Veritas Access Appliance Initial Configuration Guide

Last Published:
Product(s): Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
  1. Getting to know the Access Appliance
    1.  
      About the Veritas Access Appliance
    2. About the Access Appliance administration interfaces
      1.  
        Using the Access Appliance shell menu
    3.  
      About licensing the Access Appliance
    4.  
      Where to find the documentation
  2. Preparing to configure the appliance
    1.  
      Initial configuration requirements
    2.  
      About obtaining IP addresses for Veritas Access
    3.  
      Network and firewall requirements
    4.  
      About network connections for the appliance
  3. Configuring the appliance for the first time
    1. How to configure the Access Appliance for the first time
      1.  
        Configuring the Access cluster on the appliance
  4. Getting started with the Veritas Access GUI
    1.  
      Accessing the Veritas Access web interface
  5. Network connection management
    1. Configuring network address settings on the appliance nodes
      1.  
        Deleting network settings on appliance nodes
      2.  
        About NIC1 (eth0) port usage on the appliance nodes
      3.  
        About IPv4-IPv6-based network support on the Access Appliance
    2. Configuring VLAN settings on the appliance nodes
      1.  
        Viewing VLAN settings
      2.  
        Deleting a VLAN
    3. About the Veritas Remote Management Console
      1.  
        Configuring the IPMI port on an appliance node
      2.  
        Managing IPMI users on an appliance node
      3.  
        Resetting the IPMI on an appliance node
  6. Monitoring the appliance
    1.  
      About hardware monitoring in the Access GUI
    2. About Veritas AutoSupport on the Access Appliance
      1.  
        Setting up AutoSupport on the appliance
      2.  
        Using a proxy server with the appliance
    3.  
      Setting up email notifications on the appliance
    4.  
      Setting up SNMP notifications on the appliance
    5.  
      Testing the appliance hardware
  7. Resetting the appliance to factory settings
    1.  
      About appliance factory reset
    2.  
      Performing factory reset for cluster nodes
  8. Appliance security
    1.  
      About Access Appliance security
    2. About Access appliance user account privileges
      1. Access appliance admin password specifications
        1.  
          Password encryption and handling on the Access appliance
    3.  
      About forced password changes
    4.  
      Changing the Maintenance user account password
    5. About the Access Appliance intrusion detection system
      1.  
        Reviewing SDCS events on the Access Appliance
      2.  
        Auditing the SDCS logs on an Access Appliance
      3.  
        About SDCS event type codes and severity codes on an Access appliance node
      4.  
        Changing the SDCS log retention settings on an Access Appliance node
    6.  
      About the Access Appliance intrusion prevention system
    7. About Access appliance operating system security
      1.  
        Vulnerability scanning of the Access Appliance
      2.  
        Disabled service accounts on the Access appliance
    8.  
      About data security on the Access appliance
    9.  
      About data integrity on the Access appliance
    10. Recommended IPMI settings on the Access appliance
      1.  
        Replacing the default IPMI SSL certificate on the Access appliance

Configuring the Access cluster on the appliance

This procedure configures the Veritas Access cluster on the appliance. This procedure is only performed during the initial configuration of the appliance. Ensure that you complete all of the other necessary steps in the initial configuration process before you configure the cluster.

See How to configure the Access Appliance for the first time.

To configure the Veritas Access cluster on the appliance:

  1. Log in to the Access Appliance shell menu of one of the appliance nodes using the default credentials:

    User: admin

    Password: P@ssw0rd

  2. Enter the configure cluster command to start the cluster configuration wizard.
  3. Type yes to continue.
  4. Enter a name for the cluster.

    Cluster names should be DNS-compatible. DNS-compliant cluster names should conform to the following naming conventions:

    • Must be at least three and no more than 55 characters long.

    • Allowed characters in a cluster name are lowercase letters, numbers, and hyphens 'a-z, 0-9, -'. Any other character is invalid.

    • Must start with a lowercase letter and must not start with a hyphen ('-') or number.

    • Must end with a lowercase letter or a number.

    • Should not be an IP address.

    Note:

    If you plan to use Active Directory authentication, Windows Active Directory restricts a NetBIOS name or a computer object name to a maximum of 15 characters. Access Appliance uses the first 15 characters of the cluster name to create a NetBIOS name to comply with the Windows AD restriction. Ensure that the chosen cluster name is unique in the first 15 characters so the objects created in the domain are distinct with unique names.

  5. If VLAN is configured for the appliance, specify the VLAN ID for both the nodes.
  6. Enter the eth1 IP addresses for each node, separated by a space.
  7. Enter the maintenance user password for appliance nodes.

    After specifying the password, the storage on each of the nodes is scanned. The data, fencing, and configuration volumes are created when you scan the storage. The configuration cannot proceed if the storage scan operation fails.

  8. Specify whether you want to configure network bonding for the public network interfaces. For the Access 3340 Appliance model, you can configure network bonding for eth4 and eth5. For the Access 3350 Appliance model, you can configure network bonding for eth4 and eth6. To configure network bonding, type yes and continue to step 9; else type no and go to step 10.
  9. If you typed yes in step 8, complete the following steps and go to step 13.
    • Specify the mode for the network bonding.

    • If you select mode 3 (balance-xor) or 5 (802.3ad), specify the transmit hash policy to use.

    • Enter the starting IP address from the range of public IP addresses that you have reserved. At a minimum, you need to reserve two continuous public IP addresses.

    • Enter the starting virtual IP address from the range of virtual IP addresses that you have reserved. At a minimum, you need to reserve two continuous virtual IP addresses.

