Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Support for multiple data subnets
Access Appliance now supports multiple data subnets. This is applicable to all the protocols that the Access Appliance supports. If you have different subnets, you can access the services of the Access Appliance cluster via those subnets. The protocol specific entities and features decide how the subnets are utilized by the individual protocol. Multiple subnets can be configured with or without multiple VLANs.
Note:
Data network isolation depends on the customer network configuration. The application configuration in Access Appliance does not restrict the customer from using the same network for multiple protocols.
If you have multiple subnets and you want to create multiple VLANs for each subnet, then Veritas recommends the following:
Create a VLAN using the network vlan add nic VLAN_ID command, which creates a new device called nic.VLAN_ID.
Add new virtual IP address belonging to the VLAN using the network ip addr add command.
Add a route for the newly created subnet, if required.
If you want to create another VLAN, repeat the above steps.
va800a> network vlan add eth5 1979 Access Appliance INFO V-493-10-4071 VLAN Device will not get Physical IP by default use following command to add IP Access Appliance INFO V-493-10-4072 network ip addr add <ipaddr> <netmask> <type> [device] [nodename] 100% [#] Configuring VLAN device va800a> network vlan show VLAN DEVICE VLAN id ---- ------ ------- eth5.1979 eth5 1979 va800a> network ip addr add 10.11.12.95 255.255.255.0 virtual eth5.1979 Access Appliance ip addr SUCCESS V-493-10-1381 ip addr add successful.
va800a> network ip addr show IP Netmask/Prefix Device Node Type Status FQDNs -- -------------- ------ ---- ---- ------ ----- 192.168.10.130 255.255.255.0 eth4 va800a-01 Physical 192.168.10.120 255.255.255.0 eth1 va800a-01 Physical 192.168.10.131 255.255.255.0 eth4 va800a-02 Physical 192.168.10.121 255.255.255.0 eth1 va800a-02 Physical 192.168.10.124 255.255.255.0 eth1 va800a-01 Virtual ONLINE (Con IP) 192.168.10.140 255.255.255.0 eth4 va800a-01 Virtual ONLINE 192.168.10.141 255.255.255.0 eth4 va800a-02 Virtual ONLINE 192.168.10.142 255.255.255.0 eth5 va800a-02 Virtual ONLINE 192.168.10.143 255.255.255.0 eth5 va800a-01 Virtual ONLINE 10.11.12.95 255.255.255.0 eth5.1979 va800a-01 Virtual ONLINE