e3a broadcast 192.0.2.25

Specifying a media type for a network interfaceYou can use the ifconfig command to specify a media type for configuring the speed and duplex ofa network interface.

Step

1. To specify a media type, enter the following command:

ifconfig interface_name mediatype type

interface_name is the name of the network interface.

type specifies the Ethernet media type used. The possible values are tp, tp-fd, 100tx, 100tx-fd,auto, and 10g-sr.

For more information, see the na_ifconfig(1) man page.

Example

To configure the interface e2a as a 100Base-TX full-duplex interface, enter the followingcommand:

32 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 33: Network Management Guide

ifconfig e2a mediatype 100tx-fd

Specifying an MTU size for a network interfaceYou can specify the maximum transmission unit (MTU) size for transmission between your storagesystem and its client. The MTU size is used to specify the jumbo frame size on Gigabit Ethernetinterfaces.

Step

1. To specify an MTU size, enter the following command:

ifconfig interface_name mtusize size

interface_name is the name of the network interface.

size is the MTU to be used for the network interface.

Example

To specify an MTU size of 9000 for Gigabit Ethernet interface e8, enter the following command:

ifconfig e8 mtusize 9000

Related concepts

What jumbo frames are on page 25

Specifying the flow control type for a network interfaceYou can use the ifconfig command to specify the flow control type for a network interface to managethe flow of frames between two directly connected link-partners.

Step

1. To specify the flow control, enter the following command:

ifconfig interface_name flowcontrol value

interface_name is the name of the network interface.

value is the flow control type.

Example

To turn off flow control on interface e8, enter the following command:

ifconfig e8 flowcontrol none

Network interface configuration | 33

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 34: Network Management Guide

Related concepts

Flow control on page 27

Flow control options

You can use the flowcontrol option of the ifconfig command to view and configure flow controlsettings. You can also use the ifstat command to view the operational flow control setting. If youdo not specify the flowcontrol option when configuring a network interface, the configured flowcontrol uses full, the default value.

You can configure flow control on interfaces operating at or above 1,000 Mbps.

The configured flow control setting is advertised during autonegotiation. If autonegotiation succeeds,the operational flow control setting is determined based on the negotiated speed and the value advertisedby the other device. If autonegotiation fails, the configured flow control setting is used.

The following table describes the values you can specify for the flowcontrol option.

DescriptionFlow control value

No flow controlnone

Able to receive flow control framesreceive

Able to send flow control framessend

Able to send and receive flow control framesfull

Specifying whether a network interface is trustedYou can specify whether a network interface is trustworthy or untrustworthy by using the ifconfigcommand. When you specify an interface as untrusted (untrustworthy), any packets received on theinterface are likely to be dropped. For example, if you run a ping command on an untrusted interface,the interface drops any ICMP response packet received.

Step

1. To specify a network interface as trusted or untrusted, enter the following command:

ifconfig interface_name {trusted|untrusted}

interface_name is the name of the network interface.

trusted specifies that the network interface is trustworthy.

untrusted specifies that the network interface is untrustworthy.

34 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 35: Network Management Guide

Example

To specify that the network attached to interface e8 is not trustworthy for firewall security, enterthe following command:

ifconfig e8 untrusted

Specifying the partner IP address in an HA pairIn an HA pair, you can assign a partner IP address to a network interface by using the ifconfigcommand. The network interface takes over this IP address when a failover occurs.

Step

1. To assign the partner IP address, enter the following command:

ifconfig interface_name partner address

interface_name is the name of the network interface.

address is the partner IP address.

Example

To specify the IP address on the partner interface that takes over the interface e8 in the case ofa failover, enter the following command:

ifconfig e8 partner 192.0.2.10

Specifying the partner interface in an HA pairIn an HA pair, you can assign the name of a partner interface by using the ifconfig command. Thepartner interface takes over the network interface when a failover occurs.

Step

1. To specify a partner interface name, enter the following command:

ifconfig interface_name partner partner_interface

interface_name is the name of the network interface.

partner_interface is the name of the partner network interface.

Network interface configuration | 35

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 36: Network Management Guide

Example

To specify e3 as the interface for the HA pair partner that takes over the interface e8 when e8fails, enter the following command:

ifconfig e8 partner e3

Enabling or disabling automatic takeover for a network interfaceYou can enable or disable negotiated failover for a network interface by using the nfo option of theifconfig command. Therefore, you can configure the interface to trigger automatic takeover if theinterface experiences a persistent failure. You must include the nfo option in the /etc/rc file for itto persist across reboots.

Before you begin

You must enable takeover on interface failures by entering the following command:

options cf.takeover.on_network_interface_failure enable

About this task

A network interface that is a part of an interface group cannot use the nfo option.

Step

1. To enable or disable negotiated failover, enter the following command:

ifconfig interface_name {nfo|-nfo}

interface_name is the name of the network interface.

nfo—Enables negotiated failover

-nfo—Disables negotiated failover

Example

To enable negotiated failover on the interface e8 of an HA pair, enter the following command:

ifconfig e8 nfo

Removing a primary IP address from a network interfaceYou can remove a primary IP address from a network interface to disconnect the network interfacefrom the network or reconfigure the network interface.

36 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 37: Network Management Guide

About this task

You can remove a primary address only after removing all the manually configured alias addresses forthe interface.

Step

1. To remove a primary IP address, enter the following command:

ifconfig interface_name 0

interface_name is the name of the network interface.

Alternatively, to remove a primary IPv4 address, you can use the following command:

ifconfig interface_name 0.0.0.0

Example

To remove the primary address of the interface e3, enter the following command:

ifconfig e3 0

Viewing network interface settings from the command-line interfaceYou can view the network interface settings by using your storage system command-line interface.

Step

1. Depending on the network interface settings that you want to view, complete the following step:

Enter the following command...If you want to view...

ifconfig -aAll interfaces

ifconfig interface_nameA specific interface

How to configure aliases for a network interfaceYou can create an alias, which is an alternative IP address for an interface, when you change the IPaddress of an interface to a new address. You can use the alias to continue accepting packets to the oldIP address.

There are two alias options available for the ifconfig command:

• alias—Establishes an alternative IP address for an interface.

• -alias—Removes an alternative IP address for an interface.

Network interface configuration | 37

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 38: Network Management Guide

You can use the alias option from the command-line interface. However, the IP address that isconfigured using the alias option is lost if the storage system reboots. If you want to make thesechanges persistent, include them in the /etc/rc file for the root volume.

Note: You cannot use FilerView to manage aliases.

You cannot set up an IP address and an alias for an interface with one ifconfig command. You mustconfigure the IP address for the interface before setting up the alias.

The -alias option is useful when you want to stop using an IP address originally configured for aninterface, but do not want to reboot your storage system. To make the changes due to the -alias optionpersistent, include them in the /etc/rc file of the root volume.

Creating or removing aliasesYou can create or remove an alias if you are changing the IP address of an interface. You should usethe alias command to create an alias IP address, and use the -alias command to remove an alias IPaddress.

Step

1. To create or remove an alias, enter the following command:

ifconfig interface_name [-]alias address

Example

The following example creates the alias IP address 192.0.2.30 for the interface e0 (alreadyconfigured with IP address 192.0.2.21):

ifconfig e0 alias 192.0.2.30

The following example removes the 192.0.2.30 alias for the interface e0 specified in the previousexample:

ifconfig e0 -alias 192.0.2.30

How to change the status of a network interfaceSometimes you have to make an interface inactive before you can perform certain tasks and then makeit active again after you complete a task. You can do make an interface active or inactive by using theup or down option in the ifconfig command.

You need to change the interface status before you perform the following tasks:

• Install a new interface

38 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 39: Network Management Guide

• Upgrade an interface

• Troubleshoot network connectivity issues

• Disable a failed interface

Changing the status of an interfaceYou can change the status of an interface to active or inactive by using the ifconfig command.

Step

1. To change the status of an interface, enter the following command:

ifconfig interface {up|down}

up—makes the interface active

down—makes the interface inactive

Viewing and modifying network interface settings usingFilerView

The FilerView graphical interface allows you to view or modify the network settings for your storagesystem.

About this task

When you use FilerView to make changes, they are automatically written to the /etc/rc file.

Steps

1. In FilerView, click Network in the list on the left pane.2. In the list under Network, click Manage Interfaces.3. Depending on whether you want to view or modify the configuration settings, do one of the following:

Then...If you want to...

Click Show All Interface Details.View interface configuration details

Select an interface and click Modify.Modify an interface configuration

Network interface configuration | 39

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 40: Network Management Guide

How to block protocols on network interfacesYou can use the interface.blocked.protocol option to configure storage system network interfacesto block specified network protocols including CIFS, iSCSI, FTP, or NFS on selected network interfaces.

Blocking protocols from network interfacesYou can use the options interface command to block a specified protocol on a network interface.You can also remove a protocol block from a network interface.

Step

1. To block or unblock protocols from network interfaces, perform one of the following steps:

Then, enter the following command...If you want to...

optionsinterface.blocked.protocol_name interface_name

protocol_name is the protocol that you want to block.

interface_name is the interface on which you want to block the protocol.

For example, if you want to block the interface e9 from using the CIFSprotocol, use the following command:

options interface.blocked.cifs e9

Block a protocol from anetwork interface

optionsinterface.blocked.protocol_name interface_name,interface_name,...interface_name

For example, to block the CIFS protocol from the interfaces e0a and e0b,use the following command:

options interface.blocked.cifs e0a,e0b

Block a protocol from multiplenetwork interfaces

40 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 41: Network Management Guide

Then, enter the following command...If you want to...

optionsinterface.blocked.protocol_name interface_name

Note: To block multiple protocols from a single interface, you need torepeat the command for each protocol.

For example, you can use the following commands to block NFS, CIFS, andFTP from the interface e0a:

options interface.blocked.nfs e0a

options interface.blocked.cifs e0a

options interface.blocked.ftpd e0a

Block multiple protocols froma network interface

options interface.blocked.protocol_name ""

For example, use the following command to remove any blocks for CIFS:

options interface.blocked.cifs ""

Remove a protocol block

Network interface information you can viewYou can view the statistics about the status and performance of your network interfaces. Data ONTAPprovides several commands that you can use to display this information.

The following table lists these commands and the information they display.

Information displayedCommand

• Interface status (up or down)

• Configuration parameters

ifconfig -a

• Packets sent and received

• Collisions and other errors

• Negotiated media type settings between storage system interfaces andlink partners

ifstat

Network interface configuration | 41

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 42: Network Management Guide

Information displayedCommand

• Active sockets for each protocol

• Memory buffer (mbuf) pool usage

• Protocol-specific statistics for all protocols or a single protocol

• Cumulative or continuous packet traffic for all interfaces or a singleinterface

• Routing tables

netstat

For more information, see the man pages for these commands.

You can also use FilerView to view selected interface and routing information.

Next topics

Viewing statistics of all active TCP connections on page 42

How to view network interface statistics on page 44

Viewing or clearing network interface statistics using the command-line interface on page 44

Viewing network interface information with FilerView on page 47

Viewing statistics of all active TCP connectionsYou can view the mapping network context of each TCP connection and the number of bytes of datasent and received over each TCP connection by using the netstat command.

Step

1. Depending on the statistics that you want to view, do one of the following:

Then, enter the following command...If you want to view the...

netstat -aMMapping context of each TCP connection

netstat -aBNumber of bytes of data sent and received over each TCPconnection

Example

The following example shows the output of the netstat -aM command:

netstat -aMActive TCP connections (including servers)Ctx Local Address Remote Address Swind Send-Q Rwind Recv-Q State lg *.443 *.* 0 0 0 0 LISTEN lg *.22 *.* 0 0 0 0 LISTEN lg *.10568 *.* 0 0 0 0 LISTEN lg *.10569 *.* 0 0 0 0 LISTEN lg *.10567 *.* 0 0 0 0 LISTEN

42 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 43: Network Management Guide

lg *.10571 *.* 0 0 0 0 LISTEN lg *.8514 *.* 0 0 0 0 LISTEN lg *.514 *.* 0 0 0 0 LISTEN lg *.23 *.* 0 0 0 0 LISTEN lg *.8023 *.* 0 0 0 0 LISTEN lg *.4047 *.* 0 0 0 0 LISTEN lg *.4045 *.* 0 0 0 0 LISTEN lg *.4046 *.* 0 0 0 0 LISTEN lg *.2049 *.* 0 0 0 0 LISTEN lg *.111 *.* 0 0 0 0 LISTEN lg *.28073 *.* 0 0 0 0 LISTEN lg *.32243 *.* 0 0 0 0 LISTEN lg *.22899 *.* 0 0 0 0 LISTEN 1 192.168.1.72.2049 192.168.1.36.800 33952 328 26280 0 ESTABLISHED lg *.2049 *.* 0 0 0 0 LISTEN

Active UDP sockets (including servers)Local Address Remote Address Send-Q Recv-Q*.10570 *.* 0 0*.69 *.* 0 0*.161 *.* 0 0*.4049 *.* 0 0*.4047 *.* 0 0*.4045 *.* 0 0*.4046 *.* 0 0*.2049 *.* 0 0*.111 *.* 0 0*.21566 *.* 0 0*.520 *.* 0 0

The following example shows the output of the netstat -aB command:

netstat -aBActive TCP connections (including servers)Local Address Remote Address Swind Send-Q Rwind Recv-Q State Sent Rcvdlocalhost-20.1023 localhost-10.671 65535 0 8760 0 ESTABLISHED 0 0 localhost-20.8514 localhost-10.626 66608 1 8760 0 ESTABLISHED 1 44 localhost-20.18576 localhost-10.7951 66608 0 8760 0 ESTABLISHED 9284 606K *.10568 *.* 0 0 0 0 LISTEN 0 0 *.10569 *.* 0 0 0 0 LISTEN 0 0 *.10567 *.* 0 0 0 0 LISTEN 0 0 *.22 *.* 0 0 0 0 LISTEN 0 0 *.443 *.* 0 0 0 0 LISTEN 0 0 *.8514 *.* 0 0 0 0 LISTEN 0 0 *.514 *.* 0 0 0 0 LISTEN 0 0 *.23 *.* 0 0 0 0 LISTEN 0 0 *.8023 *.* 0 0 0 0 LISTEN 0 0 *.32243 *.* 0 0 0 0 LISTEN 0 0 *.22899 *.* 0 0 0 0 LISTEN 0 0

Active UDP sockets (including servers)Local Address Remote Address Send-Q Recv-Q*.10570 *.* 0 0

Network interface configuration | 43

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 44: Network Management Guide

*.69 *.* 0 0*.161 *.* 0 0

How to view network interface statisticsYou can view the statistics that are maintained by the networking code, the network adapter, or thenetwork driver by using the ifstat command. The ifstat command displays these statistics that aregathered either from the time of the last reboot or from the last time you cleared them.

If you use the ifstat command on a storage system that is part of an HA pair, the resulting informationpertains only to the storage system on which the command was run. The information does not includestatistics for the high availability partner node.

The output of the ifstat command might contain various information, because different types ofinterfaces—for example, Ethernet or Gigabit Ethernet—generate different types of statistics.

Related references

Statistics for Gigabit Ethernet controller VI, VII, and G20 interfaces on page 141

Statistics for the BGE 10/100/1000 Ethernet interface on page 148

Statistics for Gigabit and 10 Gigabit Ethernet controllers T204, T210, and T320interfaces on page 145

Viewing or clearing network interface statistics using the command-lineinterface

You can use the ifstat command to view the cumulative statistics of packets received and sent on aspecified network interface or on all network interfaces. You can also use the ifstat command toclear the statistics.

About this task

• The ifstat command displays the cumulative network interface statistics that are gathered eitherfrom the time of the last reboot or from the last time you cleared them.

• In the takeover mode of an HA pair, the ifstat command displays the combined statistics of thepackets processed by the network interface on the local node and those on the partner node.Because the statistics displayed by the ifstat command are cumulative, a giveback does not causethe statistics to zero out.

Step

1. Depending on the statistics that you want to view, perform one of the following steps:

Then, enter the following command...If you want to...

ifstat -aView the network interface statistics of all interfaces

44 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 45: Network Management Guide

Then, enter the following command...If you want to...

ifstat interface_name

interface_name is the name of the networkinterface.

View the network interface statistics of a specificinterface

ifstat -z interface_nameClear the network interface statistics of a networkinterface

Example

To view the statistics of the network interface e0a, enter the following command:

ifstat e0a

An output similar to the following is displayed.

ifstat e0a

-- interface e0a (8 days, 20 hours, 10 minutes, 27 seconds) --

RECEIVE Frames/second: 13 | Bytes/second: 800 | Errors/minute: 0 Discards/minute: 0 | Total frames: 897k | Total bytes: 62415k Total errors: 0 | Total discards: 0 | Multi/broadcast: 734k No buffers: 0 | Non-primary u/c: 0 | Tag drop: 0 Vlan tag drop: 0 | Vlan untag drop: 0 | CRC errors: 0 Runt frames: 0 | Fragment: 0 | Long frames: 0 Jabber: 0 | Alignment errors: 0 | Bus overruns: 0 Queue overflows: 0 | Xon: 0 | Xoff: 0 Jumbo: 0 | Reset: 0 | Reset1: 0 Reset2: 0TRANSMIT Frames/second: 2 | Bytes/second: 110 | Errors/minute: 0 Discards/minute: 0 | Total frames: 153k | Total bytes: 24129k Total errors: 0 | Total discards: 0 | Multi/broadcast: 9478 Queue overflows: 0 | No buffers: 0 | Max collisions: 0 Single collision: 0 | Multi collisions: 0 | Late collisions: 0

Network interface configuration | 45

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 46: Network Management Guide

Timeout: 0 | Xon: 0 | Xoff: 0 Jumbo: 0LINK_INFO Current state: up | Up to downs: 0 | Auto: on Speed: 1000m | Duplex: full | Flowcontrol: none

The following command clears and reinitializes the statistics for the network interface e0a:

ifstat -z e0a

The following sample output shows the network interface statistics for the network interface e0aimmediately after the statistics are cleared.

ifstat e0a

-- interface e0a (0 hours, 0 minutes, 8 seconds) --

RECEIVE Frames/second: 1 | Bytes/second: 32 | Errors/minute: 0 Discards/minute: 0 | Total frames: 7 | Total bytes: 448 Total errors: 0 | Total discards: 0 | Multi/broadcast: 0 No buffers: 0 | Non-primary u/c: 0 | Tag drop: 0 Vlan tag drop: 0 | Vlan untag drop: 0 | CRC errors: 0 Runt frames: 0 | Fragment: 0 | Long frames: 0 Jabber: 0 | Alignment errors: 0 | Bus overruns: 0 Queue overflows: 0 | Xon: 0 | Xoff: 0 Jumbo: 0 | Reset: 0 | Reset1: 0 Reset2: 0TRANSMIT Frames/second: 1 | Bytes/second: 17 | Errors/minute: 0 Discards/minute: 0 | Total frames: 4 | Total bytes: 361 Total errors: 0 | Total discards: 0 | Multi/broadcast: 0 Queue overflows: 0 | No buffers: 0 | Max collisions: 0 Single collision: 0 | Multi collisions: 0 | Late collisions: 0 Timeout: 0 | Xon: 0 | Xoff: 0 Jumbo: 0LINK_INFO Current state: up | Up to downs: 0 | Auto:

46 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 47: Network Management Guide

on Speed: 1000m | Duplex: full | Flowcontrol: none

Viewing network interface information with FilerViewThe Network Report in FilerView displays selected network interface statistics and routing information.It provides the same information that you get by running the netstat -l, routed status, andnetstat -rn commands.

Steps

1. In FilerView, click Network from the left pane.2. In the list under Network, click Report.

Network interface configuration | 47

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 48: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 49: Network Management Guide

How routing in Data ONTAP works

You can have Data ONTAP route its own outbound packets to network interfaces. Although yourstorage system can have multiple network interfaces, it does not function as a router. However, it canroute its outbound packets.

Data ONTAP uses two routing mechanisms:

• Fast path: Data ONTAP uses this mechanism to route NFS packets over UDP and to route all TCPtraffic.

• Routing table: To route all other IP traffic, Data ONTAP uses the information available in the localrouting table.The routing table contains the routes that have been established and are currently in use, as well asthe default route specification.

Next topics

What fast path is on page 49

How to manage the routing table on page 50

How to specify the default route on page 52

How to enable or disable routing mechanisms on page 52

How to view the routing table and default route information on page 54

Modifying the routing table on page 56

What fast path isFast path is an alternative routing mechanism to the routing table. It provides advantages such as loadbalancing and improved storage system performance.

Fast path is enabled automatically on your storage system; however, you can disable it.

Using fast path provides the following advantages:

• Load balancing between multiple network interfaces on the same subnet.Load balancing is achieved by sending responses on the same interface of your storage system thatreceives the incoming requests.

• Increased storage system performance by skipping routing table lookups.

Next topics

How fast path works with NFS-over-UDP on page 50

How fast path works with TCP on page 50

How routing in Data ONTAP works | 49

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 50: Network Management Guide

How fast path affects Telnet sessions and the ping utility on page 50

Fast path not compatible with asymmetric routing on page 50

How fast path works with NFS-over-UDPNFS-over-UDP traffic uses fast path only when sending a reply to a request. The reply packet is sentout on the same network interface that received the request packet.

For example, a storage system named toaster uses the toaster-e1 interface to send reply packets inresponse to NFS-over-UDP requests received on the toaster-e1 interface.

How fast path works with TCPData ONTAP can use fast path on every TCP packet transmitted except the first SYN packet (if DataONTAP initiates a connection). The network interface that is used to transmit a packet is the sameinterface that received the last packet.

For TCP connections, if Data ONTAP detects that using fast path in a network setup is not optimal,fast path is turned off automatically.

How fast path affects Telnet sessions and the ping utilityIf fast path is enabled and the default router stops working, you cannot use the ping utility tocommunicate with your storage system. However, the Telnet sessions to your storage system can stillbe established from a non-local subnet. This happens because the ping utility uses routing table lookups.

Fast path not compatible with asymmetric routingIf fast path is enabled on your storage system in an asymmetric network, the destination MAC addressof the response packet will be that of the router that forwarded the incoming packet. However, inasymmetric networks, the router that forwards packets to your storage system is not the router thatforwards packets sent by the storage system. In such scenarios, you must disable fast path.

How to manage the routing tableYou can manage the routing table automatically by using the routed daemon, or manually by usingthe route command.

Next topics

What the routed daemon does on page 51

When the routed daemon should be turned off on page 51

Routing tables in a vFiler unit environment on page 51

Circumstances that might alter the routing table on page 52

50 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 51: Network Management Guide

What the routed daemon doesThe routed daemon performs several functions automatically and can be configured to perform severaladditional functions. The routed daemon is enabled by default.

The routed daemon performs the following functions by default:

• Deletes redirected routes after a specified period

• Performs router discovery with ICMP Router Discovery Protocol (IRDP)This is useful only if there is no static default route.

• Listens for Routing Information Protocol (RIP) packets

• Migrates routes to alternate interfaces when multiple interfaces are available on the same subnet

The routed daemon can also be configured to perform the following functions:

• Control RIP and IRDP behavior

• Generate RIP response messages that update a host route on your storage system

• Recognize distant gateways identified in the /etc/gateways file

For more information about the routed daemon, see the na_routed(1) man page.

When the routed daemon should be turned offIn some circumstances, you should turn off the routed daemon. For example, you should turn it offif you have multiple interfaces on the same subnet and you want to direct network traffic to specificinterfaces.

If you want to direct traffic to specific interfaces, you must turn off the routed daemon, because thedaemon sees all interfaces on a subnet as equivalent.

You can safely turn off the routed daemon if the following conditions are true:

• You do not use RIP or router discovery.

• You have a single router per subnet or a network in which redirects are not sent.

• You can manage your routing table directly.

Note: Unless you have specific routing needs and understand network routing configuration, youare advised to always keep the routed daemon on. Turning off the routed daemon might causeunexpected routing behavior.

Routing tables in a vFiler unit environmentIf you enable the MultiStore license, Data ONTAP disables the routed daemon. Therefore, routingtables in a vFiler unit environment must be managed manually with the route command.

How routing in Data ONTAP works | 51

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 52: Network Management Guide

All vFiler units in an IP address space share a routing table. Therefore, any commands that display ormanipulate the routing table apply to all vFiler units in that IPspace.

Circumstances that might alter the routing tableCertain events can cause the routing table to be modified. You should check the routing table after theseevents occur to be sure that it is still configured, as required.

