Veritas Access Installation Guide

Last Published:
Product(s): Access (7.4.1)
Platform: Linux
  1. Introducing Veritas Access
      About Veritas Access
  2. Licensing in Veritas Access
      About Veritas Access product licensing
  3. System requirements
      Important release information
    2. System requirements
      1. Linux requirements
          Operating system RPM installation requirements and operating system patching
          Kernel RPMs that are required to be installed with exact predefined RPM versions
          OL kernel RPMs that are required to be installed with exact predefined RPM versions
          Required operating system RPMs for OL 7.4
          Required operating system RPMs for RHEL 7.3
          Required operating system RPMs for RHEL 7.4
        Software requirements for installing Veritas Access in a VMware ESXi environment
        Hardware requirements for installing Veritas Access virtual machines
        Management Server Web browser support
        Supported NetBackup versions
        Supported OpenStack versions
        Supported Oracle versions and host operating systems
        Supported IP version 6 Internet standard protocol
    3. Network and firewall requirements
        NetBackup ports
        OpenDedup ports and disabling the iptable rules
        CIFS protocols and firewall ports
      Maximum configuration limits
  4. Preparing to install Veritas Access
      Overview of the installation process
      Hardware requirements for the nodes
      Connecting the network hardware
    4. About obtaining IP addresses
        About calculating IP address requirements
        Reducing the number of IP addresses required at installation time
      About checking the storage configuration
  5. Deploying virtual machines in VMware ESXi for Veritas Access installation
      Setting up networking in VMware ESXi
      Creating a datastore for the boot disk and LUNs
      Creating a virtual machine for Veritas Access installation
  6. Installing and configuring a cluster
      Installation overview
      Summary of the installation steps
      Before you install
    4. Installing the operating system on each node of the cluster
        About the driver node
        Installing the operating system on the target Veritas Access cluster
        Installing the Oracle Linux operating system on the target Veritas Access cluster
    5. Installing Veritas Access on the target cluster nodes
        Installing and configuring the Veritas Access software on the cluster
        Veritas Access Graphical User Interface
    6. About managing the NICs, bonds, and VLAN devices
        Selecting the public NICs
        Selecting the private NICs
        Excluding a NIC
        Including a NIC
        Creating a NIC bond
        Removing a NIC bond
        Removing a NIC from the bond list
    7. About VLAN tagging
        Creating a VLAN device
        Removing a VLAN device
        Limitations of VLAN tagging
      Replacing an Ethernet interface card
      Configuring I/O fencing
      About configuring Veritas NetBackup
      About enabling kdump during an Veritas Access configuration
      Reconfiguring the Veritas Access cluster name and network
      Configuring a KMS server on the Veritas Access cluster
  7. Automating Veritas Access installation and configuration using response files
      About response files
      Performing a silent Veritas Access installation
      Response file variables to install and configure Veritas Access
      Sample response file for Veritas Access installation and configuration
  8. Displaying and adding nodes to a cluster
      About the Veritas Access installation states and conditions
      Displaying the nodes in the cluster
      Before adding new nodes in the cluster
      Adding a node to the cluster
      Adding a node in mixed mode environment
      Deleting a node from the cluster
      Shutting down the cluster nodes
  9. Upgrading Veritas Access and operating system
      Upgrading the operating system and Veritas Access
  10. Upgrading Veritas Access using a rolling upgrade
      About the rolling upgrades
      Supported rolling upgrade paths for upgrades on RHEL and Oracle Linux
      Performing a rolling upgrade using the installer
  11. Uninstalling Veritas Access
      Before you uninstall Veritas Access
    2. Uninstalling Veritas Access using the installer
        Removing Veritas Access 7.4.1 RPMs
        Running uninstall from the Veritas Access 7.4.1 disc
  12. Appendix A. Installation reference
      Installation script options
  13. Appendix B. Configuring the secure shell for communications
      Manually configuring passwordless SSH
      Setting up the SSH and the RSH connections
  14. Appendix C. Manual deployment of Veritas Access
      Deploying Veritas Access manually on a two-node cluster in a non-SSH environment
      Enabling internal sudo user communication in Veritas Access

About Veritas Access

Veritas Access is a software-defined, scale-out network-attached storage (NAS) solution for unstructured data that works on commodity hardware. Veritas Access provides resiliency, multi-protocol access, and data movement to and from the public or the private cloud based on policies.

Figure: Veritas Access architecture

Veritas Access architecture

You can use Veritas Access in any of the following ways.

Table: Interfaces for using Veritas Access




Centralized dashboard and quick actions with operations for managing your storage.

See the GUI and the online Help for more information.


Enables automation using scripts, which run storage administration commands against the Veritas Access cluster.

See the Veritas Access RESTful API Guide for more information.

Command-line interface (CLI or CLISH)

Single point of administration for the entire cluster.

See the manual pages for more information.

Table: Veritas Access key features describes the features of Veritas Access.

Table: Veritas Access key features



Multi-protocol access

Veritas Access supports the following protocols:

  • Amazon S3

  • CIFS

  • FTP

  • iSCSI target

  • NFS

  • Oracle Direct NFS

  • SMB 3

  • NFS with S3

WORM storage for Enterprise Vault Archiving

Veritas Access can be configured as WORM primary storage for archival by Enterprise Vault.

