12 DataProtectionSS&SM SG
12 DataProtectionSS&SM SG
NetApp Confidential 1
12-1 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Create a Snapshot copy of a volume and create
Snapshot policies
Create load-sharing (LS) and data-protection (DP)
mirror copies
Manually and automatically replicate mirror copies
Promote an LS mirror copy to replace its read/write
volume
Restore a Snapshot copy to be a read/write volume
Configure Vserver and cluster peering for data
protection
NetApp Confidential 2
MODULE OBJECTIVES
12-2 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data-Protection Methods
Snapshot copies
Mirror copies for data protection and load sharing
SnapVault backup copies
Tape backups through third-party software
Restores:
– volume snapshot restore
– LS mirrors: snapmirror promote
– DP mirrors: snapmirror resync
– Vault backups: snapmirror restore
– NDMP restore
NetApp Confidential 3
DATA-PROTECTION METHODS
A customer’s data-protection plan is likely to use all of the methods of protecting data that are shown here.
12-3 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disaster Recovery
NetApp Confidential 4
DISASTER RECOVERY
No native tape backup or restore commands are currently available in clustered Data ONTAP. All tape
backups and restores are performed through third-party NDMP applications.
12-4 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
NetApp Confidential 5
LESSON 1
12-5 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Technology
A Snapshot copy is a read-only image of the active
file system at a point in time.
The benefits of Snapshot technology are:
– Nearly instantaneous application data backups
– Fast recovery of data that is lost due to:
Accidental data deletion
Accidental data corruption
Snapshot technology is the foundation for these
NetApp products:
– SnapRestore – SnapManager
– SnapDrive – SnapMirror
– FlexClone – SnapVault
NetApp Confidential 6
SNAPSHOT TECHNOLOGY
Snapshot technology is a key element in the implementation of the WAFL (Write Anywhere File Layout) file
system:
A Snapshot copy is a read-only, space-efficient, point-in-time image of data in a volume or aggregate.
A Snapshot copy is only a “picture” of the file system, and it does not contain any data file content.
Snapshot copies are used for backup and error recovery.
The Data ONTAP operating system automatically creates and deletes Snapshot copies of data in volumes to
support commands that are related to Snapshot technology.
12-6 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume Snapshot Functionality
Snapshot copies can be created:
– Manually
– Automatically based on a schedule defined by Snapshot
policies
A user can restore files and directories through a client:
– UNIX: .snapshot directory (visibility set at the volume)
– Windows: ~snapshot directory (visibility set at the share)
A cluster administrator can restore an entire volume with
SnapRestore:
– Restores an entire volume (or an individual file)
– Command: volume snapshot restore
– Requires the SnapRestore license
NetApp Confidential 7
12-7 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data ONTAP Snapshot Copy
PROD SNAP 1 SNAP 2
Production: Active File System
A A A
Prod
B B B
C C C
WRITE WRITE D D D
A B C D E F F’ E’ E’E E E
F’F F F’
F
S1 S2
SNAP #1 SNAP #2
NetApp Confidential 8
12-8 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Restore from a Snapshot
PROD SNAP
PROD1 SNAP 2
Production: Active File System
A A A
Prod
B B B
C C C
D D D
A B C D E F F’ E’ E’
E E E
F’
F F F’
F
Prod
S1 S2
Production:
SNAP #1 SNAP #2
Active
File System
NetApp Confidential 9
12-9 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CLI: Snapshot Copy Creation
To manually create Snapshot copies:
cluster1::> volume snapshot create -vserver vs0
-volume vol3 -snapshot vol3_snapshot
NetApp Confidential 10
12-10 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Disk Consumption
Snapshot Reserve Aggregate Space
NetApp Confidential 11
12-11 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The volume snapshot show Command
netappu::> volume snap show -vserver vs7 -volume vs7_vol1
---Blocks---
Vserver Volume Snapshot Size Total% Used%
-------- ------- ---------------------------------- ------------ ------ -----
vs7 vs7_vol1
weekly.2011-09-22_0015 88KB 0% 37%
5min.2011-09-23_1120 76KB 0% 34%
5min.2011-09-23_1125 72KB 0% 33%
5min.2011-09-23_1130 92KB 0% 38%
weekly.2011-09-29_0015 56KB 0% 27%
daily.2011-10-02_0010 56KB 0% 27%
daily.2011-10-03_0010 52KB 0% 26%
hourly.2011-10-03_0605 52KB 0% 26%
hourly.2011-10-03_0705 52KB 0% 26%
hourly.2011-10-03_0805 52KB 0% 26%
hourly.2011-10-03_0905 52KB 0% 26%
hourly.2011-10-03_1005 52KB 0% 26%
hourly.2011-10-03_1105 52KB 0% 26%
13 entries were displayed.
