Cisco Training Courses

Cisco Training Courses

Insoft has been serving IT industry with authorized Cisco courses training, since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco U

Cisco U. is customized to achieve your learning needs as this provides learning paths that includes wide range of topics, including CCNA, Cloud and Network Automation Essentials.

Browse Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

Insoft Services´ training capabilities rely on the excellence of our exclusive Fortinet Certified Trainers (FCT). We are dedicated to providing high-quality training to Fortinet Customers and Partners.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More
Cisco Training Courses

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

 

TXOne Networks provides cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through the OT zero trust methodology protecting assets for their entire life cycle.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

CDOTDP9 – ONTAP 9 Cluster Administration and Data Protection

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Data Protection & Privacy

I consent to receive emails and/or calls from Insoft Services related to the Insoft Services´ products and services.
I acknowledge that my data will be collected and processed as described in the Insoft Services privacy policy.

Close

CDOTDP9 – ONTAP 9 Cluster Administration and Data Protection

Enroll Now
Duration
5 Days
Delivery
(Online and onsite)
Price
Price Upon Request

This five-day ONTAP 9 Cluster Administration & Data Protection (CDOTDP9) course comprises of the three-day ONTAP 9 Cluster Administration (ONTAP9ADM) followed by the two-day ONTAP 9 Data Protection Administration (DATAPROT9) courses.

The first 3 days use lecture and hands-on exercises to teach basic administration and configuration of a cluster. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager.

Students spend the final 2 days learning the core technologies of ONTAP Data protection administration. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.

By the end of this course, you should be able to:

  • Describe how ONTAP 9 fits into NetApp’s Cloud and Data Fabric strategy
  • Identify supported ONTAP platforms
  • Define ONTAP cluster components
  • Create a cluster
  • Manage ONTAP administrators
  • Configure and manage storage resources
  • Configure and manage networking resources
  • Describe a Storage Virtual Machine’s (SVM’s) role in NetApp’s storage architecture
  • Create and configure an SVM
  • Create and manage FlexVols
  • Implement storage efficiency features
  • Create protocol servers within an SVM
  • Upgrade and revert ONTAP patches and releases
  • Describe the levels on which ONTAP protects data
  • Describe the ONTAP 9 data protection features
  • Understand the various data mirroring relationships available with ONTAP 9
  • Configure and operate SnapMirror and SnapVault data replication
  • Demonstrate Storage Virtual Machine data protection
  • Explain the components and configuration involved with SyncMirror and MetroCluster
  • Describe NDMP protocol operation, configuration and management
  • Pre/Post Assessment

ONTAP 9 Cluster Administration Module 1: ONTAP Overview

  • Data Fabric
  • ONTAP software
  • Fabric layers
  • The cluster
  • Nodes
  • High-availability pairs
  • Networks
  • Ports and logical interfaces
  • ONTAP storage architecture
  • Physical storage
  • SVM
    • Components
    • Types
    • Benefits
    • Root volume
    • FlexVol volumes
  • Data LIFs
  • Simply Anywhere
  • ONTAP Select
  • ONTAP cloud

Module 2: Cluster Setup

  • Terminology review
  • FAS configurations
  • Supported cluster configurations
    • Single-node
    • Two-node
    • Multimode
    • MetroCluster
  • Cluster setup steps
  • Disk-shelf
  • Power on
  • Firmware
  • Boot menu
  • Connections
  • Node installing and initialization
  • Boot sequence
  • Creating a cluster
  • Cluster administrators
  • Clustershell
  • OnCommand system manager 9.0

Module 3: Management

  • Managing clusters
  • Administrators
  • Access
  • RBAC
  • Active directory authentication
  • Administrative security
  • Date and time
  • Licensing
  • Policy-based storage services
  • Policy-based management
  • Jobs and schedules

Module 4: Network management

  • Network types
  • Physical ports
  • Modifying network port attributes
  • Ifgroups
  • VLANS
  • IPspace review
  • Broadcast domains
  • Subnets
  • Network interfaces
  • Logical interfaces
  • Data LIFs
  • Nondisruptive LIF features
  • Failover groups vs. failover policies
  • Routing management
  • Host-name resolution

