Please enter search query.
Search <book_title>...
Veritas Access Installation Guide
Last Published:
2019-09-30
Product(s):
Access (7.4.2)
Platform: Linux
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading the operating system and Veritas Access
- Performing a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
About VLAN tagging
When VLANs (Virtual Local Area Network) span multiple switches, VLAN tagging is required. A VLAN is a way to create independent logical networks within a physical network. VLAN tagging is the practice of inserting a VLAN ID into a packet header to identify which VLAN the packet belongs to.
By using the VLAN tagging feature, you can:
Create a VLAN device during installation
Create a VLAN device on the specified bond interface.
Note:
You need to create a bond interface first.
See Creating a VLAN device .
See Removing a VLAN device .