Veritas Disaster Recovery Advisor 5.2 - Deployment Requirements

Article:DOC2504  |  Created: 2010-08-12  |  Updated: 2010-08-12  |  Article URL http://www.symantec.com/docs/DOC2504
Article Type
Documentation


Description



Table of Contents:
About this document
Intended audience
DRA deployment architecture
Deployment environment
DRA server
Oracle environment and licensing
Web client requirements
Credentials and collection methods used
About setting up DRA user profiles
About privilege control software
Data collection from EMC Control Center
Data collection from SYMCLI through a UNIX proxy
Data collection from NaviCLI through a UNIX proxy
Data collection from HDS HiCommand
Data collection from NetApp
Data collection from UNIX hosts
Privileged commands on AIX
Data collection from Windows
Data collection from databases
Mail server configuration
Network and other environmental recommendations
Methods for secure privilege provisioning
sudo on UNIX hosts
Solaris
HP-UX
Linux
AIX
UNIX Privilege Manager
Suggested Oracle grant provisioning
Granting dictionary select privileges (recommended)
Granting individual view select privileges
Suggested MS SQL Server grant provisioning
Commands used to collect data from NetApp
Queries used to scan EMC ECC


 


Attachments

Veritas Disaster Recovery Advisor 5.2 - Deployment Requirements
dra_deployment_52.pdf (551 kBytes)

Article URL http://www.symantec.com/docs/DOC2504


Terms of use for this information are found in Legal Notices