Module 5: Physical Storage

  • Storage architecture
  • Disks and aggregates
  • Spare disks
  • RAID groups
  • ONTAP RAID technologies
  • Virtual storage tier
  • Flash cache 2 feature
  • Flash pool aggregates
  • SSD tier
  • SSD partitioning
  • Root-Data advanced drive partitioning

Module 6: Logical Storage

  • Flexible volumes
  • Files and LUNs
  • Volumes in aggregates
  • Properties
  • SVM flexible volume
  • Snapshot copy technology
  • Copy design
  • Snapshot policy
  • Typical workflow
  • Recovering data
  • UNIX client
  • Moving volumes

Module 7: Storage Efficiency

  • Thick and Thin provisioning
  • Deduplication
  • Data compression
  • Inline data compaction
  • Storage consumption
  • FlexClone volume clones
  • Split a cloned volume

Module 8: NAS Protocols

  • Unified storage
  • Terminology
  • NAS file system
  • NFS implementation
  • Junctions
  • NAS namespace architecture
  • NFS
  • NFSv3 implementation steps
  • Exporting
  • Client specification
  • Export policies and rules
  • Mounts
  • Block protocol
  • SMB implementation steps
  • Creating shares
  • Share permissions
  • Windows file permissions
  • SMB authentication methods
  • MMC support
  • Network load balancing

Module 9: SAN Protocols

  • SAN
  • SCSI concepts
  • Scalable SAN support
  • iSCSI architecture
  • iSCSI nodes
  • implementation
  • ONTAP portal groups
  • Creating a LUN
  • Creating an igroup
  • Windows LUN implementation

Module 10: Cluster Maintenance

  • Upgrade advisor
  • Rolling upgrade
  • OnCommand system manager
  • Alerts
  • Autosupport tool
  • EMS
  • Event-Log filtering
  • OnCommand portfolio
  • System manager dashboard
  • OnCommand unified manager
  • Performance considerations
  • Analyzing I/O
  • ONTAP 9 OnCommand performance manager
  • QoS scaling
  • Disk type performance
  • Optimal operating point
  • Maximize performance
  • System logs

Module 11: Data Protection Features

  • Data currency
  • Data consistency
  • Challenges
  • HA solutions
  • Disaster recovery solutions
  • Compliance solutions
  • Cloud solutions
  • Managing and monitoring
  • Partner management software
  • Tools

Labs:

  • Verify connectivity to an ONTAP cluster
  • Verify that required license codes are installed
  • Explore the clustershell CLI
  • Navigate command directories
  • Adjust preferences by using the SET command
  • Practice tab completion
  • Use the command history
  • Navigate OnCommand system manager
  • Create a login banner and MOTD
  • Explore licensing
  • Configure cluster time and assign an NTP server
  • Create custom administrators and verify access levels
  • Authenticate a cluster administrator by using active directory
  • Create an interface group
  • Create a VLAN
  • Create a new IPspace, broadcast domain and subnet
  • Create a subnet for the default IPspace
  • Explore failover groups
  • Create data LIFs
  • Create an aggregate
  • Expand an aggregate
  • Verify the operability of a degraded RAID-TEC aggregate
  • Convert an aggregate to a flash pool
  • Create flexible volumes
  • Manage snapshot copies
  • Restore a file from a snapshot copy
  • Expand a volume and perform a volume move
  • Explore thin provisioning
  • Enable storage efficiency
  • Create and split a FlexClone volume
  • Migrate and rehome a NAS data LIF
  • Configure an SVM to host NFS and SMB protocols
  • Verify and create SMB shares
  • Access SMB shares from a windows client
  • Access the NFS export from a Linux client
  • Verify MPIO configuration
  • Check the iSCSI software initiator name
  • Use OnCommand system manager to configure an SVM for iSCSI
  • Configure the iSCSI software initiator on the windows host
  • Access the iSCSI-attached LUN from the windows host
  • Explore the event log
  • Collect statistics for the headroom feature
  • Create a workload on an SVM by using iometer
  • Configure storage QoS for an SVM
  • Explore headroom statistics for CPU

