Skip to main content
NetApp Knowledge Base

How to troubleshoot NFS access to an NTFS security style volume/qtree in ONTAP 9

Last Updated:

Applies to



The following document is intended to be used as a guide for troubleshooting NFS access to NTFS security style volumes (or qtrees).

Before starting, it is important to have some basic configuration information about the environment, this will allow us to check the configuration of all items involved in the access process.

  • Vserver name
  • Volume name
  • The name of the LIF that is being used to access the volume

Once this information is known, collect the following information. Examples are as follows:

::> vol show -vserver vs1 -volume voltest -fields policy,unix-permissions,junction-path,junction-parent,security-style,type
vserver volume  type policy  security-style unix-permissions junction-path junction-parent
------- ------- ---- ------- -------------- ---------------- ------------- ---------------
vs1     voltest RW   default ntfs           ---rwxr-xr-x     /voltest      vs1_root

Run the command again, this time specifying the junction-parent as the volume.
::> volume show -vserver vs1 -volume vs1_root -fields policy,unix-permissions,junction-path,junction-parent,security-style,type
vserver volume   type policy  security-style unix-permissions junction-path junction-parent
------- -------- ---- ------- -------------- ---------------- ------------- ---------------
vs1     vs1_ro   RW   default ntfs           ---rwxr-xr-x     /             -

::> export-policy rule show -vserver vs1 -policyname default -instance

Determine which node the interface is on for the volume you are accessing. If you do not know the LIF information, use the -address option.
::> net int show -address
The node on which the LIF is on should be used when the node name is requested in the following commands.



Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.