The routing table might be modified in the following circumstances:

• A new interface is configured with the ifconfig command and there are no existing entries forthe new network number in the routing table.

• You use the route add command to add an entry to the routing table.

• Your storage system receives an ICMP redirect packet, which notifies the storage system of a betterfirst-hop router for a particular destination.

Note: Your storage system ignores ICMP redirect packets if theip.icmp_ignore_redirect.enable option is turned on.

• Your storage system is rebooted after the default route in the /etc/rc file is modified.

How to specify the default routeThe default route entry routes to destinations that are not listed in the routing table. You can specifythe default route in Data ONTAP either during initial setup or by modifying the /etc/rc file.

Example

The following example shows the default route being set in the /etc/rc file using the routeadd command:

hostname sys1

ifconfig e0 192.0.2.21 netmask 255.255.255.0 mediatype 100tx-fd

route add default 192.0.2.1 1

routed on

How to enable or disable routing mechanismsBoth the fast path mechanism and the routed daemon are enabled by default in Data ONTAP. Youcan enable or disable these routing mechanisms using the command-line interface or FilerView.

52 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 53: Network Management Guide

If you disable both fast path and the routed daemon, you must configure routing manually.

Next topics

Enabling or disabling fast path on page 53

Enabling or disabling the routed daemon from the command-line interface on page 53

Enabling or disabling the routed daemon with FilerView on page 53

Enabling or disabling fast pathYou can enable or disable fast path by using the options ip.fastpath.enable command.

Step

1. Enter the following command from the command-line interface:

options ip.fastpath.enable {on|off}

on—Enables fast path

off—Disables fast path

Note: You can use the -x option with the netstat command to check if the fast path mechanismis enabled.

Enabling or disabling the routed daemon from the command-line interfaceYou can turn on or turn off the routed daemon by using the routed command.

Steps

1. To enable or disable the routed daemon, enter the following command:

routed {on|off}

on—Turns on the routed daemon

off—Turns off the routed daemon

2. If you use the command-line interface, you must also edit the /etc/rc file in the root volume tospecify the same routed daemon behavior across storage system reboots.

Enabling or disabling the routed daemon with FilerViewYou can use FilerView to turn on or turn off the routed daemon.

Steps

1. In FilerView, click Network from the list on the left pane.

How routing in Data ONTAP works | 53

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 54: Network Management Guide

2. In the list under Network, click Configure.3. Select Yes (for on) or No (for off) from the Routed Enabled drop-down list.4. Click Apply.

How to view the routing table and default route informationYou can view the routing table of the storage system and default route information relating to yourroute's destinations, their gateways, how much each route is used, and the interface used by each route.Flags showing route status information are also displayed.

Next topics

Viewing the routing table from the command-line interface on page 54

Viewing the default route information from the command-line interface on page 55

Viewing the routing table and routing information by using FilerView on page 56

Viewing the routing table from the command-line interfaceYou can view the routing table by using the netstat -rn command or the route -s command.

Step

1. To view the Data ONTAP routing table, enter one of the following commands:

• netstat -rn

• route -s

Example

The output of the netstat -rn command is as follows:

netstat -rnRouting tables

Internet:Destination Gateway Flags Refs Use Interfacedefault 192.0.2.1 UGS 7 116009 e0a192.0.2/24 link#3 UC 0 0 e0a192.0.2.1 0:15:c6:bf:c6:44 UHL 1 0 e0a192.0.2.68 0:a0:98:7:66:2 UHL 0 1079 lo192.0.2.216 0:a0:98:7:3e:5 UHL 0 0 e0a192.0.2.217 0:a0:98:7:3e:5 UHL 0 0 e0a

54 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 55: Network Management Guide

192.0.2.255 ff:ff:ff:ff:ff:ff UHL 0 9470 e0a127.0.0.1 127.0.0.1 UH 0 11 lo

In this example, the destination can be a host 192.0.2.1, a network 192.0.2/24, or the defaultroute. If the destination is a subnet on a network, the network number is followed by a forwardslash (/) and a number that describes the network mask for that network.

Routing table flags

The following table describes the Flags column in the netstat -rn output.

DescriptionFlag

Up—Route is validU

Gateway—Route is to a gateway router rather than to a directly connected network or hostG

Host name—Route is to a host rather than to a network, where the destination address is a completeaddress

H

Reject—Set by ARP when an entry expires (for example, the IP address could not be resolved into aMAC address)

R

Dynamic—Route added by a route redirect or RIP (if routed is enabled).D

Modified—Route modified by a route redirectM

Cloning—A new route is cloned from this entry when it is usedC

Link—Link-level information, such as the Ethernet MAC address, is presentL

Static—Route added with the route commandS

Viewing the default route information from the command-line interfaceYou can view the default route information by using the routed status command. You can alsoview the default route by using the netstat -rn or route -s commands.

Step

1. Enter the following command:

routed status

The command output displays whether the routed daemon is turned on or off, default routeinformation, and routing protocols.

Example

The output of the routed status command is as follows:

How routing in Data ONTAP works | 55

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 56: Network Management Guide

routed statusRIP snooping is onGateway Metric State Time Last Heardexample-gateway.com 1 ALIVE Wed Mar 18 13:58:56 IST 20090 free gateway entries, 1 used

In the routed status command output, metric is the route property that is used to determinethe preferred route. The route with the lowest metric is the preferred route. You should alwaysuse a metric greater than 0 when adding default routes.

Viewing the routing table and routing information by using FilerViewYou can view the routing table, routing information, and routing protocols by using FilerView.

Steps

1. In FilerView, click Network in the list on the left pane.2. In the list under Network, click Report.

The Routing section of the Network Report shows the default route and protocols in effect, and thenshows routing tables.

Modifying the routing tableYou can use the route command to add or delete routes in your routing table, or remove all storagesystems from the routing table. You cannot modify the routing table using FilerView.

Step

1. Depending on whether you want to add or delete a route from the routing table, perform the followingstep:

Then, enter the following command...If you want to...

route add destination [gateway metric]

destination is the IP address or host name of the destination for which the routeis being added or deleted.

gateway is the gateway for the specified destination.

metric indicates the number of hops to the destination. The value of metricshould be greater than zero when the route to the destination is through the gateway.The value of metric is zero when the destination and gateway are in thesame subnet.

Add a route

56 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 57: Network Management Guide

Then, enter the following command...If you want to...

route delete destination [gateway metric]Delete a route

For more information about the route command and options, see the na_route(1) man page.

Example

To add a destination with an IP address 192.0.2.25 to the routing table, enter the followingcommand:

route add 192.0.2.25 gateway.com 1

You can verify that the route to this destination is added to the routing table by using the netstat-rn or route -s command, as shown in the following output:

netstat -rnRouting tables

Internet:Destination Gateway Flags Refs Use Interfacedefault 192.0.2.1 UGS 4 184855 e0a127.0.0.1 127.0.0.1 UH 0 0 lo192.0.2/24 link#11 UHL 2 1238 e0a192.0.2.1 0:d0:d3:0:30:0 UHL 0 40 e0a192.0.2.23 0:1:30:b8:30:c0 UHL 1 0 e0a192.0.2.25 192.0.2.1 UHL 0 1285 lo

How routing in Data ONTAP works | 57

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 58: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 59: Network Management Guide

How to maintain host-name information

Data ONTAP relies on correct resolution of host names to provide basic connectivity for storage systemson the network. If you are unable to access the storage system data or establish sessions, there mightbe problems with host-name resolution on your storage system or on a name server.

Host-name information can be maintained in one or all of the following ways in Data ONTAP:

• In the /etc/hosts file on your storage system's default volume

• On a Domain Name System (DNS) server

• On a Network Information Service (NIS) server

If you use more than one of the resources for host-name resolution, the order in which they are used isdetermined by the /etc/nsswitch.conf file.

Next topics

How the /etc/hosts file works on page 59

How to configure DNS to maintain host information on page 62

How to use dynamic DNS to update host information on page 65

How to use NIS to maintain host information on page 68

How to configure NIS with Data ONTAP interfaces on page 71

What NIS information you can view on page 74

Configuring DNS and NIS with FilerView on page 76

How to change the host-name search order on page 77

How the /etc/hosts file worksData ONTAP uses the /etc/hosts file to resolve host names to IP addresses. You need to keep the/etc/hosts file up-to-date. Changes to the /etc/hosts file take effect immediately.

When Data ONTAP is first installed, the /etc/hosts file is automatically created with default entriesfor the following interfaces:

• localhost

• All interfaces on your storage system

The /etc/hosts file resolves the host names for the storage system on which it is configured. Thisfile cannot be used by other systems for name resolution.

For more information about file formats, see the na_hosts(5) man page.

You can add IP address and host name entries in the /etc/hosts file in the following two ways:

How to maintain host-name information | 59

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 60: Network Management Guide

• Locally—You can add entries by using the command-line interface or FilerView.

• Remotely—If the file has many entries and you have access to an NIS makefile master, you can usethe NIS makefile master to create the /etc/hosts file. This method prevents errors that might becaused by editing the file manually.

Next topics

Adding a host name in the /etc/hosts file on page 60

Hard limits for the /etc/hosts file on page 61

Editing the /etc/hosts file with FilerView on page 61

Changing the host name of a storage system on page 61

Adding a host name in the /etc/hosts fileYou can add a host name and its aliases in the /etc/hosts file.

About this task

You can use the setup command to rewrite the /etc/hosts file.

Step

1. From a workstation that has access to your storage system, edit the /etc/hosts file. Add thefollowing line to the /etc/hosts file:

IP_address host_name aliases

IP_address is the IP address of the host.

host_name is the name of the host.

aliases are the alias names for the host.

Example

To add a host name, myhost, with an IP address 192.0.2.16, add the following line in the/etc/hosts file:

192.0.2.16 myhost newhost myhost-e0a

newhost and myhost-e0a are the alias names for myhost.

The following is a sample /etc/hosts file:

rdfile /etc/hosts#Auto-generated by setup Tue Apr 21 17:41:40 IST 2009127.0.0.1 localhost192.0.2.16 myhost myhost-e0a# 0.0.0.0 myhost-e0b

60 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 61: Network Management Guide

# 0.0.0.0 myhost-e0c# 0.0.0.0 myhost-e0d

Hard limits for the /etc/hosts fileYou need to be aware of the hard limits on the line size and number of aliases when you edit the/etc/hosts file.

The hard limits are as follows:

• Maximum line size is 1022 characters.The line size limit includes the end of line character. You can enter up to 1021 characters per line.

• Maximum number of aliases is 34.

Note: There is no limit on file size.

Editing the /etc/hosts file with FilerViewYou can add entries to the local /etc/hosts file if the number of entries is small.

Steps

1. In FilerView, click Network in the list on the left pane.2. In the list under Network, click Manage Hosts File.3. Click in the hosts window, then click Insert.4. Complete the fields in the Create a New /etc/hosts Line window for each host you want to add and

click OK.5. Click Apply in the Manage Hosts File window.

Changing the host name of a storage systemYou can change the host name of a storage system by editing the /etc/hosts file, and then using thehostname command.

Steps

1. Edit the /etc/hosts file to include the new host name of the storage system.2. Enter the following command to specify a new name for the host:

hostname new_name

new_name is the new host name of the storage system.

Note: Ensure that you complete both steps before rebooting the storage system. If you skip thesecond step, after rebooting the storage system, any manual or scheduled SnapMirror operations

How to maintain host-name information | 61

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 62: Network Management Guide

might fail. Use the hostname command to specify the correct name before any SnapMirroroperations are initiated.

How to configure DNS to maintain host informationYou can maintain host information centrally using DNS. With DNS, you do not have to update the/etc/hosts file every time you add a new host to the network. You can configure your storage systemto use one or more DNS servers either during the setup procedure or later, by using the command-lineinterface or FilerView.

If you have several storage systems on your network, maintaining host information centrally saves youfrom updating the /etc/hosts file on each storage system every time you add or delete a host.

If you configure DNS during the setup procedure, your storage system's DNS domain name and nameserver addresses are configured in one of the following ways:

• Automatically if you use Dynamic Host Configuration Protocol (DHCP) to configure onboardinterfaces. Automatic configuration is possible only if all the DHCP-configured DNS server addressesare IPv4 addresses.

• Manually if you do not use DHCP—you must enter the values when prompted. A maximum ofthree name server IP addresses can be specified for a DNS server.

If you configure DNS later, you must take the following actions:

• Specify DNS name servers.

• Specify the DNS domain name of your storage system.

• Enable DNS on your storage system.

You can enable DNS and set DNS configuration values in either of the following ways:

• Using FilerView

• Using the command-line interface

If you want to use primarily DNS for host-name resolution, you should specify it ahead of other methodsin the hosts section of the /etc/nsswitch.conf file.

Correct host-name resolution depends on correctly configuring of the DNS server. If you experienceproblems with host-name resolution or data availability, check the DNS server in addition to localnetworking.

For more information about storage system DNS resolution of host names, see the na_dns(1) andna_dns(8) man pages.

Next topics

Configuring DNS from the command-line interface on page 63

62 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 63: Network Management Guide

How DNS resolves host names on page 64

DNS name caching on page 64

DNS information you can view on page 64

Configuring DNS from the command-line interfaceYou can configure DNS by first creating or editing the /etc/resolv.conf file, then specifying theDNS domain name, and finally enabling DNS through the command-line interface.

Steps

1. Depending on whether you want to create or edit the /etc/resolv.conf file, perform the followingstep:

Then...If you are...

By using a text editor, create the /etc/resolv.conf file in the rootvolume. The file can consist of up to three lines, each specifying a nameserver host in the following format.

nameserver ip_address

ip_address is the IP address of the DNS name server.

Creating the/etc/resolv.conf file

From a workstation that has access to the root volume of your storagesystem, edit the /etc/resolv.conf file using a text editor.

Editing the/etc/resolv.conf file

2. Enter the following command to specify the DNS domain name:

options dns.domainname domain

domain is the new domain name, which follows the host name of your storage system in the fullyqualified domain name.

3. Enter the following command to enable DNS:

options dns.enable {on|off}

on—Enables DNS

off—Disables DNS

Hard limits for the /etc/resolv.conf file

You need to be aware of the hard limits for name servers, domain name, and search domains when youcreate or edit the /etc/resolv.conf file.

The hard limits for the /etc/resolv.conf file are as follows:

• Maximum line size is 256.

• Maximum number of name servers is 3.

How to maintain host-name information | 63

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 64: Network Management Guide

• Maximum domain name length is 256.

• Maximum search domains limit is 6.

• Total number of characters for all search domains is 256.

Note: There is no limit on file size.

How DNS resolves host namesDNS uses certain records for resolving a domain name to an IP address. To determine a host namebased on the IP address, DNS uses the reverse lookup.

For resolving IPv4 addresses, DNS uses A record. The A record can store a 32-bit address and canresolve IPv4 addresses.

IPv4 reverse DNS lookups use the in-addr.arpa domain. An IPv4 address is represented in thein-addr.arpa domain by a sequence of bytes, represented as decimal numbers, in reverse order. Thenumbers are separated by dots and end with the suffix .in-addr.arpa.

Example

Reverse lookup domain nameIP address

10.2.0.192.in-addr.arpa192.0.2.10

DNS name cachingDNS name caching speeds up the process whereby the DNS name resolver converts host names intoIP addresses. The DNS name cache stores DNS requests so that they can be easily and quickly foundwhen needed. DNS name caching is enabled by default.

Name caching improves DNS performance during a name server failover and reduces the time neededfor an HA pair takeover and giveback.

You can disable DNS name caching by using the dns.cache.enable option, but doing so might havean adverse performance impact. The dns flush command removes all entries from the DNS namecache. However, the command has no effect if DNS name caching is not enabled. For more informationabout the dns flush command and the dns.cache.enable option, see the na_ dns(1) man page.

DNS information you can viewYou can view information about whether DNS and DNS name caching are enabled, configured nameservers, state of these name servers (whether up or down), configured DNS domain name, DNS namecache statistics, and performance statistics for each name server.

The dns info command displays the status of the DNS resolver. If DNS is enabled, the commanddisplays the following information:

64 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 65: Network Management Guide

• Whether DNS is enabled

• Whether DNS name caching is enabled

• Caching statistics

• Cache hits: Number of DNS requests that were found in the cache

• Cache misses: Number of DNS requests that were not found in the cache and that required aDNS query to the name server

• Cache entries: Number of entries currently in the DNS name cache

• Expired cache entries

• Number of cache replacements

• Details about each name server that was polled by your storage system:

• IP address of the DNS server

• State of the name server, displayed as "UP," "DOWN," or "NO INFO"

• Date of the last DNS request to that name server

• Average time in milliseconds for a DNS query

• Number of DNS queries made

• Number of DNS queries that resulted in errors

• Default DNS domain name of the storage system

• Search domains of the storage system

The search domains are domain suffixes that are used to convert unqualified domain names into fullyqualified domain names (FQDN). The search domains are read from the /etc/resolv.conf file.

For more information about the dns info command and the resulting display, see the na_ dns(1) manpage.

How to use dynamic DNS to update host informationYou can use dynamic DNS updates to prevent errors and save time when sending new or changed DNSinformation to the primary master DNS server for your storage system's zone. Dynamic DNS allowsyour storage system to automatically send information to the DNS servers as soon as the informationchanges on the system.

Without dynamic DNS updates, you must manually add DNS information (DNS name and IP address)to the identified DNS servers when a new system is brought online or when existing DNS informationchanges. This process is slow and error-prone. In a disaster-recovery situation, manual configurationcan result in a long downtime.

How to maintain host-name information | 65

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 66: Network Management Guide

For example, if you want to change the IP address on interface e0 of storagesystem1, you can simplyconfigure e0 with the new IP address. The storage system storagesystem1 automatically sends itsupdated information to the primary master DNS server.

Note: Data ONTAP supports a maximum of 64 Dynamic Domain Name Server (DDNS) aliases.

Next topics

How dynamic DNS updates work in Data ONTAP on page 66

Support for dynamic DNS updates in Data ONTAP on page 66

Enabling or disabling dynamic DNS updates on page 67

Disabling the transmission of DNS updates for an IP address on page 67

Changing the time-to-live setting for DNS entries on page 68

How dynamic DNS updates work in Data ONTAPIf dynamic DNS updates are enabled on your storage system, Data ONTAP periodically sends updatesto the primary master DNS server for its zone. Updates are also sent if any DNS information changeson your system.

Your storage system finds the primary master DNS server for its zone by querying the DNS serversconfigured in your storage system's /etc/resolv.conf file. The primary master DNS server mightbe different from the ones configured in your storage system's /etc/resolv.conf file.

By default, periodic updates are sent every 12 hours. A time-to-live (TTL) value is assigned to everyDNS update sent from your storage system. The TTL value defines the time for which a DNS entry isvalid on the DNS server. By default, the TTL value is set to 24 hours, and you can change it.

When your storage system sends an update to the DNS server, it waits up to five minutes to receive anacknowledgement of the update from the server. If it does not receive an acknowledgement, the storagesystem sends the update again. This time, the storage system doubles the waiting interval (to 10 minutes),before sending the update. The storage system continues to double the waiting interval with each retryuntil a waiting interval of 160 minutes or TTL/2, whichever is less, is reached.

Support for dynamic DNS updates in Data ONTAPCertain conditions apply when you are using dynamic DNS updates in Data ONTAP.

The following conditions apply to dynamic DNS updates:

• By default, dynamic DNS updates are disabled in Data ONTAP.

• Dynamic DNS updates are supported on UNIX and Windows systems.

• On Windows DNS servers, secure dynamic DNS updates can be used to prevent malicious updateson the DNS servers. Kerberos is used to authenticate updates.Even if secure dynamic DNS updates are enabled, your storage system initially tries sending updatesin clear text. If the DNS server is configured to accept only secure updates, the updates sent in cleartext are rejected. Upon rejection, the storage system sends secure DNS updates.

66 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 67: Network Management Guide

• For secure dynamic DNS updates, your storage system must have CIFS running and must be usingWindows Domain authentication.

• Dynamic DNS updates can be sent for the following:

• Physical interfaces

• Interface group and VLAN interfaces

• vFiler units

• You cannot set TTL values for individual vFiler units. All vFiler units inherit the TTL value that isset for vfiler0, which is the default vFiler unit and is the same as the physical storage system.

• DHCP addresses cannot be dynamically updated.

• In a takeover situation, the hosting storage system is responsible for sending DNS updates for IPaddresses for which it is responding.

Enabling or disabling dynamic DNS updatesYou can enable or disable dynamic DNS on your storage system by using the optionsdns.update.enable command.

Step

1. Enter the following command:

options dns.update.enable {on|off|secure}

on—Enables dynamic DNS updates

off—Disables dynamic DNS updates

secure—Enables secure dynamic DNS updates

Note: Secure dynamic DNS updates are supported for Windows DNS servers only.

Disabling the transmission of DNS updates for an IP addressYou can disable the sending of dynamic DNS updates for an IP address by using the ifconfigcommand.

About this task

You should not disable dynamic DNS updates for an interface that is a part of an interface group.

Step

1. Enter the following command:

ifconfig interface_name no_ddns IP_address

How to maintain host-name information | 67

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 68: Network Management Guide

interface_name is the name of the interface.

IP_address is the IP address of the interface.

Example

You can use the following command to ensure that dynamic DNS updates are not sent from theinterface, e0a:

ifconfig e0a no_ddns 192.0.2.30

The following output shows the output of the ifconfig command after the dynamic DNS isdisabled for the interface:

ifconfig e0ae0a: flags=0x2d48867<UP,BROADCAST,RUNNING,MULTICAST,TCPCKSUM> mtu 1500inet 192.0.2.30 netmask 0xff000000 broadcast 10.255.255.255 noddnsether 00:a0:98:07:66:02 (auto-1000t-fd-up) flowcontrol full

The ifconfig command output shows the keyword noddns that indicates that dynamic DNSupdates are disabled for this IP address.

Changing the time-to-live setting for DNS entriesYou can change the time-to-live setting for DNS entries by using the options dns.update.ttlcommand.

Step

1. Enter the following command:

options dns.update.ttl time

time can be set in seconds (s), minutes (m), or hours (h), with a minimum value of 600 secondsand a maximum value of 24 hours.

Example

To set the TTL to two hours, enter the following command:

options dns.update.ttl 2h

How to use NIS to maintain host informationSimilar to DNS, NIS enables you to centrally maintain host information. In addition, NIS enables youto maintain user information.

68 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 69: Network Management Guide

NIS provides the following methods for resolving the storage system's host name:

• Using the /etc/hosts file on the NIS server, which you can download to your storage system'sdefault volume for local host-name lookup.

• Using a hosts map, maintained as a database on the NIS server, which your storage system queriesin a host lookup request across the network.

Next topics

How using NIS slaves can improve performance on page 69

How an NIS master is selected on page 69

Creating /etc/hosts from the NIS master on page 70

Guidelines for using NIS slaves on page 70

NIS administrative commands on page 71

How using NIS slaves can improve performanceYou can improve the performance of your storage system by using an NIS slave. Host-name resolutionby using a hosts map can have a performance impact because each query for the hosts map is sent acrossthe network to the NIS server.

The NIS slave improves performance by establishing contact with an NIS master server and performingthe following two tasks:

• Downloading the maps from the NIS master serverYou can download the maps from the NIS master server to the NIS slave by running the yppushcommand from the NIS server. You can also download the maps by disabling and then enablingthe NIS slave from your storage system. After the maps are downloaded, they are stored in the/etc/yp/nis_domain_name directory. The NIS slave then services all the NIS requests fromyour storage system by using these maps. The NIS slave checks the NIS master every 45 minutesfor any changes to the maps. If there are changes, they are downloaded.

• Listening for updates from the NIS masterWhen the maps on the NIS master are changed, the NIS master administrator can optionally notifyall slaves. Therefore, in addition to periodically checking for updates from the NIS master, the NISslave also listens for updates from the master.

You cannot configure the NIS slave during the setup procedure. To configure the NIS slave after thesetup procedure is complete, you need to enable NIS slave by setting options nis.slave.enableto on.

Note: The NIS slave does not respond to remote NIS client requests and therefore cannot be usedby other NIS clients for name lookups.

How an NIS master is selectedIf you enable the NIS slave on your storage system, the NIS servers listed with the nis.serversoption are contacted to determine the master NIS server.

How to maintain host-name information | 69

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 70: Network Management Guide

The NIS master can be different from the servers that are listed with the nis.servers option. In sucha case, the servers listed with the nis.servers option inform the slave about the master server.

