Veritas Access Installation Guide
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- Important release information
- System requirements
- Linux requirements
- Operating system RPM installation requirements and operating system patching
- Kernel RPMs that are required to be installed with exact predefined RPM versions
- OL kernel RPMs that are required to be installed with exact predefined RPM versions
- Required operating system RPMs for OL 7.4
- Required operating system RPMs for RHEL 7.3
- Required operating system RPMs for RHEL 7.4
- Software requirements for installing Veritas Access in a VMware ESXi environment
- Hardware requirements for installing Veritas Access virtual machines
- Management Server Web browser support
- Supported NetBackup versions
- Supported OpenStack versions
- Supported Oracle versions and host operating systems
- Supported IP version 6 Internet standard protocol
- Linux requirements
- Network and firewall requirements
- Maximum configuration limits
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installation overview
- Summary of the installation steps
- Before you install
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Replacing an Ethernet interface card
- Configuring I/O fencing
- About configuring Veritas NetBackup
- About enabling kdump during an Veritas Access configuration
- Reconfiguring the Veritas Access cluster name and network
- Configuring a KMS server on the Veritas Access cluster
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Management Server Web browser support
The following are the supported Web browsers for Veritas Access:
Table:
Browser | Version | Comments |
|---|---|---|
Internet Explorer |
| JavaScript: Enabled Cookies: Enabled |
Firefox | Firefox 4.x and later | JavaScript: Enabled Cookies: Enabled |
Google Chrome | Google Chrome 10 and later version | JavaScript: Enabled Cookies: Enabled |
Additional considerations for supported Web browsers:
Your browser must support JavaScript 1.2 or later.
If you use pop-up blockers (including Yahoo Toolbar or Google Toolbar), either disable them or configure them to accept pop-ups from the Veritas Access node to which you connect.
For Internet Explorer 8.0 on Windows Server 2003, download and install the hot fix from the following location:
If you are unable to download the gendeploy script using Internet Explorer 9.0, visit the following location to resolve the issue:
For Internet Explorer, enable the play animations in web pages option in the multimedia category of Advanced Internet options.
For Internet Explorer, when popup-blocker is turned on, make sure that the filter Level is set to Medium or lower.
For Internet Explorer, ensure that the site is included in the list of trusted sites.
If you cannot add the site to the list of trusted sites, enable the Binary and script Behaviors option in security settings.
You must install Adobe Flash plug-in version 10, or later.