Please enter search query.
Search <book_title>...
Veritas Access 7.3 Installation Guide
Last Published:
2019-04-04
Product(s):
Access (7.3)
Platform: Linux
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About NIC bonding and NIC exclusion
- About VLAN Tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
About VLAN Tagging
When VLANs (Virtual Local Area Network) span multiple switches, VLAN Tagging is required. A VLAN is a way to create independent logical networks within a physical network. VLAN Tagging is the practice of inserting a VLAN ID into a packet header to identify which VLAN the packet belongs to.
VLAN Tagging feature includes the following:
Ability to create a VLAN device during installation.
Create a VLAN device on the specified bond interface.
You need to create a bond interface first.