Welcome to ONLC Training Centers

Veritas Access 7.3 Administration

Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

Need a class for a group?

We can deliver this class for your group. Follow the link to request more information.

Email Alert

Receive an email when this class is available as "Ready to Run" or "Early Notice" status.

Train from your home or office

If you have high-speed internet and a computer you can likely take this class from your home or office.


Veritas Access 7.3 Administration Course Outline

Special Note to New Hampshire Residents
This course has not yet been approved by the New Hampshire Department of Education. Please contact us for an update on when the class will be available in New Hampshire.

Overview
This course covers how to use Veritas Access to manage storage, file systems, and shares using the Veritas Access web-based GUI and command line. You learn about file system and file share administration as well as creating and maintaining NFS, CIFS, S3, and FTP file shares. In this course, you configure cloud-based storage as a secondary tier in Veritas Access. You also learn how to integrate Veritas Access as LTR storage for NetBackup.

Duration
Five days

Course Objectives
By the completion of this course, you will be able to:
• Install and configure a Veritas Access cluster.
• Configure authentication services in Veritas Access.
• Configure Veritas Access shares (NFS/CIFS/S3/FTP).
• Configure and administer storage tiers.
• Deduplicate and compress data.
• Configure quality of service (QoS).
• Configure file retention for WORM-enabled file systems.
• Configure continuous and episodic replication.
• Create a scale-out file system.
• Configure a cloud tier in AWS S3 and Glacier.
• Move files between primary and cloud tiers.
• Backup and restore data using NetBackup.
• Install and configure Veritas Access as NetBackup LTR storage with optional migration to the cloud.
• Perform basic troubleshooting tasks.

Who Should Attend
This course is for UNIX/Linux system architects, system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration/development staff who will be designing, installing, operating, and/or integrating Veritas Access.

Prerequisites
You must have working knowledge of advanced computer terminology, including TCP/IP networking and Internet concepts, and administrator-level knowledge of RedHat Enterprise Linux 7.4. Knowledge of cloud technologies and Microsoft Windows 2008/2012 operating systems is a plus.

Hands-On
This course includes practical hands-on exercises that enable you to test your new skills and begin to transfer them into your working environment.

COURSE OUTLINE

Introducing Veritas Access
• Need for Veritas Access
• Business Benefits and use cases
• Technical benefits

Installing Veritas Access
• Installation requirements
• Licensing in Veritas Access
• Installing Veritas Access
• Using response files
• Locating installation log files

Exploring Veritas Access User Interfaces
• Veritas Access users and user interfaces
• Navigating the CLISH interface
• Using the GUI to administer Veritas Access
• Managing licenses
• Configuring networking

Configuring Authentication Services
• Introducing authentication services
• Configuring LDAP server settings
• Configuring the NIS-related settings
• Configuring NSS lookup order
• Configuring authentication for NFS shares
• Configuring authentication for CIFS shares
• Locating authentication-related log files

Provisioning Storage
• Overview of storage provisioning in Veritas Access
• Performing storage discovery
• Administering storage pools
• Using Flexible Storage Sharing
• Using iSCSI disks
• Performing disk management operations
• Locating log files

Creating File Systems
• Creating, modifying, and deleting a filesystem
• Using storage policies
• Upgrading disk layout versions
• Checking and repairing a file system
• Configuring SmartIO
• Locating log files

Configuring Veritas Access Shares
• Introducing file sharing protocols
• Using Veritas Access as a NFS server
• Using Veritas Access as a CIFS server
• Using Veritas Access as a S3 server
• Providing FTP services using Veritas Access
• Using Veritas Access as an iSCSI target
• Locating log files

Deduplicating data
• Compressing files
• Encrypting Volumes
• Configuring Quality of Service - Max IOPS
• Configuring file retention
• Configuring erasure coding
• Locating log files

Replicating Data
• Replication concepts
• Episodic replication
• Configuring episodic replication
• Configuring continuous replication
• Locating log files

Using Point-In-Time Copies
• File system snapshots
• Creating snapshots
• Instant rollbacks
• Creating instant rollbacks
• Locating PITC log files

Configuring On-premise Storage Tiering
• Overview of the SmartTier solution
• Adding tiers to a file system
• Administering storage tiers using SmartTier
• Configuring policies for a tiered file system
• Configuring schedules for a tiered file system
• Locating SmartTier log files

Creating a Scale-Out File System
• Overview of the scale-out file system
• Specifications of a scale-out file system
• Scale-out file system architecture
• Creating and using a scale-out file system
• Troubleshooting scale-out file system issues

Using Cloud as a Tier for Scale-Out File System
• Cloud Tiering overview
• Architecture
• Using cloud as a tier in AWS
• Moving files between tiers
• Using data movement policies
• Monitoring data usage in the cloud tier
• Locating log files

Using NetBackup with Veritas Access
• NetBackup and Veritas Access integration overview
• NetBackup workflow
• SAN-based backup
• Configuring Veritas Access for NetBackup
• Monitoring and managing NetBackup Client
• Backing up and restoring over NetBackup SAN client
• Uninstalling and installing NetBackup Client
• Troubleshooting

Using Veritas Access for LTR in NetBackup
• Overview of the LTR solution
• High-level architecture
• Installing and configuring LTR components
• Locating log files

Troubleshooting Veritas Access
• Using Log files
• Debugging, monitoring, and reporting
• Recovering from failures
• Troubleshooting network connectivity
• Troubleshooting cloud tiering
• Troubleshooting installation
View outline in Word

DP0090

Attend hands-on, instructor-led Veritas Access 7.3 Administration training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Symantec Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
www.onlc.com