The NIS slave on your storage system can contact the master only if any one the following conditionsis true:

• The NIS server has an entry in the hosts map for the master.

• The /etc/hosts file on your storage system is able to resolve the IP address of the master.

Creating /etc/hosts from the NIS masterYou can create a host file remotely and modify the NIS master to install the host file in the /etcdirectory. This method is useful if you have many entries in your host file.

Steps

1. On the NIS server, open the NIS Makefile with a text editor.2. Locate the section for hosts.time.3. Add the following lines at the end of the hosts.time section, replacing dirname with a directory

name of your choice, and toaster 1, toaster2, and so on with names of the storage systems:

@mntdir=/tmp/dirname_etc_mnt_$$$$;\ if [ ! -d $$mntdir ]; then rm -f

$$mntdir; \ mkdir $$mntdir; fi;\ for s_system in toaster1 toaster2 toaster3

; do \ mount $$s_system:/etc $$mntdir;\ mv $$mntdir/hosts

$$mntdir/hosts.bak;\ cp /etc/hosts $$mntdir/hosts;\ umount $$mntdir;\

done;\ rmdir $$mntdir

4. Save the NIS Makefile.

The /etc/hosts file on your storage system is updated whenever the NIS Makefile is run.

Related concepts

How the /etc/hosts file works on page 59

Guidelines for using NIS slavesYou should keep certain guidelines in mind when using an NIS slave.

The following guidelines apply when using the NIS slave:

• The root volume of your storage system must have sufficient space to download maps for the NISslave. Typically, the space required in the root volume is same as the size of the maps on the NISserver.

• If the root volume does not have enough space to download maps, the following occurs:

• An error message is displayed informing you that the space on the disk is not sufficient todownload or update the maps from the NIS master.

70 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 71: Network Management Guide

• If the maps cannot be downloaded, the NIS slave is disabled. Your storage system switches tousing hosts map on the NIS server for name resolution.

• If the maps cannot be updated, your storage system continues to use the old maps.

• If the NIS master server was started with the -d option or if the hosts.byname and hosts.byaddrmaps are generated with the -b option, your storage system must have DNS enabled, DNS serversmust be configured, and the hosts entry in the /etc/nsswitch.conf file must contain DNS as anoption to use for host name lookup.

If you have your NIS server configured to perform host name lookups using DNS, or if you use DNSto resolve names that cannot be first resolved using the hosts.by* maps, using the NIS slave causesthose lookups to fail. This is because when the NIS slave is used, all lookups are performed locallyusing the downloaded maps. However, if you configure DNS on your storage system as describedpreviously, the lookups succeed.

You can use the NIS slave for the following:

• Interface groups and VLAN interfaces

• vFiler units

• HA pairs

Note: In an HA pair, you should ensure that the nis.servers options value is the same on bothnodes and that the /etc/hosts file on both nodes can resolve the name of the NIS master server.

NIS administrative commandsYou can use the NIS administrative commands to view the NIS server information.

Data ONTAP supports the standard NIS administrative commands listed in the following table. Formore information, see each command's man page.

FunctionCommand

Prints an entire NIS map.ypcat

Displays the NIS group cache entries.ypgroup

Looks up specific entries in an NIS map.ypmatch

Returns the name of the current NIS server.ypwhich

How to configure NIS with Data ONTAP interfacesYou can configure your storage system to use one or more NIS servers either during the setup procedureor later using the Data ONTAP command-line interface or FilerView.

How to maintain host-name information | 71

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 72: Network Management Guide

If you want to use primarily NIS for host-name resolution, specify it ahead of other methods in thehosts map in the /etc/nsswitch.conf file.

To configure NIS, you need to do all of the following:

• Specify the NIS server to which your storage system should bind

• Specify the NIS domain name of your storage system

• Enable NIS on your storage system

Correct host-name resolution depends on correctly configuring the NIS server. If you experienceproblems with host-name resolution or data availability, check the NIS server in addition to localnetworking.

For more information about your NIS client, see the na_nis(1) and na_nis(8) man pages.

Next topics

Enabling or disabling NIS using the command-line interface on page 72

Specifying the NIS domain name on page 72

Specifying NIS servers to bind to your storage system on page 73

Enabling an NIS slave on your storage system on page 73

Enabling or disabling NIS using the command-line interfaceYou can enable or disable NIS using the command-line interface.

Step

1. Enter the following command:

options nis.enable {on|off}

on—Enables NIS

off—Disables NIS

Specifying the NIS domain nameYou might want to specify the NIS domain name to which your storage system belongs.

Step

1. Enter the following command:

options nis.domainname domain

domain is the NIS domain name to which your storage system belongs. For example, typical NISdomain names might be sales or marketing. The NIS domain name is usually not the same asthe DNS domain name.

72 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 73: Network Management Guide

Specifying NIS servers to bind to your storage systemYou can specify an ordered list of NIS servers to which you want your storage system to bind. The listshould begin with the closest NIS server (closest in network terms) and end with the farthest one.

About this task

Keep the following in mind before performing the binding procedure:

• Using the NIS broadcast feature can incur security risks.

• You can specify NIS servers by IP address or host name. If host names are used, ensure that eachhost name and its IP address are listed in the /etc/hosts file of your storage system. Otherwise,the binding with the host name fails.

• You can only specify IPv4 addresses or server names that resolve to IPv4 addresses by using the/etc/hosts file on your storage system.

Step

1. Enter the following command to specify the NIS servers and their order:

options nis.servers ip_address, server_name,[*]

The asterisk (*) specifies that broadcast is used to bind to NIS servers if the servers in the list arenot responding. The '*' is the default value. If you do not specify the broadcast option, and none ofthe listed servers is responding, NIS services are disrupted until one of the preferred servers responds.

Example

The following command lists two servers and uses the default broadcast option:

options nis.servers 192.0.2.1,nisserver-1,*

Your storage system first tries to bind to 192.0.2.1. If the binding fails, the storage system triesto bind to nisserver-1. If this binding also fails, the storage system binds to any server that respondsto the broadcast. However, the storage system continues to poll the preferred servers. When oneof the preferred server is found, the storage system binds to the preferred server.

Enabling an NIS slave on your storage systemYou can enable an NIS slave on your storage system to reduce traffic over your network.

Step

1. To enable or disable an NIS slave on your storage system, enter the following command:

options nis.slave.enable {on|off}

How to maintain host-name information | 73

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 74: Network Management Guide

What NIS information you can viewYou can view information about NIS master and slave servers, netgroup caches, and performancestatistics.

The nis info command displays the following types of NIS information:

• NIS domain name

• Last time the local group cache was updated

• Information about each NIS server that was polled by your storage system:

• IP address of the NIS server

• Type of NIS server

• State of the NIS server

• Whether your storage system is bound to the NIS server

• Time of polling

• Information about the NIS netgroup cache:

• Status of the cache

• Status of the '*.*' entry in the cache

• Status of the '*.nisdomain' entry in the cache

• Whether an NIS slave is enabled

• NIS master server

• Last time the NIS map was checked by the NIS slave

• NIS performance statistics:

• Number of YP lookup network retransmission

• Total time spent in YP lookups

• Number of network retransmission

• Minimum time spent in a YP lookup

• Maximum time spent in a YP lookup

• Average time spent in a YP lookup

• Response statistics for the three most recent YP lookups

For more information about the nis info command and resulting display, see the na_nis(1) manpage.

74 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 75: Network Management Guide

Viewing NIS performance statisticsYou can use the nis info command to display NIS performance statistics for your storage system.

Step

1. Enter the following command to display NIS information:

nis info

Example

The following example shows the statistics provided by the nis info command.

system1*> nis info NIS domain is lab.example.com NIS group cache has been disabled

IP Address Type State Bound Last Polled Clientcalls Became Active ----------------------------------------------------------------------------------------------- 192.0.2.12 PREF ALIVE YES Mon Jan 23 23:11:14GMT 2008 0 Fri Jan 20 22:25:47 GMT 2008

NIS Performance Statistics: Number of YP Lookups: 153 Total time spent in YP Lookups: 684 ms, 656 us Number of network re-transmissions: 0 Minimum time spent in a YP Lookup: 0 ms, 1 us Maximum time spent in a YP Lookup: 469 ms, 991 us Average time spent in YP Lookups: 4 ms, 474 us

3 Most Recent Lookups: [0] Lookup time: 0 ms, 1 us Number of network re- transmissions: 0 [1] Lookup time: 5 ms, 993 us Number of network re- transmissions: 0 [2] Lookup time: 0 ms, 1 us Number of network re- transmissions: 0 NIS netgroup (*.* and *.nisdomain) cache status:uninitialized *.* eCode: 0

How to maintain host-name information | 75

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 76: Network Management Guide

*.nisdomain eCode: 0 NIS Slave disabled

Configuring DNS and NIS with FilerViewYou can configure DNS and NIS for host-name resolution by using FilerView. You can also configurethe host-name service configuration file (/etc/nsswitch.conf) with FilerView.

Steps

1. Click Network in the list on the left pane.2. In the list under Network, click Configure Host Name Resolution (DNS & NIS).

The Host Name Resolution Policy Wizard is displayed.

3. Click Next and complete the steps in the Host Name Resolution Policy Wizard to set or modifythe DNS and NIS configuration values.

You can perform the following tasks by using the Host Name Resolution Policy Wizard:

• Enable DNS and NIS

• Enter a DNS domain name

• Specify the dynamic DNS update interval

• Enable dynamic DNS

• Use DNS cache

• Specify IP addresses of DNS servers (maximum of three IP addresses)

• Specify the domain search list

• Specify a NIS domain name

• Specify NIS servers

• Enable NIS domain search

• Enable NIS slave

• Enable local caching of NIS group files

• Specify the schedule to update the local cache of NIS group files

• Define the search order for hosts, password, shadow, group, and netgroup information

76 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 77: Network Management Guide

How to change the host-name search orderIf you use more than one method for host-name resolution, you must specify the order in which eachname resolution service is used. This order is specified in the /etc/nsswitch.conf file in yourstorage system's root volume. You can change this order at any time.

Data ONTAP creates a default /etc/nsswitch.conf file when you run the setup command on yourstorage system. The contents of the default file are as follows:

hosts: files nis dns

passwd: files nis ldap

netgroup: files nis ldap

group: files nis ldap

shadow: files nis

Note: Only the hosts entry in the /etc/nsswitch.conf file pertains to host-name resolution. Forinformation about other entries, see the Data ONTAP 8.0 7-Mode System Administration Guide andthe na_nsswitch.conf(5) man page.

By default, the host information is searched in the following order:

• /etc/hosts file

• NIS

• DNS

You can change the host-name resolution order in either of the following ways:

• By using FilerView

• By editing the /etc/nsswitch.conf file

Next topics

Changing the host-name search order with FilerView on page 77

Changing the host-name search order on page 78

Changing the host-name search order with FilerViewYou can change the host-name search order with FilerView.

Steps

1. In FilerView, click Network in the list on the left pane.2. In the list under Network, click Manage DNS and NIS Name Service.

How to maintain host-name information | 77

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 78: Network Management Guide

3. In the Name Service section, select the desired values from the Hosts drop-down list.

Changing the host-name search orderYou can change the order in which Data ONTAP searches for host information by editing the/etc/nsswitch.conf file.

Steps

1. If the /etc/nsswitch.conf file does not exist in the root volume of the storage system, createit.

2. Edit the file, entering each line in the following format:

hosts: service

service is one or more of the following: files, dns, nis.

3. Save the file.

Example

To change the resolution order to use NIS exclusively, change the hosts line to read as follows:

hosts: nis

78 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 79: Network Management Guide

How to monitor your storage system with SNMP

If you enable SNMP in Data ONTAP, the SNMP managers can query your storage system's SNMPagent for information. The SNMP agent gathers information and forwards it to the managers by usingSNMP. The SNMP agent also generates trap notifications whenever specific events occur.

For diagnostic and other network management services, Data ONTAP provides an SNMP agentcompatible with SNMP versions 1 and 3. SNMPv3 offers advanced security by using pass phrases andencryption. SNMPv3 supports the MIB-II specification and the MIBs of your storage system. Thefollowing MIB-II groups are supported:

• System

• Interfaces

• Address translation

• IP

• ICMP

• TCP

• UDP

• SNMP

Note: Transmission and EGP MIB-II groups are not supported.

Next topics

Types of SNMP traps in Data ONTAP on page 79

What a MIB is on page 80

What the SNMP agent does on page 80

How to configure the SNMP agent on page 80

User-defined SNMP traps on page 88

Types of SNMP traps in Data ONTAPSNMP traps capture system monitoring information in Data ONTAP. There are two types of traps inData ONTAP: built-in and user-defined.

• Built-in traps are predefined in Data ONTAP and are automatically sent to the network managementstations on the traphost list if an event occurs. These traps are based on one of the following:

• RFC 1213, which defines traps such as coldStart, linkDown, linkUp, and authenticationFailure.

• Specific traps defined in the custom MIB, such as diskFailedShutdown, cpuTooBusy, andvolumeNearlyFull.

How to monitor your storage system with SNMP | 79

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 80: Network Management Guide

• User-defined traps are defined by snmp traps commands or the FilerView SNMP Traps windows.These traps are sent using proxy trap ID numbers 11 through 18, which correspond to a trap's MIBpriority.

What a MIB isA MIB file is a text file that describes SNMP objects and traps. MIBs are not configuration files. DataONTAP does not read these files and their contents do not affect SNMP functionality.

Data ONTAP provides two MIB files:

• A custom MIB (/etc/mib/netapp.mib)

• An Internet SCSI (iSCSI) MIB (/etc/mib/iscsi.mib)

Data ONTAP also provides a short cross-reference between object identifiers (OIDs) and object shortnames in the /etc/mib/traps.dat file. This file is useful for creating user-defined traps.

Note: The latest versions of the Data ONTAP MIBs and traps.dat files are available online onthe NOW site. However, the versions of these files on the Web site do not necessarily correspond tothe SNMP capabilities of your Data ONTAP version. These files are provided to help you evaluateSNMP features in the latest Data ONTAP version.

Related information

NOW site

What the SNMP agent doesThe storage system includes an SNMP agent that responds to queries and sends traps to networkmanagement stations.

The SNMP agent on the storage system has only read privileges—that is, it cannot be used to takecorrective action in response to a trap.

How to configure the SNMP agentYou need to configure the SNMP agent on your storage system to set SNMP values and parameters.You can configure your SNMP agent through the command-line interface or with FilerView.

To configure the SNMP agent on your storage system, you need to perform the following tasks:

• Verify that SNMP is enabled.

80 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 81: Network Management Guide

Note: SNMP is enabled by default in Data ONTAP.

• If you are running SNMPv3, configure SNMPv3 for read-only access.

• Enable traps.Although SNMP is enabled by default, traps are disabled by default.

• Specify host names of one or more network management stations.Traps can only be sent when at least one SNMP management station is specified as a traphost. Trapnotifications can be sent to a maximum of eight network management stations.

You can do the following after configuring SNMP:

• Provide courtesy information about storage system location and contact personnel.

• Set SNMP access privileges. You can restrict SNMP access on a host or interface basis.

• Specify SNMP communities.Community strings function as group names to establish trust between SNMP managers and clients.Data ONTAP imposes the following limitations on SNMP communities:

• No more than eight communities are allowed.

• Only read-only communities are supported.

• Enable query authentication.You can enable authentication failure traps, which are generated when the agent receives querieswith the wrong community string, for the SNMP agent. The traps are sent to all hosts specified astraphosts.

• Create and load user-defined traps.

Note: Storage systems in an HA pair can have different SNMP configurations. For more information,see the na_snmp(1) man page.

Next topics

Enabling or disabling SNMP using the command-line interface on page 81

Configuring SNMPv3 users on page 82

Setting SNMP access privileges on page 83

Viewing and modifying your SNMP configuration from the command-line interface on page 83

Modifying your SNMP configuration with FilerView on page 84

SNMP command syntax on page 84

SNMP security parameters on page 85

Example: SNMP commands on page 86

Enabling or disabling SNMP using the command-line interfaceYou can enable or disable SNMP from the command-line interface by entering the optionssnmp.enable command.

How to monitor your storage system with SNMP | 81

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 82: Network Management Guide

Step

1. Enter the following command:

options snmp.enable {on|off}

on—Enables SNMP

off—Disables SNMP

Configuring SNMPv3 usersTo access MIB objects by using SNMPv3, you should create users with login-snmp capability.

Steps

1. Enter the following command to create a role with login-snmp capability:

useradmin role add role_name -a login-snmp

role_name is the role name with login-snmp capability.

Example

useradmin role add myrole1 -a login-snmp

2. Enter the following command to create a group and add the created role to that group:

useradmin group add group_name -r role_name

group_name is the group name to which you want to add the created role, role_name.

Example

useradmin group add mygroup1 -r myrole1

3. Enter the following command to create a user and add the user to the created group:

useradmin user add user_name -g group_name

user_name is the user name belonging to the group, group_name.

Example

useradmin user add myuser1 -g mygroup1

You are asked to enter a password for the new user. Ensure that the password has a minimum ofeight characters.

4. Enter the snmpwalk command through the system MIB:

snmpwalk -v 3 -u user_name -l authNoPriv -A password storage_system system

password is the user's password that you entered in Step 3.

storage_system is the storage system that contains the MIBs.

82 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 83: Network Management Guide

Example

snmpwalk -v 3 -u myuser1 -l authNoPriv -A johndoe123 host1 system

Setting SNMP access privilegesYou can set SNMP access privileges on a host or an interface by using the command-line interface.The snmp.access option defines a method to restrict access to the storage system on aprotocol-by-protocol basis.

About this task

You cannot set access privileges with FilerView.

Step

1. Enter the following command:

options snmp.access access_spec

access_spec consists of keywords and their values. Access can be allowed or restricted by hostname, IP address, and network interface name.

Example

For example, the following command allows access to SNMP for network interfaces e0, e1, ande2.

options snmp.access if=e0,e1,e2

Viewing and modifying your SNMP configuration from the command-lineinterface

You can use the snmp command to view or modify your SNMP configuration values.

Step

1. Enter the following command:

snmp {options values}

options are the available options for the snmp command, such as authtrap, community, contact,init, location, traphost, and traps.

values are the values that you want to set for a particular option.

How to monitor your storage system with SNMP | 83

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 84: Network Management Guide

Related references

SNMP command syntax on page 84

Modifying your SNMP configuration with FilerViewYou can use FilerView to modify your SNMP configuration.

Steps

1. Click SNMP in the list on the left.2. In the list under SNMP, click Configure.

The current SNMP configuration is displayed.

3. To set or modify SNMP configuration values, enter configuration values in the drop-down lists ortext fields.

4. Click Apply.

SNMP command syntaxIf you specify one or more values for an option of the SNMP commands, the value of that option is setor changed. However, if no values are specified, the current value of that option is returned.

The following table describes the syntax and parameters of SNMP commands.

DescriptionCommand

Displays the current values of all SNMP options,such as init, community, contact, andtraphost.

snmp

With a value: Enables (with value 1) or disables(with value 0) authentication failure traps on theSNMP agent.

Without a value: Displays the current value ofauthtrap set in Data ONTAP.

snmp authtrap [0|1]

Displays the current list of communities.snmp community

Adds a community.

Default value: The default community for the SNMPagent in Data ONTAP is public. The only accessmode available on storage systems is the default ro(read-only).

snmp community add rocommunity

84 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 85: Network Management Guide

DescriptionCommand

Deletes one or all communities.snmp community delete {all | ro

community }

With a value: Sets the contact name for your storagesystem. You must enclose the contact string in singlequotes (' ') if the string contains spaces.

You can enter a maximum of 255 characters for thecontact information.

Without a value: Displays the current contact nameset in Data ONTAP.

snmp contact [contact]

With a value: Enables (with value 1) or disables(with value 0) built-in traps and the traps definedusing the snmp traps command.

Without a value: Displays the current value ofsnmp init in Data ONTAP.

Default value: By default, SNMP traps are disabledin Data ONTAP; the system uses the equivalent ofsnmp init 0.

snmp init [0|1]

With the option: Sets the location of your storagesystem. You must enclose the location stringin single quotes (' ') if the string contains spaces.

Without the option: Displays the current locationset in Data ONTAP.

snmp location [location]

With the option: Adds or deletes SNMP hosts thatreceive traps from Data ONTAP.

Without the option: Displays the current traphostsset in Data ONTAP.

snmp traphost [{add|delete} {hostname|ipaddress}]

Displays the list of user-defined traps set in DataONTAP

snmp traps [options]

SNMP security parametersSNMPv3 includes an authentication feature that, when selected, requires users to enter their name, anauthentication protocol, and an authentication key, in addition to their desired security level wheninvoking a command.

How to monitor your storage system with SNMP | 85

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 86: Network Management Guide

If the security level is set to authNoPriv, authentication is performed by using a user's authKey to signthe message being sent. The authProtocol parameter must be MD5. The authKey parameters are generatedfrom a passphrase that must have a minimum of eight characters.

If the security level is set to authNoPriv, you must enter the following parameters:

DescriptionCommand-line flagParameter

User name must not exceed 31 characters.-u NamesecurityName

Authentication type must be MD5.-a (MD5)authProtocol

Passphrase with a minimum of eight characters.-A PASSPHRASEauthKey

Security level: must be Authentication, NoPrivacy.

Note: Data ONTAP does not supportretrieving MIB values using the noAuthNoPrivsecurity level.

-l (authNoPriv)securityLevel

Sets the context name used for SNMPv3 messages.-n CONTEXTNAMEcontext

Example: SNMP commandsYou can use the snmpget, snmpwalk, snmpbulkget, and snmpbulkwalk commands to retrieveinformation from network elements with SNMP agents.

snmpwalk

The following command retrieves all the variables under the system sys1:

snmpwalk -Os -c public -v 1 sys1 systemsysDescr.0 = STRING: Data ONTAP Release 7.3.1 sysObjectID.0 = OID: enterprises.789.2.3 sysUpTimeInstance = Timeticks: (121596665) 14 days, 1:46:06.65sysContact.0 = STRING: sysName.0 = STRING: sys1.lab.example.com sysLocation.0 = STRING: sysServices.0 = INTEGER: 72

The following command is an example of an SNMPv3 request to retrieve all variables under the systemsys1:

snmpwalk -v 3 -u joeblow -l authNoPriv -A joeblow12 sys1 systemSNMPv2-MIB::sysDescr.0 = STRING: Data ONTAP Release 7.3.1SNMPv2-MIB::sysObjectID.0 = OID:SNMPv2-SMI::enterprises.789.2.3DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (121622059) 14days, 1:50:20.59SNMPv2-MIB::sysContact.0 = STRING: SNMPv2-MIB::sysName.0 = STRING: sys1.lab.example.com

86 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 87: Network Management Guide

SNMPv2-MIB::sysLocation.0 = STRING: SNMPv2-MIB::sysServices.0 = INTEGER: 72

Note: You need to enter authentication information for using SNMPv3.

snmpget

The following command retrieves the system.sysDescr.0 object from the host sys1 by using thepublic community string:

snmpget -c public sys1 system.sysDescr.0system.sysDescr.0 = Data ONTAP Release 7.3.1 Mon Mar 16 16:56:43 IST 2009

The following command retrieves the value of an ICMP object (OID=56.1.1.1.1) from the host sys1:

snmpget -c public -v 2c sys1 .1.3.6.1.2.1.56.1.1.1.1 56.1.1.1.1.1 = Counter32: 0

snmpbulkget

The following command retrieves the system object sysDescr.0 and the first three objects in theifTable:

snmpbulkget -v2c -Cn1 -Cr3 -Os -c public sys1 system ifTable sysDescr.0 = STRING: Data ONTAP Release 7.3.1ifIndex.1 = INTEGER: 1ifIndex.2 = INTEGER: 2ifDescr.1 = STRING: "lo0"

snmpbulkwalk

The following command retrieves all the variables under the system sys1:

snmpbulkwalk -v2c -Os -c public sys1 systemsysDescr.0 = STRING: Data ONTAP Release 7.3.1 sysObjectID.0 = OID: enterprises.789.2.3 sysUpTimeInstance = Timeticks: (121603434) 14 days, 1:47:14.34 sysContact.0 = STRING: sysName.0 = STRING: sys1.lab.example.com sysLocation.0 = STRING: sysServices.0 = INTEGER: 72

The following example shows a part of the output from retrieving all the variables for the UDP object:

snmpbulkwalk -c public -v 2c 192.0.2.19 udp udp.udpInDatagrams.0 = Counter32: 347 udp.udpNoPorts.0 = Counter32: 4 udp.udpInErrors.0 = Counter32: 0 udp.udpOutDatagrams.0 = Counter32: 138

How to monitor your storage system with SNMP | 87

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 88: Network Management Guide

udp.udpTable.udpEntry.udpLocalAddress.0.0.0.0.69 = IpAddress: 00 00 00 00 udp.udpTable.udpEntry.udpLocalAddress.0.0.0.0.111 = IpAddress: 00 00 00 00

User-defined SNMP trapsIf the predefined built-in traps are not sufficient to create alerts for conditions you want to monitor, youcan create user-defined traps in Data ONTAP.

