<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SVM Security best practice in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128486#M27852</link>
    <description>&lt;P&gt;Your question is slighly confusing to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do one SVM with a lif on each physical from the cluster&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for example, SVM1, 2 HA pair would get 4 LIFS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my honest opinion, unless you are in a super secure corporate environment, govt regulated or a true multi-tenant ip filtering is a complete waste of time&lt;/P&gt;</description>
    <pubDate>Mon, 27 Feb 2017 15:23:06 GMT</pubDate>
    <dc:creator>JGPSHNTAP</dc:creator>
    <dc:date>2017-02-27T15:23:06Z</dc:date>
    <item>
      <title>SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128483#M27851</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does someone know repercution security network or security breach for this 2 methods :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2&amp;nbsp;SVM&amp;nbsp; with 2 LIF , &amp;nbsp;one lif per SVM and 1 vlan&amp;nbsp;per lif &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 SVM with 2 LIF (on the same SVM) &amp;nbsp;with export policy for&amp;nbsp;filter by ip/client match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does somewhere we should found this KB /&amp;nbsp; Best Practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 15:24:30 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128483#M27851</guid>
      <dc:creator>dng_consulting</dc:creator>
      <dc:date>2025-06-04T15:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128486#M27852</link>
      <description>&lt;P&gt;Your question is slighly confusing to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do one SVM with a lif on each physical from the cluster&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for example, SVM1, 2 HA pair would get 4 LIFS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my honest opinion, unless you are in a super secure corporate environment, govt regulated or a true multi-tenant ip filtering is a complete waste of time&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 15:23:06 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128486#M27852</guid>
      <dc:creator>JGPSHNTAP</dc:creator>
      <dc:date>2017-02-27T15:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128489#M27853</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It depends on what you are doing with the 2 LIFs. If you want to use one for NFS and the other for CIFS I would use 2 SVMs because there is just one routing table per SVM.&lt;/P&gt;&lt;P&gt;I think it is not a security decision because then you use IPSpaces, it's more a networking/routing decision.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Dario&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 15:25:38 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128489#M27853</guid>
      <dc:creator>SYNTAXERROR</dc:creator>
      <dc:date>2017-02-27T15:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128496#M27854</link>
      <description>&lt;P&gt;Thanks for this response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My customer would like isolate flux dmz and they would like have one SVM for several VLAN.&lt;/P&gt;&lt;P&gt;I would like to explain their that it's better and properly to segregate each environment with&amp;nbsp;several SVM but i don't&amp;nbsp;have the strong argument&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 16:11:52 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128496#M27854</guid>
      <dc:creator>dng_consulting</dc:creator>
      <dc:date>2017-02-27T16:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128498#M27855</link>
      <description>&lt;P&gt;There is no direct relationship between the protocols and the routing table but often you don't want to maintain a routing table for cifs when you don't know exactly in which subnets your clients live.&lt;/P&gt;&lt;P&gt;You can for sure create a SVM with both protocols but beware of the requirements for joining an Active Directory and the security style for the volumes.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 16:12:21 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128498#M27855</guid>
      <dc:creator>SYNTAXERROR</dc:creator>
      <dc:date>2017-02-27T16:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128499#M27856</link>
      <description>&lt;P&gt;^^&lt;/P&gt;&lt;P&gt;agree&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SVM's with ipspaces would be the way to go, one for DMZ, and one for prod network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Don't mess with export policies to control acl's for cifs&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 16:22:00 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128499#M27856</guid>
      <dc:creator>JGPSHNTAP</dc:creator>
      <dc:date>2017-02-27T16:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: SVM Security best practice</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128500#M27857</link>
      <description>&lt;P&gt;I would separate DMZ and the production network with IPSpaces.&lt;/P&gt;&lt;P&gt;In my opinion the following arguments are&amp;nbsp;used to separate SVMs:&lt;/P&gt;&lt;P&gt;- SVM-DR&lt;/P&gt;&lt;P&gt;- Domain Admins have rights on Active Directory joined SVMs&amp;nbsp;&lt;/P&gt;&lt;P&gt;- If you use NFS SVMs for VMWare Datastore you need a user for a backup tool (like VSC) and you don't want to share the cifs volumes with this user (cloning, destroying and so on)&lt;/P&gt;&lt;P&gt;- Routing issues as mentioned&lt;/P&gt;&lt;P&gt;- Administrative issues: if for example the server team wants to administrate the CIFS Shares on their own and you don't want them to create shares on the NFS volumes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it really depends on what you're using on this SVMs.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2017 16:31:26 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/SVM-Security-best-practice/m-p/128500#M27857</guid>
      <dc:creator>SYNTAXERROR</dc:creator>
      <dc:date>2017-02-27T16:31:26Z</dc:date>
    </item>
  </channel>
</rss>

