Veritas Access Installation Guide
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading the operating system and Veritas Access
- Performing a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
About managing the NICs, bonds, and VLAN devices
When you enter y, the installer allows you to perform the following operations:
Do you want to manually select NICs, or configure NIC bonding or VLAN tagging? [y,n,q] (n) y
Select the public NICs
Select the private NICs
Exclude a NIC
See Excluding a NIC.
Include a NIC
See Including a NIC.
Create a new NIC bond and add a NIC to a bond
See Creating a NIC bond.
Remove a bond
See Removing a NIC bond.
Remove a NIC from the bond list
Add a VLAN device on a particular NIC
See Creating a VLAN device .
Remove a VLAN device on a particular NIC
See Removing a VLAN device .
Note:
The NIC bonding and NIC exclusion configuration options support both a single NIC or bond, and multiple NICs or bonds.
When using the NIC exclusion feature, you can exclude any NIC on the first node. But if you want to exclude any NIC on the other nodes, you can choose to exclude NICs per node.
See Excluding a NIC.