Veritas Access Appliance 8.3 Administrator's Guide

Last Published:
Product(s): Appliances (8.3)
Platform: Veritas 3360,Veritas 3350,Veritas 3340
  1. Section I. Introducing Access Appliance
    1. Introducing Access Appliance
      1.  
        About Access Appliance
      2.  
        About the Access Appliance Dashboard
      3. Getting started with the Access CLISH
        1.  
          Accessing the Access CLISH
        2.  
          Navigating the Access CLISH
        3.  
          Getting help using the Access CLISH
        4.  
          Displaying the command history
        5.  
          Using the more command
      4.  
        Getting started with Access Appliance APIs
  2. Section II. Configuring Access Appliance
    1. Managing users
      1.  
        About user management
      2.  
        About the naming requirements for adding new users
      3.  
        About the naming requirements when assigning roles to domain users
      4.  
        Adding and removing user roles using GUI
      5.  
        Performing user management using CLISH
    2. Managing licenses
      1.  
        About Access Appliance licenses
      2.  
        Managing licenses from the GUI
      3.  
        Managing licenses from the command-line interface
    3. Configuring the network
      1.  
        About configuring the Access Appliance network
      2.  
        About bonding Ethernet interfaces
      3.  
        Bonding Ethernet interfaces
      4.  
        Considerations for configuration a LACP bond
      5.  
        Configuring DNS settings
      6.  
        About Ethernet interfaces
      7.  
        Displaying current Ethernet interfaces and states
      8.  
        Configuring IP addresses
      9.  
        Configuring IP addresses and FQDNs in a non-DNS environment
      10.  
        Configuring VLAN interfaces
      11.  
        Configuring NIC devices
      12.  
        About configuring routing tables
      13.  
        Configuring routing tables
      14.  
        Changing the firewall settings
      15.  
        Configuring Access Appliance in IPv4 and IPv6 mixed mode
      16.  
        Support for multiple data subnets
      17.  
        Adding console FQDN to the network and accessing the GUI using the console FQDN
    4. Configuring authentication services
      1.  
        About configuring LDAP settings
      2.  
        Configuring LDAP server settings
      3.  
        Administering the Access Appliance cluster's LDAP client
      4.  
        About Active Directory (AD)
      5.  
        Configuring AD server settings
      6.  
        Configuring entries for Access Appliance DNS for authenticating to Active Directory (AD)
      7.  
        Configuring AD/LDAP using the GUI
      8.  
        Configuring NSS lookup order
      9.  
        Sign-in options for the Access Appliance UI
      10. Configuring user authentication using digital certificates or smart cards
        1.  
          Adding CA certificates for smart card authentication
        2.  
          Deleting CA certificates
  3. Section III. Managing Access Appliance storage
    1. Configuring storage
      1.  
        About storage provisioning and management
      2.  
        About configuring disks
      3.  
        About configuring storage pools
      4.  
        Configuring storage pools
      5.  
        About quotas for usage
      6.  
        Enabling, disabling, and displaying the status of file system quotas
      7.  
        Setting and displaying file system quotas
      8.  
        Setting user quotas for users of specified groups
      9.  
        About quotas for CIFS home directories
      10.  
        Workflow for configuring and managing storage using the Access Appliance CLI
      11.  
        Displaying information for all disk devices associated with the nodes in a cluster
      12.  
        Displaying WWN information
      13.  
        Importing new LUNs forcefully for new or existing pools
      14.  
        Initiating host discovery of LUNs
    2. Managing disks
      1.  
        Adding disks to a storage pool
      2.  
        Removing disks from a storage pool
      3.  
        Viewing information about disks
      4.  
        Accessing disk details
      5.  
        Discovering disks
      6.  
        Formatting a disk
    3. Access Appliance as an iSCSI target
      1.  
        About Access Appliance as an iSCSI target
      2.  
        Managing the iSCSI target service
      3.  
        Managing the iSCSI targets
      4.  
        Managing the LUNs
      5.  
        Managing the mappings with iSCSI initiators
      6.  
        Managing the users
  4. Section IV. Managing Access Appliance file access services
    1. Configuring the NFS server
      1.  
        About using the NFS server with Access Appliance
      2.  
        Using the kernel-based NFS server
      3.  
        Accessing the NFS server
      4.  
        Displaying and resetting NFS statistics
      5.  
        Configuring Access Appliance for ID mapping for NFS version 4
      6.  
