■
To configure VCS clusters in secure mode (optional), you need:
■
The name of the Root Broker system
Example:
east
See
“About Symantec Product Authentication Service
(AT)”
on page 19.
■
Access to the Root Broker system without use of a
password.
For automatic mode (default)
The path for the encrypted files that you get from the
Root Broker administrator.
See
“Creating encrypted files for the security
infrastructure”
on page 35.
For semiautomatic mode
using encrypted files
■
The fully-qualified hostname (FQDN) of the Root
Broker . (e.g. east.symantecexample.com)
The given example puts a system in the (DNS)
domain symantecexample.com with the unqualified
hostname east, which is designated as the Root
Broker.
■
The root broker’s security domain (e.g.
)
■
The root broker’s port (e.g.
2821
)
■
The path to the local root hash (e.g.
/var/tmp/privatedir/root_hash
)
■
The authentication broker’s principal name on each
cluster node (e.g.
galaxy.symantecexample.com
and
nebula.symantecexample.com
)
For semiautomatic mode
without using encrypted files
■
To add VCS users, which is not required if you configure your cluster in secure
mode, you need:
VCS usernames are restricted to 1024 characters.
Example:
smith
User names
VCS passwords are restricted to 255 characters.
Enter the password at the prompt.
User passwords
Users have three levels of privileges: A=Administrator,
O=Operator, or G=Guest.
Example:
A
To decide user privileges
■
To configure SMTP email notification (optional), you need:
53
Installing and configuring VCS
Getting your VCS installation and configuration information ready
Summary of Contents for Veritas Cluster Server 5.0 Update 3
Page 1: ...Veritas Cluster Server Installation Guide Linux for IBM Power 5 0 Release Update 3...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 12: ...Contents 12...
Page 22: ...Introducing Veritas Cluster Server About VCS optional components 22...
Page 28: ...Planning to install VCS Supported software 28...
Page 104: ...Configuring VCS clusters for data integrity Setting up disk based I O fencing manually 104...
Page 152: ...Installing VCS on a single node Adding a node to a single node cluster 152...