Index A
ACS
integrating with Security Manager 4-5
B
boot disk
mirroring 3-3
C
cautions
significance of ii-ix
conventions ii-viii
D
documentation
audience ii-vii
conventions ii-viii
ordering ii-x
related ii-ix
E
Ethernet connections
making 3-1
external storage
connecting to servers 3-2
M
Microsoft Windows
installing 3-2
O
overview 1-1
P
permissions
updating on the working volume 3-14
S
security guidelines
obtaining ii-x
Security Manager
backing up 4-6
installation overview 3-6
installing on secondary servers 3-9
installing on the primary server 3-7
manually starting, stopping, failing over 4-3
uninstalling 4-6
upgrading 4-6
support
obtaining ii-x
Symantec Veritas
see Veritas 3-2
system requirements
hardware, dual-node site 2-2
hardware, single-node site 2-1
software, geographic redundancy 2-4
software, local redundancy 2-3
software, replication without clustering 2-4
understanding 2-1
T
test plans
application failures B-16
Ethernet/network failures B-3
manual switches B-1
server failures B-10
V
Veritas Cluster Server
configuring, dual geographic cluster 3-24
configuring, single local cluster (dual-node) 3-16
customizing behavior 4-1
resource views A-1
Veritas Products
installing 3-2
overview 1-5
Veritas Volume Manager
configuring primary server (without replication) 3-4
configuring primary servers (with replication) 3-5
configuring secondary servers 3-6
Veritas Volume Replicator
configuring 3-12
W
warnings
significance of ii-ix
worksheets
geographic redundancy 2-6
local redundancy 2-5
Index
A
ACS
integrating with Security Manager 4-5
B
boot disk
mirroring 3-3
C
cautions
significance of ii-ix
conventions ii-viii
D
documentation
audience ii-vii
conventions ii-viii
ordering ii-x
related ii-ix
E
Ethernet connections
making 3-1
external storage
connecting to servers 3-2
M
Microsoft Windows
installing 3-2
O
overview 1-1
P
permissions
updating on the working volume 3-14
S
security guidelines
obtaining ii-x
Security Manager
backing up 4-6
installation overview 3-6
installing on secondary servers 3-9
installing on the primary server 3-7
manually starting, stopping, failing over 4-3
uninstalling 4-6
upgrading 4-6
support
obtaining ii-x
Symantec Veritas
see Veritas 3-2
system requirements
hardware, dual-node site 2-2
hardware, single-node site 2-1
software, geographic redundancy 2-4
software, local redundancy 2-3
software, replication without clustering 2-4
understanding 2-1
T
test plans
application failures B-16
Ethernet/network failures B-3
manual switches B-1
server failures B-10
V
Veritas Cluster Server
configuring, dual geographic cluster 3-24
configuring, single local cluster (dual-node) 3-16
customizing behavior 4-1
resource views A-1
Veritas Products
installing 3-2
overview 1-5
Veritas Volume Manager
configuring primary server (without replication) 3-4
configuring primary servers (with replication) 3-5
configuring secondary servers 3-6
Veritas Volume Replicator
configuring 3-12
W
warnings
significance of ii-ix
worksheets
geographic redundancy 2-6
local redundancy 2-5