1. NetApp ONTAP 9 Security Hardening Guide (TR-4569):
Section 3.1, "Disable Insecure Protocols": This guide explicitly recommends disabling insecure protocols. It states, "NetApp recommends disabling insecure protocols such as Telnet, RSH, and HTTP and using their secure counterparts, SSH and HTTPS." This directly supports the use of SSH and HTTPS over RSH and HTTP for security.
2. NetApp ONTAP System Administration Documentation:
"Access a cluster" section: The documentation details the primary methods for cluster management. It specifies, "You can access a cluster by using the command-line interface (CLI) or an ONTAP GUI... You can use a Secure Shell (SSH) client... to access the ONTAP CLI... You can use a web browser to access an ONTAP GUI, such as ONTAP System Manager... by entering the IP address of the cluster management LIF using HTTPS." This confirms SSH and HTTPS as the standard, secure access methods.
3. NetApp ONTAP CLI Reference:
security ssh command manual page: Describes the configuration of the SSH server on ONTAP for secure CLI access.
system services web command manual page: Details the configuration of web services, including enabling HTTPS and disabling HTTP to ensure secure access to ONTAP System Manager.