SlideShare a Scribd company logo
NetApp Cluster Mode 8.2 Administration-:(Hot to access the
NetApp storage through CLI (command) line)
You can access yourNetAppClustermode systemsbyusingthree methods.
Method-1
1) Go physicallyandconnectyourlaptopto the serial console port(LaptopandNetAppstorage IP
range shouldbe inthe same subnet)
2) You mustinstall puttysoftware inyourlaptopordesktoptoget accessit
Openthe puttyin yourlaptopand checkthe which com port isenabledinyourlaptopor desktop
(windowsmachine)
Type the command inthe run ->compmgmt.msc as below
In the computermanagementselectthe device manager,inthe rightpanel note downthe COMport (it
may be COM1, COM2 or COM3 etc)
Note downthe com port as above and openthe puttyand selectthe Serial optionandgive the correct
COMport (COM1 here) andpressenter.
You will getthe console accessandit will askyouthe username and password.
Username -admin
Password -give the adminpassword
Method-2
By usingthe telnetorRSH-:
TelnetandRSH are disabledinthe predefinedmanagementfirewall policy(mgmt).Toenable the
clusterto acceptTelnetor RSH requests,youmustcreate a new managementfirewall policythathas
TelnetorRSH enabledandthenassociate the new policywiththe clustermanagementLIF.
Data ONTAPpreventsyoufromchangingpredefinedfirewallpolicies.However,youcancreate a
newpolicybycloningthe predefinedmgmtmanagementfirewallpolicyandthenenablingTelnetor
RSH underthe newpolicy.
Steps
1. Use the systemservicesfirewallpolicyclonecommandtocreate a new management
firewall policybasedonthe mgmtmanagementfirewall policy.
Example
cluster1::> system servicesfirewall policyclone -policymgmt -new-policy-name mgmt1
2. Use the systemservicesfirewallpolicycreate commandtoenable TelnetorRSHin
the newmanagementfirewall policy.
Example
cluster1::> system servicesfirewall policycreate -policymgmt1 -service telnet-actionallow-ip-list
0.0.0.0/0
cluster1::> system servicesfirewall policycreate -policymgmt1 -service rsh-action allow -ip-list
0.0.0.0/0
3. Use the networkinterface modifycommandtoassociate the new policywiththe cluster management
LIF.
Example
cluster1::> network interface modify -vservercluster1 -lifcluster_mgmt-firewall-policymgmt1
In the windowsmachine openthe puttyandselectthe protocol astelnetandenterthe IPorhostname
and accessthe NetAppstorage incli
It isnot secure protocol thatso whyplease don’tuse thisaswell asRSH
#rsh hostname_or_IP -l username:password
In the puttyselectthe Rloginoption
Note- If yourhost machine isLinux thenyoucan execute the commandinthe CLI,puttyisnot required
but if youare usingthe windowsmachine youneedputtysoftware toaccessthe NetAppclusterin
commandline (CLI)
You can downloadthe puttysoftware byusingthe below link.
https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
Choose asper your32 bitor 64 bit OSyou are using.
Metheod-3
The most recommendedwaytoaccessthe NetAppstorage byusingthe commandmode isSSH (Secure
Shell)
Type the IP or hostname of the NetApp storage byselectingthe SSHprotocol asbelow
It will askyouthe username andpassword
User name- admin
Password -Administratorpassword
(Or)
loginas: admin
Usingkeyboard-interactive authentication.
Password:
cluster::>
To see the webservice whichare enable ordisable youcanexecute the below command-:
cluster1::> system serviceswebshow
External WebServices:true
Status:online
HTTP Protocol Port: 80
HTTPs Protocol Port:443
TLSv1 Enabled:true
SSLv3 Enabled:true
SSLv2 Enabled:false
Note- Please enable sshprotocol onlyasitisveryverysecure anddisable RSHand telnetservices.
Thank you!
Saroj

More Related Content

What's hot

Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode  Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode
Saroj Sahu
 