ONTAP 9.0 Data Protection Administration Module 1: ONTAP Integrated Data Protection

  • Data protection overview
    • Currency
    • Types
    • Consistency
    • Challenges
  • High availability
    • NVRAM
    • RAID DP or RAID-TEC technology
  • Backup and archive
    • Snapshot copy
    • SnapRestore
    • SnapVault
    • Dump or SMTape
  • Disaster recovery
    • SnapMirror
    • FlexClone
    • Load-sharing mirrors
    • SyncMirror
    • MetroCluster
  • Compliance
    • NetApp Storage Encryption (NSE)
    • SnapLock
  • Cloud
    • Private storage
    • Snap-to-Cloud
    • AltaVault
  • OnCommand system manager
  • Host-level software
  • Application-level software
  • Data Protection tools

Module 2: NetApp Mirroring Fundamentals

  • SnapMirror technology
  • Mirror relationships
  • Relationship types
  • Load sharing
  • SnapMirror and SnapVault configuration
  • SnapMirror policies and configuration
  • Automatic transfers
  • Intercluster network connectivity
  • TCP connections
  • Two cluster networking
  • Cluster cascade networking
  • Deployment configuration
  • SnapMirror cascade deployments
  • Cluster Fan-out or Fan-in
  • Intercluster SnapMirror Throttle
  • Network compression
  • Peer relationships

Module 3: Implement SnapMirror Relationships

  • FlexVol volumes mirror copy
  • SnapMirror relationships configuratiom
  • Licensing
  • Language setting
  • Job schedules
  • Monitoring relationships
  • Failover mode
  • Disaster mode
  • Version-independent SnapMirror technology
  • FlexClone technology
  • Tape backup
  • NDMP
  • Volume move

Module 4: Disaster Recovery for Storage Virtual Machines

  • SVM disaster recovery
  • Identity preserve option
  • SVM disaster recovery requirements
  • Selective protection
  • Test and Dev
  • Convert a volume

Module 5: Disk-to-Disk Backup with SnapVault Software

  • SnapVault Soltuion components
  • Snapshot copy policy
  • SnapVault backups
  • Managing SnapMirror and SnapVault updates
  • SnapVault end-to-end storage efficiency
  • Storage compression
  • Space planning requirements
  • Tiered backup
  • Restoring data

Module 6: SyncMirror and MetroCluster Software

  • Data mirroring
  • Plexes and pools to an aggregate relationship
  • Storage type considerations
  • SyncMirror Plex failure
  • MetroCluster overview
  • Nondisruptive operations
  • Local HA failover
  • Protecting data
  • Unmirrored aggregates
  • Node-level QoS
  • Active-active configuration
  • Planned switchover
  • Tiebreaker software

Module 7: NDMP and Tape Backup

  • NDMP technology
  • Terms and concepts
  • Nodes, connections and variables
  • Managing SVM-Scoped NDMP
  • NDMP backup models
  • User authentication
  • SVM-aware NDMP
  • Management commands

Labs:

  • Ensure connectivity to your ONTAP cluster
  • Synchronize system time for windows domains
  • Assign a network time protocol (NTP) server for SVL-NAU and RTP-NAU
  • Verify that required license codes are installed
  • Create intercluster subnets and LIFs
  • Prepare the storage environment on RTP-NAU as the secondary target
  • Configure cluster peering
  • Configure SVM peering
  • Configure a SnapMirror relationship
  • Verify data transfer
  • Take the source volume offline
  • Activate the destination volume
  • Reactivate the original source volume
  • Restore the original SnapMirror relationship
  • Create an unscheduled Snapshot copy
  • Configure storage virtual machine disaster recovery
  • Check for space requirements
  • Create the disaster-recovery SVM
  • Create an SVM peer relationship
  • Create the SVM SnapMirror relationship
  • Failover to the disaster-recovery SVM
  • Reverse the SnapMirror relationship
  • Recover the primary SVM
  • Create the SnapVault relationship
  • Verify data transfer
  • Simulate a disaster and recover data
  • Network Engineers
  • Channel Partners
  • System Engineers