    See About obtaining IP addresses for Veritas Access.

  10. Enter the number of public IP addresses that you want to configure for the public data network. You can specify any value from 0 to 4 considering each node of a 2-node Access cluster has two public network interfaces.

    If you choose to configure one or more IP addresses, you are prompted to enter the specified number of IP addresses. You have the option to enter a maximum of 32 IP addresses. However, only the number of IP addresses that you specified are configured and the rest are maintained as free IP addresses in the cluster.

    You can enter individual public IP addresses for the data network or an IP address range. You can specify IPv4 or IPv6 addresses. The addresses need not be contiguous. An IPv4 range is supported.

    For example, to specify an IP range, type 10.182.12.89-92.

    The IP addresses are assigned to the public interfaces of both the nodes using the round-robin algorithm, selecting the first public interface of both the nodes followed by the second public interface of both the nodes. For example if you specify 3, the first public interface of both the nodes is assigned an IP address followed by the second public interface of the first node. If you specify 3 and choose to enter 4 IP addresses, the 3 IP addresses are assigned using the round-robin algorithm and 1 IP address is maintained as a free IP address in the cluster. If you enter 0, no public IP address is configured and you are not prompted to specify the IP addresses.

    See About obtaining IP addresses for Veritas Access.

  11. Enter the number of virtual IP addresses to assign to each network interface in the data network.

    Note:

    Starting with version 8.0, you can assign a virtual IP address to a public data network interface that does not have a physical IP address assigned to it. Earlier, a physical IP address was required to be assigned to a public data network interface if you wanted to assign a virtual IP address to it.

  12. Enter the starting virtual IP address or individual virtual IP addresses separated by a space or a comma. You can specify IPv4 or IPv6 addresses. The addresses need not be contiguous. An IPv4 range is supported.
  13. Enter the netmask for the data network IP addresses.
  14. Enter the gateway IP address of the data network.
  15. Enter the console virtual IP address.
  16. Enter the host name for the nodes.

    The host name must be at least 3 and no more than 63 characters long.

  17. Enter the IP address or the FQDN of the NTP server.

    If you specify the FQDN of the NTP server, you must configure the DNS server. Enter the DNS server IP address and go to step 19. If you specify the IP address of the NTP server continue to step 18.

  18. Specify whether you want to configure a DNS server.

    If you opted to configure a DNS server, enter the DNS server IP address.

    Note:

    This is an optional step, and only required if the DNS server was not configured earlier, or you had configured the appliance node host name, or you want to change the previous DNS configuration. Ensure that the configured DNS server can resolve the eth1 IP address to a valid node host name as this is required for AutoSupport CallHome to work correctly.

  19. Enter the DNS server domain name.
  20. Enter the IP address for the private network.

    The private network can be any IPv4 address that does not conflict with the provided management or data network ranges.

    Note:

    The base network IP address is calculated by using the netmask that is specified for the private network, and the IP addresses are assigned starting from this base IP address. The first IP address is reserved for the NLM (Network Lock Manager) service and successive IP addresses are assigned to the network interfaces.

  21. Enter the netmask for the private IP address.

    The netmask is used to customize the private IP range. The netmask must be 255.252.0.0 or greater.

  22. To configure the cluster in lockdown mode, enter yes.

    If you opted to configure the cluster in lockdown mode, specify the following options:

    • Lockdown mode: The lockdown mode creates Write Once Read Many (WORM) storage that prevents your data from being encrypted, modified, or deleted. You can specify enterprise or compliance mode, with compliance mode providing the highest level of data security.

    • Minimum retention period: The minimum duration in seconds, hours, days, weeks, months, years, for which to retain the data. The minimum retention period is 1 hour.

    • Maximum retention period: The maximum duration in seconds, hours, days, weeks, months, years, for which to retain the data. The maximum retention period is 60 years.

    You can also change the lockdown mode after the cluster is configured. For details, see the Veritas Access Appliance Administrator's Guide.

  23. Review the configuration summary and type yes to continue and begin the configuration.

    If you have configured network bonding, bond0 is created for the public network and the message Public network connection provided by bond0 with subordinate network interfaces is displayed.

    The configuration process can take around 40 minutes to complete. During the configuration, disk-based fencing is configured. You cannot change the fencing configuration.

    The URL to access the Access web interface is displayed during the configuration.

    The appliance is restarted to bring up the Access services as part of the configuration process. After the configuration is complete, a summary of the cluster configuration is displayed.

  24. Change the known default password of the admin, maintenance, and IPMI (if the sysadmin account uses the default password) user accounts.

    Veritas enforces changing the known default passwords during the initial configuration to ensure that the default passwords do not remain active on the node.

    Ensure that the following password requirements are met:

    • The password cannot reverse the entire user name.

    • The password must contain at least eight characters.

    • The password must contain at least one numeric character (0-9).

    • The password must contain at least one lowercase character (a-z).

    • The password must contain at least one uppercase character (A-Z).

    • The password must contain at least one special character (~!@#$%^&).

    Note:

    The maintenance user password must be the same on each node. If the password expires, log in to the Access web interface with the maintenance account to change the password.

After the configuration is complete, you can log in to the appliance using any of the following user interfaces:

Table: Appliance user interface addresses

Interface

IP address

Access Appliance shell menu for node 1

Node 1 eth1 IP over SSH

Access Appliance shell menu for node 2

Node 2 eth1 IP over SSH

Access shell menu

Console IP over SSH

Access GUI

http://consoleIP:14161/

See About the Access Appliance administration interfaces.