How to enable efficiency (deduplication and compression in netapp cluster mod...
How to enable efficiency (deduplication and compression in netapp cluster mod...How to enable efficiency (deduplication and compression in netapp cluster mod...
How to enable efficiency (deduplication and compression in netapp cluster mod...
Saroj Sahu
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
Saroj Sahu
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
Saroj Sahu
 
Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)
Naseem Khoodoruth
 
Day5_Apache_JMeter_Test_Execution_RemoteMode_Master_Slave
Day5_Apache_JMeter_Test_Execution_RemoteMode_Master_SlaveDay5_Apache_JMeter_Test_Execution_RemoteMode_Master_Slave
Day5_Apache_JMeter_Test_Execution_RemoteMode_Master_Slave
Sravanthi N
 
Configuration of NTP Server on CentOS 8
Configuration of NTP Server on CentOS 8Configuration of NTP Server on CentOS 8
Configuration of NTP Server on CentOS 8
Kaan Aslandağ
 
Firewalld LAB
Firewalld LABFirewalld LAB
Firewalld LAB
Kaan Aslandağ
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
Chanaka Lasantha
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configure
Ämjed Othman
 
Daemons in PHP
Daemons in PHPDaemons in PHP
Daemons in PHP
Zoltán Németh
 
Configuration of BIND DNS Server On CentOS 8
Configuration of BIND DNS Server On CentOS 8Configuration of BIND DNS Server On CentOS 8
Configuration of BIND DNS Server On CentOS 8
Kaan Aslandağ
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days
 
How To Configure VNC Server on CentOS 7
How To Configure VNC Server on CentOS 7How To Configure VNC Server on CentOS 7
How To Configure VNC Server on CentOS 7
VCP Muthukrishna
 
Configuration IPTables On CentOS 8
Configuration IPTables On CentOS 8Configuration IPTables On CentOS 8
Configuration IPTables On CentOS 8
Kaan Aslandağ
 
TFTP Installation Configuration Guide
TFTP Installation Configuration GuideTFTP Installation Configuration Guide
TFTP Installation Configuration Guide
VCP Muthukrishna
 
Dns configuration on rhel 5
Dns configuration on rhel 5Dns configuration on rhel 5
Dns configuration on rhel 5
Subin Selvaraj
 
Linux Kernel Crashdump
Linux Kernel CrashdumpLinux Kernel Crashdump
Linux Kernel Crashdump
Marian Marinov
 
Ftp configuration in rhel7
Ftp configuration in rhel7Ftp configuration in rhel7
Ftp configuration in rhel7
Balamurugan M
 
Linux Basic Administration Commands Guide
Linux Basic Administration Commands GuideLinux Basic Administration Commands Guide
Linux Basic Administration Commands Guide
VCP Muthukrishna
 

What's hot (20)

Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode  Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode
 
How to enable efficiency (deduplication and compression in netapp cluster mod...
How to enable efficiency (deduplication and compression in netapp cluster mod...How to enable efficiency (deduplication and compression in netapp cluster mod...
How to enable efficiency (deduplication and compression in netapp cluster mod...
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
 
Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)
 
Day5_Apache_JMeter_Test_Execution_RemoteMode_Master_Slave
Day5_Apache_JMeter_Test_Execution_RemoteMode_Master_SlaveDay5_Apache_JMeter_Test_Execution_RemoteMode_Master_Slave
Day5_Apache_JMeter_Test_Execution_RemoteMode_Master_Slave
 
Configuration of NTP Server on CentOS 8
Configuration of NTP Server on CentOS 8Configuration of NTP Server on CentOS 8
Configuration of NTP Server on CentOS 8
 
Firewalld LAB
Firewalld LABFirewalld LAB
Firewalld LAB
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configure
 
Daemons in PHP
Daemons in PHPDaemons in PHP
Daemons in PHP
 
Configuration of BIND DNS Server On CentOS 8
Configuration of BIND DNS Server On CentOS 8Configuration of BIND DNS Server On CentOS 8
Configuration of BIND DNS Server On CentOS 8
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
How To Configure VNC Server on CentOS 7
How To Configure VNC Server on CentOS 7How To Configure VNC Server on CentOS 7
How To Configure VNC Server on CentOS 7
 