Completion of the following web-based training modules:

  • ONTAP Cluster Fundamentals (WBT)
  • ONTAP NAS Fundamentals (WBT)
  • ONTAP SAN Fundamentals (WBT)
  • ONTAP Data Protection Fundamentals (WBT)
This five-day ONTAP 9 Cluster Administration & Data Protection (CDOTDP9) course comprises of the three-day ONTAP 9 Cluster Administration (ONTAP9ADM) followed by the two-day ONTAP 9 Data Protection Administration (DATAPROT9) courses. The first 3 days use lecture and hands-on exercises to teach basic administration and configuration of a cluster. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. Students spend the final 2 days learning the core technologies of ONTAP Data protection administration. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.

By the end of this course, you should be able to:

  • Describe how ONTAP 9 fits into NetApp’s Cloud and Data Fabric strategy
  • Identify supported ONTAP platforms
  • Define ONTAP cluster components
  • Create a cluster
  • Manage ONTAP administrators
  • Configure and manage storage resources
  • Configure and manage networking resources
  • Describe a Storage Virtual Machine’s (SVM’s) role in NetApp’s storage architecture
  • Create and configure an SVM
  • Create and manage FlexVols
  • Implement storage efficiency features
  • Create protocol servers within an SVM
  • Upgrade and revert ONTAP patches and releases
  • Describe the levels on which ONTAP protects data
  • Describe the ONTAP 9 data protection features
  • Understand the various data mirroring relationships available with ONTAP 9
  • Configure and operate SnapMirror and SnapVault data replication
  • Demonstrate Storage Virtual Machine data protection
  • Explain the components and configuration involved with SyncMirror and MetroCluster
  • Describe NDMP protocol operation, configuration and management
  • Pre/Post Assessment

ONTAP 9 Cluster Administration Module 1: ONTAP Overview

  • Data Fabric
  • ONTAP software
  • Fabric layers
  • The cluster
  • Nodes
  • High-availability pairs
  • Networks
  • Ports and logical interfaces
  • ONTAP storage architecture
  • Physical storage
  • SVM
    • Components
    • Types
    • Benefits
    • Root volume
    • FlexVol volumes
  • Data LIFs
  • Simply Anywhere
  • ONTAP Select
  • ONTAP cloud

Module 2: Cluster Setup

  • Terminology review
  • FAS configurations
  • Supported cluster configurations
    • Single-node
    • Two-node
    • Multimode
    • MetroCluster
  • Cluster setup steps
  • Disk-shelf
  • Power on
  • Firmware
  • Boot menu
  • Connections
  • Node installing and initialization
  • Boot sequence
  • Creating a cluster
  • Cluster administrators
  • Clustershell
  • OnCommand system manager 9.0

Module 3: Management

  • Managing clusters
  • Administrators
  • Access
  • RBAC
  • Active directory authentication
  • Administrative security
  • Date and time
  • Licensing
  • Policy-based storage services
  • Policy-based management
  • Jobs and schedules

Module 4: Network management

  • Network types
  • Physical ports
  • Modifying network port attributes
  • Ifgroups
  • VLANS
  • IPspace review
  • Broadcast domains
  • Subnets
  • Network interfaces
  • Logical interfaces
  • Data LIFs
  • Nondisruptive LIF features
  • Failover groups vs. failover policies
  • Routing management
  • Host-name resolution

Module 5: Physical Storage

  • Storage architecture
  • Disks and aggregates
  • Spare disks
  • RAID groups
  • ONTAP RAID technologies
  • Virtual storage tier
  • Flash cache 2 feature
  • Flash pool aggregates
  • SSD tier
  • SSD partitioning
  • Root-Data advanced drive partitioning

