Veritas Access Installation Guide
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Performing a silent Veritas Access installation
You can use the silent installation if you want to install the Veritas Access software on a large number of nodes. You need to prepare a response file. By using this file, the silent installation and configuration of the Veritas Access software can be performed, without any prompts.
Before you perform a silent Veritas Access installation and configuration, you need to manually configure an SSH communication between the nodes.
See Manually configuring passwordless SSH.
You can get the Veritas Access example response file from the root directory of the ISO image.
To use the Veritas Access silent installation feature
- Enter the following command:
# ./installaccess -responsefile access.responsefile
To generate the access.response
example file
- Install and configure the Veritas Access software without any errors.
- Get the
access.response
example file from the log directory.
To use the access.response
example file
- Rename the Veritas Access example response file to
access.responsefile
. - Modify the file by changing the cluster name, IP address ranges, and other parameters, as necessary for your configuration.
Installation times may vary depending on your configuration.
See Installing and configuring the Veritas Access software on the cluster.