Veritas Access Installation Guide
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About NIC bonding and NIC exclusion
- About VLAN Tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Troubleshooting the LTR upgrade
- Appendix C. Configuring the secure shell for communications
Summary of the installation steps
The Veritas Access software installation consists of two main pieces:
Operating system installation.
Veritas Access requires Red Hat Enterprise Linux.
See See System requirements.
Veritas Access software installation.
Table: Summary of installation steps provides a brief summary of the installation steps. The summary includes cross references to where you can find more information about each task.
Table: Summary of installation steps
Task | Steps | For more information |
---|---|---|
Task 1: Install the operating system on each node of the cluster. | Steps include:
| See Installing and configuring the Veritas Access software on the cluster. |
Task 2: Install the Veritas Access software on the cluster. | Steps include:
| See Installing and configuring the Veritas Access software on the cluster. |