        Configuring the NFS client for ID mapping for NFS version 4
      7.  
        About authenticating NFS clients
      8. Setting up Kerberos authentication for NFS clients
        1.  
          Adding and configuring Access Appliance to the Kerberos realm
    2. Using Access Appliance as a CIFS server
      1.  
        About configuring Access Appliance for CIFS
      2. About configuring CIFS for Active Directory (AD) domain mode
        1.  
          Joining Access Appliance to Active Directory (AD)
        2.  
          Verifying that Access Appliance has joined Active Directory (AD) successfully
        3.  
          Using multi-domain controller support in CIFS
        4.  
          About leaving an AD domain
        5.  
          Changing domain settings for AD domain mode
        6.  
          Removing the AD interface
      3.  
        Adding an SPN entry on the Windows client
      4. About setting trusted domains
        1.  
          Specifying trusted domains that are allowed access to the CIFS server
        2.  
          Allowing trusted domains access to CIFS
        3.  
          Setting Active Directory trusted domains
      5.  
        About storing account information
      6.  
        Storing user and group accounts
      7.  
        Reconfiguring the CIFS service
      8.  
        About mapping user names for CIFS/NFS sharing
      9.  
        About the mapuser commands
      10.  
        Adding, removing, or displaying the mapping between CIFS and NFS users
      11.  
        Automatically mapping UNIX users from LDAP to Windows users
      12. About managing home directories
        1.  
          Setting the home directory file systems
        2.  
          Setting up home directories
        3.  
          Displaying home directory usage information
        4.  
          Deleting home directories and disabling creation of home directories
      13. About CIFS clustering modes
        1.  
          About switching the clustering mode
      14. About migrating CIFS shares and home directories
        1.  
          Migrating CIFS shares and home directories from normal to ctdb clustering mode
        2.  
          Migrating CIFS shares and home directories from ctdb to normal clustering mode
      15.  
        Setting the CIFS aio_fork option
      16.  
        Enabling CIFS data migration
    3. Using Access Appliance as an Object Store server
      1.  
        About the Object Store server
      2.  
        Use cases for configuring the Object Store server
      3.  
        Configuring the Object Store server
      4.  
        About buckets and objects
      5.  
        File systems used for objectstore buckets
      6.  
        Enabling WORM on buckets
      7.  
        Object Access SSL certificate
      8.  
        Object Access endpoints
      9.  
        S3 with NFS use case
      10.  
        S3 with NSP use case
      11. Configuring the S3 server using GUI
        1.  
          Setting Object Access server default parameters
        2.  
          Setting up the Object Access server group-specific parameters
        3.  
          Viewing information about S3
        4.  
          Provisioning the S3 bucket using GUI
  5. Section V. Managing Access Appliance security
    1. Managing security
      1.  
        Security overview
      2.  
        About the security meter
    2. Setting up FIPS mode
      1.  
        FIPS 140-2 conformance for Access Appliance
      2.  
        Viewing FIPS status for Access Appliance
      3.  
        Enabling FIPS for Access Appliance
      4.  
        Disabling FIPS mode for NetBackup MSDP
      5.  
        Managing the FIPS mode using the command-line interface
    3. Configuring STIG
      1.  
        STIG overview for Access Appliance
      2.  
        Enabling OS STIG hardening for Access Appliance
      3.  
        Viewing STIG status of an Access Appliance
      4.  
        Enabling STIG using the command-line interface
    4. Setting the banner
      1.  
        Managing the login banner using the UI
      2.  
        Managing the banner from the command-line interface
    5. Setting the password policy
      1.  
        Managing the password policy using the UI
      2.  
        Managing the password policy from the command-line interface
    6. Immutability in Access Appliance
      1.  
        Support for immutability in Access Appliance
      2.  
        About lockdown modes
      3.  
        Selecting or changing the lockdown mode
      4.  
        Accessing the root shell in lockdown mode
      5.  
        Configuring immutability using GUI
    7. Deploying certificates on Access Appliance
      1.  
        About system certificates on Access Appliance
      2.  
        About external certificates on Access Appliance
      3.  
        Deploying ECA using the GUI
      4.  
        Log locations
    8. Single Sign-On (SSO)
      1.  
        About single sign-on (SSO) configuration
      2.  
        Configuring SSO on Access Appliance
      3.  
        Limitations and log locations
    9. Configuring multifactor authentication
