NetBackup™ Installation Guide
- Preparing for installation
- General installation information
- How to install NetBackup
- About storage device configuration
- Installation operational notes and limitations
- SORT information
- Veritas NetInsights Console information
- General installation information
- NetBackup licenses
- Installing server software on UNIX systems
- Installation requirements for UNIX and Linux
- Installing NetBackup primary server software on Linux
- Installing NetBackup media server software on Linux
- About pushing client software from a primary server to clients
- Installation requirements for UNIX and Linux
- Installing server software on Windows systems
- About the administrative interfaces
- Installing NetBackup client software
- About NetBackup client installation on Windows
- About NetBackup client installation on UNIX and Linux
- Configuring NetBackup
- Removing NetBackup server and client software
- Reference
Installing UNIX clients locally
The following procedure installs the NetBackup client software on a local computer.
To install client software locally on a UNIX client
- Use one of the following methods to start the installation script:
ESD images (downloaded files)
Navigate to the location where the installation images reside.
Enter the following command:
./install
Native install tools
NetBackup supports the install and upgrade of the UNIX and Linux client binaries with native installers. More information is available.
See Install of the UNIX and Linux client binaries with native installers.
- When the following message appears, press Enter to continue:
Veritas Installation Script Copyright 1993 - 2016 Veritas Corporation, All Rights Reserved. Installing NetBackup Client Software Please review the VERITAS SOFTWARE LICENSE AGREEMENT located on the installation media before proceeding. The agreement includes details on the NetBackup Product Improvement Program. For NetBackup installation and upgrade information specific to your platform and to find out if your installed EEBs or hot fixes are contained in this release, check out the Veritas Services and Operations Readiness Tools (SORT) Installation and Upgrade Checklist and Hot fix and EEB Release Auditor, respectively, at https://sort.veritas.com/netbackup. Do you wish to continue? [y,n] (y)
The client binaries represent the operating system versions where the binaries were compiled. The binaries typically function perfectly on later versions of the operating system. The installation procedure attempts to load the appropriate binaries for your system. If the script does not recognize the local operating system, it presents choices.
- Type y and press Enter to continue with the software installation.
Do you want to install the NetBackup client software for this client? [y,n] (y)
- Type the name of your NetBackup primary server and press Enter to continue.
Enter the name of the NetBackup primary server:
- Confirm the NetBackup client name and press Enter to continue.
Would you like to use "client_name" as the configured name of the NetBackup client? [y,n] (y)
- (Conditional) Enter one or more media servers if prompted:
This host cannot connect directly to the primary server; therefore, one or more media servers are required in order to contact the primary server for security information. Enter the media servers (one per line) or X to skip the question. Enter Q to indicate all media servers have been entered. Enter a media server for host primary.domain, Q to quit, or X to skip this question: media.domain q
- After you confirm you want to continue, the installer fetches the certificate authority certificate details.
Getting CA certificate details. Depending on the network, this action may take a few minutes. To continue without setting up secure communication, press Ctrl+C.
Be aware if you press Ctrl+C, this action requires you to rerun the installation or continue with the installation without the required security components. If these security components are absent, backups and restores fail.
- The installer then looks to see what certificate authority the local system is configured to use. The options for certificate authority on the local system are: NetBackup Certificate Authority, external certificate authority, or indeterminate.
The installer then uses a combination of the primary server certificate authority mode and the local system certificate authority configuration to determine the next steps.
- If the installer prompts you for a certificate file path, your environment uses an external certificate authority. Proceed to step 10.
If the installer prompts you for fingerprint information, your environment uses a NetBackup Certificate Authority. Proceed to step 16.
If the installer cannot determine the configuration of the certificate authority on the primary server, you are presented with two options:
Skip the security configuration and configure your certificate authority after installation. More information about post-installation certificate authority configuration is available:
https://www.veritas.com/support/en_US/article.100044300
For more information, see the NetBackup Security and Encryption Guide and refer to the chapter on external CA and external certificates.
Proceed to step 20.
Exit the installation and restart the installation once you configure your certificate authority.
- Provide the external certificate authority information at the prompts shown:
Enter the certificate file path or q to skip security configuration: /usr/eca/cert_chain.pem Enter the trust store location or q to skip security configuration: /usr/eca/trusted/cacerts.pem Enter the private key path or q to skip security configuration: /usr/eca/private/key.pem Enter the passphrase file path or q to skip security configuration (default: NONE): /usr/eca/private/passphrase.txt
Note:
Be aware the passphrase file path is optional.
