Veritas™ Resiliency Platform 2.2 Solutions for VMware
- Section I. Overview of Resiliency Platform
- Overview of Resiliency Platform
- Overview of Resiliency Platform Data Mover
- Overview of recovery to on-premises data center
- Managing assets protected by NetBackup
- Overview of Amazon Web Services
- Overview of vCloud
- Section II. Preparing your environment
- Using array-based replication
- Using Veritas Resiliency Platform Data Mover
- Managing disaster recovery network mapping
- Managing Replication Gateway pairs
- Using array-based replication
- Section III. Working with resiliency groups
- Managing resiliency groups
- Configuring resiliency groups for remote recovery
- Managing virtual machines for remote recovery (DR) using 3rd party replication technology
- Managing virtual machines for remote recovery (DR) using Resiliency Platform Data Mover
- Managing virtual machines for remote recovery (DR) in Amazon Web Services
- Managing resiliency groups
- Section IV. Managing disaster recovery
- Rehearsing DR operations to ensure DR readiness
- Performing disaster recovery operations
- Rehearsing DR operations to ensure DR readiness
- Managing resiliency plans
- Creating a new resiliency plan template
- Monitoring risks, reports, and activities
- Managing evacuation plans
- Appendix A. General troubleshooting
- Resolving the Admin Wait state
- Appendix B. Sample policy and trust relationships for AWS
Sample command for Windows keytab file
Following is a sample command for Windows keytab file.
Authentication domain (AD) user is user2, configured on VRPWINDNS.COM domain. Password of the user is user@123. Ensure that the domain name is always in capital letters.
In the command, princ is the user name, mapuser is the user account.
Principal type (ptype), needs to be specified as KRB5_NT_PRINCIPAL. And out is the output keytab file, which is C:/user2.keytab for the sample.
Using the above values, the sample command is:
C:\Users\Administrator>ktpass.exe /princ user2@VRPWINDNS.COM /mapuser user2@VRPWINDNS.COM /pass user@123 /ptype KRB5_NT_PRINCIPAL /out C:/user2.keytab
Verifying the keytab file
After the keytab file is generated, copy the keytab file to a UNIX machine having kinit utility.
Verify the connection with DNS using - kinit user@DOMAIN which is kinit user2@VRPWINDNS.COM as per above sample values.
Enter the password of user2. On successful execution of the command, verify the keytab file using: kinit user2@VRPWINDNS.COM -k -t /root/user2.keytab