Module 6: Logical Storage

  • Flexible volumes
  • Files and LUNs
  • Volumes in aggregates
  • Properties
  • SVM flexible volume
  • Snapshot copy technology
  • Copy design
  • Snapshot policy
  • Typical workflow
  • Recovering data
  • UNIX client
  • Moving volumes

Module 7: Storage Efficiency

  • Thick and Thin provisioning
  • Deduplication
  • Data compression
  • Inline data compaction
  • Storage consumption
  • FlexClone volume clones
  • Split a cloned volume

Module 8: NAS Protocols

  • Unified storage
  • Terminology
  • NAS file system
  • NFS implementation
  • Junctions
  • NAS namespace architecture
  • NFS
  • NFSv3 implementation steps
  • Exporting
  • Client specification
  • Export policies and rules
  • Mounts
  • Block protocol
  • SMB implementation steps
  • Creating shares
  • Share permissions
  • Windows file permissions
  • SMB authentication methods
  • MMC support
  • Network load balancing

Module 9: SAN Protocols

  • SAN
  • SCSI concepts
  • Scalable SAN support
  • iSCSI architecture
  • iSCSI nodes
  • implementation
  • ONTAP portal groups
  • Creating a LUN
  • Creating an igroup
  • Windows LUN implementation

Module 10: Cluster Maintenance

  • Upgrade advisor
  • Rolling upgrade
  • OnCommand system manager
  • Alerts
  • Autosupport tool
  • EMS
  • Event-Log filtering
  • OnCommand portfolio
  • System manager dashboard
  • OnCommand unified manager
  • Performance considerations
  • Analyzing I/O
  • ONTAP 9 OnCommand performance manager
  • QoS scaling
  • Disk type performance
  • Optimal operating point
  • Maximize performance
  • System logs

Module 11: Data Protection Features

  • Data currency
  • Data consistency
  • Challenges
  • HA solutions
  • Disaster recovery solutions
  • Compliance solutions
  • Cloud solutions
  • Managing and monitoring
  • Partner management software
  • Tools

Labs:

  • Verify connectivity to an ONTAP cluster
  • Verify that required license codes are installed
  • Explore the clustershell CLI
  • Navigate command directories
  • Adjust preferences by using the SET command
  • Practice tab completion
  • Use the command history
  • Navigate OnCommand system manager
  • Create a login banner and MOTD
  • Explore licensing
  • Configure cluster time and assign an NTP server
  • Create custom administrators and verify access levels
  • Authenticate a cluster administrator by using active directory
  • Create an interface group
  • Create a VLAN
  • Create a new IPspace, broadcast domain and subnet
  • Create a subnet for the default IPspace
  • Explore failover groups
  • Create data LIFs
  • Create an aggregate
  • Expand an aggregate
  • Verify the operability of a degraded RAID-TEC aggregate
  • Convert an aggregate to a flash pool
  • Create flexible volumes
  • Manage snapshot copies
  • Restore a file from a snapshot copy
  • Expand a volume and perform a volume move
  • Explore thin provisioning
  • Enable storage efficiency
  • Create and split a FlexClone volume
  • Migrate and rehome a NAS data LIF
  • Configure an SVM to host NFS and SMB protocols
  • Verify and create SMB shares
  • Access SMB shares from a windows client
  • Access the NFS export from a Linux client
  • Verify MPIO configuration
  • Check the iSCSI software initiator name
  • Use OnCommand system manager to configure an SVM for iSCSI
  • Configure the iSCSI software initiator on the windows host
  • Access the iSCSI-attached LUN from the windows host
  • Explore the event log
  • Collect statistics for the headroom feature
  • Create a workload on an SVM by using iometer
  • Configure storage QoS for an SVM
  • Explore headroom statistics for CPU

ONTAP 9.0 Data Protection Administration Module 1: ONTAP Integrated Data Protection

