Veritas Disaster Recovery Advisor 5.3 - Deployment Requirements

Description

 

Table of Contents

 
About this document
Intended audience
 
DRA deployment architecture
Deployment environment
DRA server
Hardware
Software
Oracle environment and licensing
Web client requirements
Credentials and collection methods used
About setting up DRA user profiles
About privilege control software
Data collection from EMC Control Center
Data collection from SYMCLI through a UNIX proxy
Data collection from NaviCLI through a UNIX proxy
Data collection from HDS HiCommand/HP CommandView
Data collection from NetApp
Data collection from VMware vCenter
Data collection from UNIX hosts
Privileged commands on AIX
Data collection from Windows
Data collection from databases
Mail server configuration
Network and other environmental recommendations
Summary of ports and protocols used by DRA
 
Methods for secure privilege provisioning
sudo on UNIX hosts
EMC
HDS/HP XP
NetApp
Veritas SF and Cluster
Oracle
Additional for Solaris
Additional for Linux
UNIX Privilege Manager
Suggested Oracle grant provisioning
Suggested MS SQL Server grant provisioning
Commands used to collect data from NetApp
Queries used to scan EMC ECC
Configuring DRA for ECC scanning over JDBC SSL (Oracle)
Configuring an SSL policy
Copying the wallet file from the ECC Repository server

 

Terms of use for this information are found in Legal Notices.

Search

Survey

Did this article answer your question or resolve your issue?

No
Yes

Did this article save you the trouble of contacting technical support?

No
Yes

How can we make this article more helpful?

Email Address (Optional)