NetApp Confidential 12
12-12 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Policies
Created at the cluster level
Assigned at the volume level
Can be created with the CLI or OnCommand System manager
netappu::> volume snapshot policy show
Number Of Is
Name Schedules Enabled Comment
----------------- ---------- ------- ----------------------------------------
-
default 3 true Default policy with hourly, daily &
weekly schedules.
Schedule: hourly Count: 6 Prefix: hourly
daily 2 daily
weekly 2 weekly
NetApp Confidential 13
SNAPSHOT POLICIES
Two Snapshot policies are automatically created: default and none. If a volume uses none as its Snapshot
policy, no Snapshot copies of it will be created. If a volume uses the default policy, after two weeks, there
will be a total of ten Snapshot copies of it (six hourly copies, two daily copies, and two weekly copies).
12-13 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Directory View
from a Windows Client
NetApp Confidential 14
12-14 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
NetApp Confidential 15
LESSON 2
12-15 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The SnapMirror Engine
Is used for the volume move, volume
copy, and snapmirror commands
Uses SpinNP as the transport protocol
between the source and destination volumes
(intracluster only)
Uses a Snapshot copy of the source,
determines the incremental differences, and
transfers only the differences
Executes SnapVault backups
NetApp Confidential 16
12-16 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Considerations
NetApp Confidential 17
SNAPMIRROR CONSIDERATIONS
12-17 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LS and DP Mirror Copies
1 of 2
Mirror copies are read-only copies of a volume.
Mirror copies are volumes that have SnapMirror
relationships with source volumes.
Mirror copies are updated from source volumes
manually, or automatically based on a scheduled.
LS mirror relationships stay within the Vserver of the
source volume.
DP mirror relationships can be within a Vserver,
between Vservers within the cluster, and between
Vservers of two different clusters.
Mirrors cannot be cascaded.
NetApp Confidential 18
12-18 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LS and DP Mirror Copies
2 of 2
A volume must be created before the volume can be
used as a mirror destination.
A SnapMirror volume must be created as type DP, a
RW volume cannot be changed to a DP mirror.
Creating a mirror relationship does not cause an initial
update to be performed.
An LS mirror copy can be promoted to become the
source volume using the snapmirror promote
command.
A DP mirror copy can be converted to a writable
volume using the snapmirror break command.
A mirror copy can be “restored” to its source.
NetApp Confidential 19
12-19 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The snapmirror promote Command
For LS Mirrors Only
The snapmirror promote command:
– Performs a failover to a destination volume
– Changes the destination volume to the new source
volume
Read-only volume becomes read-write
New source volume assumes the identity and SnapMirror
relationships of the original source volume
– Destroys the original source volume
The destination volume must be an LS volume.
Client accesses are redirected from the original
source volume to the promoted destination volume.
NetApp Confidential 20
12-20 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Mirror Creation Steps
1. Create a (mirror) volume: volume create
2. Create a mirror relationship: snapmirror create
3. Perform baseline replication:
– Data protection: snapmirror initialize
– Load sharing: snapmirror initialize-ls-set
4. Perform incremental replication:
– Data protection: snapmirror update
– Load sharing: snapmirror update-ls-set
NetApp Confidential 21
12-21 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The snapmirror show Command
cluster1::> snapmirror show
Source Destination Mirror Relationship Total
Path Type Path State Status Progress Healthy
------------- ---- ------------ ------------- -------------- ---------- -------
cluster1://vs2/vs2root
DP cluster1://vs2/vs2root_dp1
Snapmirrored Idle - true
cluster1://vs2/vs2root_dp2
Snapmirrored Idle - true
LS cluster1://vs2/vs2root_ls2
Snapmirrored Idle - true
cluster1://vs2/vol227
XDP cluster2://vs7/xdp_vol227
Snapmirrored Idle - true
4 entries were displayed.
NetApp Confidential 22
12-22 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The snapmirror show –instance
Command
cluster1::> snapmirror show -source-volume vs2root -type ls -instance
Relationship Type: LS
Tries Limit: 8
Transfer Snapshot: -
Snapshot Progress: -
Total Progress: -
Snapshot Checkpoint: -
Healthy: true
NetApp Confidential 23
12-23 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LS Mirror Copies
LS mirror copies are primarily used for load sharing
(balancing) when client read access is used.
Read access requests for a volume are distributed to the
volume’s LS mirror copies, unless the special . admin path is
used.
LS mirror copies are automatically available in the
namespace.
LS mirror copies are implicitly accessed by clients (for read
access).
Junctions are accessible in LS mirror copies.
LS mirror copies are always replicated as a group.
A source volume can have a maximum of one LS mirror copy
per node.