Configuration IPTables On CentOS 8
Configuration IPTables On CentOS 8Configuration IPTables On CentOS 8
Configuration IPTables On CentOS 8
 
TFTP Installation Configuration Guide
TFTP Installation Configuration GuideTFTP Installation Configuration Guide
TFTP Installation Configuration Guide
 
Dns configuration on rhel 5
Dns configuration on rhel 5Dns configuration on rhel 5
Dns configuration on rhel 5
 
Linux Kernel Crashdump
Linux Kernel CrashdumpLinux Kernel Crashdump
Linux Kernel Crashdump
 
Ftp configuration in rhel7
Ftp configuration in rhel7Ftp configuration in rhel7
Ftp configuration in rhel7
 
Linux Basic Administration Commands Guide
Linux Basic Administration Commands GuideLinux Basic Administration Commands Guide
Linux Basic Administration Commands Guide
 

Similar to How to access the Netapp cluster mode 8.2 through CLI (command mode)

Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
louisraj
 
Firewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter StackFirewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter Stack
Mahmoud Shiri Varamini
 
Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8
Kaan Aslandağ
 
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docxINFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
carliotwaycave
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
Nutan Kumar Panda
 
Linux internet server security and configuration tutorial
Linux internet server security and configuration tutorialLinux internet server security and configuration tutorial
Linux internet server security and configuration tutorial
annik147
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
Netwax Lab
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7
VCP Muthukrishna
 
bettercap.pdf
bettercap.pdfbettercap.pdf
bettercap.pdf
shehbaz15
 
Ap7181 cli guide
Ap7181 cli guideAp7181 cli guide
Ap7181 cli guide
Advantec Distribution
 
Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)
Kaustubh Padwad
 
Lan to lan vpn
Lan to lan vpnLan to lan vpn
Lan to lan vpn
Rohit Pardasani
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
abhijitgnbbl
 
12 - System Security in Red Hat
12 - System Security in Red Hat12 - System Security in Red Hat
12 - System Security in Red Hat
Shafaan Khaliq Bhatti
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
LaticiaGrissomzz
 
Saad baig practical file
Saad baig practical fileSaad baig practical file
Saad baig practical file
SaadBaig33
 
Firewalls rules using iptables in linux
Firewalls rules using iptables in linuxFirewalls rules using iptables in linux
Firewalls rules using iptables in linux
aamir lucky
 
80133823 backdor-nectcat-through-smb
80133823 backdor-nectcat-through-smb80133823 backdor-nectcat-through-smb
80133823 backdor-nectcat-through-smb
jeweh
 
Important cisco-chow-commands
Important cisco-chow-commandsImportant cisco-chow-commands
Important cisco-chow-commands
ssusere31b5c
 

Similar to How to access the Netapp cluster mode 8.2 through CLI (command mode) (20)

Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
 
Firewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter StackFirewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter Stack
 
Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8
 
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docxINFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
INFA 620Laboratory 4 Configuring a FirewallIn this exercise.docx
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Linux internet server security and configuration tutorial
Linux internet server security and configuration tutorialLinux internet server security and configuration tutorial
Linux internet server security and configuration tutorial
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7
 
bettercap.pdf
bettercap.pdfbettercap.pdf
bettercap.pdf
 
Ap7181 cli guide
Ap7181 cli guideAp7181 cli guide
Ap7181 cli guide
 
Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)Fully Automated Nagios (FAN)
Fully Automated Nagios (FAN)
 
Lan to lan vpn
Lan to lan vpnLan to lan vpn
Lan to lan vpn
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
12 - System Security in Red Hat
12 - System Security in Red Hat12 - System Security in Red Hat
12 - System Security in Red Hat
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Saad baig practical file
Saad baig practical fileSaad baig practical file
Saad baig practical file
 
Firewalls rules using iptables in linux
Firewalls rules using iptables in linuxFirewalls rules using iptables in linux
Firewalls rules using iptables in linux
 
