Please enter search query.
Search <book_title>...
Veritas Access Appliance 8.4 Administrator's Guide
Last Published:
2025-05-19
Product(s):
Appliances (8.4)
Platform: Veritas 3350,Veritas 3340,Veritas 3360
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Managing licenses
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- Using Access Appliance as an Object Store server
- Configuring the S3 server using GUI
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Managing security
- Setting up FIPS mode
- Configuring STIG
- Setting the banner
- Setting the password policy
- Immutability in Access Appliance
- Deploying certificates on Access Appliance
- Single Sign-On (SSO)
- Configuring multifactor authentication
- Section VI. Monitoring and troubleshooting
- Monitoring the appliance
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring continuous replication
- How Access Appliance continuous replication works
- Configuring a continuous replication job using the GUI
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring continuous replication
- Section X. Reference
Accessing the root shell in lockdown mode
You can use the following procedure to access the root shell when lockdown mode is configured.
To access the root shell when lockdown mode is configured
- Log on to the node-level CLI on any node in the cluster.
- Run the show serial-number command to get the serial number for a specific node.
- If you have permission to generate access key on the SHI portal, then go to the portal to generate access key with the serial number that you got in step 2 . For more information, refer to the System Health Insights User Guide.
If you do not have the permission to generate the access key on the SHI portal, open a ticket with Veritas Support to generate an access key. Mention the serial number in the Support case. The Veritas Support will generate an access key with the serial number provided. Set an access passphrase which will be required later to elevate to root.
- Log on to the Access Appliance shell on the same node as in step 2.
- Run the support unlock command. You are prompted to enter the maintenance password. Enter the maintenance password and press Enter. You are prompted to enter an access key. Enter the access key that you got in step 3. You are prompted to enter an access passphrase. Enter the access passphrase that you set in step 3. Press Enter to unlock the root shell access to the current node (all other nodes remain locked).
- Run the support elevate command. Enter the maintenance password. You are prompted to enter an access passphrase. Enter the access passphrase set in step 3. Press Enter to get into the root shell.
- Repeat steps 3 to 6 to get into the root shell of all other nodes in the cluster if you are required to unlock the nodes.
- Run the support lock command on a specific node to lock that node. If no manual lock is issued, the node is locked automatically after 12 hours. All the current users are removed from the root shell in a single node.
Note:
The access key expires in 2 hours.