      1.  
        About multifactor authentication
      2.  
        Considerations when configuring multifactor authentication
      3.  
        Configuring multifactor authentication for your user account
      4.  
        Disabling multifactor authentication for your user account
      5.  
        Enforcing multifactor authentication for all users
      6.  
        Configuring multifactor authentication for your user account when it is enforced in the cluster
      7.  
        Resetting multifactor authentication for a user
  6. Section VI. Monitoring and troubleshooting
    1. Monitoring the appliance
      1.  
        Testing the appliance hardware
      2. About Veritas AutoSupport on the Access Appliance
        1.  
          Setting up AutoSupport on the appliance
        2.  
          Using a proxy server with the appliance
      3.  
        Setting up email notifications on the appliance
      4.  
        Setting up SNMP notifications on the appliance
    2. Configuring event notifications and audit logs
      1.  
        About troubleshooting
      2.  
        Monitoring command activity
      3.  
        Monitoring alerts
      4. About alert management
        1.  
          Viewing information about alert management
        2.  
          Managing alerts
      5.  
        Monitoring events
      6.  
        Viewing reports
      7.  
        Viewing cluster storage usage
      8.  
        Viewing file system usage
      9.  
        About event notifications
      10.  
        About severity levels and filters
      11.  
        About SNMP notifications
      12.  
        Configuring a syslog server
      13.  
        Displaying events on the console
    3. Appliance log files
      1.  
        About appliance log files
      2. Gathering device logs with the DataCollect command
        1.  
          Collecting default and additional diagnostic logs
      3.  
        Downloading logs using the Log Transfer Console
      4. Forwarding logs to an external server
        1.  
          Configuring log forwarding using the UI
        2.  
          Modifying log forwarding settings using the UI
        3.  
          Removing log forwarding using the UI
        4.  
          Setting up log forwarding using the command-line interface
        5.  
          Viewing the configured settings from the appliance shell menu
      5. Collecting logs using the UI
        1.  
          Uploading log packages to Veritas Support
        2.  
          Downloading log packages
        3.  
          Deleting log packages
  7. Section VII. Provisioning and managing Access Appliance file systems
    1. Creating and maintaining file systems
      1.  
        About creating and maintaining file systems
      2.  
        About encryption at rest
      3. Considerations for creating a file system
        1.  
          Best practices for creating file systems
        2.  
          Choosing a file system layout type
        3.  
          Determining the initial extent size for a file system
        4.  
          About striping file systems
        5.  
          About FastResync
        6.  
          About fsck operation
        7.  
          Enabling WORM on a file system
        8.  
          Setting retention in files
        9.  
          Setting WORM over NFS
        10.  
          Manually setting WORM-retention on a file over CIFS
        11. About managing application I/O workloads using maximum IOPS settings
          1.  
            Setting the maximum IOPS
      4.  
        Creating a file system
      5.  
        Bringing the file system online or offline
      6.  
        Listing all file systems and associated information
      7. Modifying a file system
        1.  
          Adding or removing a mirror from a file system
        2.  
          Adding or removing a column from a file system
        3.  
          Increasing the size of a file system
        4.  
          Decreasing the size of a file system
      8. Managing a file system
        1.  
          Defragmenting a file system
        2.  
          Checking and repairing a file system
        3.  
          Configuring FastResync for a file system
        4.  
          Disabling the FastResync option for a file system
        5.  
          Checking and resynchronizing stale mirrors
        6.  
          Setting file system alerts
        7.  
          Displaying file system alert values
        8.  
          Removing file system alerts
      9.  
        Destroying a file system
      10.  
        Upgrading disk layout versions
  8. Section VIII. Provisioning and managing Access Appliance shares
    1. Creating shares for applications
      1.  
        About file sharing protocols
      2.  
        About concurrent access
      3.  
        Sharing directories using CIFS and NFS protocols
      4.  
        Sharing a file system as a CIFS home directory
      5.  
        About concurrent access with NFS and S3
    2. Creating and maintaining NFS shares
      1.  
        About NFS file sharing
      2. About the NFS shares
