20Installing and configuring the product

Installing the product

The host names of the cluster nodes.

The device names of the network interface cards (NICs) used for the private networks among nodes.

Establishing communication between nodes is required to install Veritas software from a remote system, or to install and configure a cluster. The node from which the installation utility is run must have permissions to run rsh (remote shell) or ssh (secure shell) utilities as root on all cluster nodes or remote systems.

See Veritas Storage Foundation and High Availability Solutions Getting Started Guide.

Symantec recommends configuring the cluster with I/O fencing enabled. I/O fencing requires shared devices to support SCSI-3 Persistent Reservations (PR). Enabling I/O fencing prevents data corruption caused by a split brain scenario.

The Storage Foundation Cluster File System is supported without I/O fencing enabled. However, without I/O fencing enabled, split brain scenarios can result in data corruption.

Installing the product

The product installer is the recommended method to license and install the product. The installer also enables you to configure the product, verify preinstallation requirements, and view the product’s description.

At most points during an installation, you can type b (“back”) to return to a previous section of the installation procedure. The back feature of the installation scripts is context-sensitive, so it returns to the beginning of a grouped section of questions. If an installation procedure hangs, use Control–cto stop and exit the program. There is a short delay before the script exits.

The following sample procedure is based on the installation of a Veritas Storage Foundation Cluster File System HA cluster with two nodes: “system01” and “system02.” If you are installing on standalone systems only, some steps are unnecessary, and these are indicated. Default responses are enclosed by parentheses. Press Return to accept defaults.

Note: If you have obtained a Veritas product from an electronic download site, the single product download files do not contain the installer installation script, so you must use the product installation script to install the product. For example, if you download Veritas Cluster File System, use the installsfcfs script instead of the installer script.

Page 18
Image 18
Symantec HP-UX manual Installing the product

HP-UX specifications

Symantec HP-UX is a comprehensive security solution engineered to protect the HP-UX operating system, a variant of the UNIX OS developed by Hewlett-Packard (HP). As a robust enterprise environment, HP-UX is widely used in mission-critical applications, particularly in industries such as finance, telecommunications, and manufacturing. Symantec’s integration with HP-UX enhances security, providing essential features that cater to the needs of large organizations.

One of the main features of Symantec HP-UX is its advanced threat protection capabilities. It employs a multi-layered approach to security, utilizing signature-based detection, behavior-based analysis, and heuristics to identify and mitigate known and unknown threats. This real-time protection minimizes the risk of malware, ransomware, and other cyber threats that can compromise sensitive data and disrupt business operations.

In addition to threat protection, Symantec HP-UX includes robust data loss prevention (DLP) capabilities. DLP technology helps organizations ensure that their confidential data remains secure by preventing unauthorized access and exfiltration. This feature is particularly important for compliance with regulatory requirements such as GDPR and HIPAA, as it aids in safeguarding customer information.

Another significant characteristic of Symantec HP-UX is its scalability. Designed to handle the demands of enterprise environments, the solution can be easily integrated with existing IT infrastructure while adapting to growing workloads. This functionality is essential for organizations that require flexible security measures to accommodate expansion or changes in business processes.

Security management and reporting are also key components of Symantec HP-UX. The solution provides centralized management tools that allow administrators to monitor security status, deploy updates, and manage policy across multiple systems from a single interface. These tools enhance visibility into security incidents and enable organizations to respond promptly to potential threats.

Moreover, Symantec HP-UX offers automated updates and patch management. Regular updates are crucial for maintaining a secure environment, and the solution ensures that systems are protected against the latest vulnerabilities without requiring extensive manual intervention.

In summary, Symantec HP-UX is a powerful security solution designed for the HP-UX operating system. Its main features include advanced threat protection, data loss prevention, scalability, centralized management, and automated updates. These characteristics make it a vital tool for organizations aiming to protect their data and maintain a secure operational environment in the face of evolving cyber threats.