NetApp Confidential 24
LS MIRROR COPIES
The purpose of LS mirror copies is to offload volumes (and a single data module) of read activity. Therefore,
all mirror copies must be synchronized at the same data-version level. When a volume is replicated to its LS
mirror copies, all LS mirror copies of the volume are synchronized directly from the volume (without
cascading).
The way that NFS is mounted on a client, or which CIFS share is mapped to the client, changes which data is
accessed―either the read/write volume or one of its LS mirror copies. NFS is usually mounted at the root of a
Vserver by using a command such as mount <host>://myvserver. This command causes the LS
selection algorithm to be invoked. If, however, the NFS mount command is executed by using the . admin
path, such as mount <host>:/.admin /myvserver, this mount from the client always accesses the
read/write volumes when traversing the namespace, even if there are LS mirror copies for volumes.
For CIFS, the difference is not in how a share is accessed but in which share is accessed. If you create a share
for the . admin path and use that share, the client always has read/write access. If you create a share without
using . admin, the LS selection algorithm is used.
Unless the special .admin path is used, clients are transparently directed to an LS mirror copy for read
operations rather than to the read/write volume.
12-24 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LS Mirror Selection
The Data ONTAP operating system:
If an LS mirror copy is on the same node as the network module
that fields the request, the network module uses that LS mirror
copy.
If no LS mirror copy is on the same node as the network module
that fields the request, the network module uses an up-to-date
LS mirror copy on another node.
NFS and CIFS:
NFS: A new LS mirror can be selected even if a file remains
open.
CIFS: A new LS mirror is not selected while a file remains open.
NetApp Confidential 25
LS MIRROR SELECTION
When the / path is used (that is, the . admin path is not used) and a read or write request comes through that
path into the network module of a node, the network module first determines if there are any LS mirror copies
of the volume that it needs to access. If there aren’t any LS mirror copies of that volume, the read request is
routed to the read/write volume. If there are LS mirror copies of the volume, preference is given to an LS
mirror copy on the same node as the network module that fielded the request. If there isn’t an LS mirror copy
on that node, an up-to-date LS mirror copy from another node is chosen.
If a write request goes to an LS mirror copy, it returns an error to the client, which indicates that the file
system is read-only. To write to a volume that has LS mirror copies, you must use the . admin path.
For NFS clients, an LS mirror copy is used for a set period of time (minutes), after which a new LS mirror
copy is chosen. After a file is opened, different LS mirror copies can be used across different NFS operations.
The NFS protocol can manage the switch from one LS mirror copy to another.
For CIFS clients, the same LS mirror copy continues to be used for as long as a file is open. After the file is
closed, and the period of time expires, a new LS mirror copy is selected before the next time that a file is
opened. CIFS clients use this process because the CIFS protocol cannot manage the switch from one LS
mirror copy to another.
12-25 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Typical LS Mirror Issues
1 of 2
Client machines cannot see volumes that have
been created.
The volume must be mounted (given a
junction path) to the namespace.
Replicate the parent volume.
NetApp Confidential 26
12-26 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Typical LS Mirror Issues
2 of 2
Client requests always go to the source volume rather than
to the LS mirror copy. This issue occurs when the client is
mounted by using the .admin path or share.
Because the client is read-only, client write requests fail.
– This issue occurs when the client is not mounted by using the
.admin path or share.
– For read/write NFS access to a volume that has LS mirror
copies, clients must be mounted by using the .admin path.
– For read/write CIFS access to a volume that has LS mirror
copies, a specific volume .admin CIFS share must be created,
and the clients must connect to that share.
NetApp Confidential 27
12-27 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexCache Volumes and LS Mirror Volumes
1 of 2
A Origin volume
FlexCache volume
A’
B’ LS mirror volume
A’ A A’ A’
B’ B B’ B’ B’
NetApp Confidential 28
12-28 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexCache Volumes and LS Mirror Volumes
2 of 2
NetApp Confidential 29
12-29 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DP Mirror Copies
1 of 2
DP mirror copies are not implicitly accessed by
clients.
DP mirror copies can be mounted (through a junction)
into the namespace by the administrator.
In DP mirror copies, junctions are not accessible.
Each DP mirror copy replication is independent of the
LS mirror copies and of other DP mirror copies of the
same source volume.
NetApp Confidential 30
DP MIRROR COPIES: 1 OF 2
Data-protection mirror copies are not meant for client access, although they can be mounted into the
namespace by an administrator. Junctions cannot be followed in a data-protection mirror copy, so access is
given to only the data that is contained in that data-protection mirror copy, not to any other volumes that are
mounted to the source read/write volume.
Data-protection mirror copies are primarily meant for disk-based online backups. Data-protection mirror
copies are simpler, faster, more reliable, and easier to restore than tape backups are, although data-protection
mirror copies are not portable for storing offsite. A typical use of data-protection mirror copies is to put them
on aggregates of SATA disks that use RAID-DP technology and then mirror data to them daily during the
least active time in the cluster. One data-protection mirror copy per volume is generally sufficient.