Before you define a new trap, you should consult the Data ONTAP MIBs to see if any existing trapsserve your purpose.

Next topics

How SNMP traps work on page 88

How to define or modify a trap on page 89

Viewing or modifying trap values from the command-line interface on page 89

Viewing or modifying trap values with FilerView on page 89

Defining traps in a configuration file on page 90

Example: Trap definitions on page 90

Command syntax for SNMP trap parameters on page 91

SNMP trap parameters on page 92

How SNMP traps workYou can set SNMP traps to inspect the value of MIB variables periodically. Whenever the value of aMIB variable meets the conditions you specify, a trap is sent to the network management stations onthe traphost list. The traphost list specifies the network management stations that receive the trapinformation.

You can set traps on any numeric variable in the MIB. For example, you can set a trap to monitor thefans on your storage system and have the SNMP application on your network management station showa flashing message on your console when a fan has stopped working.

Traps are persistent. After you set a trap, it exists across reboots until you remove it or modify it.

Follow these guidelines when creating traps:

• Use the /etc/mib/traps.dat file to find Object Identifiers (OIDs) for objects in the MIB filesof your storage system.

• Ensure that the trap can be generated in the storage system environment.

• Do not set traps on tabular data.It is possible to set traps on row entries in a sequence—for example, an entry in a table. However,if the order in the table is changed by adding or removing rows, you will no longer be trapping thesame numeric variables.

88 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 89: Network Management Guide

How to define or modify a trapYou can define traps or modify traps you have already defined by entering values from the command-lineinterface, in FilerView, or in a configuration file.

You must supply the following elements when you create or modify traps.

• Trap nameTrap name is the name of the user-defined trap you want to create or change. A trap name musthave no embedded periods.

• Trap parameters

• Parameter values

Note: When you create a user-defined trap, it is initially disabled by default. You must enable a trapbefore it can be triggered. You enable traps by using the snmp traps command or FilerView.

Viewing or modifying trap values from the command-line interfaceYou can view or modify your trap values through your command-line interface.

Step

1. Enter the following command:

snmp traps {options variables}

options are the options for SNMP traps such as walk, load, trapname and so on.

variables are values for the specified option.

Viewing or modifying trap values with FilerViewYou can use FilerView to view or modify a trap value.

Steps

1. In FilerView, click SNMP in the list on the left pane.2. In the list under SNMP, click Traps.3. Depending on whether you want to create, modify, or view a trap, perform the following step:

Then...If you want to...

a. Click Add.b. In the Add an SNMP Trap window, enter the requested

information.c. Click Add again.

Create a new trap

How to monitor your storage system with SNMP | 89

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 90: Network Management Guide

Then...If you want to...

a. Click Manage for the trap you want to view or modify.b. In the Manage SNMP Traps window, click Modify.

View or modify an existing trap

Defining traps in a configuration fileYou can define SNMP traps in a configuration file and then load the file with the snmp traps loadcommand. Data ONTAP automatically backs up your SNMP configuration as Snapshot copies, makingit easy to transfer user-defined traps to other storage systems and to recover SNMP configurations incase of a disaster.

Steps

1. Create a traps configuration file on your storage system.

You can choose the name and location of the file.

Example/etc/mib/mytraps

2. Enter the traps in the configuration file in the following form:

trapname.parmvalue

The parameters are the same as those used with the snmp traps command.

3. Test each line of the file by entering the snmp traps command using the command-line interfaceor by specifying the trap using FilerView. Make corrections as needed.

4. Load the configuration file with the following command:

snmp traps load file_name

file_name is the name of the configuration file.

Example

snmp traps load /etc/mib/mytraps

Example:Trap definitionsYou can define a group of traps by using the command-line interface or FilerView.

The following example sets a group of traps. The trap descriptions are numbered in brackets.

snmp traps cifstotalops.var snmp.1.3.6.1.4.1.789.1.7.3.1.1.1.0

[1]

snmp traps cifstotalops.trigger level-trigger

90 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 91: Network Management Guide

snmp traps cifstotalops.edge-1 1000000

[4]

snmp traps cifstotalops.interval 10

[2]

snmp traps cifstotalops.backoff-calculator step-backoff

[5]

snmp traps cifstotalops.backoff-step 3590

[5]

snmp traps cifstotalops.rate-interval 3600

[3]

snmp traps cifstotalops.priority alert

snmp traps cifstotalops.message snmp.1.3.6.1.4.1.789.1.7.3.1.1.1.0

A cifstotalops trap [1] is evaluated every 10 seconds [2]. The value received from the previous evaluationand the current value are used to calculate the number of CIFS operations per hour [3]. If the numberexceeds one million [4], the trap fires and continues to fire every hour [5] until the total number of CIFSoperations drops below one million.

Command syntax for SNMP trap parametersIf you specify one or more values for an option of the SNMP commands, the value of that option is setor changed. However, if no values are specified, the current value of that option is returned.

The following table describes the syntax and parameters for the snmp traps command.

DescriptionCommand

Displays the list of user-defined traps set in Data ONTAP.snmp traps

Enables, disables, resets, or deletes the trap trapname. If you do not specifya trap name, all traps defined so far are acted on.

snmp traps

[enable|disable|

reset|delete] trapname

Walks (traverses in order) the trap list by prefix; that is, lists all traps that havenames beginning with prefix.

snmp traps walk prefix

Loads a set of traps from a configuration file. The file contains a list of trapsand parameters without the snmp traps command preceding each trap. Ifthe specified file name is defaults, traps are read from the /etc/defaults/traps file.

snmp traps

loadtrap_list_filename

Defines or changes a user-defined trap parameter.snmp

traps trapname.parm

value

How to monitor your storage system with SNMP | 91

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 92: Network Management Guide

SNMP trap parametersYou must specify certain parameters to create SNMP traps.

The following table lists SNMP trap parameters that you enter with the snmp traps command in thecommand-line interface and the equivalent parameters that you select in FilerView.

Equivalent in FilerViewParameter in command-line interface

OIDvar

Triggertrigger

Edge 1

Edge 2

edge-1

edge-2

Edge 1 Direction

Edge 2 Direction

edge-1-direction

edge-2-direction

Intervalinterval

Interval Offsetinterval-offset

Rate Intervalrate-interval

Backoff Stylebackoff-calculator

Backoff Stepbackoff-step

Backoff Multiplierbackoff-multiplier

Prioritypriority

not availablemessage

Next topics

The var parameter on page 93

The trigger parameter on page 93

The edge-1 and edge-2 parameters on page 93

The edge-1-direction and edge-2-direction parameters on page 94

The interval parameter on page 94

The interval-offset parameter on page 94

The rate-interval parameter on page 94

The backoff-calculator parameter on page 95

The backoff-step parameter on page 95

The backoff-multiplier parameter on page 95

The priority parameter on page 95

The message parameter on page 96

92 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 93: Network Management Guide

The var parameter

The var parameter associates a user-defined trap name (specified by the trapname variable in thesnmp traps command or Trap Name in FilerView) with a specific MIB object. The MIB object isspecified in the value field of the snmp traps command. It must be of the form snmp.oid, whereoid is an Object Identifier (OID).

Note: The traps.dat file, located in the /etc/mib directory on your storage system, can helpyou determine OIDs. This file maps MIB objects' short names in the Data ONTAP MIB files to theirnumeric OIDs. For more information about a particular OID, see the MIB.

In FilerView, it is necessary to enter only the numerical OID, and not the "snmp" prefix.

The trigger parameter

The trigger parameter specifies the type of triggers that you can set for a trap. If a trap is triggered,data about the event that caused the trigger is sent to the network management stations.

You can specify the following values for the trigger parameter:

• single-edge-trigger—Fires a trap and sends data when the value of the trap's MIB variablecrosses an edge (a value that you specify) for the first time.

• double-edge-trigger—Fires a trap and sends data when either of two edges is crossed. Adouble-edge-trigger enables you to set two edges, each with its own direction.

• level-trigger—Fires a trap and sends data whenever the trap's value crosses a specified edgevalue.

• change-trigger—Keeps track of the last value received from the trap. If the current value differsfrom the previously received value, the trap is triggered.

• always-trigger—Enables a trap to always trigger at the specified evaluation interval (specifiedby the interval parameter). For example, a trap can trigger every 24 hours for the agent to sendthe total number of CIFS operations to an SNMP manager.

The edge-1 and edge-2 parameters

The edge-1 and edge-2 parameters of a trap specify the threshold values that are compared during trapevaluation to determine whether to fire a trap and send data.

The edge-1 parameter specifies the value for the edge in a single-edge-triggered trap or the first edgein a double-edge-triggered trap. The default value for the edge-1 parameter is MAXINT.

The edge-2 parameter specifies the value for the second edge in a double-edge-triggered trap. Thedefault value for the edge-2 parameter is 0.

Note: The edge-2 parameter is not displayed in FilerView during trap creation unlessdouble-edge-trigger is selected in the trigger parameter.

How to monitor your storage system with SNMP | 93

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 94: Network Management Guide

The edge-1-direction and edge-2-direction parameters

The edge-1-direction and edge-2-direction parameters enable you to set or change the directionthat is used to evaluate a trap. The edge-triggered traps only send data when the edge is crossed in eitherthe up or down direction.

The default values for the edge-1-direction and the edge-2-direction parameters are as follows:

• edge-1-direction:up

• edge-2-direction:down

Note: You enter the direction values on the same line as the edge value when you run the snmptraps command. The edge-2-direction parameter is not displayed in FilerView during trapcreation unless double-edge-trigger is selected in the trigger parameter.

The interval parameter

The interval parameter is the time, in seconds, between evaluations of a trap.

A trap can only send data as often as it is evaluated, even if the edge values are exceeded sooner. Thedefault value for the interval parameter is 3600.

Note: The maximum value that can be specified for the interval parameter in Data ONTAP is2147482.

The interval-offset parameter

The interval-offset parameter is the amount of time, in seconds, until the first trap evaluation.

The default value for the interval-offset parameter is 0. You can set it to a nonzero value to preventtoo many traps from being evaluated at once (for example, at system startup).

The rate-interval parameter

The rate-interval parameter specifies the time, in seconds, in which the change in value of a trap'svariable (rate of change) is expressed.

If the rate-interval value is set for a trap, the samples of data obtained at the interval points (setusing the interval parameter) for a trap variable are used to calculate the rate of change. If thecalculated value exceeds the value set for the edge-1 or edge-2 parameter, the trap is fired.

For example, to obtain the number of CIFS operations per hour, you specify a rate-interval of3600. If rate-interval is set to 0, no sampling at interval points occurs and trap evaluation proceedsas with any other kind of trap. The default value for the rate-interval parameter is 0.

94 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 95: Network Management Guide

The backoff-calculator parameter

The backoff-calculator parameter enables you to change the trap evaluation interval for a trapafter a trap fires.

After a trap fires and sends data, you might not want it to be evaluated so often. For instance, you mightwant to know within a minute of when a file system is full, but only want to be notified every hourthereafter that it is still full.

The backoff-calculator parameter can take the following values in the value variable field:

• step-backoff

• exponential-backoff

• no-backoff

The default value for the backoff-calculator parameter is no-backoff.

The backoff-step parameter

The backoff-step parameter specifies the number of seconds by which the trap evaluation intervalis increased.

If a trap interval is 10 and its backoff-step is 3590, the trap is evaluated every 10 seconds until it firesthe first time and sends data, and once an hour thereafter. The default value for the backoff-stepparameter is 0.

Note: The backoff step parameter is not displayed in FilerView during trap creation unless "step"is selected in the Backoff Style field.

The backoff-multiplier parameter

The backoff-multiplier parameter specifies the value by which to multiply a trap's evaluationinterval each time it fires.

If you set backoff-calculator to exponential-backoff and backoff-multiplier to 2, theinterval doubles each time the trap fires. The default value of the backoff-multiplier parameter is1.

Note: The backoff multiplier parameter is not displayed in FilerView during trap creationunless "exponential" is selected in the Backoff Style field.

The priority parameter

The priority parameter sets the priority of a trap.

How to monitor your storage system with SNMP | 95

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 96: Network Management Guide

If several traps are scheduled to fire at the same time, you can use the priority parameter to decidewhich trap is serviced first. The possible values for the priority parameter, from highest to lowest,are as follows:

• emergency

• alert

• critical

• error

• warning

• notification

• informational

• debug

The default value for the priority parameter is notification.

The message parameter

The message parameter specifies a message that goes out with a trap.

The message can be a string of text or simply the SNMP OID, in the form snmp.oid. If you specifythe OID as your message, Data ONTAP sends the information that was trapped concerning the OID.If you do not specify a message parameter for a trap, when the trap fires you see a string with thenumerical OID value and its priority level.

For example, the following string is sent to the network management stations for the trap cpuUpTimeif the message parameter is not set:

cpuUpTime == 10562288.priority == notification

Note: If the message is a string that includes spaces, you must enclose the string in quotation marks(" ").

You cannot set the message parameter in FilerView.

96 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 97: Network Management Guide

How VLANs work

VLANs provide logical segmentation of networks by creating separate broadcast domains. A VLANcan span multiple physical network segments. The end-stations belonging to a VLAN are related byfunction or application.

For example, end-stations in a VLAN might be grouped by departments, such as engineering andaccounting, or by projects, such as release1 and release2. Because physical proximity of the end-stationsis not essential in a VLAN, you can disperse the end-stations geographically and still contain thebroadcast domain in a switched network.

Next topics

VLAN membership on page 97

GARP VLAN Registration Protocol on page 99

VLAN tags on page 99

Advantages of VLANs on page 100

Prerequisites for setting up VLANs on page 101

Guidelines for setting up VLANs in Data ONTAP on page 101

How to manage VLANs on page 102

How to create and configure a VLAN on page 102

How to add an interface to a VLAN on page 105

How to delete a VLAN on page 106

How to modify VLAN interfaces on page 108

How to view VLAN statistics on page 108

VLAN membershipAn end-station must become a member of a VLAN before it can share the broadcast domain with otherend-stations on that VLAN. The switch ports can be configured to belong to one or more VLANs (staticregistration), or end-stations can register their VLAN membership dynamically, with VLAN-awareswitches.

VLAN membership can be based on one of the following:

• Switch ports

• End-station MAC addresses

• Protocol

How VLANs work | 97

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 98: Network Management Guide

In Data ONTAP, VLAN membership is based on switch ports. With port-based VLANs, ports on thesame or different switches can be grouped to create a VLAN. As a result, multiple VLANs can existon a single switch.

How VLAN membership affects communicationAny broadcast or multicast packets originating from a member of a VLAN are confined only amongthe members of that VLAN. Communication between VLANs, therefore, must go through a router.

The following figure illustrates how communication occurs between geographically dispersed VLANmembers.

In this figure, VLAN 10 (Engineering), VLAN 20 (Marketing), and VLAN 30 (Finance) span threefloors of a building. If a member of VLAN 10 on Floor 1 wants to communicate with a member ofVLAN 10 on Floor 3, the communication occurs without going through the router, and packet floodingis limited to port 1 of Switch 2 and Switch 3 even if the destination MAC address to Switch 2 andSwitch 3 is not known.

98 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 99: Network Management Guide

GARP VLAN Registration ProtocolGARP VLAN Registration Protocol (GVRP) uses Generic Attribute Registration Protocol (GARP) toallow end-stations on a network to dynamically register their VLAN membership with GVRP-awareswitches. Similarly, these switches dynamically register with other GVRP-aware switches on thenetwork, thus creating a VLAN topology across the network.

GVRP provides dynamic registration of VLAN membership; therefore, members can be added orremoved from a VLAN at any time, saving the overhead of maintaining static VLAN configuration onswitch ports. Additionally, VLAN membership information stays current, limiting the broadcast domainof a VLAN only to the active members of that VLAN.

For more information about GVRP and GARP, see IEEE 802.1Q and IEEE 802.1p (incorporated inthe 802.1D:1998 edition).

GVRP configuration for VLAN interfacesBy default, GVRP is disabled on all VLAN interfaces in Data ONTAP; however, you can enable it.

After you enable GVRP on an interface, the VLAN interface informs the connecting switch about theVLANs it supports. This information (dynamic registration) is updated periodically. This informationis also sent every time an interface comes up after being in the down state or whenever there is a changein the VLAN configuration of the interface.

VLAN tagsA VLAN tag is a unique identifier that indicates the VLAN to which a frame belongs. Generally, aVLAN tag is included in the header of every frame sent by an end-station on a VLAN.

On receiving a tagged frame, the switch inspects the frame header, and based on the VLAN tag, identifiesthe VLAN. The switch then forwards the frame to the destination in the identified VLAN. If thedestination MAC address is unknown, the switch limits the flooding of the frame to ports that belongto the identified VLAN.

How VLANs work | 99

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 100: Network Management Guide

For example, in this figure, if a member of VLAN 10 on Floor 1 sends a frame for a member of VLAN10 on Floor 2, Switch 1 inspects the frame header for the VLAN tag (to determine the VLAN) and thedestination MAC address. The destination MAC address is not known to Switch 1. Therefore, the switchforwards the frame to all other ports that belong to VLAN 10, that is, port 4 of Switch 2 and Switch 3.Similarly, Switch 2 and Switch 3 inspect the frame header. If the destination MAC address on VLAN10 is known to either switch, that switch forwards the frame to the destination. The end-station on Floor2 then receives the frame.

Advantages of VLANsVLANs provide a number of advantages such as ease of administration, confinement of broadcastdomains, reduced network traffic, and enforcement of security policies.

VLANs provide the following advantages:

• Ease of administrationVLANs enable logical grouping of end-stations that are physically dispersed on a network. Whenusers on a VLAN move to a new physical location but continue to perform the same job function,the end-stations of those users do not need to be reconfigured. Similarly, if users change their job

100 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 101: Network Management Guide

function, they need not physically move: changing the VLAN membership of the end-stations tothat of the new team makes the users' end-stations local to the resources of the new team.

• Confinement of broadcast domainsVLANs reduce the need to have routers deployed on a network to contain broadcast traffic. Floodingof a packet is limited to the switch ports that belong to a VLAN.

• Reduction in network trafficConfinement of broadcast domains on a network significantly reduces traffic.

• Enforcement of security policiesBy confining the broadcast domains, end-stations on a VLAN are prevented from listening to orreceiving broadcasts not intended for them. Moreover, if a router is not connected between theVLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

Prerequisites for setting up VLANsYou must meet certain prerequisites for switches and end stations before you can set up VLANs in anetwork.

The following are the prerequisites for setting up VLANs:

• The switches deployed in the network either must comply with IEEE 802.1Q standards or musthave a vendor-specific implementation of VLANs.

• For an end-station to support multiple VLANs, it must be able to dynamically register (using GVRP)or must be statically configured to belong to one or more VLANs.

Guidelines for setting up VLANs in Data ONTAPVLANs in Data ONTAP are implemented in compliance with the IEEE 802.1Q standard.

You should keep these guidelines in mind when setting up VLANs in Data ONTAP:

• You cannot set up VLANs using the setup procedure. You must use the command-line interfaceor FilerView to create, change, or delete VLANs.

• You must add the commands to create VLANs on the storage system to the /etc/rc file to makethe VLANs persistent across reboots.

• You can create any number of VLANs on a NIC (supporting IEEE 802.1Q) on the storage system.However, Data ONTAP imposes a limit on the number of interfaces (including physical, interfacegroup, vlan, vh, and loopback interfaces) per storage system.

• You can create VLANs on physical interfaces and interface groups.

How VLANs work | 101

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 102: Network Management Guide

• You can use VLANs to support packets of different Maximum Transmission Unit (MTU) sizes onthe same network interface. If a network interface is a member of multiple VLANs, you can specifydifferent MTU sizes for individual VLANs.

• You can assign an identification number from 1 to 4094 to a VLAN.

• You must ensure that the interface on your storage system is also a member of its partner's VLANsin an HA pair.

• You cannot configure any parameters except mediatype for the physical network interfaceconfigured to handle VLANs.

Related concepts

Maximum number of network interfaces on page 23

How to manage VLANsYou can use the vlan command to create, add interfaces to, delete, modify, and view the statistics ofa VLAN.

The following table gives the syntax of the vlan command:

DescriptionCommand

Create a VLANvlan create [-g {on|off}] ifnamevlanid_list

Add an interface to a VLANvlan add ifname vlanid_list

Delete an interface from a VLANvlan delete -q ifname [vlanid_list]

Enable or disable GVRP on VLAN interfacesvlan modify -g {on|off} ifname

View the statistics of the network interfaces of a VLANvlan stat ifname [vlanid_list]

For more information about the vlan command, see the na_vlan(1) man page.

Note: The VLANs created or changed using the vlan command are not persistent across rebootsunless the vlan commands are added to the /etc/rc file.

How to create and configure a VLANYou can create a VLAN by using the vlan create command and configure the VLAN by using theifconfig command.

102 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 103: Network Management Guide

The vlan create command creates a VLAN interface, includes that interface in one or more VLANsas specified by the VLAN identifier, enables VLAN tagging, and enables (optionally) GVRP on thatinterface. You can create a VLAN even when the interface is "up" state.

You can use the ifconfig command to configure the VLAN interfaces that are created by the vlancommand.You can also use the ifconfig command to configure an IP address for the underlyinginterface.

By default, GVRP is disabled on VLAN interfaces created by using the vlan create command;however, you can enable it with the -g option of the vlan create command. You can also use the-g option with the vlan modify command to enable GVRP later after creating VLAN interfaces.

If you enable GVRP on an interface that is configured down, the state of the interface and all associatedVLAN interfaces is automatically configured up. This state change occurs so that the interface can startsending VLAN registration frames to register its VLAN membership with the switch.

Next topics

How to use VLANs for tagged and untagged network traffic on page 103

Creating a VLAN on page 103

Configuring a VLAN on page 105

How to use VLANs for tagged and untagged network trafficYou can configure an IP address for an interface with VLANs. Any untagged traffic goes to the baseinterface and the tagged traffic goes to the respective VLAN.

You can use the ifconfig command to configure an IP address for the underlying interface of theVLAN. Any tagged frame is received by the matching VLAN interface. Untagged traffic is receivedby the native VLAN on the underlying interface.

Note: You should not create a VLAN on a physical interface with the same identifier as the nativeVLAN of the switch. For example, if the network interface e0b is on native VLAN 10, you shouldnot create a VLAN e0b-10 on that interface.

You cannot bring down a network interface that is configured to receive tagged and untagged traffic(IP configured for the underlying interface and VLANs). You must bring down all VLANs on theunderlying interface before you bring down the interface. However, you can delete the IP address ofthe underlying interface.

When you configure a VLAN using GVRP, the GVRP packets are sent as both untagged and taggedfrom the native VLAN.

For information about reverting with a configuration for receiving tagged and untagged frames on thesame network interface, see the Data ONTAP 8.0 7-Mode Upgrade Guide.

Creating a VLANYou can create a VLAN on the storage system for ease of administration, confinement of broadcastdomains, reduced network traffic, and enforcement of security policies.

How VLANs work | 103

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 104: Network Management Guide

About this task

• VLANs created by using the vlan create command are not persistent across reboots unless thevlan commands are added to the /etc/rc file.

• A VLAN name should not exceed 15 characters. A VLAN is named by combining the base interfacename (physical or interface group) and the VLAN identifier. If the resulting VLAN name exceeds15 characters, the base interface name is truncated and appended to the VLAN identifier with ahyphen (-) in between.

• You should be aware of the limit on the interface name when making an entry in the /etc/rc file.

Step

1. Enter the following command:

vlan create [-g {on|off}] ifname vlanid

-g enables (on) or disables (off) GVRP on an interface. By default, GVRP is disabled on theinterface.

ifname is the name of the network interface.

vlanid is the VLAN identifier to which the ifname interface belongs. You can include a list ofVLAN identifiers.

