Table 4-3 Installationand configuration tasks

ReferenceTask
SeeStarting the software installationon page 61.
SeeSpecifying systems for installationon page 62.
SeeLicensing VCSon page 63.
SeeChoosing VCS RPMs for installationon page 64.
SeeChoosing to install VCS RPMs or configure VCS
onpage 65.
SeeInstalling VCS RPMson page 75.
Licenseand install VCS
SeeStarting the software configurationon page 66.
SeeSpecifying systems for configurationon page 67.
SeeConfiguring the basic clusteron page 67.
SeeAdding VCS userson page 71. (optional)
SeeConfiguring SMTP email notificationon page 71.
(optional)
SeeConfiguring SNMP trap notificationon page 73.
(optional)
SeeConfiguring global clusterson page 74. (optional)
Configurethe cluster
andits features
SeeCreating VCS configuration fileson page 76.Create configuration
files
SeeStarting VCSon page 77.
SeeCompleting the installationon page 77.
StartVCS and its
components
SeeAbout enabling LDAP authentication for clusters that run
insecure modeon page 78.
Forclusters that run in
securemode, enable
LDAPauthentication
plug-inif VCS users
belongto LDAP
domain.
SeeAbout configuring VCS clusters for data integrity
onpage 87.
SeeInstalling the Java Consoleon page 80.
Performthe
post-installationtasks
SeeVerifying the cluster after installationon page 84.Verifythe cluster
Starting the software installation

Youcan install VCS using the Veritas product installer or the installvcs program.

61Installingandconfiguring VCS
Installingand configuring VCS 5.0 RU3