        1.  
          Creating an NFS share with continuous replication
        2.  
          Creating an NFS share with encryption
        3.  
          Creating an NFS share without replication and encryption
      3.  
        Displaying file systems and snapshots that can be exported
      4.  
        Exporting an NFS share
      5.  
        Displaying exported directories
      6.  
        About managing NFS shares using netgroups
      7.  
        Unexporting a directory or deleting NFS options
      8.  
        Exporting an NFS share for Kerberos authentication
      9.  
        Mounting an NFS share with Kerberos security from the NFS client
      10.  
        Exporting an NFS snapshot
    3. Creating and maintaining CIFS shares
      1.  
        About managing CIFS shares
      2. About the CIFS shares
        1.  
          Creating a CIFS share with continuous replication
        2.  
          Creating a CIFS share with encryption
        3.  
          Creating a CIFS share without replication and encryption
      3.  
        Exporting a directory as a CIFS share
      4.  
        Configuring a CIFS share as secondary storage for an Enterprise Vault store
      5.  
        Exporting the same file system/directory as a different CIFS share
      6.  
        About the CIFS export options
      7.  
        Setting share properties
      8.  
        Displaying CIFS share properties
      9.  
        Hiding system files when adding a CIFS normal share
      10.  
        Allowing specified users and groups access to the CIFS share
      11.  
        Denying specified users and groups access to the CIFS share
      12.  
        Exporting a CIFS snapshot
      13.  
        Deleting a CIFS share
      14.  
        Modifying a CIFS share
      15.  
        Making a CIFS share shadow copy aware
      16. About managing CIFS shares for Enterprise Vault
        1.  
          Creating a CIFS share for Enterprise Vault with continuous replication
        2.  
          Creating a CIFS share for Enterprise Vault without replication
    4. Integrating Access Appliance with Data Insight
      1.  
        Access Appliance integration with Data Insight
  9. Section IX. Managing Access Appliance storage services
    1. Configuring continuous replication
      1.  
        About Access Appliance continuous replication
      2. How Access Appliance continuous replication works
        1.  
          How data flows in continuous replication synchronous mode
        2.  
          How data flows in continuous replication asynchronous mode
      3.  
        Starting Access Appliance continuous replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file system to replicate
      6.  
        Managing continuous replication
      7.  
        Displaying continuous replication information and status
      8.  
        Unconfiguring continuous replication
      9.  
        Preserving the file system on the destination cluster
      10.  
        Cloud tiering with continuous replication
      11.  
        Configuring Enterprise Vault with continuous replication
      12. Configuring a continuous replication job using the GUI
        1.  
          Stopping or starting a continuous replication job
        2.  
          Pausing and resuming a continuous replication job
        3.  
          Failing over or failing back a continuous replication job
        4.  
          Unconfiguring a continuous replication job
      13. Continuous replication failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
      14.  
        Addition of multiple file systems to a Replicated Volume Group
    2. Using snapshots
      1.  
        About snapshots
      2.  
        Enabling WORM on storage snapshots
      3.  
        Creating snapshots
      4.  
        Displaying snapshots
      5.  
        Managing disk space used by snapshots
      6.  
        Bringing snapshots online or taking snapshots offline
      7.  
        Restoring a snapshot
      8.  
        About snapshot schedules
      9.  
        Configuring snapshot schedules
      10.  
        Managing automated snapshots
    3. Using instant rollbacks
      1.  
        About instant rollbacks
      2.  
        Creating a space-optimized rollback
      3.  
        Creating a full-sized rollback
      4.  
        Listing Access Appliance instant rollbacks
      5.  
        Restoring a file system from an instant rollback
      6.  
        Refreshing an instant rollback from a file system
      7.  
        Bringing an instant rollback online
      8.  
        Taking an instant rollback offline
      9.  
        Destroying an instant rollback
      10.  
        Creating a shared cache object for Access Appliance instant rollbacks
      11.  
        Listing cache objects
      12.  
        Destroying a cache object of a Access Appliance instant rollback
  10. Section X. Reference
    1. Appendix A. Access Appliance documentation
      1.  
        Using the Access Appliance product documentation
      2.  
        About accessing the online man pages
  11.  
    Index