Veritas Access is certified as a CIFS primary WORM storage for Enterprise Vault 12.1.

For more information, see the Veritas Access Enterprise Vault Solutions Guide.

WORM support over NFS

Veritas Access supports WORM over NFS.

Creation of Partition Secure Notification (PSN) file for Enterprise Vault Archiving

A Partition Secure Notification (PSN) file is created at a source partition after the successful backup of the partition at the remote site.

For more information, see the Veritas Access Enterprise Vault Solutions Guide.

Managing application I/O workloads using maximum IOPS settings

The MAXIOPS limit determines the maximum number of I/Os processed per second collectively by the storage underlying the file system.

Flexible Storage Sharing (FSS)

Enables cluster-wide network sharing of local storage.

Scale-out file system

The following functionality is provided for a scale-out file system:

  • File system that manages a single namespace spanning over both on-premises storage as well as cloud storage, which provides better fault tolerance for large data sets.

  • Highly available NFS and S3 shares.

    You use scale-out file systems if you want to store a large capacity of data in a single namespace (3 PB is the maximum file system size).

  • Creation of CIFS shares.

  • File sharing for a scale-out file system using FTP.

Cloud as a tier for a scale-out file system

Veritas Access supports adding a cloud service as a storage tier for a scale-out file system. You can move data between the tiers based on file name patterns and when the files were last accessed or modified. Use scheduled policies to move data between the tiers on a regular basis.

Veritas Access moves the data from the on-premises tier to Amazon S3, Amazon Glacier, Amazon Web Services (AWS), GovCloud (US), Azure, Google cloud, Alibaba, Veritas Access S3, IBM Cloud Object Storage, and any S3-compatible storage provider based on automated policies. You can also retrieve data archived in Amazon Glacier.


Veritas Access supports both read and writeback caching on solid state drives (SSDs) for applications running on Veritas Access file systems.


Veritas Access's built-in SmartTier feature can reduce the cost of storage by moving data to lower-cost storage. Veritas Access storage tiering also facilitates the moving of data between different drive architectures and on-premises.


Veritas Access supports snapshots for recovering from data corruption. If files, or an entire file system, are deleted or become corrupted, you can replace them from the latest uncorrupted snapshot.


You can run post-process periodic deduplication in a file system, which eliminates duplicate data without any continuous cost.


You can compress files to reduce the space used, while retaining the accessibility of the files and having the compression be transparent to applications. Compressed files look and behave almost exactly like uncompressed files: the compressed files have the same name, and can be read and written as with uncompressed files.

Erasure coding

Erasure coding is configured with the EC log option for the NFS use case.

IP load balancing

With IP load balancing, a single virtual IP is used to act as a load balancer IP, which distributes the incoming requests to the different nodes in the Veritas Access cluster for the services that are run on an active-active cluster.

Veritas Access as an iSCSI target for RHEL 7.x

Veritas Access as an iSCSI target can be configured to serve block storage. iSCSI target as a service is hosted in the active-active mode in the Veritas Access cluster.

Configuring Veritas Access in IPv4 and IPv6 mixed mode

Support for configuring the Veritas Access cluster in an IPv4 environment, or an IPV6 environment, or in a mixed mode environment where you have both IPv4 and IPv6 addresses.

NetBackup integration

Built-in NetBackup client for backing up your file systems to a NetBackup master or media server. Once data is backed up, a storage administrator can delete unwanted data from Veritas Access to free up expensive primary storage for more data.

OpenDedup integration

Integration with OpenDedup for deduplicating your data to on-premises or cloud storage for long-term data retention.

See the Veritas Access NetBackup Solutions Guide for more information.

OpenStack plug-in

Integration with OpenStack:

  • OpenStack Cinder integration that allows OpenStack instances to use the storage hosted by Veritas Access.

  • OpenStack Manila integration that lets you share Veritas Access file systems with virtual machines on OpenStack Manila.


Support for setting file system quotas, user quotas, and hard quotas.


Periodic replication of data over IP networks.

See the episodic(1) man page for more information.

Synchronous replication of data over IP networks

See the continuous(1) man page for more information.

Support for LDAP, NIS, and AD

Veritas Access uses the Lightweight Directory Access Protocol (LDAP) for user authentication.

Partition Directory

With support for partitioned directories, directory entries are redistributed into various hash directories. These hash directories are not visible in the namespace view of the user or operating system. For every new create, delete, or lookup, this feature performs a lookup for the respective hashed directory and performs the operation in that directory. This leaves the parent directory inode and its other hash directories unobstructed, which vastly improves file system performance.

By default, this feature is not enabled. See the storage_fs(1) manual page to enable this feature.

Isolated storage pools

Enables you to create an isolated storage pool with a self-contained configuration. An isolated storage pool protects the pool from losing the associated metadata even if all the configuration disks in the main storage pool fail.

Performance and tuning

Workload-based tuning for the following workloads:

  • Media server - Streaming media represents a new wave of rich Internet content. Recent advancements in video creation, compression, caching, streaming, and other content delivery technology have brought audio and video together to the Internet as rich media. You can use Veritas Access to store your rich media, videos, movies, audio, music, and photos.

  • Virtual machine support

  • Other workloads