Example

You can create VLANs with identifiers 10, 20, and 30 on the interface e4 of a storage systemby using the following command:

vlan create e4 10 20 30

As a result, VLAN interfaces e4-10, e4-20, and e4-30 are created. The ifconfig commandoutput displays e4 as a VLAN interface as follows:

ifconfig -ae0a: flags=0x80e08866<BROADCAST,RUNNING,MULTICAST,VLAN> mtu 1500ether 00:0c:29:56:54:7e (auto-1000t-fd-up) flowcontrol full

The following example displays the truncation of the base interface name when creating a VLAN.To create a VLAN on the interface group "reallylongname," enter the following command:

vlan create reallylongname 100

The resulting VLAN name is "reallylongn-100". The base interface name is truncated and theVLAN name is restricted to 15 characters. When you edit the /etc/rc file, ensure that you enterthe truncated VLAN name.

104 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 105: Network Management Guide

Configuring a VLANBy using the ifconfig command, you can configure all the parameters for a VLAN interface in thesame way that you configure the parameters for a physical interface.

Step

1. Enter the following command:

ifconfig ifname-vlanid IP_address netmask mask

ifname-vlanid is the VLAN interface name.

IP_address is the IP address for this interface.

mask is the network mask for this interface.

Example

You can create VLANs with identifiers 10, 20, and 30 on the interface e4 of a storage system byusing the following command:

vlan create e5a 1760

You can configure the VLAN interface e4-10 by using the following command:

ifconfig e5a-1760 192.0.2.11 netmask 255.255.255.0

You can configure the following parameters:

• IP address

• Network mask

• Interface status

• Partner

How to add an interface to a VLANYou can add an interface to a VLAN. If a physical interface does not belong to any VLAN, you canuse the vlan create command to make the interface a member of one or more VLANs. However, ifthe interface is already a member of a VLAN, you should use the vlan add command to add theinterface to subsequent VLANs.

Note: In Data ONTAP 8.0 7-Mode, you can also use the vlan create command to add additionalVLAN interfaces to an existing VLAN.

How VLANs work | 105

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 106: Network Management Guide

Related tasks

Creating a VLAN on page 103

Adding an interface to a VLANYou can use the vlan add command to add an interface to an already created VLAN. As with thevlan create command, the vlan add command creates a VLAN interface that must be configuredusing the ifconfig command.

About this task

VLANs created using the vlan add commands are not persistent across reboots unless the vlancommands are added to the /etc/rc file.

Step

1. Enter the following command:

vlan add interface_name vlanid

interface_name is the name of the network interface.

vlanid is the VLAN identifier to which the interface belongs. You can include a list of VLANidentifiers.

Example

You can add VLANs with identifiers 40 and 50 on the interface e4 of a storage system by usingthe following command:

vlan add e4 40 50

VLAN interfaces e4-40 and e4-50 are created.

How to delete a VLANYou can delete one or all VLANs associated with an interface. You can use the vlan delete commandto delete the VLANs on an interface.

You can delete either a specific VLAN or all VLANs associated with that interface. If all VLANs foran interface are deleted, the interface is available to be configured as a regular physical interface.

Next topics

Deleting all VLANs on page 107

Deleting a specific VLAN on page 107

106 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 107: Network Management Guide

Deleting all VLANsWhen you delete all VLANs on an interface, the interface is then available to be configured as a regularphysical interface.

Step

1. Enter the following command:

vlan delete [-q] interface_name

interface_name is the name of the network interface.

vlanid is the VLAN identifier to which the interface_name interface belongs. You can includea list of VLAN identifiers.

By default, the vlan delete command prompts you to confirm the deletion. If you do not want toreceive this prompt, use the -q flag. This action invokes the quiet mode, which causes the operation tocomplete without prompting.

Example

You can delete all VLANs configured on the interface e4 with the following command:

vlan delete e4

Deleting a specific VLANYou can delete one or more specific VLANs from an interface.

Step

1. Enter the following command:

vlan delete [-q] interface_name vlanid

If you specify the -q option for quiet mode, the operation does not prompt you to confirm thedeletion.

interface_name is the name of the network interface.

vlanid is the VLAN identifier to which the interface_name interface belongs.

Note: If you want to delete more than one specific VLAN, you can include a list of VLANidentifiers.

How VLANs work | 107

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 108: Network Management Guide

Example

You can delete VLAN e4-30 with the following command:

vlan delete e4 30

How to modify VLAN interfacesTo enable or disable GVRP on all interfaces of a network adapter, you should use the vlan modifycommand.

When you enable GVRP on a network interface, it is enabled on all the associated VLANs.

Example

You can enable GVRP only on the network interface e8 of a storage system. However, youcannot enable or disable GVRP only for the VLAN e8-2.

Modifying VLAN interfacesYou can modify VLAN interfaces so that GVRP is enabled. GVRP dynamically registers the VLANmemberships of stations on your network. This saves you the overhead of maintaining static VLANconfiguration on switch ports every time there is a change in your network.

Step

1. Enter the following command:

vlan modify -g {on|off} adap_name

-g on enables GVRP.

-g off disables GVRP.

adap_name is the name of the network adapter.

Note: VLANs modified using the vlan modify command are not persistent across rebootsunless the vlan commands are added to the /etc/rc file.

How to view VLAN statisticsYou can use the vlan stat command to view the statistics of network interfaces configured in VLANs.

108 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 109: Network Management Guide

The vlan stat command displays the frames received and transmitted on a network interface. Thiscommand also displays the number of frames that were rejected because the frames did not belong toany of the VLAN groups to which the interface belongs.

Next topics

Viewing VLAN statistics on page 109

Viewing statistics for a specific VLAN on page 109

Viewing VLAN statisticsYou can use the vlan stat command to view the statistics of all VLANs configured on a networkinterface.

Step

1. Enter the following command:

vlan stat interface_name

interface_name is the name of the network interface.

Example

The following example displays the statistics of all VLANs on a storage system named toaster:

toaster> vlan stat e4 Vlan Physical Interface: e4 (5 hours, 50 minutes, 38 seconds) -- Vlan IDs: 3,5GVRP: enabled

RECEIVE STATISTICSTotal frames: 0 | Total bytes: 0 |Multi/broadcast: 0

Untag drops:0 | Vlan tag drops: 0

TRANSMIT STATISTICS Total frames: 8 | Total bytes: 368

Vlan Interface: e4-3 (0 hours, 20 minutes, 45 seconds) --

ID: 3 MAC Address: 00:90:27:5c:58:14

Viewing statistics for a specific VLANYou can use the vlan stat command to view the statistics for a specific VLAN configured on anetwork interface.

How VLANs work | 109

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 110: Network Management Guide

Step

1. Enter the following command:

vlan stat interface_name vlanid

interface_name is the name of the network interface.

vlanid is the VLAN identifier to which the interface_name interface belongs. You can includea list of VLAN identifiers.

110 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 111: Network Management Guide

How interface groups work in Data ONTAP

An interface group is a feature in Data ONTAP that implements link aggregation on your storage system.Interface groups provide a mechanism to group together multiple network interfaces (links) into onelogical interface (aggregate). After an interface group is created, it is indistinguishable from a physicalnetwork interface.

Different vendors refer to interface groups by the following terms:

• Virtual aggregations

• Link aggregations

• Trunks

• EtherChannel

Interface groups provide several advantages over individual network interfaces:

• Higher throughput—Multiple interfaces work as one interface.

• Fault tolerance—If one interface in an interface group goes down, your storage system stays connectedto the network by using the other interfaces.

• No single point of failure—If the physical interfaces in an interface group are connected to multipleswitches and a switch goes down, your storage system stays connected to the network through theother switches.

Next topics

Network interfaces grouped into an interface group on page 112

Types of interface groups on page 112

Load balancing in multimode interface groups on page 116

How to manage interface groups on page 117

The ifgrp command on page 118

Creating a single-mode interface group on page 118

How an active interface in a single-mode interface group is selected on page 120

Designating a nonfavored interface on page 120

Creating a static multimode interface group on page 121

Creating a dynamic multimode interface group on page 123

How to add interfaces to an interface group on page 124

How to delete interfaces from an interface group on page 125

Viewing interface group status on page 126

Viewing interface group statistics on page 128

Destroying an interface group on page 129

Second-level interface groups on page 130

How interface groups work in Data ONTAP | 111

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 112: Network Management Guide

Second-level interface groups in an HA pair on page 132

Network interfaces grouped into an interface groupYou can group network interfaces to form an interface group.

The following figure shows four separate network interfaces, e3a, e3b, e3c, and e3d, before they aregrouped into an interface group.

The following figure shows the four network interfaces grouped into a single interface group calledTrunk1.

Types of interface groupsYou can create three different types of interface groups on your storage system.

112 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 113: Network Management Guide

The three types of interface groups include:

• Single-mode interface group

• Static multimode interface group

• Dynamic multimode interface group

Each interface group provides different levels of fault tolerance. Multimode interface groups providemethods for load balancing network traffic.

Next topics

Single-mode interface group on page 113

Static multimode interface group on page 114

Dynamic multimode interface group on page 115

Single-mode interface groupIn a single-mode interface group, only one of the interfaces in the interface group is active. The otherinterfaces are on standby, ready to take over if the active interface fails.

There can be more than one interface on standby in a single-mode interface group. If an active interfacefails, your storage system randomly picks one of the standby interfaces to be the next active link. Theactive link is monitored and link failover is controlled by the storage system; therefore, single-modeinterface group does not require any switch configuration. Single-mode interface groups also do notrequire a switch that supports link aggregation.

A single-mode interface group fails when the link status of an interface is down, which signals that theinterface has lost connection with the switch. Failure can also occur when the link-monitoring ARPpackets do not reach any of the interfaces that form the interface group. To avoid this problem, youmust ensure that all the interfaces of a single-mode interface group are in the same broadcast domain(LAN).

All interfaces in a single-mode interface group share a common Media Access Control (MAC) address.

The following figure is an example of a single-mode interface group. In the figure, e0 and e1 are partof the SingleTrunk1 single-mode interface group. If the active interface, e0, fails, the standby e1 interfacetakes over and maintains the connection to the switch.

How interface groups work in Data ONTAP | 113

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 114: Network Management Guide

Static multimode interface groupThe static multimode interface group implementation in Data ONTAP is in compliance with IEEE802.3ad (static). Any switch that supports aggregates, but does not have control packet exchange forconfiguring an aggregate, can be used with static multimode interface groups.

Static multimode interface groups do not support IEEE 802.3ad (dynamic), also known as LinkAggregation Control Protocol (LACP). Port Aggregation Protocol (PAgP), the proprietary linkaggregation protocol from Cisco, too is not supported.

In a static multimode interface group, all interfaces in the interface group are active and share a singleMAC address. This logical aggregation of interfaces provides higher throughput than a single-modeinterface group. Static multimode interface groups can recover from a failure of up to (n-1) interfaces,where n is the total number of interfaces that form the interface group.

A static multimode interface group requires a switch that supports link aggregation over multiple switchports. The switch is configured so that all ports to which links of an interface group are connected arepart of a single logical port. Some switches might not support link aggregation of ports configured forjumbo frames. For more information, see your switch vendor's documentation.

Several load-balancing options are available to distribute traffic among the interfaces of a staticmultimode interface group.

Data ONTAP is only responsible for distributing outbound traffic and does not have control over howinbound packets arrive because each end of an aggregate is responsible for controlling the distributionof its outbound traffic.

The following figure is an example of a static multimode interface group. Interfaces e0, e1, e2, and e3are part of the MultiTrunk1 multimode interface group. All four interfaces in the MultiTrunk1 multimodeinterface group are active.

114 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 115: Network Management Guide

Dynamic multimode interface groupDynamic multimode interface groups can detect not only the loss of link status (as do static multimodeinterface groups), but also a loss of data flow. This feature makes dynamic multimode interface groupscompatible with high-availability environments. The dynamic multimode interface group implementationin Data ONTAP is in compliance with IEEE 802.3ad (dynamic), also known as Link AggregationControl Protocol (LACP).

Dynamic multimode interface groups have some special requirements. They include the following:

• Dynamic multimode interface groups must be connected to a switch that supports LACP.

• Dynamic multimode interface groups must be configured as first-level interface groups.

• Dynamic multimode interface groups should be configured to use the IP-based load-balancingmethod.

In a dynamic multimode interface group, all interfaces in the interface group are active and share asingle MAC address. This logical aggregation of interfaces provides higher throughput than a single-modeinterface group.

A dynamic multimode interface group requires a switch that supports link aggregation over multipleswitch ports. The switch is configured so that all ports to which links of an interface group are connectedare part of a single logical port. For information about configuring the switch, see your switch vendor'sdocumentation. Some switches might not support link aggregation of ports configured for jumbo frames.For more information, see your switch vendor's documentation.

Attention: Data ONTAP supports only the active and passive modes of LACP.

Several load-balancing options are available to distribute traffic among the interfaces of a dynamicmultimode interface group.

Data ONTAP is only responsible for distributing outbound traffic and does not have control over howinbound packet arrive because each end of an aggregate is responsible for controlling the distributionof its outbound traffic.

How interface groups work in Data ONTAP | 115

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 116: Network Management Guide

The following figure is an example of a dynamic multimode interface group. Interfaces e0, e1, e2, ande3 are part of the MultiTrunk1 multimode interface group. All four interfaces in the MultiTrunk1dynamic multimode interface group are active.

Load balancing in multimode interface groupsYou can ensure that all interfaces of a multimode interface group are equally utilized for outgoingtraffic. You can use the load-balancing methods for equalizing traffic.

The load-balancing methods include:

• IP address based

• MAC address based

• Round-robin based

The load-balancing method for a multimode interface group can be specified only when the interfacegroup is created. If no method is specified, the IP address based load-balancing method is used.

Next topics

IP address and MAC address load balancing on page 116

Round-robin load balancing on page 117

IP address and MAC address load balancingIP address and MAC address load balancing are the methods for equalizing traffic on multimode interfacegroups. IP address load balancing is recommended for use with dynamic multimode interface groups.

These load-balancing methods use a fast hashing algorithm on the source and destination addresses (IPaddress and MAC address). If the result of the hashing algorithm maps to an interface that is not in theUP link-state, the next active interface is used.

116 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 117: Network Management Guide

Note: Do not select the MAC address load-balancing method when creating interface groups on astorage system that connects directly to a router. In such a setup, for every outgoing IP frame, thedestination MAC address is the MAC address of the router. As a result, only one interface of theinterface group is used.

Round-robin load balancingYou can use round-robin for load balancing multimode interface groups. You should use the round-robinoption for load balancing a single connection's traffic across multiple links to increase single connectionthroughput. However, this method might cause out-of-order packet delivery.

If the remote TCP endpoints do not handle TCP reassembly correctly or lack enough memory to storeout of order packets, they might be forced to drop packets. Therefore, this can lead to unnecessaryretransmissions from the storage controller.

How to manage interface groupsYou can configure and manage interface groups on your storage system. You can create, add interfacesto, delete interfaces from, display status and statistics of, and destroy an interface group.

The following guidelines apply when you create and configure interface groups on your storage system:

• You can group up to 16 physical Ethernet interfaces on your storage system to obtain an interfacegroup. The network interfaces that are part of an interface group do not have to be on the samenetwork adapter, but it is best that all network interfaces be full-duplex.

• You cannot include a VLAN interface in an interface group.

• The interfaces that form an interface group should have the same Maximum Transmission Unit(MTU) size. You can use the ifconfig command to configure the MTU size on the interfacesof an interface group. You need to configure the MTU size only if you are enabling jumbo frameson the interfaces.

• You can include any interface, except the e0M management interface that is present on some storagesystems.

Note: Do not mix interfaces of different speeds or media in the same multimode interface group.

Some switches might not support multimode link aggregation of ports configured for jumbo frames.For more information, see your switch vendor's documentation.

How interface groups work in Data ONTAP | 117

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 118: Network Management Guide

The ifgrp commandYou can manage interface groups on your storage system by using the ifgrp command. This commandenables you to create, add interfaces to, delete interfaces from, view status and statistics of, and destroyan interface group.

The following table gives the ifgrp command syntax:

DescriptionCommand

Create a single-mode or multimode interface groupifgrp create [single|multi|lacp]ifgrp_name -b [rr|mac|ip][interface_list]

Designate a favored and nonfavored interface in asingle-mode interface group

ifgrp {favor|nofavor} interface_name

Add network interfaces to an interface groupifgrp add ifgrp_name interface_list

Delete a network interface from an interface groupifgrp deleteifgrp_name interface_name

Destroy an interface groupifgrp destroy ifgrp_name

View the status of an interface groupifgrp status [ifgrp_name]

View the statistics of data packets on the networkinterfaces of an interface group

ifgrp stat ifgrp_name [interval]

The following ifgrp commands are not persistent if used from the command-line interface; however,you can put any of these commands in the /etc/rc file to make it persistent across reboots:

• ifgrp create

• ifgrp add

• ifgrp delete

• ifgrp destroy

• ifgrp favor

• ifgrp nofavor

Creating a single-mode interface groupYou can create a single-mode interface group, in which only one interface is active at a time and theothers are ready to take over if the active interface fails. If you want a specific interface to be active,

118 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 119: Network Management Guide

you need to specify that interface as preferred; otherwise an interface is randomly selected to be theactive interface.

Before you begin

You need to meet the following prerequisites to create a single-mode interface group:

• Decide on a case-sensitive name for the interface group that meets the following criteria:

• It must begin with a letter.

• It must not contain any spaces.

• It must not contain more than 15 characters.

• It must not already be in use for an interface group.

• Decide on a list of the interfaces you want to combine into the interface group.

• Configure down all interfaces that will be included in the interface group by using the ifconfigcommand.

Steps

1. Enter the following command:

ifgrp create single ifgrp_name [interface_list]

ifgrp_name is the name of the interface group.

interface_list is a list of the interfaces you want the interface group to consist of.

Note: The operation performed using the ifgrp create command is not persistent acrossreboots unless the command is added to the /etc/rc file.

2. Enter the following command:

ifconfig ifgrp_name IP_address

ifgrp_name is the name of the interface group.

IP_address is the IP address for this interface.

Example: Creating a single-mode interface group with an IPv4 address

1. You can create a single-mode interface group with the following command:

ifgrp create single SingleTrunk1 e0 e1

2. You can configure an IP address of 192.0.2.4 and a netmask of 255.255.255.0 on thesingle-mode interface group SingleTrunk1, created in Step 1, with the following command:

ifconfig SingleTrunk1 192.0.2.4 netmask 255.255.255.0

How interface groups work in Data ONTAP | 119

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 120: Network Management Guide

Related concepts

Single-mode interface group on page 113

How an active interface in a single-mode interface group isselected

When you create a single-mode interface group, by default, an interface is randomly selected to be theactive interface, which is also known as a preferred or favored interface. There can be only one activeinterface in a single-mode interface group.

However, if you want to specify another interface as active, you can use the ifgrp favor commandto override the random selection. Additionally, if you want to specify an interface not to be consideredwhen the random selection is made, you can use the ifgrp nofavor command. An interface specifiedby the ifgrp nofavor command is known as the nonfavored interface.

Selecting an active interfaceYou can select one interface over another when you add a new, higher speed, or higher bandwidthinterface to the single-mode interface group and want this new interface to be the preferred interface.

Step

1. Enter the following command:

ifgrp favor interface_name

interface_name is the name of the interface you want to be active.

Example

You can specify the interface e1 to be preferred with the following command:

ifgrp favor e1

Note: The operation performed using the ifgrp favor command is not persistent acrossreboots unless the command is added to the /etc/rc file.

Designating a nonfavored interfaceYou can designate an interface as nonfavored so that it is not considered during the random selectionof an active interface in a single-mode interface group.

120 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 121: Network Management Guide

About this task

The interface marked as "nonfavored" can become the active interface when all other interfaces in asingle-mode interface group fail. Even after other interfaces become active (in up state), a nonfavoredinterface continues to stay active until it fails or until you, the system administrator, change the activeinterface by using the ifgrp favor command.

Step

1. Enter the following command:

ifgrp nofavor interface_name

interface_name is the name of the interface you do not want to be considered during the randomselection of an active interface.

Example

You can specify the interface e2 to be "not favored" with the following command:

ifgrp nofavor e2

Note: The operation performed using the ifgrp nofavor command is not persistent acrossreboots unless the command is added to the /etc/rc file.

Creating a static multimode interface groupYou can use the ifgrp create command to create a static multimode interface group. If you do notspecify the type of interface group in the ifgrp create command, a static multimode interface groupis created by default.

Before you begin

You need to meet the following prerequisites to create a multimode interface group:

• Identify or install a switch that supports link aggregation over multiple port connections in yournetwork, configured according to your switch vendor's instructions.

• Decide on a case-sensitive name for the interface group that meets the following criteria:

• It must begin with a letter.

• It must not contain a space.

• It must not contain more than 15 characters.

• It must not already be in use for an interface group.

• Decide on the interfaces you want the interface group to consist of.

How interface groups work in Data ONTAP | 121

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 122: Network Management Guide

• Configure down all interfaces that will be included in the interface group by using the ifconfigcommand.

About this task

You can improve throughput by creating a static multimode interface group. With a multimode interfacegroup, all interfaces in the interface group are active and share a single MAC address. This logicalaggregation of interfaces provides higher throughput than a single-mode interface group.

Steps

1. Enter the following command:

ifgrp create multi ifgrp_name -b {rr|mac|ip} [interface_list]

-b describes the load-balancing method.

rr specifies round-robin load balancing.

mac specifies MAC address load balancing.

Note: Do not select the MAC address load-balancing method when creating interface groups ona storage system that connects directly to a router. In such a setup, for every outgoing IP frame,the destination MAC address is the MAC address of the router. As a result, only one interface ofthe interface group is used.

ip indicates IP address load balancing (default).

ifgrp_name is the name of a previously created interface group.

interface_list is a list of the interfaces you want to add to the interface group.

2. Enter the following command:

ifconfig ifgrp_name IP_address netmask mask

Example

You can create a static multimode interface group, comprising interfaces e0, e1, e2, and e3 andusing MAC address load balancing, with the following command:

ifgrp create multi MultiTrunk1 -b mac e0 e1 e2 e3

Related concepts

Static multimode interface group on page 114

Load balancing in multimode interface groups on page 116

122 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 123: Network Management Guide

Creating a dynamic multimode interface groupWith a dynamic multimode interface group, all interfaces in the interface group are active and share asingle MAC address. This logical aggregation of interfaces provides higher throughput than a single-modeinterface group. Dynamic multimode interface groups can detect can detect both loss of link and lossof data flow.

Before you begin

You need to meet the following prerequisites to create a multimode interface group:

• Identify or install a switch that supports LACP over multiple port connections in your network,configured according to your switch vendor's instructions.

• Decide on a case-sensitive name for the interface group that meets the following criteria:

• It must begin with a letter.

• It must not contain a space.

• It must not contain more than 15 characters.

• It must not already be in use for an interface group.

• Decide on the interfaces you want the interface group to consist of.

• Configure down all interfaces that will be included in the interface group by using the ifconfigcommand.

Steps

1. Enter the following command:

ifgrp create lacp ifgrp_name -b {rr|mac|ip} [interface_list]

-b specifies the load-balancing method.

rr specifies round-robin load balancing.

mac specifies MAC address load balancing.

Note: Do not select the MAC address load-balancing method when creating interface groups ona storage system that connects directly to a router. In such a setup, for every outgoing IP frame,the destination MAC address is the MAC address of the router. As a result, only one interface ofthe interface group is used.

ip specifies IP address based load balancing (default).

ifgrp_name is the name of a previously created interface group.

interface_list is a list of the interfaces that make up the interface group.

How interface groups work in Data ONTAP | 123

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 124: Network Management Guide

2. Enter the following command:

ifconfig ifgrp_name IP_address netmask mask

Example

You can create a dynamic multimode interface group, comprising interfaces e0, e1, e2, and e3and using IP address based load balancing, with the following command:

ifgrp create lacp MultiTrunk1 -b ip e0 e1 e2 e3

Related concepts

Dynamic multimode interface group on page 115

Load balancing in multimode interface groups on page 116

The LACP log fileData ONTAP logs information about the LACP negotiation for dynamic multimode interface groupsin the /vol0/etc/log/lacp_log file.

Related concepts

Dynamic multimode interface group on page 115

How to add interfaces to an interface groupYou can add one or more interfaces to an interface group. You can add physical interfaces to an interfacegroup any time after you create it.

