Veritas Access Installation Guide
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements- Important release information
- System requirements- Linux requirements- Operating system RPM installation requirements and operating system patching
- Kernel RPMs that are required to be installed with exact predefined RPM versions
- OL kernel RPMs that are required to be installed with exact predefined RPM versions
- Required operating system RPMs for OL 7.3
- Required operating system RPMs for OL 7.4
- Required operating system RPMs for RHEL 7.3
- Required operating system RPMs for RHEL 7.4
 
- Software requirements for installing Veritas Access in a VMware ESXi environment
- Hardware requirements for installing Veritas Access virtual machines
- Management Server Web browser support
- Supported NetBackup versions
- Supported OpenStack versions
- Supported Oracle versions and host operating systems
- Supported IP version 6 Internet standard protocol
 
- Linux requirements
- Network and firewall requirements
- Maximum configuration limits
 
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster- Installation overview
- Summary of the installation steps
- Before you install
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Replacing an Ethernet interface card
- Configuring I/O fencing
- About configuring Veritas NetBackup
- About enabling kdump during an Veritas Access configuration
- Reconfiguring the Veritas Access cluster name and network
- Configuring a KMS server on the Veritas Access cluster
 
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Management Server Web browser support
The following are the supported Web browsers for Veritas Access:
Table:
| Browser | Version | Comments | 
|---|---|---|
| Internet Explorer | 
 | JavaScript: Enabled Cookies: Enabled | 
| Firefox | Firefox 4.x and later | JavaScript: Enabled Cookies: Enabled | 
| Google Chrome | Google Chrome 10 and later version | JavaScript: Enabled Cookies: Enabled | 
Additional considerations for supported Web browsers:
- Your browser must support JavaScript 1.2 or later. 
- If you use pop-up blockers (including Yahoo Toolbar or Google Toolbar), either disable them or configure them to accept pop-ups from the Veritas Access node to which you connect. 
- For Internet Explorer 8.0 on Windows Server 2003, download and install the hot fix from the following location: 
- If you are unable to download the gendeploy script using Internet Explorer 9.0, visit the following location to resolve the issue: 
- For Internet Explorer, enable the play animations in web pages option in the multimedia category of Advanced Internet options. 
- For Internet Explorer, when popup-blocker is turned on, make sure that the filter Level is set to Medium or lower. 
- For Internet Explorer, ensure that the site is included in the list of trusted sites. 
- If you cannot add the site to the list of trusted sites, enable the Binary and script Behaviors option in security settings. 
- You must install Adobe Flash plug-in version 10, or later.