Please enter search query.
Search <book_title>...
Veritas Access Installation Guide
Last Published:
2018-07-27
Product(s):
Access (7.3.1)
Platform: Linux
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About NIC bonding and NIC exclusion
- About VLAN Tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Troubleshooting the LTR upgrade
- Appendix C. Configuring the secure shell for communications
About VLAN Tagging
When VLANs (Virtual Local Area Network) span multiple switches, VLAN Tagging is required. A VLAN is a way to create independent logical networks within a physical network. VLAN Tagging is the practice of inserting a VLAN ID into a packet header to identify which VLAN the packet belongs to.
VLAN Tagging feature includes the following:
Ability to create a VLAN device during installation.
Create a VLAN device on the specified bond interface.
You need to create a bond interface first.