Adding interfaces to an interface groupIf you want to expand your network, you can use the ifgrp command to add one or more physicalinterfaces to an interface group.

Before you begin

• You must configure additional ports on the switch where the new interfaces will be connected. Forinformation about configuring the switch, see your switch vendor's documentation.

• The interface to be added to the interface group must be configured down by using the ifconfigcommand.

Step

1. Enter the following command:

124 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 125: Network Management Guide

ifgrp add ifgrp_name interface_list

ifgrp_name is the name of a previously configured interface group.

interface_list is a list of the interfaces you want to add to the interface group.

Example

You can add the interface e4 to the multimode interface group MultiTrunk1 with the followingcommand:

ifgrp add MultiTrunk1 e4

Note: The operation performed using the ifgrp add command is not persistent across rebootsunless the command is added to the /etc/rc file.

How to delete interfaces from an interface groupYou can use the ifgrp delete command to delete a physical interface from an interface group—forexample, when the interface needs maintenance).

Deleting interfaces from an interface groupYou can use the ifgrp delete command to delete one or more interfaces from an interface group.

Before you begin

You must bring down the interface group before you can delete a network interface from the interfacegroup. You can bring down the interface group by using the following command:

ifconfig ifgrp_name down

ifgrp_name is the name of the interface group you want to bring down.

About this task

The operation performed using the ifgrp delete command is not persistent across reboots unlessthe command is added to the /etc/rc file.

Step

1. Enter the following command:

ifgrp delete ifgrp_name interface

ifgrp_name is the name of the interface group.

How interface groups work in Data ONTAP | 125

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 126: Network Management Guide

interface is the interface of the interface group you want to delete.

Example

You can delete the interface e4 from a multimode interface group MultiTrunk1 with the followingcommands:

ifconfig MultiTrunk1 down

ifgrp delete MultiTrunk1 e4

Viewing interface group statusYou can view the current status of a specified interface group or all single-mode and multimode interfacegroups on your storage system.

Step

1. Enter the following command:

ifgrp status [ifgrp_name]

ifgrp_name is the name of the interface group whose status you want to display.

If you do not specify the interface group name, the status of all interface groups is displayed.

Example

The following example displays the status of the interface group ifgrp1:

ifgrp status ifgrp1default: transmit 'IP Load balancing', Ifgrp Type 'multi_mode', fail 'log'ifgrp1: 1 link, transmit 'none', Ifgrp Type 'single_mode' fail 'default' Ifgrp Status Up Addr_set up: e0b: state up, since 23Jun2009 08:18:12 (00:01:16) mediatype: auto-1000t-fd-up flags: enabled input packets 54, input bytes 4858 output packets 35, output bytes 2830 output probe packets 0, input probe packets 0 strike count: 0 of 10 up indications 1, broken indications 0 drops (if) 0, drops (link) 0 indication: up at 23Jun2009 08:18:12 consecutive 75, transitions 1 broken: e0c: state broken, since 23Jun2009 08:18:22 (00:01:06) mediatype: auto-unknown-down flags:

126 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 127: Network Management Guide

input packets 0, input bytes 0 output packets 0, output bytes 0 output probe packets 0, input probe packets 0 strike count: 0 of 10 up indications 0, broken indications 0 drops (if) 0, drops (link) 0 indication: broken at 23Jun2009 08:18:22 consecutive 0, transitions 1

What the interface group status information table containsYou can view the status information of an interface group by using the ifgrp status command.

The following table describes the information that is shown in each field and subfield of the ifgrpstatus command output.

DescriptionSubfieldField

Indicates the default values for fields such as transmit, Ifgrp Type,and fail. These values apply if you do not specify any values forthese fields when creating an interface group.

default

Indicates the default load-balancing method.transmit

Indicates the default interface group type.Ifgrp Type

Indicates the default location where the errors are logged.fail

Indicates that the data that follows this field pertains to theinterface group, ifgrp_name.

ifgrp_name

Indicates the load-balancing method used.transmit

Indicates the type of interface group. Possible values aresingle-mode, multi_mode, or lacp.

Ifgrp Type

Indicates the location where errors are logged for the interfacegroup.

fail

Indicates the current status of the interface group, ifgrp_name.Ifgrp Status

Indicates that a MAC address has been configured for the interfacegroup, ifgrp_name, and all its interfaces.

Addr_set

Indicates the current link-state of the interface. Possible valuesare up or down.

state

Indicates the date, time, and number of hours since the interfacehas been up.

since

Indicates the media type that defines the speed and duplex forthat interface.

mediatype

How interface groups work in Data ONTAP | 127

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 128: Network Management Guide

DescriptionSubfieldField

Indicates whether the interface is enabled or disabled to send andreceive data.

flags

Indicates the number of attempts for link-monitoring. When anunderlying link of an interface group does not receive any packets(including ARP packets that are used for link-monitoring), thestrike count gets incremented once in 5 seconds. If this strikecount reaches 10, the underlying link is brought "down."

strike count

Indicates the number of consecutively received "up" or "broken"indications from the switch and link interaction.

consecutive

Indicates the number of indications received that caused a statetransition from "up" to "broken" or "down" to "up".

transitions

Viewing interface group statisticsYou can view the statistics for a specific interface group or for all interface groups. The statistics includethe number of packets received and sent by each interface group.

Step

1. Enter the following command:

ifgrp stat [ifgrp_name] [interval]

ifgrp_name is the name of the interface group. If you do not specify an interface group, the statusof all interface groups is displayed.

interval is the interval, in seconds. The default is one second.

Example

The following example displays the output of the ifgrp stat command for a multimodeinterface group created with the round-robin load-balancing method:

ifgrp stat ifgrp0ifgrp (trunk) ifgrp0 e3a e3b Pkts In Pkts Out Pkts In Pkts Out 8637076 47801540 158 159 1617 9588 0 0 1009 5928 0 0 1269 7506 0 0 1293 7632 0 0

128 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 129: Network Management Guide

920 5388 0 0 1098 6462 0 0 2212 13176 0 0 1315 7776 0 0

The first row of the output shows the total number of packets received and sent until the time theifgrp stat command was run. The following rows show the total number of packets receivedand sent per second thereafter.

For interface groups created with the round-robin load-balancing option, the outgoing packetsare balanced among the network interfaces of the interface group.

ifgrp stat ifgrp1Interface group (trunk) ifgrp1 e0c e0b Pkts In Pkts Out Pkts In Pkts Out 82 208k 796k 208k 1 27342 104774 27326 2 26522 102088 26560 8 20332 77275 20335 5 27198 103529 27186

Destroying an interface groupYou destroy an interface group when you no longer need it or when you want to use the interfaces thatform the interface group for other purposes. After you destroy the interface group, the interfaces in theinterface group act individually rather than as an aggregate.

Steps

1. Configure the interface group down by entering the following command:

ifconfig ifgrp_name down

ifgrp_name is the name of the interface group you want to configure down.

2. Enter the following command:

ifgrp destroy ifgrp_name

ifgrp_name is the name of the interface group you want to destroy.

How interface groups work in Data ONTAP | 129

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 130: Network Management Guide

Second-level interface groupsIf you have more than one multimode interface group, you can use the ifgrp create command togroup them by creating a second layer of interface group called the second-level interface group.Second-level interface groups enable you to provide a standby multimode interface group in case theprimary multimode interface group fails.

You can use second-level interface groups on a single storage system or in an HA pair.

Note: You cannot use LACP interface groups as second-level interface groups.

Next topics

Guidelines for creating a second-level interface group on page 130

Creating a second-level interface group on page 130

Enabling failover in a second-level interface group on page 132

Guidelines for creating a second-level interface groupYou can create a single-mode second-level interface group over two multimode interface groups. Theports of the underlying multimode interface groups should be connected to the same switch. If youcreate a second-level interface group over two multimode interface groups that are connected to twodifferent switches, you should connect the two switches with an inter-switch link (ISL).

For a single-mode interface group, the switch ports must be in the same broadcast domain (LAN).Link-monitoring ARP packets are sent over the ports of a single-mode interface group to detect whetherthe ports are in the same broadcast domain. If the ports are not in the same broadcast domain, theinterface group is configured down.

When the ports of a single-mode interface group are connected to different broadcast domains, it iscalled a split-network condition. Therefore, a second-level interface group, created over two multimodeinterface groups that are connected to two different switches without an ISL, is automatically configureddown.

Creating a second-level interface groupYou can create a second-level interface group by using two multimode interface groups.

Before you begin

You need to meet the following prerequisites to create a second-level interface group:

• Identify or install a switch that supports link aggregation over multiple port connections in yournetwork, configured according to your switch vendor's instructions.

• Decide on a name for the second-level interface group:

• It must begin with a letter.

130 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 131: Network Management Guide

• It must not contain a space.

• It must not contain more than 15 characters.

• It must not already be in use for an interface group.

• Decide on a list of the interfaces you want the interface group to consist of.

• Configure down all interfaces that will be included in the interface group by using the ifconfigcommand.

Steps

1. Enter the following command to create the first of two multimode interfaces:

ifgrp create multi -b {rr|mac|ip} ifgrp_name1 if1 if2

The ifgrp_name1 interface group is composed of two physical interfaces, if1 and if2.

-b—specifies the type of load-balancing method.

rr—specifies the round-robin load-balancing option.

mac—specifies the MAC address load-balancing option.

ip—indicates the IP address load-balancing option (default option).

2. Enter the following command to create the second of two multimode interfaces:

ifgrp create multi -b {rr|mac|ip} ifgrp_name2 if3 if4

The ifgrp_name2 interface group is composed of two physical interfaces, if3 and if4.

3. Enter the following command to create a single-mode interface from the multimode interfaces:

ifgrp create single ifgrp_name ifgrp_name1 ifgrp_name2

ifgrp_name is the second-level interface group created with two multimode interface groups,ifgrp_name1 and ifgrp_name2.

Example

The following commands creates two interface groups and a second-level interface group. In thisexample, IP address load balancing is used for the multimode interface groups.

ifgrp create multi Firstlev1 e0 e1

ifgrp create multi Firstlev2 e2 e3

ifgrp create single Secondlev Firstlev1 Firstlev2

How interface groups work in Data ONTAP | 131

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 132: Network Management Guide

Enabling failover in a second-level interface groupIn a second-level single-mode interface group over two or more multimode interface groups, you canenable the ifgrp.failover.link_degraded option for failing over to a multimode interface groupwith higher aggregate bandwidth. The failover happens regardless of whether the currently activeinterface group is favored or not. By default, this option is off.

Step

1. To enable failover to a multimode interface group with higher aggregate bandwidth when one ormore of the links in the active multimode interface group fails, enter the following command:

options ifgrp.failover.link_degraded on

Second-level interface groups in an HA pairIn an HA pair, you can access data from both storage systems even if one of the storage system in theconfiguration fails.

With a second-level interface group connected in a single-mode configuration, you can maintainconnectivity to your storage system even if one of the switches fails. Therefore, by using the twoconfigurations together, you can achieve a fully redundant storage system connectivity architecture.

The following figure shows second-level interface groups in an HA pair.

When both storage systems are in operation, the following connections exist:

• Firstlev1 in Secondlev 1 connects StorageSystem 1 to the network through Switch 1.

• Firstlev2 in Secondlev 1 connects StorageSystem 1 to Switch 2.

• Firstlev4 in Secondlev 2 connects StorageSystem 2 to the network through Switch 2.

• Firstlev3 in Secondlev 2 connects StorageSystem 2 to Switch 1.

132 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 133: Network Management Guide

Firstlev2 and Firstlev3 are in standby mode.

If one of the switches fails, the following happens:

• If Switch 1 fails, Firstlev2 and Firstlev4 maintain the connection for their storage systems throughSwitch 2.

• If Switch 2 fails, Firstlev1 and Firstlev3 maintain the connection for their storage systems throughSwitch 1.

In the following figure, Switch 1 fails in an HA pair. Firstlev2 takes over the MAC address of Firstlev1and maintains the connectivity through Switch 2.

Creating a second-level interface group in an HA pairYou can create two second-level interface groups on an HA pair so that you can access data from bothstorage systems even if one of the storage system in the configuration fails.

Before you begin

You must ensure that all interfaces to be included in the interface group are configured to be down.You can use the ifconfig command to configure down an interface.

About this task

The operation performed using the ifgrp create command is not persistent across reboots unlessthe command is added to the /etc/rc file.

Steps

1. Enter the following commands on StorageSystem1 to create two multimode interface groups:

ifgrp create multi -b {rr|mac|ip} ifgrp_name1 if1 if2

ifgrp create multi -b {rr|mac|ip} ifgrp_name2 if3 if4

How interface groups work in Data ONTAP | 133

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 134: Network Management Guide

-b specifies the type of load-balancing method.

rr specifies round-robin load-balancing option.

mac specifies MAC address load-balancing option.

ip specifies IP address load-balancing option (default option).

if1, if2, if3, if4 are the network interfaces.

ifgrp_name1 and ifgrp_name2 are the names of the multimode interface groups.

2. Enter the following command on StorageSystem1 to create a second-level interface from themultimode interface groups:

ifgrp create single secondlev1 ifgrp_name1 ifgrp_name2

secondlev1 is the name of the second-level interface group.

3. Enter the following commands on StorageSystem2 to create two multimode interface groups:

ifgrp create multi -b {rr|mac|ip} ifgrp_name3 if5 if6

ifgrp create multi -b {rr|mac|ip} ifgrp_name4 if7 if8

4. Enter the following command on StorageSystem2 to create a second-level interface from themultimode interface groups:

ifgrp create single secondlev2 ifgrp_name3 ifgrp_name4

5. Enter the following command on StorageSystem1 to configure the second-level interface groupsfor takeover:

ifconfig secondlev1 partner secondlev2

6. Enter the following command on StorageSystem2 to configure the second-level interface groupsfor takeover:

ifconfig secondlev2 partner secondlev1

In steps 5 and 6, secondlev1 and secondlev2 (arguments to the partner option) must be interfacenames and not interface IP addresses. If secondlev1 is an interface group, secondlev2 must also bean interface group.

Example

The following commands create a second-level interface group in an HA pair. In this example,IP-based load balancing is used for the multimode interface groups.

On StorageSystem1:

ifgrp create multi Firstlev1 e1 e2

ifgrp create multi Firstlev2 e3 e4

134 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 135: Network Management Guide

ifgrp create single Secondlev1 Firstlev1 Firstlev2

On StorageSystem2 :

ifgrp create multi Firstlev3 e5 e6

ifgrp create multi Firstlev4 e7 e8

ifgrp create single Secondlev2 Firstlev3 Firstlev4

On StorageSystem1:

ifconfig Secondlev1 partner Secondlev2

On StorageSystem2 :

ifconfig Secondlev2 partner Secondlev1

How interface groups work in Data ONTAP | 135

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 136: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 137: Network Management Guide

How to diagnose network problems

You can diagnose problems on your network by using commands such as netdiag, ping, and pktt.

The netdiag command continuously gathers and analyzes statistics, and performsdiagnostic tests. These diagnostic tests identify and report problems with your physicalnetwork or transport layers and suggest remedial action.

For a full description of the netdiag command along with all available options, see thena_netdiag(1) man page.

netdiag

You can use the ping command to test whether your storage system can reach otherIPv4 hosts on your network.

For a full description of the ping command, see the na_ping(1) man page.

ping

You can use the pktt command to trace the packets sent and received in the storagesystem's network.

For a full description of the pktt command, see the na_pktt(1) man page.

pktt

Next topics

Diagnosing transport layer problems on page 137

How to diagnose ping problems on page 138

Protecting your storage system from forged ICMP redirect attacks on page 139

Related references

Error codes for the netdiag command on page 169

Diagnosing transport layer problemsYou can use the netdiag -t command to diagnose problems with the transport layer in your storagesystem.

Step

1. Enter the following command:

netdiag -t

How to diagnose network problems | 137

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 138: Network Management Guide

Example

A storage system whose TCP window size is smaller than the recommended value displays thefollowing output:

Performing transport layer diagnostics.....The TCP receive window advertised by CIFS client192.0.2.13 is 8760. This is less than the recommended value of 32768 bytes. You should increase the TCP receivebuffer size for CIFS on the client. Press enter to continue.

How to diagnose ping problemsYou can use the Data ONTAP ping throttling mechanism and its ip.ping_throttle.drop_leveloption to help avoid denial-of-service attacks that can occur when using ICMP.

The ping throttling mechanism is active in intervals of 1 second. If the number of ICMP echo and replypackets that the storage system receives in a 1-second interval exceeds the ping throttling threshold,the storage system drops all subsequent packets that are received within that 1-second interval.

Note: Regardless of whether the ping throttling threshold has been reached, clients that send morethan 16 packets per second to a storage system might experience packet loss. To allow clients to sendmore than 16 packets per second, you must disable ping throttling.

If your storage system supports a very large number of CIFS clients that use ICMP pings to determineCIFS shares accessibility, you can increase the ping throttling threshold value in theip.ping_throttle.drop_level option.

If a large number of CIFS clients are experiencing temporary or persistent unavailability of the storagesystem, you should check to see if the ping throttling threshold has been exceeded for the storage system.If so, you can increase the ping throttling threshold value.

Next topics

Increasing the ping throttling threshold value on page 138

Checking the ping throttling threshold status on page 139

Disabling ping throttling on page 139

Increasing the ping throttling threshold valueIf your storage system supports a very large number of CIFS clients that use ICMP pings to determineCIFS shares accessibility, you might need to increase the ping throttling threshold value.

Step

1. Enter the following command:

138 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 139: Network Management Guide

options ip.ping_throttle.drop_level packets_per_second

packets_per_second specifies the maximum number of ICMP echo or echo reply packets (pingpackets) that the storage system accepts per second. Any further packets within 1 second are dropped.The default value is 150.

Checking the ping throttling threshold statusIf a large number of CIFS clients are experiencing temporary or persistent unavailability of the storagesystem, you should check if the ping throttling threshold has been exceeded for the storage system.

Step

1. Enter the following command:

netstat -p icmp

The resulting report lists the number of pings and ping replies that have been dropped, if any.

If the number of pings dropped, the number of ping replies dropped, or the number of both pings andping replies dropped is greater than zero, you should increase the ip.ping_throttle.drop_valueto a number that is higher than the current value.

Disabling ping throttlingTo allow clients to send more than 16 packets per second, you need to disable ping throttling.

Step

1. Enter the following command:

options ip.ping_throttle.drop_level 0

Protecting your storage system from forged ICMP redirectattacks

You can disable ICMP redirect messages to protect your storage system against forged ICMP redirectattacks.

About this task

To efficiently route a series of datagrams to the same destination, your storage system maintains a routecache of mappings to next-hop gateways. If a gateway is not the best next-hop for a datagram with aspecific destination, the gateway forwards the datagram to the best next-hop gateway and sends an

How to diagnose network problems | 139

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 140: Network Management Guide

ICMP redirect message to the storage system. By forging ICMP redirect messages, an attacker canmodify the route cache on your storage system, causing it to send all of its communications throughthe attacker. The attacker can then hijack a session at the network level, easily monitoring, modifying,and injecting data into the session.

Step

1. Enter the following command:

options ip.icmp_ignore_redirect.enable on

Your storage system now ignores ICMP redirect messages.

For more information about the ip.icmp_ignore_redirect.enable option, see the na_options(1)man page.

Note: By default, the ip.icmp_ignore_redirect.enable option is off.

140 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 141: Network Management Guide

Network interface statistics

You can use the ifstat command to view statistics for the network interfaces supported by DataONTAP.

Next topics

Statistics for Gigabit Ethernet controller VI, VII, and G20 interfaces on page 141

Statistics for Gigabit and 10 Gigabit Ethernet controllers T204, T210, and T320interfaces on page 145

Statistics for the BGE 10/100/1000 Ethernet interface on page 148

Related concepts

How to view network interface statistics on page 44

Related tasks

Viewing or clearing network interface statistics using the command-line interface on page 44

Statistics for Gigabit Ethernet controller VI, VII, and G20interfaces

The ifstat command output displays several statistics when you use the command for the GigabitEthernet controllers and G20 interfaces.

The statistics in this section are for the following controllers:

• 10/100/1000 Ethernet controller VI and VII

• Gigabit Ethernet controller VI

• 10/100/1000 Ethernet controller G20

• Gigabit Ethernet controller G20

RECEIVE section statistics

The following table describes the statistics in the RECEIVE section of the ifstat command output.

DefinitionStatistic

Rate of received frames per second.Frames/second

Rate of received bytes per second.Bytes/second

Network interface statistics | 141

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 142: Network Management Guide

DefinitionStatistic

Rate of errors (which led to frames being lost) perminute.

Errors/minute

Rate per minute of packets discarded due to unavailableresources.

Discards/minute

Total frames that are received on the interface.Total frames

Total bytes that are received on the interface.Total bytes

Total errors that occur on the interface.Total errors

Total number of packets that were discarded even thoughno errors were detected. This number is a sum of the"No buffers", "Bus overruns", and "Queue overflows"statistics.

Total discards

Total number of multicast or broadcast packets received.Multi/broadcast

Number of frames that are both misaligned and containCRC errors.

Alignment errors

Number of Ethernet frames received for the partner'sMAC address after a failover in an HA pair.

Non-primary u/c

Number of tagged frames dropped on an interface thatis not configured to support VLAN tagging.

Tag drop

Number of tagged frames dropped that do not match theVLAN tags configured on the interface.

Vlan tag drop

Number of untagged frames dropped on an interfacethat is configured to be part of a VLAN.

Vlan untag drop

Number of packets received with bad CRC.CRC errors

Total number of received packets with a bad length.These are frames counted as undersize, fragment,oversize, or jabber.

Bad length

Number of received frames that were less than theminimum size (64 bytes) and had a valid CRC.

Runt frames

Number of received frames that were less than theminimum size and had a bad CRC.

Fragment

Number of received frames that were greater than themaximum size and had a valid CRC.

Long frames

Number of received frames that were greater than themaximum size and had a bad CRC.

Jabber

142 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 143: Network Management Guide

DefinitionStatistic

Number of times the adapter's receive FIFO overflowedand a packet was dropped. This occurs when the bus isvery busy and the adapter cannot transfer data into hostmemory. This might also occur when your storagesystem CPU is very busy and cannot process thereceived packets fast enough.

Bus overruns

Number of frames dropped on receive due to the driverreceive queue overflowing.

Queue overflows

Number of times the driver could not allocate a bufferand a packet was dropped. This might happen whenyour storage system is very busy. If the count increasescontinually, it might indicate that a software componentis not returning buffers.

No buffer

Number of XON frames received when receive or fullflow control is enabled.

Xon

Number of XOFF frames received when receive or fullflow control is enabled.

Xoff

Number of good packets received that were larger thanthe standard Ethernet packet size when jumbo framesare enabled.

Jumbo

Number of times the driver reset the NIC because theNIC was in a bad state.

Reset

Number of times the driver reset the NIC because theNIC was in a bad state.

Reset1

Number of times the driver reset the NIC because theNIC was in a bad state.

Reset2

TRANSMIT section statistics

The following table describes the statistics in the TRANSMIT section of the ifstat command output.

MeaningStatistic

Rate of transmitted frames per second.Frames/second

Rate of transmitted bytes per second.Bytes/second

Rate of errors (which led to frames being lost) perminute.

Errors/minute

Network interface statistics | 143

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 144: Network Management Guide

MeaningStatistic

Rate per minute of packets discarded due to unavailableresources.

Discards/minute

Total frames that are transmitted on the interface.Total frames

Total bytes that are transmitted on the interface.Total bytes

Total errors that occur on the interface.Total errors

Total number of packets that were discarded even thoughno errors were detected. This number is a sum of the"No buffers" and "Queue overflows" statistics.

Total discards

Total number of multicast or broadcast packetstransmitted.

Multi/broadcast

Number of times the driver failed to allocate a bufferfor the transmit packet.

No buffers

Number of outgoing packets dropped because thedriver's queue was full. It might indicate a systemproblem.

Queue overflow

Number of frames that were not transmitted becausethey encountered the maximum number of allowedcollisions. Only valid in half-duplex mode.

Max collisions

Number of frames that encountered exactly onecollision. Only valid in half-duplex mode.

Single collision

Number of frames that encountered more than onecollision, but less than the maximum allowed. Onlyvalid in half-duplex mode.

Multi collisions

Number of collisions that occurred outside the collisionwindow. Only valid in half-duplex mode.

Late collisions

Number of XON frames transmitted when send or fullflow control is enabled.

