Index

 

Introduction.........................................................................................................................................

3

Installation of Veritas Cluster products ....................................................................................................

3

Configuring SSH or remsh before installing products ............................................................................

3

Enabling SSH...............................................................................................................................

4

Enabling remsh ............................................................................................................................

5

Installation methods for Veritas Cluster products ......................................................................................

6

Using Product Installer...................................................................................................................

6

Installation options........................................................................................................................

8

Invoking product installation scripts from the command line ...............................................................

8

Installation of Data Protector Cell Manager on a cluster............................................................................

8

Veritas Cluster Integration .................................................................................................................

9

Licensing and VERITAS Cluster...........................................................................................................

9

Installation of Cell Manager on Veritas Cluster ....................................................................................

9

Prerequisites for Installation............................................................................................................

9

Steps before installation of Cell Manager ........................................................................................

9

Prerequisites ..............................................................................................................................

10

Setting Kernel Parameters ............................................................................................................

11

Installation Procedure..................................................................................................................

11

Installing a Cluster-Aware Client...................................................................................................

13

Prerequisites ..............................................................................................................................

13

Installation procedure..................................................................................................................

14

Importing a Cluster Aware Client..................................................................................................

14

Configuration of Data Protector Cell Manager on cluster ........................................................................

14

Prerequisites for Configuration .....................................................................................................

14

Configuring the Primary and Secondary Cell Managers .........................................................................

15

Configuring the Primary Cell Manager .................................................................................................

15

Configuring the secondary Cell Manager .............................................................................................

15

For More Information .........................................................................................................................

16

2