Please enter search query.
Search <book_title>...
Veritas NetBackup™ Flex Scale Administrator's Guide
Last Published:
2024-04-01
Product(s):
Appliances (3.1)
Platform: NetBackup Flex Scale OS
- Product overview
- Viewing information about the NetBackup Flex Scale cluster environment
- NetBackup Flex Scale infrastructure management
- User management
- About Universal Shares
- Node and disk management
- Adding a node to the cluster using the NetBackup Flex Scale web interface
- License management
- Managing hardware vendor packages
- User management
- NetBackup Flex Scale network management
- Bonding operations
- Data network configurations
- Network configuration on plain device (eth5)
- Network configuration on bonded interfaces (bond0 on eth5 and eth7)
- NetBackup Flex Scale infrastructure monitoring
- Resiliency in NetBackup Flex Scale
- EMS server configuration
- Site-based disaster recovery in NetBackup Flex Scale
- Performing disaster recovery using RESTful APIs
- NetBackup Flex Scale security
- STIG overview for NetBackup Flex Scale
- FIPS overview for NetBackup Flex Scale
- Support for immutability in NetBackup Flex Scale
- Deploying external certificates on NetBackup Flex Scale
- Troubleshooting
- Collecting logs for cluster nodes
- Troubleshooting NetBackup Flex Scale issues
- Appendix A. Maintenance procedures for HPE servers
- Appendix B. Configuring NetBackup optimized duplication
- Appendix C. Disaster recovery terminologies
- Appendix D. Configuring Auto Image Replication
About system certificates on NetBackup Flex Scale
NetBackup Flex Scale supports one certificate for all services. The certificate can be internal or external. The Appliance CA creates the internal certificate. Any CA can create the external certificate using a CSR generated using the NetBackup Flex Scale GUI. The CA certificate can also be downloaded using the GUI by navigating to
. The admin user can change the certificate mode by navigating to in the GUI. After changing the certificate mode, the admin user should restart all the services to start using the new certificate.You can navigate to
to download the VxOS certificates which contain the intermediate and root CA certificates (both VxOS root and VxOS stem).Note:
Ensure that you have the latest Chrome update for the secure connection to work with VxOS certificates.
If the system certificate mode is set to internal, the certificate that is signed by the Appliance CA (internal certificate) is used for all the GUI services.
You must update the clients trust-store with CA certificate to secure connection.