Xon

Number of XOFF frames transmitted when send or fullflow control is enabled.

Xoff

Number of times the adapter's transmitter hung and theadapter had to be reset. This can happen when the cableis pulled and the transmitter cannot transmit a packet.The adapter is reset to reclaim packet buffers.

Timeout

Number of packets transmitted that were larger than thestandard Ethernet frame size (1,518 bytes).

Jumbo

144 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 145: Network Management Guide

LINK INFO section statistics

The following table describes the statistics in the LINK INFO section of the ifstat command output.

MeaningStatistic

Current state of the interface:

• up or down—The state of the link.

• cfg_down—The interface is configured down.

• enabling—The interface is coming up.

Current state

Number of times the link toggled between up and down.Up to downs

Operational state of autonegotiation:

• on—Autonegotiation is enabled and succeeded.

• off—Autonegotiation failed. This happens whenthe device to which the interface is connected hasdisabled autonegotiation or is incompatible with theinterface. This might also indicate that the interfaceis down.

Auto

Speed of link negotiated or set.Speed

Duplex of the link negotiated or set.Duplex

The operational flow control setting.Flow control

Related concepts

How to view network interface statistics on page 44

Statistics for Gigabit and 10 Gigabit Ethernet controllers T204,T210, and T320 interfaces

The ifstat command output displays several statistics when you use the command for the 10/100/1000Ethernet controllers T204V and T204E, and the 10 Gigabit Ethernet controllers T210 and T320.

RECEIVE section statistics

The following table describes the statistics in the RECEIVE section of the ifstat command outputwhen you use the command on the 10/100/1000 Ethernet controllers T204V and T204E, and the 10Gigabit Ethernet controllers T210 and T320.

Network interface statistics | 145

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 146: Network Management Guide

MeaningStatistic

Rate of received frames per second.Frames/second

Rate of received bytes per second.Bytes/second

Rate of errors (which led to frames being lost) perminute.

Errors/minute

Rate per minute of packets discarded due to unavailableresources.

Discards/minute

Total frames that are received on the interface.Total frames

Total bytes that are received on the interface.Total bytes

Total errors that occur on the interface.Total errors

Total number of packets that were discarded even thoughno errors were detected. This number is a sum of the"No buffers", "Bus overruns", and "Queue overflows"statistics.

Total discards

Total number of multicast or broadcast packets received.Multi/broadcast

Number of frames that are both misaligned and containCRC errors.

Alignment errors

Number of Ethernet frames received for the partner'sMAC address after a failover in a cluster configuration.

Non-primary u/c

Number of tagged frames dropped on an interface thatis not configured to support VLAN tagging.

Tag drop

Number of tagged frames dropped that do not match theVLAN tags configured on the interface.

Vlan tag drop

Number of untagged frames dropped on an interfacethat is configured to be part of a VLAN.

Vlan untag drop

Number of packets received with bad CRC.CRC errors

Number of received frames that were less than theminimum size (64 bytes) and had a valid CRC.

Runt frames

Number of received frames that were greater than themaximum size and had a valid CRC.

Long frames

Number of received frames that were greater than themaximum size and had a bad CRC.

Jabber

146 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 147: Network Management Guide

MeaningStatistic

Number of times the driver could not allocate a bufferand a packet was dropped. This might happen whenyour storage system is very busy. If the count increasescontinually, it might indicate that a software componentis not returning buffers.

No buffer

Number of good packets received that were larger thanthe standard Ethernet packet size when jumbo framesare enabled.

Jumbo

Number of MAC Control PAUSE frames sent to thelink partner to inhibit transmission of data frames for aspecified period of time. This can help the partner fromoverrunning the controller's receive buffers.

Pause Frames

TRANSMIT section statistics

The following table describes the statistics in the TRANSMIT section of the ifstat command outputwhen you use the command on the 10/100/1000 Ethernet controllers T204V and T204E, and the 10Gigabit Ethernet controllers T210 and T320.

MeaningStatistic

Rate of transmitted frames per second.Frames/second

Rate of transmitted bytes per second.Bytes/second

Rate of errors (which led to frames being lost) perminute.

Errors/minute

Rate per minute of packets discarded due to unavailableresources.

Discards/minute

Total frames that are transmitted on the interface.Total frames

Total bytes that are transmitted on the interface.Total bytes

Total errors that occur on the interface.Total errors

Total number of packets that were discarded even thoughno errors were detected. This number is a sum of the"No buffers" and "Queue overflows" statistics.

Total discards

Total number of multicast or broadcast packetstransmitted.

Multi/broadcast

Number of times the driver failed to allocate a bufferfor the transmit packet.

No buffers

Network interface statistics | 147

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 148: Network Management Guide

MeaningStatistic

Number of outgoing packets dropped because thedriver's queue was full. It might indicate a systemproblem.

Queue overflow

FIFO goes empty before an internal End-Of-Packetindicator is read.

Bus Underruns

Number of MAC Control PAUSE frames sent to thelink partner to inhibit transmission of data frames for aspecified period of time. This can help the partner fromoverrunning the controller's receive buffers.

Pause Frames

LINK INFO section statistics

The following table describes the statistics in the LINK INFO section of the ifstat command outputwhen you use the command on the 10/100/1000 Ethernet controllers T204V and T204E, and the 10Gigabit Ethernet controllers T210 and T320.

MeaningStatistic

Current state of the interface:

• up or down—The state of the link.

• cfg_down—The interface is configured down.

• enabling—The interface is coming up.

Current state

Number of times the link toggled between up and down.Up to downs

Speed of link negotiated or set.Speed

Duplex of the link negotiated or set.Duplex

The operational flow control setting.Flow control

Related concepts

How to view network interface statistics on page 44

Statistics for the BGE 10/100/1000 Ethernet interfaceThe ifstat command output displays several statistics when you use the command on the BGE10/100/1000 Ethernet interface.

148 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 149: Network Management Guide

RECEIVE section statistics

The following table describes the statistics in the RECEIVE section of the ifstat command outputwhen you use the command on the BGE 10/100/1000 Ethernet interface.

MeaningStatistic

Rate of received frames per second.Frames/second

Rate of received bytes per second.Bytes/second

Rate of errors (which led to frames being lost) perminute.

Errors/minute

Rate per minute of packets discarded due to unavailableresources.

Discards/minute

Total frames that are received on the interface.Total frames

Total bytes that are received on the interface.Total bytes

Total errors that occur on the interface.Total errors

Total number of packets that were discarded even thoughno errors were detected. This number is a sum of the"No buffers", "Bus overruns", and "Queue overflows"statistics.

Total discards

Total number of multicast or broadcast packets received.Multi/broadcast

Number of frames that are both misaligned and containCRC errors.

Alignment errors

Number of Ethernet frames received for the partner'sMAC address after a failover in a cluster configuration.

Non-primary u/c

Number of tagged frames dropped on an interface thatis not configured to support VLAN tagging.

Tag drop

Number of tagged frames dropped that do not match theVLAN tags configured on the interface.

Vlan tag drop

Number of untagged frames dropped on an interfacethat is configured to be part of a VLAN.

Vlan untag drop

Number of packets received with bad CRC.CRC errors

Number of received frames that were less than theminimum size (64 bytes) and had a valid CRC.

Runt frames

Number of received frames that were less than theminimum size and had a bad CRC.

Fragment

Network interface statistics | 149

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 150: Network Management Guide

MeaningStatistic

Number of received frames that were greater than themaximum size and had a valid CRC.

Long frames

Number of received frames that were greater than themaximum size and had a bad CRC.

Jabber

Number of times the driver could not allocate a bufferand a packet was dropped. This might happen whenyour storage system is very busy. If the count increasescontinually, it might indicate that a software componentis not returning buffers.

No buffer

Number of XON frames received when receive or fullflow control is enabled.

Xon

Number of XOFF frames received when receive or fullflow control is enabled.

Xoff

Number of good packets received that were larger thanthe standard Ethernet packet size when jumbo framesare enabled.

Jumbo

Not used. Ignore.Ring full

Error detected while processing a jumbo packet. Packetis discarded.

Jumbo error

TRANSMIT section statistics

The following table describes the statistics in the TRANSMIT section of the ifstat command outputwhen you use the command on the BGE 10/100/1000 Ethernet interface.

MeaningStatistic

Rate of transmitted frames per second.Frames/second

Rate of transmitted bytes per second.Bytes/second

Rate of errors (which led to frames being lost) perminute.

Errors/minute

Rate per minute of packets discarded due to unavailableresources.

Discards/minute

Total frames that are transmitted on the interface.Total frames

Total bytes that are transmitted on the interface.Total bytes

Total errors that occur on the interface.Total errors

150 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 151: Network Management Guide

MeaningStatistic

Total number of packets that were discarded even thoughno errors were detected. This number is a sum of the"No buffers" and "Queue overflows" statistics.

Total discards

Total number of multicast or broadcast packetstransmitted.

Multi/broadcast

Number of times the driver failed to allocate a bufferfor the transmit packet.

No buffers

Number of outgoing packets dropped because thedriver's queue was full. It might indicate a systemproblem.

Queue overflow

Number of frames that were not transmitted becausethey encountered the maximum number of allowedcollisions. Only valid in half-duplex mode.

Max collisions

Number of frames that encountered exactly onecollision. Only valid in half-duplex mode.

Single collision

Number of frames that encountered more than onecollision, but less than the maximum allowed. Onlyvalid in half-duplex mode.

Multi collisions

Number of collisions that occurred outside the collisionwindow. Only valid in half-duplex mode.

Late collisions

Number of XON frames transmitted when send or fullflow control is enabled.

Xon

Number of XOFF frames transmitted when send or fullflow control is enabled.

Xoff

Number of packets transmitted that were larger than thestandard Ethernet packet size when jumbo frames areenabled.

Jumbo

Number of frames for which the first transmission wasdelayed because the medium was busy.

Deferred

Number of frames not transmitted due to an internalMAC sublayer error.

MAC Internal

LINK INFO section statistics

The following table describes the statistics in the LINK INFO section of the ifstat command outputwhen you use the command on the BGE 10/100/1000 Ethernet interface.

Network interface statistics | 151

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 152: Network Management Guide

MeaningStatistic

Current state of the interface:

• up or down—The state of the link.

• cfg_down —The interface is configured down.

• enabling—The interface is coming up.

Current state

Number of times the link toggled between up and down.Up to downs

Speed of link negotiated or set.Speed

Duplex of the link negotiated or set.Duplex

The operational flow control setting.Flow control

Related concepts

How to view network interface statistics on page 44

152 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 153: Network Management Guide

Ways to improve your storage system's performance

You can improve your storage system's performance by performing certain configuration procedures.

The following configuration procedures might improve the performance of your storage system:

• Balance NFS traffic on network interfacesYou can attach multiple interfaces on your storage system to the same physical network to balancenetwork traffic among different interfaces.For example, if two Ethernet interfaces on a storage system named toaster are attached to the samenetwork where four NFS clients reside, specify in the /etc/fstab file on client1 and client2 thatthese clients mount from toaster-0:/home. Specify in the /etc/fstab file on client3 and client4that these clients mount from toaster-1:/home. This scheme can balance the traffic amonginterfaces if all clients generate about the same amount of traffic.Your storage system always responds to an NFS request by sending a reply using the interface overwhich the request was received.

• Correct duplex mismatches on 10Base-T or 100Base-T Ethernet networksOn 10Base-T or 100Base-T Ethernet networks, the speed and duplex settings for the interfaces atboth ends of a link must match exactly. You can use the ifconfig interface command to checkthe duplex setting of your storage system’s interface.If the setting is to autonegotiate, the ifconfig command displays a setting that begins with auto(for example, auto-100tx-fd-up). Otherwise, the ifconfig command displays the configuredmedia type setting (for example, 100tx-fd-up).

Note: If one end of the link is set to autonegotiate, the other end must also be set to autonegotiate;otherwise, a mismatch might occur. You can determine the negotiated setting with the ifstatcommand.

• Upgrade to a faster network interfaceYou can increase the storage system's performance by upgrading to a faster network interface (10Gigabit Ethernet interfaces).

Ways to improve your storage system's performance | 153

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 154: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 155: Network Management Guide

IP port usage on a storage system

The Data ONTAP services file is available in the /etc directory. The /etc/services file is in thesame format as its corresponding UNIX system's /etc/services file.

Next topics

Host identification on page 155

/etc/services NNTP and TTCP ports on page 158

NFS-enabled ports on page 158

Ports not listed in /etc/services on page 159

FTP on page 159

SSH on page 160

Telnet on page 160

SMTP on page 161

Time service on page 161

DNS on page 162

DHCP on page 162

TFTP on page 162

HTTP on page 163

Kerberos on page 163

NFS on page 164

CIFS on page 164

SSL on page 164

SNMP on page 165

RSH on page 166

Syslog on page 166

The routed daemon on page 166

NDMP on page 167

SnapMirror and SnapVault on page 167

Host identificationAlthough some port scanners are able to identify storage systems as storage systems, others port scannersreport storage systems as unknown types—UNIX systems because of their NFS support, or Windowssystems because of their CIFS support. There are several services that are not currently listed in the/etc/services file.

IP port usage on a storage system | 155

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 156: Network Management Guide

The following table gives a sample content of the /etc/services file.

DescriptionPort/ ProtocolService

# File transfer protocol20/tcpftp-data

# File transfer protocol21/tcpftp

# SecureAdmin rsh

replacement

22/tcpssh

# Remote login (insecure)23/tcptelnet

# outbound connections

for autosupport

25/tcpsmtp

# Time Service37/tcptime

# Time Service37/udptime

# DNS - outbound only53/udpdomain

# DNS zone transfers -

unused

53/tcpdomain

# DHCP server - outbound

only

67/udpdhcps

# DHCP client - only

first-time setup

68/udpdhcp

# Trivial FTP - for

netboot support

69/udptftp

# HTTP license,

FilerView, SecureAdmin

80/tcphttp

# Kerberos 5 - outbound

only

88/udpkerberos

# Kerberos 5 - outbound

only

88/tcpkerberos

# aka rpcbind, used for

NFS

111/udpportmap

# aka rpcbind, used for

NFS

111/tcpportmap

# unused, shouldn't be

listed here.

119/tcpnntp

# Network Time Protocol123/tcpntp

156 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 157: Network Management Guide

DescriptionPort/ ProtocolService

# Network Time Protocol123/udpntp

# NetBIOS nameserver -

for CIFS

137/udpnetbios-name

# NetBIOS datagram

service - for CIFS

138/udpnetbios-dg

# NetBIOS service session

- for CIFS

139/tcpftp-data

# Secure FilerView

(SecureAdmin)

443/tcpssl

# CIFS over TCP with

NetBIOS framing

445/tcpcifs-tcp

# For Data Fabric Manager

or other such tools

161/udpsnmp

# rsh, insecure remote

command execution.

514/tcpshell

# outbound only514/udpsyslog

# for RIP routing

protocol

520/udproute

# outbound only, if at

all

750/udpkerberos-sec

# outbound only, if at

all

750/tcpkerberos-sec

# primary NFS service2049/udpnfsd

# primary NFS service2049/tcpnfsd

# unused, shouldn't be

listed here.

5001/udpttcp

# unused, shouldn't be

listed here.

5001/tcpttcp

# for network backups10000/tcpndmp

# also SnapVault10566/tcpsnapmirro

# Internal connection

inside your storage

system

32243/tcpndmp-local

IP port usage on a storage system | 157

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 158: Network Management Guide

/etc/services NNTP and TTCP portsThe NNTP and TTCP ports are not used by your storage system and should never be detected by a portscanner.

NFS-enabled portsSome ports (port numbers in the 600 range) on the storage system are NFS-enabled.

The following ports are found on the storage system with NFS-enabled:

NFS mount daemon (mountd)602UDP

NFS mount daemon (mountd)603TCP

NFS status daemon (statd, statmon)604UDP

NFS status daemon (statd, statmon)605TCP

NFS lock manager (lockd, nlockmgr)606UDP

NFS lock manager (lockd, nlockmgr)607TCP

NFS quota daemon (quotad, rquotad)608UDP

On other systems, the ports appear as follows:

NFS mount daemon (mountd)611UDP

NFS mount daemon (mountd)612TCP

NFS status daemon (statd, statmon)613UDP

NFS status daemon (statd, statmon)614TCP

NFS lock manager (lockd, nlockmgr)615UDP

NFS lock manager (lockd, nlockmgr)616TCP

NFS quota daemon (quotad, rquotad)617UDP

The following command on UNIX systems obtains the correct information by querying the port mapperon port 111:

toaster# rpcinfo -p sys1

program vers proto port service 100011 1 udp 608 rquotad

158 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 159: Network Management Guide

100021 4 tcp 607 nlockmgr 100021 3 tcp 607 nlockmgr 100021 1 tcp 607 nlockmgr 100021 4 udp 606 nlockmgr 100021 3 udp 606 nlockmgr 100021 1 udp 606 nlockmgr 100024 1 tcp 605 status 100024 1 udp 604 status 100005 3 tcp 603 mountd 100005 2 tcp 603 mountd 100005 1 tcp 603 mountd 100005 3 udp 602 mountd 100005 2 udp 602 mountd 100005 1 udp 602 mountd 100003 3 udp 2049 nfs 100003 2 udp 2049 nfs 100000 2 tcp 111 rpcbind 100000 2 udp 111 rpcbind

Note: The port numbers listed for mountd, statd, lockd, and quotad are not committed portnumbers. These services can be running on other ports of the storage systems. Because the systemselects these port numbers at random when it boots, they are not listed in the /etc/services file.

Ports not listed in /etc/servicesSome ports appear in a port scan but are not listed in the /etc/services file.

The following ports appear in a port scan but are not listed in the /etc/services file.

ServicePortProtocol

SSH (SecureAdmin)22TCP

SSL (SecureAdmin)443TCP

iSCSI-Target3260TCP

Note: Disable open ports that you do not need.

FTPFile Transfer Protocol (FTP) uses TCP ports 20 and 21.

If you use FTP to transfer files to and from your storage system, the FTP port is required; otherwise,use FilerView or the following CLI command to disable the FTP port:

options ftpd.enable off

IP port usage on a storage system | 159

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 160: Network Management Guide

FTP is not a secure protocol for two reasons:

• When users log in to the system, user names and passwords are transmitted over the network inclear text format that can easily be read by a packet sniffer program.These user names and passwords can then be used to access data and other network resources. Youshould establish and enforce policies that prevent the use of the same passwords to access storagesystems and other network resources.

• FTP server software used on platforms other than storage systems contains serious security-relatedflaws that allow unauthorized users to gain administrative (root) access and control over the host.

For a detailed description of the FTP support for your storage system, see the Data ONTAP 8.0 7-ModeFile Access and Protocols Management Guide.

SSHSecure Shell (SSH) protocol is a secure replacement for RSH and runs on TCP port 22. This port appearsin a port scan only if the SecureAdmin software is installed on your storage system.

There are three commonly deployed versions of the SSH protocol:

• SSH version 1—is secure than RSH or Telnet, but is vulnerable to TCP session attacks.This vulnerability to attack lies in the SSH protocol version 1 itself and not in the associated storagesystem products.

• SSH version 2—has a number of feature improvements over SSH version 1 and is less vulnerableto attacks.

• SSH version 1.5—is used to identify clients or servers that support both SSH versions 1 and 2.

To disable SSH support or to close TCP port 22, you must use the following CLI command:

secureadmin disable ssh

TelnetTelnet is used for administrative control of your storage system and uses TCP connections on port 23.Telnet is more secure than RSH, as secure as FTP, and less secure than SSH or Secure Socket Layer(SSL).

Telnet is less secure than SSH and SSL because:

• When users log in to a system, such as your storage system, user names and passwords are transmittedover the network in clear text format.Clear text format can be read by an attacker by using a packet sniffer program. The attacker can usethese user names and passwords to log in to your storage system and execute unauthorized

160 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 161: Network Management Guide

administrative functions, including destruction of data on the system. If administrators use the samepasswords on your storage system as they do on other network devices, the attacker can use thesepasswords to access the resources of the storage system as well.

Note: To reduce the potential for attack, you must establish and enforce policies preventingadministrators from using the same passwords on your storage system that they use to accessother network resources.

• Telnet server software used on other platforms (typically in UNIX environments) have serioussecurity-related flaws that allow unauthorized users to gain administrative (root) control over thehost.

Telnet is also vulnerable to the same type of TCP session attacks as SSH protocol version 1. However,TCP session attacks are less common because a packet sniffing attack is easier.

To disable Telnet, you must set options telnet.enable to off.

SMTPSimple Mail Transport Protocol (SMTP) uses TCP port 25. Your storage system does not listen on thisport but makes outgoing connections to mail servers using this protocol when sending AutoSupporte-mail.

Time serviceYour storage system supports two different time service protocols, time and ntp.

The following are the two different time service protocols:

• TIME protocol (also known as rdate)—specified in the RFC 868 standard. This standard allows fortime services to be provided on TCP or UDP port 37. Your storage system uses only UDP port 37.

• Simple Network Time Protocol (SNTP)—specified in the RFC 2030 standard and is provided onlyon UDP port 123.

When your storage system has the timed.enable option set to on and a remote protocol (rdate orSNTP) is specified, the storage system synchronizes to a network time server.

If the timed.enable option is set to off , your storage system is unable to synchronize with thenetwork time server using SNTP. You can use the rdate command to use the rdate TIME protocol.

You should set the timed.enable option to on in a cluster configuration.

IP port usage on a storage system | 161

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 162: Network Management Guide

DNSThe Domain Name System (DNS) uses UDP port 53 and TCP port 53. Your storage system does nottypically listen on these ports because it does not run a domain name server. However, if DNS is enabledon your storage system, it makes outgoing connections using UDP port 53 for host name and IP addresslookups.

The storage system never uses TCP port 53 because this port is used explicitly for communicationbetween DNS servers. Outgoing DNS queries by your storage system are disabled by turning off DNSsupport. Turning off DNS support protects against receiving bad information from another DNS server.

Because your storage system does not run a domain name server, the name service must be providedby one of the following:

• Network information service (NIS)

• An /etc/hosts file

• Replacement of host names in the configuration files (such as /etc/exports, /etc/usermap.cfg,and so on) with IP addresses

DNS must be enabled for participation in an Active Directory domain.

DHCPClients broadcast messages to the entire network on UDP port 67 and receive responses from theDynamic Host Configuration Protocol (DHCP) server on UDP port 68. The same ports are used for theBOOTP protocol.

DHCP is used only for the first-time setup of your storage system. Detection of DHCP activity on yourstorage system by a port scan other than the activity during the first-time setup indicates a seriousconfiguration or software error.

TFTPTrivial File Transfer Protocol (TFTP) uses TCP port 69. It is used mostly for booting UNIX or UNIX-likesystems that do not have a local disk (this process is also known as netbooting) and for storing andretrieving configuration files for devices such as Cisco routers and switches.

Transfers are not secure on TFTP because it does not require authentication for clients to connect andtransfer files.

Your storage system’s TFTP server is not enabled by default. When TFTP is enabled, the administratormust specify a directory to be used by TFTP clients, and these clients cannot access other directories.

162 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 163: Network Management Guide

Even within the TFTP directory, access is read-only. TFTP should be enabled only if necessary. Youcan disable TFTP using the following option:

options tftpd.enable off

HTTPHypertext Transport Protocol (HTTP) runs on TCP port 80 and is the protocol used by Web browsersto access Web pages.

Your storage system uses HTTP to access the following:

• Files when HTTP is enabled

• FilerView for graphical user interface (GUI) administration

• Secure FilerView when SecureAdmin is installed

The SecureAdmin SSL interface accepts connections on TCP port 443. SecureAdmin manages thedetails of the SSL network protocol, encrypts the connection, and then passes this traffic through to thenormal HTTP FilerView interface through a loopback connection. This loopback connection does notuse a physical network interface. HTTP communication takes place inside your storage system, and noclear text packets are transmitted.

HTTP is not vulnerable to security attacks because it provides read-only access to documents byunauthenticated clients. Although authentication is not typically used for file access, it is frequentlyused for access to restricted documents or for administration purposes, such as FilerView administration.The authentication methods defined by HTTP send credentials, such as user names and passwords, overthe network without encryption. The SecureAdmin product is provided with SSL support to overcomethis shortcoming.

Note: In versions earlier than Data ONTAP 7.0, your storage system listens for new connections(by default, set to TCP port 80) even when HTTP is not licensed and FilerView is disabled. However,starting with Data ONTAP 7.0, you can stop your storage system from listening for new connectionsby setting the options httpd.enable and httpd.admin.enable to off. If either of the optionsis set to on, your storage system will continue to listen for new connections.