  • Data protection overview
    • Currency
    • Types
    • Consistency
    • Challenges
  • High availability
    • NVRAM
    • RAID DP or RAID-TEC technology
  • Backup and archive
    • Snapshot copy
    • SnapRestore
    • SnapVault
    • Dump or SMTape
  • Disaster recovery
    • SnapMirror
    • FlexClone
    • Load-sharing mirrors
    • SyncMirror
    • MetroCluster
  • Compliance
    • NetApp Storage Encryption (NSE)
    • SnapLock
  • Cloud
    • Private storage
    • Snap-to-Cloud
    • AltaVault
  • OnCommand system manager
  • Host-level software
  • Application-level software
  • Data Protection tools

Module 2: NetApp Mirroring Fundamentals

  • SnapMirror technology
  • Mirror relationships
  • Relationship types
  • Load sharing
  • SnapMirror and SnapVault configuration
  • SnapMirror policies and configuration
  • Automatic transfers
  • Intercluster network connectivity
  • TCP connections
  • Two cluster networking
  • Cluster cascade networking
  • Deployment configuration
  • SnapMirror cascade deployments
  • Cluster Fan-out or Fan-in
  • Intercluster SnapMirror Throttle
  • Network compression
  • Peer relationships

Module 3: Implement SnapMirror Relationships

  • FlexVol volumes mirror copy
  • SnapMirror relationships configuratiom
  • Licensing
  • Language setting
  • Job schedules
  • Monitoring relationships
  • Failover mode
  • Disaster mode
  • Version-independent SnapMirror technology
  • FlexClone technology
  • Tape backup
  • NDMP
  • Volume move

Module 4: Disaster Recovery for Storage Virtual Machines

  • SVM disaster recovery
  • Identity preserve option
  • SVM disaster recovery requirements
  • Selective protection
  • Test and Dev
  • Convert a volume

Module 5: Disk-to-Disk Backup with SnapVault Software

  • SnapVault Soltuion components
  • Snapshot copy policy
  • SnapVault backups
  • Managing SnapMirror and SnapVault updates
  • SnapVault end-to-end storage efficiency
  • Storage compression
  • Space planning requirements
  • Tiered backup
  • Restoring data

Module 6: SyncMirror and MetroCluster Software

  • Data mirroring
  • Plexes and pools to an aggregate relationship
  • Storage type considerations
  • SyncMirror Plex failure
  • MetroCluster overview
  • Nondisruptive operations
  • Local HA failover
  • Protecting data
  • Unmirrored aggregates
  • Node-level QoS
  • Active-active configuration
  • Planned switchover
  • Tiebreaker software

Module 7: NDMP and Tape Backup

  • NDMP technology
  • Terms and concepts
  • Nodes, connections and variables
  • Managing SVM-Scoped NDMP
  • NDMP backup models
  • User authentication
  • SVM-aware NDMP
  • Management commands

Labs:

  • Ensure connectivity to your ONTAP cluster
  • Synchronize system time for windows domains
  • Assign a network time protocol (NTP) server for SVL-NAU and RTP-NAU
  • Verify that required license codes are installed
  • Create intercluster subnets and LIFs
  • Prepare the storage environment on RTP-NAU as the secondary target
  • Configure cluster peering
  • Configure SVM peering
  • Configure a SnapMirror relationship
  • Verify data transfer
  • Take the source volume offline
  • Activate the destination volume
  • Reactivate the original source volume
  • Restore the original SnapMirror relationship
  • Create an unscheduled Snapshot copy
  • Configure storage virtual machine disaster recovery
  • Check for space requirements
  • Create the disaster-recovery SVM
  • Create an SVM peer relationship
  • Create the SVM SnapMirror relationship
  • Failover to the disaster-recovery SVM
  • Reverse the SnapMirror relationship
  • Recover the primary SVM
  • Create the SnapVault relationship
  • Verify data transfer
  • Simulate a disaster and recover data
  • Network Engineers
  • Channel Partners
  • System Engineers

Completion of the following web-based training modules:

  • ONTAP Cluster Fundamentals (WBT)
  • ONTAP NAS Fundamentals (WBT)
  • ONTAP SAN Fundamentals (WBT)
  • ONTAP Data Protection Fundamentals (WBT)