13.07.2015 Views

Cluster Server Installation Guide for Solaris x64 5.0 - Storage ...

Cluster Server Installation Guide for Solaris x64 5.0 - Storage ...

Cluster Server Installation Guide for Solaris x64 5.0 - Storage ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

20 Preparing to install and configure VCSAbout VCS <strong>5.0</strong> featuresAbout VCS <strong>5.0</strong> featuresTo configure the optional features of the VCS components, make sure to installall packages when the installation program prompts you. Review the descriptionof the optional features and decide the features that you want to configure withVCS:■■■■■Symantec Product Authentication ServiceSMTP email notification <strong>for</strong> VCS eventsSNMP trap notification <strong>for</strong> VCS eventsGlobal clusters using VCSI/O fencingSymantec Product Authentication ServiceSymantec Product Authentication Service secures communication betweencluster nodes and clients, including the Java console, by using digital certificates<strong>for</strong> authentication and SSL to encrypt communication over the public network.For more in<strong>for</strong>mation about the Authentication Service, see the Veritas <strong>Cluster</strong><strong>Server</strong> User’s <strong>Guide</strong>.To configure the cluster in secure mode, VCS requires you to configure a systemin your enterprise as root broker and all nodes in the cluster as authenticationbrokers.■■Root brokerA root broker serves as the main registration and certification authority; ithas a self-signed certificate and can authenticate other brokers. The rootbroker is only used during initial creation of an authentication broker.Authentication brokersAuthentication brokers serve as intermediate registration and certificationauthorities. Authentication brokers have certificates that are signed by theroot. Each node in VCS serves as an authentication broker.You can set up Authentication Service <strong>for</strong> the cluster during the installation orafter installation. Refer to the Veritas <strong>Cluster</strong> <strong>Server</strong> User’s <strong>Guide</strong> to configurethe cluster in secure mode after the installation and configuration process.See “Configuring the cluster in secure mode” on page 54.Figure 2-4 depicts the flow of configuring VCS in secure mode.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!