Setting up ssh on cluster systems – Symantec Veritas 5 User Manual

Page 45

Advertising
background image

where you run installvcs program. This privilege facilitates to issue ssh or rsh
commands on all systems in the cluster. If ssh is used to communicate between
systems, it must be configured in a way such that it operates without requests for
passwords or passphrases. Similarly, rsh must be configured in such a way to not
prompt for passwords.

If system communication is not possible between systems using ssh or rsh, you
have recourse.

Warning:

The rsh and ssh commands to the remote systems, where VCS is to be

installed, must not print any extraneous characters.

Setting up ssh on cluster systems

Use the Secure Shell (ssh) to install VCS on all systems in a cluster from a system
outside of the cluster. Before you start the installation process, verify that ssh is
configured correctly.

Use Secure Shell (ssh) to do the following:

Log on to another system over a network

Execute commands on a remote system

Copy files from one system to another

The ssh shell provides strong authentication and secure communications over
channels. It is intended to replace rlogin, rsh, and rcp.

The Remote Shell (rsh) is disabled by default to provide better security. Use ssh
for remote command execution.

Configuring ssh

The procedure to configure ssh uses OpenSSH example file names and commands.

Note:

You can configure ssh in other ways. Regardless of how ssh is configured,

complete the last step in the example to verify the configuration.

To configure ssh

1

Log on to the system from which you want to install VCS.

2

Generate a DSA key pair on this system by running the following command:

#

ssh-keygen -t dsa

3

Accept the default location of ~/.ssh/id_dsa.

45

Preparing to install VCS

Performing preinstallation tasks

Advertising