Considerations for configuration a LACP bond

Standardized protocol is used to establish and maintain link-aggregation between systems. What sets LACP bonding mode apart from the other bonding modes supported by Linux is that the systems participating in LACP continuously exchange data (LACPDUs) with each other to determine which links within the bond should actively be used for the transmission and receipt of network traffic.

While the IEEE standard defines terminology specific to LACP, some vendors have chosen to use different terminology. In this section, LAG (link-aggregation group) and MLAG are used when describing link-aggregation on the switch side and bond is used when describing link-aggregation on the appliance side.

The following list is a non-comprehensive list of equivalent vendor-proprietary terms.

  • LAG

    • port-channel

    • trunk

    • multi-layer trunk (MLT)

  • MLAG

    • virtual Port-channel (vPC)

    • Multi-chassis link-aggregation group (MCLAG)

    • Split multi-layer trunk (SMLT)

Interfaces in an LACP bond are either placed into an active or suspended state. In the active state an interface is allowed to collect and process incoming network traffic as well as transmit outgoing network traffic. In the suspended state an interface does not collect incoming network traffic or transmit any outgoing network traffic until the condition that caused the suspension is resolved.

For all bonded appliance interfaces to be considered active within a LACP bond, you must ensure the following:

  • The switch ports which the bonded interfaces are connected to are all members of the same LAG. If the switchports are not members within the same LAG, the appliance elects an interface or a group of interfaces, which are members of the same LAG, to be active while placing all other bonded interfaces in a suspended state.

  • The LAG must be configured to use LACP. If the LAG is not configured to use LACP, the appliance elects a single interface to be active while all other interfaces are placed into a suspended state.

A LAG cannot span multiple switches without the following:

  • Configuration of MLAG between the switches

  • Deployment of EVPN LAG multihoming in the environment

  • Switches being stacked use a vendor proprietary technology.

    Note:

    Check the switch documentation to ensure that the make and model of the switch to ensure LACP functions properly with the switches in a stacked configuration.

Stacked switches, MLAG, and EVPN LAG multihoming allow multiple switches to function as a single logical switch from the perspective of LACP. When stacking, MLAG or EVPN LAG multihoming are deployed and the LAG is properly configured. The LACP bond on the appliance places all the bonded interfaces into an active state. If the appliance's bond spans across multiple switches without MLAG, EVPN LAG multihoming, or stacking configured on those switches, LACP on the appliance detects this and elects an interface or group of interfaces, which are members of the same LAG and connected to the same switch, to be active while placing all other bonded interfaces into a suspended state. Even if the LAGs on the switches are configured to use the same LAG ID, LACP on the appliance identifies that the LACPDUs were sent from multiple different switches.

Although Access Appliance is configured as a cluster, it is important to note that Red Hat Linux does not have a mechanism to perform MLAG. Therefore, each appliance must be treated as a unique end-system. For each bond created on the Access Appliance cluster, two LAGs must be created on the switch and each LAG must be assigned a different LAG ID.

For example, when you create a two-interface bond using the Access CLI, a bond interface is created on each node. The two switch ports which connect to node_A should be assigned to a LAG with a LAG ID of X and the two switch ports which connect to node_B should be assigned to a LAG with a LAG ID of Y. In this example, if all four switch ports are assigned the LAG ID of X, the switch or set of switches elects a set of switch ports connected to one of the appliance nodes and places it in an active state while other interfaces are placed into a suspended state. This leads to network connectivity issues as the suspended interfaces are still physically up on the appliance which allows VCS to assign an IP address to them. If this happens, when that node attempts to send traffic out the bond, the application sends the traffic down the network stack, and it is dropped by the bonding driver.

While LACP does not perform load balancing, it does have a mechanism for selecting an outgoing physical interface. This mechanism is responsible for calculating a hash based on selected attributes in the headers of the outgoing network traffic. LACP associates a hash with an interface and all traffic matching that hash egress the selected interface. It is important to note that you cannot control the outgoing interface, you can only influence the selection process. This mechanism is statically configured on each system and is not negotiated between the systems participating in LACP. In Linux this mechanism is called the xmit_hash_policy.

The Access Appliance supports the following configurations of the xmit_hash_policy:

  • layer2: A hash is calculated based on the source and destination MAC addresses in the Ethernet header. This xmit_hash_policy provides decent results if communication occurs between the appliance and multiple systems on the same subnet.

    Imbalances occur if traffic is not distributed amongst multiple systems on the same subnet or if the traffic must be routed through a router/gateway.

  • layer2+3: A hash is calculated based on the source and destination MAC and IP address in the Ethernet and IP headers. This xmit_hash_policy provides decent results if communication occurs between the appliance and multiple systems.

    Imbalances occur if most of the traffic is transmitted between the appliance and a single system.

  • layer3+4: A hash is calculated based on the source and destination IP and port in the IP and TCP/UDP headers. A unique hash is produced for each socket established on the appliance.

During the planning stage, it is important to consider which xmit_hash_policy is most appropriate based on the expected usage of the bond. It is also important to include the network administrators in this planning as the xmit_hash_policy only controls the outgoing traffic on the appliance and has no effect on how the switch chooses an egress interface.