12-30 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DP Mirror Copies
2 of 2
Consider using inexpensive, high-capacity (and slower)
SATA disks for DP mirror copies.
DP mirror copies can be restored or resynchronized:
– To restore a mirror copy is to re-create a broken SnapMirror
relationship such that destination changes overwrite the
source data.
– To resynchronize a mirror copy is to re-create a broken
SnapMirror relationship such that source changes overwrite
the destination data.
– You can restore and resynchronize to a new volume.
NetApp Confidential 31
DP MIRROR COPIES: 2 OF 2
A feature that is available only for data-protection mirror copies is the ability to perform a SnapMirror restore.
This action can restore a broken mirror relationship between a source and destination and perform an
incremental overwrite of the source volume with the current contents of the mirror destination. If the restore is
performed between a source and destination that didn’t formerly have a SnapMirror relationship, a baseline
copy of the destination contents are performed to the source volume.
Resynchronizing a source and destination is similar to restoring a source and destination, except that the
source content overwrites the destination content.
12-31 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Intercluster Logical Interfaces and Ports
Intercluster LIFs Ports Cluster LIFs
– New in Data
ONTAP 8.1
– Share data ports ifgrp1
with data LIFs or
e0a e0b e0c e0d
use dedicated
intercluster ports
– Node scoped!
failover only to
other intercluster
capable ports on Data LIFs
Intercluster LIFs
same node (IP Addresses)
NetApp Confidential 32
12-32 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Intercluster SnapMirror Replication
Replication between clusters for DR
Data transfers on intercluster network
RW Source volume
DP Destination volume
NetApp Confidential 33
12-33 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Intercluster Networking for SnapMirror
NetApp Confidential 34
12-34 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster and Vserver Peering
Supported relationships include:
Intercluster (Cluster and Vserver peers required)
Intracluster (Vserver peer required)
12-35 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Starting in clustered Data ONTAP 8.2, more granularity in SnapMirror security is provided. Replication
permission must be defined by peering Storage Virtual Machines together. Before creating any SnapMirror
relationships between a pair of Storage Virtual Machines, you must have a Storage Virtual Machine peer
relationship between the pair of Storage Virtual Machines. These Storage Virtual Machines can be local
(intracluster) or remote (intercluster). Storage Virtual Machine peering is a permission-based mechanism and
is a one-time operation that must be performed by the cluster administrators.
12-36 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Snapshot Copies
1 of 2
bcluster1::> vol snap show -vserver vs2 -volume vs2root
(volume snapshot show)
---Blocks---
Vserver Volume Snapshot Size Total% Used%
-------- ------- ---------------------------------- ------------ ------ -----
vs2 vs2root
weekly.2011-10-02_0015 84KB 0% 1%
daily.2011-10-04_0010 80KB 0% 1%
snapmirror.79deda29-e8a6-11e0-b411-
123478563412_4_2147484684.2011-10-04_052359
0% 1%
92KB
hourly.2011-10-04_2105 72KB 0% 1%
hourly.2011-10-04_2205 72KB 0% 1%
hourly.2011-10-04_2305 72KB 0% 1%
hourly.2011-10-05_0005 72KB 0% 1%
daily.2011-10-05_0010 72KB 0% 1%
hourly.2011-10-05_0105 72KB 0% 1%
NetApp Confidential 36
12-37 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Snapshot Copies
2 of 2
---Blocks---
Vserver Volume Snapshot Size Total% Used%
-------- ------- ---------------------------------- ------------ ------ -----
snapmirror.79deda29-e8a6-11e0-b411-
123478563412_4_2147484683.2011-10-05_020500
0% 1%
60KB
hourly.2011-10-05_0205 72KB 0% 1%
snapmirror.79deda29-e8a6-11e0-b411-
123478563412_4_2147484676.2011-10-05_023500
0% 1%
72KB
12 entries were displayed.
NetApp Confidential 37
12-38 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you should
be able to:
Create a Snapshot copy of a volume and create
Snapshot policies
Create load-sharing (LS) and data-protection (DP)
mirror copies
Manually and automatically replicate mirror copies
Promote an LS mirror copy to replace its read/write
volume
Restore a Snapshot copy to be a read/write volume
Configure Vserver and cluster peering for data
protection
NetApp Confidential 38
MODULE SUMMARY
12-39 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exercise
Module 12: Data Protection:
Snapshot and SnapMirror Copies
Time Estimate: 60 minutes
NetApp Confidential 39
EXERCISE
Please refer to your exercise guide.
12-40 Clustered Data ONTAP Administration: Data Protection: Snapshot and SnapMirror Copies
© 2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.