Veritas InfoScale Availability 7.3 for UNIX/Linux: Advanced Administration I

Duration: 5 Days (40 Hours)

Veritas InfoScale Availability 7.3 for UNIX/Linux: Advanced Administration I Course Overview:

The Veritas InfoScale Availability 7.3 for UNIX/Linux: Advanced Administration I course is specifically designed for IT professionals who are responsible for managing, configuring, and utilizing clusters in an enterprise environment. This comprehensive course focuses on advanced topics related to networking, fencing configurations, and disaster recovery solutions using Veritas InfoScale Availability.

During the course, participants will learn how to set up and optimize advanced networking configurations within their cluster environment. They will explore various networking options and techniques to enhance the performance, availability, and reliability of their clusters.

Additionally, participants will gain knowledge and practical skills in configuring fencing, which is a critical component of cluster management. They will learn about different fencing mechanisms and how to implement them effectively to ensure the integrity and stability of the cluster infrastructure.

Furthermore, the course covers disaster recovery solutions, providing participants with insights into designing and implementing effective disaster recovery strategies for their clusters. Topics include data replication, site failover, and techniques for achieving high availability across multiple data centers.

Intended Audience:

This course is for system administrators, architects, and technical support personnel who are responsible for implementing, managing, and supporting clusters in complex enterprise environments.

By the completion of this course, you will be able to:

  • Configure advanced networking environments.
  • Implement advanced fencing configurations.
  • Configuring and manage disaster recovery environments and campus clusters.

Advanced Networking

Reviewing an Existing VCS Environment

  • Understanding the VCS architecture
  • Building the cluster configuration
  • Configuring VCS


  • Exercise A: Adding hosts to VIOM
  • Exercise B: Using SORT
  • Exercise C: Verifying the installed clustering software
  • Exercise D: Understanding cluster memberships and communication
  • Exercise E: Getting familiar with the cluster configuration

Configuring LLT

  • LLT over bonded interfaces
  • LLT over UDP
  • LLT over RDMA
  • LLT with different network interfaces
  • Manually configuring LLT


  • Exercise A: Configuring LLT over UDP
  • Exercise B: Restoring the original configuration
  • Exercise C: Using a bonded interface for LLT

Using Multiple Public Network Interfaces

  • Configuring multiple service groups with network resources
  • Managing multiple public network interfaces
  • MultiNICB and IPMultiNICB for UNIX
  • MultiNICA and IPMultiNIC for Linux


  • Exercise A: Using multiple network interfaces for increased availability
  • Exercise B: Observing NIC failover
  • Exercise C: Configuring a parallel network service group
  • Exercise D: Replacing NIC resources with Proxy resources
  • Exercise E: Restoring the original configuration

Data Protection Implementing Disk-Based I/O Fencing

  • Data protection requirements
  • I/O fencing concepts
  • I/O fencing operations
  • I/O fencing implementation
  • Fencing configuration


  • Exercise A: Verifying I/O fencing configuration
  • Exercise B: Verifying data disks for I/O fencing
  • Exercise C: Testing protection from data corruption
  • Exercise D: Observing response to system fault
  • Exercise E: Observing response to interconnect failure
  • Exercise F: Configuring SCSI3 disk-based fencing in a VCS cluster

Implementing Coordination Point Server

  • Coordination point concepts
  • Server-based fencing architecture
  • CPS operations
  • Installing and configuring a CP server
  • Configuring I/O fencing with CPS
  • Coordination point agent


  • Exercise A: Installing a single-node VCS cluster
  • Exercise B: Configuring a single-node CP server
  • Exercise C: Verifying the CP server configuration
  • Exercise D: Configuring for I/O fencing with a CP server
  • Exercise E: Testing CP server communication failure
  • Exercise F: Testing CP server caching
  • Exercise G: Restoring the original configuration

Administering Fencing Configurations

  • Installing and configuring clustered CP servers
  • Administering CPS
  • Administering disk-based I/O fencing
  • Configuring preferred fencing


  • Exercise A: Configuring CP server on a VCS cluster
  • Exercise B: Verifying the clustered CP server configuration
  • Exercise C: Modifying the fencing configuration on the application cluster
  • Exercise D: Testing CP server failover and communication failure
  • Exercise E: Restoring the original configuration

Disaster Recovery Global Clustering Architecture and Concepts

  • Global cluster architecture
  • Global cluster components
  • VCS features for global cluster management
  • Intercluster communication failure


  • Exercise A: Preparing the lab environment for global clustering
  • Exercise B: Configuring a local service group for the application

Configuring a Global Cluster

  • Configuring the Global Cluster Option
  • Linking clusters
  • Configuring a global service group
  • Managing dynamic IP address updates


  • Exercise A: Configuring the global cluster option
  • Exercise B: Securing communication between the widearea connectors
  • Exercise C: Linking clusters
  • Exercise D: Verifying DNS server access from cluster systems
  • Exercise E: Configuring a global service group

Managing a Global Cluster

  • Managing clusters in a global cluster environment
  • Managing global cluster heartbeats
  • Managing global service groups


  • Exercise A: Testing dynamic DNS updates
  • Exercise B: Adding another Icmp heartbeat link

Notification and Failover Behavior in a Global Cluster

  • Notification in a global cluster
  • Failover behavior of a global service group
  • Cluster state transitions
  • Simulating global clusters using the VCS Simulator


  • Exercise A: Configuring notification and event triggers
  • Exercise B: Testing local failover
  • Exercise C: Testing intercluster failover with ClusterFailOverPolicy set to Manual
  • Exercise D: Testing intercluster failover with ClusterFailOverPolicy set to Connected
  • Exercise E: Testing intercluster failover with ClusterFailOverPolicy set to Auto
  • Exercise F: Restoring the original configuration

You must have administrator-level experience with UNIX or Linux, TCP/IP networking, and clustering using Veritas Cluster Server.

Discover the perfect fit for your learning journey

Choose Learning Modality

Live Online

  • Convenience
  • Cost-effective
  • Self-paced learning
  • Scalability


  • Interaction and collaboration
  • Networking opportunities
  • Real-time feedback
  • Personal attention


  • Familiar environment
  • Confidentiality
  • Team building
  • Immediate application

Training Exclusives

This course comes with following benefits:

  • Practice Labs.
  • Get Trained by Certified Trainers.
  • Access to the recordings of your class sessions for 90 days.
  • Digital courseware
  • Experience 24*7 learner support.

Got more questions? We’re all ears and ready to assist!

Request More Details

Please enable JavaScript in your browser to complete this form.

Subscribe to our Newsletter

Please enable JavaScript in your browser to complete this form.