80133823 backdor-nectcat-through-smb
80133823 backdor-nectcat-through-smb80133823 backdor-nectcat-through-smb
80133823 backdor-nectcat-through-smb
 
Important cisco-chow-commands
Important cisco-chow-commandsImportant cisco-chow-commands
Important cisco-chow-commands
 

More from Saroj Sahu

Autosupport email sending failed issue netapp cluster mode-
Autosupport email sending failed issue netapp cluster mode-Autosupport email sending failed issue netapp cluster mode-
Autosupport email sending failed issue netapp cluster mode-
Saroj Sahu
 
How to assign the disks in Netapp storage cluster mode 8.X
How to assign the disks in Netapp storage cluster mode 8.XHow to assign the disks in Netapp storage cluster mode 8.X
How to assign the disks in Netapp storage cluster mode 8.X
Saroj Sahu
 
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Saroj Sahu
 
How to work seamlessly in your vm without pressing host key again and again
How to work seamlessly in your vm without pressing host key again and againHow to work seamlessly in your vm without pressing host key again and again
How to work seamlessly in your vm without pressing host key again and again
Saroj Sahu
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
Saroj Sahu
 
How to see the log files through ( gui and cli) in cluster ontap netapp stora...
How to see the log files through ( gui and cli) in cluster ontap netapp stora...How to see the log files through ( gui and cli) in cluster ontap netapp stora...
How to see the log files through ( gui and cli) in cluster ontap netapp stora...
Saroj Sahu
 
Snapshot technology Netapp storage
Snapshot technology Netapp storageSnapshot technology Netapp storage
Snapshot technology Netapp storage
Saroj Sahu
 
SAN High availability (Netapp Storage)
SAN High availability (Netapp Storage) SAN High availability (Netapp Storage)
SAN High availability (Netapp Storage)
Saroj Sahu
 
Aggregate standard for Netapp storage 7 mode
Aggregate standard for Netapp storage 7 mode Aggregate standard for Netapp storage 7 mode
Aggregate standard for Netapp storage 7 mode
Saroj Sahu
 
San1 cifs nfs_snapshot
San1 cifs nfs_snapshotSan1 cifs nfs_snapshot
San1 cifs nfs_snapshot
Saroj Sahu
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
Saroj Sahu
 
Netapp Deduplication concepts
Netapp Deduplication conceptsNetapp Deduplication concepts
Netapp Deduplication concepts
Saroj Sahu
 

More from Saroj Sahu (12)

Autosupport email sending failed issue netapp cluster mode-
Autosupport email sending failed issue netapp cluster mode-Autosupport email sending failed issue netapp cluster mode-
Autosupport email sending failed issue netapp cluster mode-
 
How to assign the disks in Netapp storage cluster mode 8.X
How to assign the disks in Netapp storage cluster mode 8.XHow to assign the disks in Netapp storage cluster mode 8.X
How to assign the disks in Netapp storage cluster mode 8.X
 
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
 
How to work seamlessly in your vm without pressing host key again and again
How to work seamlessly in your vm without pressing host key again and againHow to work seamlessly in your vm without pressing host key again and again
How to work seamlessly in your vm without pressing host key again and again
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
 
How to see the log files through ( gui and cli) in cluster ontap netapp stora...
How to see the log files through ( gui and cli) in cluster ontap netapp stora...How to see the log files through ( gui and cli) in cluster ontap netapp stora...
How to see the log files through ( gui and cli) in cluster ontap netapp stora...
 
Snapshot technology Netapp storage
Snapshot technology Netapp storageSnapshot technology Netapp storage
Snapshot technology Netapp storage
 
SAN High availability (Netapp Storage)
SAN High availability (Netapp Storage) SAN High availability (Netapp Storage)
SAN High availability (Netapp Storage)
 
Aggregate standard for Netapp storage 7 mode
Aggregate standard for Netapp storage 7 mode Aggregate standard for Netapp storage 7 mode
Aggregate standard for Netapp storage 7 mode
 