KerberosThere are four Kerberos ports in the /etc/services file: TCP port 88, UDP port 88, TCP port 750,and UDP port 750. These ports are used only for outbound connections from your storage system. Yourstorage system does not run Kerberos servers or services and does not listen on these ports.

Kerberos is used by your storage system to communicate with the Microsoft Active Directory serversfor both CIFS authentication and, if configured, NFS authentication.

IP port usage on a storage system | 163

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 164: Network Management Guide

NFSNetwork File System (NFS) is used by UNIX clients for file access. NFS uses port 2049.

NFSv3 and NFSv2 use the portmapper service on TCP or UDP port 111. The portmapper service isconsulted to get the port numbers for services used with NFSv3 or NFSv2 protocols such as mountd,statd, and nlm. NFSv4 does not require the portmapper service.

NFSv4 provides the delegation feature that enables your storage system to grant local file access toclients. To delegate, your storage system sets up a separate connection to the client and sends callbackson it. To communicate with the client, your storage system uses one of the reserved ports (port numbersless than 1024). To initiate the connection, the client registers the callback program on a random portand informs the server about it.

With delegations enabled, NFSv4 is not firewall-friendly because several other ports need to be openedup as well.

You can disable the TCP and UDP ports by setting the nfs.tcp.enable and nfs.udp.enableoptions to off.

To disable NFS, you should use the nfs off command.

CIFSCommon Internet File Service (CIFS) is the successor to the server message block (SMB) protocol.CIFS is the primary protocol used by Windows systems for file sharing.

CIFS uses UDP ports 137 and 138, and TCP ports 139 and 445. Your storage system sends and receivesdata on these ports while providing CIFS service. If it is a member of an Active Directory domain, yourstorage system must also make outbound connections destined for DNS and Kerberos.

CIFS is required for Windows file service. You can disable CIFS using FilerView or by issuing thecifs terminate command on your storage system console.

Note: If you disable CIFS, be aware that your storage system’s /etc/rc file can be set up toautomatically enable CIFS again after a reboot.

SSLThe Secure Sockets Layer (SSL) protocol provides encryption and authentication of TCP connections.Data ONTAP supports SSLv2 and SSLv3. You should use SSLv3 because it offers better security thanprevious SSL versions.

164 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 165: Network Management Guide

When SecureAdmin is installed and configured on your storage system, it listens for SSL connectionson TCP port 443. It receives secure Web browser connections on this port and uses unencrypted HTTP,running on TCP port 80, through a loopback connection to pass the traffic to FilerView. This loopbackconnection is contained within your storage system and no unencrypted data is transmitted over thenetwork.

You can enable or disable SSL by using FilerView or with the following command:

secureadmin {enable|disable} ssl

SNMPSimple Network Management Protocol (SNMP) is an industry-standard protocol used for remotemonitoring and management of network devices over UDP port 161.

SNMP is not secure because of the following reasons:

• Instead of using encryption keys or a user name and password pair, SNMP uses a community stringfor authentication. The community string is transmitted in clear text format over the network, makingit easy to capture with a packet sniffer.Within the industry, devices are typically configured at the factory to use public as the defaultcommunity string. The public password allows users to make queries and read values but does notallow users to invoke commands or change values. Some devices are configured at the factory touse private as the default community string, allowing users full read-write access.

• Even if you change the read and write community string on a device to something other thanprivate, an attacker can easily learn the new string by using the read-only public communitystring and asking the router for the read-write string.

There are three versions of SNMP:

• SNMPv1 is the original protocol and is not commonly used.

• SNMPv2 is identical to SNMPv1 from a network protocol standpoint and is vulnerable to the samesecurity problems. The only differences between the two versions are in the messages sent, messagesreceived, and types of information. These differences are not important from a security perspective.

• SNMPv3 is the latest protocol version and includes security improvements but is difficult toimplement and many vendors do not yet support it. SNMPv3 supports several different types ofnetwork encryption and authentication schemes. It allows for multiple users, each with differentpermissions, and solves SNMPv1 security problems while maintaining an important level ofcompatibility with SNMPv2.

SNMP is required if you want to monitor a storage system through an SNMP monitoring tool, such asDataFabric Manager. The SNMP implementation in the storage system allows read-only access.Regardless of the community string used, the user cannot issue commands or change variables usingSNMP on your storage system.

You should use the snmp.access option to restrict SNMP access to a named set of trusted hosts.

IP port usage on a storage system | 165

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 166: Network Management Guide

You can disable SNMP entirely by setting the snmp.enable option to off to disable SNMP entirely.

The snmp community delete and snmp community add commands are used to change thecommunity string to something other than the default value.

RSHRemote Shell (RSH) protocol is used for remote command execution. It is less secure than TFTP anduses TCP port 514.

RSH is not secure because passwords are not required for login and commands are easy to misconfigure.Therefore, you should disable RSH by setting the rsh.enable option to off.

You should use the SSH supplied with SecureAdmin for remote command execution and login. If thisis not possible, Telnet is preferred to RSH.

If RSH is the only alternative, follow these guidelines when using RSH:

• Specify only secure, trusted hosts in the /etc/hosts.equiv file.

• Always use IP addresses rather than host names in the /etc/hosts.equiv file.

• Always specify a single IP address with a single user name on each line in /etc/hosts.equivfile.

• Use the rsh.access option instead of the trusted.hosts option for access control.

• Make sure the ip.match_any_ifaddr option is set to off.

SyslogYour storage system sends messages to hosts specified by the user in the /etc/syslog.conf file byusing the syslog protocol on UDP port 514. It does not listen on this port, nor does it act as a syslogserver.

The routed daemonThe routed daemon, routed, listens on UDP port 520. It receives broadcast messages from routers orother hosts using Routing Information Protocol (RIP). These messages are used by your storage systemto update its internal routing tables to determine which network interfaces are optimal for each destination.

Your storage system never broadcasts RIP messages containing routes because Data ONTAP is notcapable of acting as a router.

166 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 167: Network Management Guide

RIP is not secure because an attacker can easily send artificial RIP messages and cause hosts runningthe routed daemon (such as your storage system) to redirect network traffic to the attacker. The attackercan then receive and shift this traffic for passwords and other information and send it on to the actualdestination, where the intrusion is undetected. This method can also be used as a starting point for TCPsession attacks.

Because of these security issues, use static routes (those set up using the route command on yourstorage system) instead of using the routed daemon.

NDMPNetwork Data Management Protocol (NDMP) runs on TCP port 10000 and is used primarily for backupof network-attached storage (NAS) devices, such as storage systems.

The protocol defines three authentication methods:

• NONE—allows authentication without restriction

• TEXT—sends a clear text password over the network, similar to Telnet or FTP

• MD5—uses the MD5 message digest algorithm along with a challenge-response message exchangeto implement a secure login mechanism

Your storage system supports both the TEXT and MD5 authentication methods. Most NDMP-enabledbackup software uses MD5 by default.

To entirely disable the TEXT authentication method, you should set the ndmpd.authtype option tochallenge.

To restrict NDMP commands to certain authorized backup hosts, you should use the ndmp.accessoption.

Regardless of the authentication method used, NDMP sends backup data in decrypted format over thenetwork, as does most other backup software. A separate network optimized for backup is a commonmeans to increase performance while retaining data security.

To disable NDMP, you should set the ndmp.enable option to off.

SnapMirror and SnapVaultSnapMirror and SnapVault use TCP port 10566 for data transfer. Network connections are alwaysinitiated by the destination system; that is, SnapMirror and SnapVault pull data rather than push data.

Authentication is minimal with both SnapMirror and SnapVault. To restrict inbound TCP connectionson port 10566 to a list of authorized hosts or IP addresses, you should configure thesnapmirror.access or snapvault.access option. When a connection is established, the destinationstorage system communicates its host name to the source storage system, which then uses this host

IP port usage on a storage system | 167

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 168: Network Management Guide

name to determine if a transfer is allowed. You should confirm a match between the host name and itsIP address. To confirm that the host name and the IP address match, you should set thesnapmirror.checkip.enable option to on.

To disable SnapMirror, you should set the snapmirror.enable option to off. To disable SnapVault,you should set the snapvault.enable option to off.

168 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 169: Network Management Guide

Error codes for the netdiag command

Network error codes are generated by the netdiag command. They describe the network problemsand suggest the actions that you can take.

The following table lists some network error codes, describes the problems that the error codes pointto, and suggests actions that you can take to fix the problems.

Note: Only a small fraction of the possible network error messages are presented in the followingtable. If you receive any problem code not listed in this chapter, contact your technical support.

Recommended actionsDescriptionError code

Complete the following steps until you detect a link:

1. Ensure that the cable is connected between the switch port andyour storage system interface, and that both ends are securelyattached.

2. Ensure that the switch port and interface are both configured up,and one of the following is true:

• Autonegotiation is enabled on both sides

• Autonegotiation is disabled on both sides, and the duplexand speed settings match

3. Because the switch port, cable, or NIC might be faulty, replacethem, one-by-one, to locate the fault.

4. If the problem persists, contact your technical support.

Link not detected.201

Change the interface configuration or peer switch port configurationto match the speed.

No link is detectedbecause of a speedmismatch.

203

Configure the interface state to up.The interface is notconfigured up.

204

Change the interface or peer switch port duplex setting so that theymatch.

Duplex mismatch.205

Upgrade to a faster interface.Link capacity problem.206

Error codes for the netdiag command | 169

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 170: Network Management Guide

Recommended actionsDescriptionError code

Complete the following steps:

1. Pull the network cable out from the network interface card.

2. Reinsert the cable.

3. Use ifstat to display statistics.

• Link errors, such as CRC, are caused by a faulty switch port,cable, or NIC; replace them one-by-one to locate the fault.

• Out-of-resource errors are caused by heavy loads.

4. If the problem persists, contact your technical support.

The interface is nottransmitting or receiving.

207

Complete the following steps:

1. Reseat the interface card.

2. Check the cables.

3. If the problem persists, contact your technical support.

Excessive I/O errors.208

The problem is not with your storage system.

Contact your network administrator to resolve the problem.

Excessive unsupportedprotocol packets arebeing sent to yourstorage system.

209

Change the configuration by using the ifconfig command.The IP address and thenetmask are inconsistentwith the assignedbroadcast address.

301

If this behavior is erroneous, change the configuration.The broadcast addressreaches a larger set ofhosts than the standardbroadcast computed fromthe IP address andnetmask.

302

Switch from NFS over UDP to NFS over TCP.There are excessive IPreassembly errors.

303

The problem is not with your storage system.

Reconfigure the client.

The TCP windowadvertised by the clientis too small.

401

The problem is not with your storage system.

Examine the network and the client for congestion.

There is excessive packetloss on the sending side.

402

170 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 171: Network Management Guide

Recommended actionsDescriptionError code

The problem is not with your storage system.

Examine the network and the client for congestion.

There is excessive packetloss on the receivingside.

403

The problem is not with your storage system.

Enable support for jumbo frames in network devices and the client.

The average TCP packetsize is poor on thereceiving side becausethe network, client, orboth are not enabled tosupport jumbo frames.

404

The problem is not with your storage system.

Examine the network and client for configured MTUs.

The average TCP packetsize is poor on thereceiving side because ofa problem with thenetwork, client, or both.

405

The problem is not with your storage system.

Examine the client application data transmission strategy.

The average TCP packetsize is poor on thereceiving side because ofa client applicationproblem.

406

Contact your network administrator to resolve the problem.Excessive TCP listensocket drops because thesystem is overloaded orunder security attack.

407

Check your network.

Contact your network administrator to resolve the problem.

There are excessivefiltered TCP port dropsbecause the system isunder security attack.

408

A packet trace might assist in locating the problem. Contact yournetwork administrator to resolve the problem.

There are excessiveembryonic TCPconnection drops becausethe system is undersecurity attack orbecause a client has abug.

409

Error codes for the netdiag command | 171

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 172: Network Management Guide

Recommended actionsDescriptionError code

• Check your client system for bugs.

• Replace hardware components until the problem is resolved.

• Contact your network administrator to resolve the problem.

Excessive TCPchecksum errors. Theseerrors can be caused badhardware on the client, inthe networkinfrastructure (forexample, blade in switchor router), or on the NIC.These errors can also becaused by a bug in theclient.

410

The problem is not with your storage system.

• Check your client system for bugs.

• Check for a security attack.

There are packetsbecause of a client. Yoursystem might be under asecurity attack.

411

Switch from NFS over UDP to NFS over TCP.There are excessive UDPchecksum errors.

451

Examine the DNS server and the path to the DNS server.The DNS server is notreachable.

601

Examine the NIS server and the path to the NIS server.The NIS server is notreachable.

602

172 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 173: Network Management Guide

Index

/etc/gateways file 51/etc/hosts file

about 59adding, host name 60changing host name 61creating, from NIS master 70editing, with FilerView 61hard limits 61host-name resolution 59

/etc/nsswitch.conf file 59, 77, 78/etc/resolv.conf file 63, 64, 66/etc/services file 155, 159/etc/syslog.conf file 166

10 Gigabit Ethernet interfacestatistics 145

A

A record 64alias address

about 37creating 38deleting 38

alternative IP address 37

C

CIFS (Common Internet File Service) 164commands

dns flush 64dns info 64ifconfig 29, 30, 34, 37, 39, 52, 105ifconfig -a 41ifgrp add 124ifgrp create 118ifgrp create lacp 123ifgrp create multi 121ifgrp create single 119ifgrp delete 125ifgrp destroy 129ifgrp favor 120ifgrp nofavor 120, 121

commands (continued)ifgrp stat 128ifgrp status 126, 127ifstat 34, 41, 44, 145netdiag 137, 169netstat 41, 42netstat -p icmp 139netstat -rn 54, 55nis info 74, 75ping 137pktt 137route 50, 51, 56route -s 54route add 52routed 53routed status 55snmp 83, 84snmp authtrap 84snmp community 84snmp contact 84snmp init 84snmp location 84snmp traphost 84snmp traps 79, 84, 89, 91, 92snmp traps load 90snmpbulkget 86snmpbulkwalk 86snmpwalk 82, 86sysconfig 23useradmin group add 82useradmin role add 82useradmin user add 82vlan add 102, 105, 106vlan create 102, 104, 105vlan delete 102, 106, 107vlan modify 102, 108vlan stat 102, 108, 109

Common Internet File Service (CIFS) 164

D

default route 52, 54, 55DHCP 162diagnose network problems 137

Index | 173

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 174: Network Management Guide

diagnostic tests 137DNS

about 62configuration information 64configuring, from the command-line interface 63configuring, with FilerView 76disabling 63disabling, dynamic updates 67dynamic updates 65, 66enabling 63enabling, dynamic updates 67fully qualified domain names (FQDN) 64host-name resolution 59, 62, 64lookup 64modifying dns.update.ttl 68name cache 64port used 162time-to-live (TTL) 66

Domain Name System (DNS) 62duplex settings, correcting mismatches 153dynamic DNS

about 65, 66disabling 67disabling, for an IP address 67enabling 67in Data ONTAP 66

Dynamic Host Configuration Protocol (DHCP) 62, 162

E

e0M 24error messages

error code, netdiag 169networking 169

Ethernet framejumbo frame 26

F

fast pathabout 49disabling 52, 53enabling 52, 53with asymmetric routing 50with NFS-over-UDP 50with ping utility 50with TCP 50with Telnet 50

File Transfer Protocol (FTP) 159

FilerViewchanging host-name search order 77configuring DNS 76configuring NIS 76configuring SNMP 84network interface settings 39network report 47routed daemon 53SNMP traps 89viewing routing table 56viewing, network interface statistics 47

flow controlabout 27, 34options 34

frameabout 25characteristics 25Ethernet 25flow 27frame size 25jumbo 25jumbo frame 25MTU size 25Pause Off 27Pause On 27

FTP 159fully qualified domain names (FQDN) 64

G

GARP (Generic Attribute Registration Protocol) 99GARP VLAN Registration Protocol (GVRP) 99Generic Attribute Registration Protocol (GARP) 99Gigabit Ethernet controller

LINK INFO statistics 141RECEIVE statistics 141statistics 141TRANSMIT statistics 141

Gigabit Ethernet interfaceinterface statistics 145statistics 148

GVRP 101GVRP (GARP VLAN Registration Protocol) 99

H

hostidentification 155naming 21

174 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 175: Network Management Guide

host nameabout 21adding, in /etc/hosts file 60changing 61changing search order 77, 78resolution 77resolution, with /etc/hosts file 59resolution, with DNS 62resolution, with NIS 68, 71search order 77

host-name resolutionabout 59, 78FilerView 77using /etc/hosts file 59using DNS 62, 64using NIS 68, 71

HTTP 163Hypertext Transport Protocol (HTTP) 163

I

ICMP 138, 139ICMP redirect messages 139ICMP Router Discovery Protocol (IRDP) 51IEEE 802.1Q standards 101ifgrp

creating single-mode 119deleting 125deleting interfaces 125destroying 129viewing statistics 128

inter-switch link (ISL) 130interface group

about 111adding interfaces 124dynamic multimode 112, 115, 123dynamic multimode, LACP log 124failover, second-level 132in an HA pair 132LACP 123load balancing 116, 117load balancing, IP address based 116load balancing, MAC address based 116manage 117naming 21second-level 130, 132selecting preferred interface 120single-mode 112, 113, 120specifying nonfavored interface 121static multimode 112, 114, 121

interface group (continued)status 127types 112viewing status 126

interface group, example 112interface groups

second-level 133IP address

alias 37, 38broadcast 32configuration 29configuring 30flow control 33media type 32MTU size 33partner interface 35partner IP 35prefix length 31removing 36subnet mask 31

IP ports 155

J

jumbo framesadvantages 25, 26configuring 26network requirements 26size 25

K

Kerberos 163

L

LACP (Link Aggregation Control Protocol) 115LACP log file 124Link Aggregation Control Protocol (LACP) 115LINK INFO statistics

10 Gigabit Ethernet interface 145Gigabit Ethernet interface 145, 148

load balancingIP address based 116MAC address based 116multimode interface groups 116round-robin 116

localhost 59

Index | 175

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 176: Network Management Guide

M

MIB/etc/mib/iscsi.mib 80/etc/mib/netapp.mib 80custom mib 80iSCSI MIB 80

multimode interface groupsload balancing, IP address based 116load balancing, MAC address based 116load balancing, round-robin 117

N

NDMP (Network Data Management Protocol) 167negotiated failover 36Network Data Management Protocol (NDMP) 167Network File System (NFS) 164Network Information Service (NIS) 68network interface

10 Gigabit Ethernet 2110/100/1000 Ethernet 21automatic takeover 36balancing NFS traffic 153blocking protocols 40changing status 39clearing statistics 44configuration 29configuring 29down 38down, status 39flow control 33Gigabit Ethernet 21maximum number 23modifying with FilerView 39naming 21nfo 36partner 35removing, protocol block 40statistics 141statistics for T204E 145statistics for T204V 145statistics for T210 145statistics for T320 145trusted 34types 21untrusted 34up 38up, status 39viewing context statistics 42

network interface (continued)viewing settings 37viewing statistics 44viewing statistics, FilerView 47viewing status 38

network interfacesviewing statistics 41

NFSbalancing traffic 153port used 164

NISabout 68administrative commands

ypcat 71ypgroup 71ypmatch 71yppush 69ypwhich 71

configure 71configuring, with FilerView 76creating /etc/hosts file 70disabling 72enabling 72enabling slave 73host-name resolution 59, 68, 71hosts map 68, 70master 70netgroup cache 74selecting the master server 70slave 69, 70specifying domain name 72specifying servers 73statistics 74viewing information 74viewing, performance statistics 75

NIS (Network Information Service) 68NIS slave

about 69enabling 73guidelines 70improve performance 69

NNTP 158

O

OID 80options

dns.cache.enable 64dns.update.enable 67dns.update.ttl 68

176 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 177: Network Management Guide

options (continued)interface.blocked.protocol 40ip.fastpath.enable 53ip.icmp_ignore_redirect.enable 52, 139ip.ping_throttle.drop_level 138, 139nis.domainname 72nis.enable 72nis.server 70nis.servers 70, 73nis.slave.enable 73snmp.access 83snmp.enable 81

P

pause frame 27performance, storage system 153ping

command 137diagnose problems 138throttling 138throttling, disabling 139throttling, threshold status 139throttling, threshold value 138

portfor SnapMirror 167for SnapVault 167NDMP 167NFS 164

port usage 155ports

TCP 158UDP 158

ports, IP 155ports, NFS-enabled 158

R

RECEIVE statistics10 Gigabit Ethernet interface 145Gigabit Ethernet interface 145, 148

Remote Shell (RSH) 166reverse lookup 64RIP (Routing Information Protocol) 52route

default 52route metric 55routed daemon

about 51disable 52

routed daemon (continued)enable 52port usage 166turning off 51, 53turning off, with FilerView 53turning on 53turning on, with FilerView 53

routingabout 49default route 52, 54, 55fast path 49, 52, 53FilerView 53managing routing table 50methods 49modifying routing table 56routed daemon 51, 52, 53routing table 52, 54vFiler units 51viewing with FilerView 56

routing information 55, 56Routing Information Protocol (RIP) 51, 52, 166routing protocols 55, 56routing table

commands to manage 50flags 55modify, circumstances 52modifying 56vFiler units 51viewing 54viewing with FilerView 56

RSH 166

S

second-level interface groupguidelines for creating 130

Secure Shell (SSH) 160Secure Sockets Layer (SSL) 164services file 155Simple Mail Transport Protocol (SMTP) 161Simple Network Management Protocol (SNMP) 79, 165Simple Network Time Protocol (SNTP) 161single-mode interface group

favored interface 120nonfavored interface 120preferred interface 120

SMTP 161SNMP

about 79access privileges, setting 83

Index | 177

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 178: Network Management Guide

SNMP (continued)agent 79, 80agent, configure 80authKey security 85authNoPriv security 85authProtocol security 85commands 84, 86configuring group, v3 82configuring role, v3 82configuring users, v3 82configuring, with FilerView 84disabling 81enabling 81examples 86login-snmp capability, v3 82MIBs 79, 80modifying configuration 83modifying, with FilerView 84noAuthNoPriv security 85port usage 165restricting access 83security parameters 85traps 80traps, configuration file 90traps, define 89traps, examples 90traps, guidelines for creating 88traps, modify 89traps, modifying 89traps, modifying with FilerView 89traps, parameter 95traps, parameters 91, 92, 93, 94, 95, 96traps, types 79traps, user-defined 88traps, viewing 89traps, viewing with FilerView 89version 3 (SNMPv3) 79viewing configuration 83

SNMP (Simple Network Management Protocol) 79SNMP traps

backoff-calculator parameter 95backoff-multiplier parameter 95backoff-step parameter 95built-in 79commands 91configuring, in a file 90creating 89defining 90edge-1 parameter 93edge-1-direction parameter 94

SNMP traps (continued)edge-2 parameter 93edge-2-direction parameter 94example 90guidelines 88interval parameter 94interval-offset parameter 94loading 90message parameter 96modifying 89modifying, with FilerView 89parameters 91, 92priority parameter 95rate-interval parameter 94trigger parameter 93user-defined 79, 88var parameter 93viewing 89viewing, with FilerView 89

SNMPv3about 79configuring group 82configuring role 82configuring users 82example 86login-snmp capability 82

SNTP 161split-network condition 130SSH 160SSL 164statistics

Gigabit Ethernet interface 148syslog 166

T

Telnet 160TFTP 162time service 161time-to-live (TTL) 66, 68TRANSMIT statistics

10 Gigabit Ethernet interface 145Gigabit Ethernet interface 145, 148

transport layer, diagnosing 137Trivial File Transfer Protocol (TFTP) 162TTCP 158

178 | Data ONTAP 8.0 7-Mode Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 179: Network Management Guide

V

VLANabout 97adding an interface 106advantages 100commands 102, 105configuring 101, 102, 105configuring GVRP 99creating 102, 104deleting 106, 107enabling GVRP 102

VLAN (continued)GVRP 99ifconfig 102membership 97, 98modifying 108naming 21prerequisites 101tagged traffic 103tags 99untagged traffic 103viewing statistics 108, 109

Index | 179

Release Candidate Documentation—24 August 2009

Contents Subject to Change

Page 180: Network Management Guide

Release Candidate Documentation—24 August 2009

Contents Subject to Change


Recommended