- When prompted, provide the required information for the CRL configuration:
Should a CRL be honored for the external certificate? 1) Use the CRL defined in the certificate. 2) Use the CRL from a file path. 3) Do not use a CRL. q) skip security configuration CRL option (1):
- (Conditional) If you specify 2, you must enter the path to the CRL location:
Enter the CRL location path or q to skip security configuration: /usr/eca/crl
- The installer echoes the configuration information you entered and attempts to retrieve details for the external certificate:
External CA values entered: Certificate file path: /usr/eca/cert_chain.pem Trust store file path: /usr/eca/trusted/cacerts.pem Private key file path: /usr/eca/private/key.pem Passphrase file path: /usr/eca/private/passphrase.txt CRL check level: Use the CRL from a file path. CRL location path: /usr/eca/crl Getting external CA certificate details Issued By : CN=IITFRMNUSINT,O=Veritas,OU=iitf Subject Name : CN=cuomovm04,O=Veritas,OU=iitf Expiry Date : Oct 31 17:25:59 2019 GMT SHA1 Fingerprint : 62:B2:C3:31:D5:95:15:85:9D:C9:AE:C6:EA:C2:DF: DF:6D:4B:92:5B Serial Number : 0x6c7fa2743072ec3eaae4fd60085d468464319a Certificate Path : /usr/eca/cert_chain.pem Validating host ECA certificate. NOTE: Depending on the network, this action may take a few minutes. To continue without setting up secure communication, press Ctrl+C.
- (Conditional) If the external certificate enrollment pre-check finishes successfully, select 1 and press Enter to continue.
The external certificate enrollment pre-check is successful. The external certificate is valid for use with primary server name How do you want to proceed? 1) Continue the installation using this certificate. 2) Update external certificate values. 3) Abort the installation. Default option (1):
Proceed to step 20.
- (Conditional) If the external certificate enrollment pre-check fails, select from the choices shown. The default is 2.
The external certificate enrollment pre-check failed. The external certificate is not valid for use with primary server name How do you want to proceed? 1) Continue the installation and set up external certificates later. 2) Modify the external CA values entered. 3) Abort the installation. Default option (2):
Proceed to step 20.
- When prompted, review the fingerprint information and confirm that it is accurate.
Primary server [primary_name] reports CA Certificate fingerprint [fingerprint]. Is this correct? [y/n] (y)
After you confirm the fingerprint information, the installer stores the certificate authority certificate details.
Storing CA certificate. Depending on the network, this action may take a few minutes. To continue without setting up secure communication, press Ctrl+C.
Be aware if you press Ctrl+C, this action requires you to rerun the installation or continue with the installation without the required security components. If these security components are absent, backups and restores fail.
- After the Certificate Authority certificate is stored, the installer fetches the host certificate.
Getting host certificate. Depending on the network, this action may take a few minutes. To continue without setting up secure communication, press Ctrl+C.
Be aware if you press Ctrl+C, this action requires you to rerun the installation or continue with the installation without the required security components. If these security components are absent, backups and restores fail.
- (Conditional) If prompted for the Authorization Token, please enter it.
An authorization token is required in order to get the host certificate for this host. At the prompt, enter the authorization token or q to skip the question. NOTE: The answer entered will not be displayed to the terminal.
Enter the authorization token for primary_server_FQDN or q to skip:
The token format is 16 upper case letters. Be aware if you press Ctrl+C, this action requires you to rerun the installation or continue with the installation without the required security components. If these security components are absent, backups and restores fail.
- If prompted, specify if you want Java and the JRE packages installed.
The Java GUI and JRE packages are currently not installed on this host.
The Java GUI and JRE can be optionally included with NetBackup. The Java GUI and JRE enable the Backup, Archive, and Restore (BAR) GUI.
Choose an option from the list below.
1) Include the Java GUI and JRE.
2) Exclude the Java GUI and JRE.
If you specify 1, you see: Including the installation of Java GUI and JRE packages. If you specify 2, you see: Excluding the installation of Java GUI and JRE packages.
- Follow the prompts to complete the installation.
Additional information about installation folder restrictions is available.
- After the installation is complete, select Exit from this Script.