San1 cifs nfs_snapshot
San1 cifs nfs_snapshotSan1 cifs nfs_snapshot
San1 cifs nfs_snapshot
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
Netapp Deduplication concepts
Netapp Deduplication conceptsNetapp Deduplication concepts
Netapp Deduplication concepts
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

How to access the Netapp cluster mode 8.2 through CLI (command mode)

  • 1. NetApp Cluster Mode 8.2 Administration-:(Hot to access the NetApp storage through CLI (command) line) You can access yourNetAppClustermode systemsbyusingthree methods. Method-1 1) Go physicallyandconnectyourlaptopto the serial console port(LaptopandNetAppstorage IP range shouldbe inthe same subnet) 2) You mustinstall puttysoftware inyourlaptopordesktoptoget accessit Openthe puttyin yourlaptopand checkthe which com port isenabledinyourlaptopor desktop (windowsmachine) Type the command inthe run ->compmgmt.msc as below In the computermanagementselectthe device manager,inthe rightpanel note downthe COMport (it may be COM1, COM2 or COM3 etc)
  • 2. Note downthe com port as above and openthe puttyand selectthe Serial optionandgive the correct COMport (COM1 here) andpressenter.
  • 3. You will getthe console accessandit will askyouthe username and password. Username -admin Password -give the adminpassword Method-2 By usingthe telnetorRSH-: TelnetandRSH are disabledinthe predefinedmanagementfirewall policy(mgmt).Toenable the clusterto acceptTelnetor RSH requests,youmustcreate a new managementfirewall policythathas TelnetorRSH enabledandthenassociate the new policywiththe clustermanagementLIF. Data ONTAPpreventsyoufromchangingpredefinedfirewallpolicies.However,youcancreate a newpolicybycloningthe predefinedmgmtmanagementfirewallpolicyandthenenablingTelnetor RSH underthe newpolicy.
  • 4. Steps 1. Use the systemservicesfirewallpolicyclonecommandtocreate a new management firewall policybasedonthe mgmtmanagementfirewall policy. Example cluster1::> system servicesfirewall policyclone -policymgmt -new-policy-name mgmt1 2. Use the systemservicesfirewallpolicycreate commandtoenable TelnetorRSHin the newmanagementfirewall policy. Example cluster1::> system servicesfirewall policycreate -policymgmt1 -service telnet-actionallow-ip-list 0.0.0.0/0 cluster1::> system servicesfirewall policycreate -policymgmt1 -service rsh-action allow -ip-list 0.0.0.0/0 3. Use the networkinterface modifycommandtoassociate the new policywiththe cluster management LIF. Example cluster1::> network interface modify -vservercluster1 -lifcluster_mgmt-firewall-policymgmt1 In the windowsmachine openthe puttyandselectthe protocol astelnetandenterthe IPorhostname and accessthe NetAppstorage incli It isnot secure protocol thatso whyplease don’tuse thisaswell asRSH
  • 5. #rsh hostname_or_IP -l username:password In the puttyselectthe Rloginoption Note- If yourhost machine isLinux thenyoucan execute the commandinthe CLI,puttyisnot required but if youare usingthe windowsmachine youneedputtysoftware toaccessthe NetAppclusterin commandline (CLI) You can downloadthe puttysoftware byusingthe below link. https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Choose asper your32 bitor 64 bit OSyou are using.
  • 6. Metheod-3 The most recommendedwaytoaccessthe NetAppstorage byusingthe commandmode isSSH (Secure Shell) Type the IP or hostname of the NetApp storage byselectingthe SSHprotocol asbelow
  • 7. It will askyouthe username andpassword User name- admin Password -Administratorpassword (Or) loginas: admin Usingkeyboard-interactive authentication. Password: cluster::> To see the webservice whichare enable ordisable youcanexecute the below command-: cluster1::> system serviceswebshow External WebServices:true Status:online HTTP Protocol Port: 80 HTTPs Protocol Port:443 TLSv1 Enabled:true SSLv3 Enabled:true SSLv2 Enabled:false Note- Please enable sshprotocol onlyasitisveryverysecure anddisable RSHand telnetservices. Thank you! Saroj