Veritas Disaster Recovery Advisor 5.3 - Deployment Requirements

Article:DOC3610  |  Created: 2011-02-07  |  Updated: 2011-05-12  |  Article URL http://www.symantec.com/docs/DOC3610
Article Type
Documentation


Environment

Description



 

Table of Contents

 
About this document
Intended audience
 
DRA deployment architecture
Deployment environment
DRA server
Hardware
Software
Oracle environment and licensing
Web client requirements
Credentials and collection methods used
About setting up DRA user profiles
About privilege control software
Data collection from EMC Control Center
Data collection from SYMCLI through a UNIX proxy
Data collection from NaviCLI through a UNIX proxy
Data collection from HDS HiCommand/HP CommandView
Data collection from NetApp
Data collection from VMware vCenter
Data collection from UNIX hosts
Privileged commands on AIX
Data collection from Windows
Data collection from databases
Mail server configuration
Network and other environmental recommendations
Summary of ports and protocols used by DRA
 
Methods for secure privilege provisioning
sudo on UNIX hosts
EMC
HDS/HP XP
NetApp
Veritas SF and Cluster
Oracle
Additional for Solaris
Additional for Linux
UNIX Privilege Manager
Suggested Oracle grant provisioning
Suggested MS SQL Server grant provisioning
Commands used to collect data from NetApp
Queries used to scan EMC ECC
Configuring DRA for ECC scanning over JDBC SSL (Oracle)
Configuring an SSL policy
Copying the wallet file from the ECC Repository server

 


Attachments

dra_deployment.pdf (654 kBytes)

Article URL http://www.symantec.com/docs/DOC3610


Terms of use for this information are found in Legal Notices