Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Enabling FIPS for Access Appliance
You can enable the FIPS mode for NetBackup MSDP for increased appliance security.
When you enable FIPS for MSDP, all backup and restore jobs that are in progress are terminated. After you enable the FIPS mode, restart the NetBackup services to restart the jobs.
To enable the FIPS mode for NetBackup MSDP, complete the following steps:
- Log in to the Access web interface of the configured cluster by opening a supported browser and typing:
http://console-ip:14161
where console-ip is the management console IP address where the web interface is hosted.
- In the navigation pane, click Settings, and then click Security management.
- On the FIPS tab, in the MSDP node status area click Enable FIPS.
- Review the compatibility list to ensure that all components that communicate with the FIPS service are FIPS compliant. Confirm that you have reviewed the compatibility list and click Continue.
- To monitor the progress, click View details on the Security page. The ongoing and completed tasks for the operation are also displayed in Recent activity.
After the operation is complete, you can view the FIPS status for both the cluster nodes. If the FIPS mode is enabled for a node, the status is displayed as Enabled. If the FIPS mode cannot be enabled for a node, the status is displayed as Disabled, and if the FIPS status cannot be retrieved because the node is stopped, shut down, or unreachable, the status is displayed as Unknown. For nodes that display Unknown status, you can enable the FIPS mode again. If the FIPS mode is enabled on the cluster and a node is down, it automatically synchronize its status with the cluster after it is up.