Veritas Access 3340 Appliance (7.4.2)- Administration

Course Overview

The Veritas Access 3340 Appliance (7.4.2)- Administration course is developed for IT professionals tasked with developing, installing, configuring, & maintaining Veritas Access Appliance environments. This course covers how to utilize the Veritas Access 3340 Appliance to handle Storage, file systems, & shares utilizing the Veritas Access web-based GUI and command line. You will learn about file systems and file share administration, as well as developing & maintaining NFS, CIFS, S3, & FTP file shares. Additionally, you will understand how to configure cloud-based Storage as a peripheral tier in Veritas Access, how to combine Veritas Access as LTR storage for NetBackup, & how to connect access for archiving and restoring files for Enterprise Vault. Note- Participants are required to use their own AWS account to perform Lab 08- Creating a scale-out file system with a cloud tier.

Prerequisites

You must have a working knowledge of advanced computer concepts, TCP/IP networking & Internet concepts, storage management, & enterprise networking. One must have administrator-level knowledge of RedHat Enterprise Linux 7.4. Comprehension of cloud technologies and Microsoft Windows 2008/2012 operating systems is a plus.

Audience Profile

This course is for system engineers, UNIX/Linux system architects, system administrators, technical support personnel, network/SAN administrators, & systems integration/development staff who will be installing, designing, operating, and/or integrating Veritas Access.

Learning Objectives

  • By the finishing of this course, you will be able to. 
  • Explain the Access 3340 Appliance (7.4.2) & its use cases, software, & hardware components. 
  •  Configure the Appliance cluster.
  • Configure Storage, the S3 server, trigger LTR policy, generate S3 keys &  provision buckets, and review the storage configuration. 
  • Configure Access Appliance in a NetBackup domain. 
  •  Comprehend storage provisioning in Veritas Access. 
  • Develop Veritas Access file systems with the support of Access GUI and CLISH. 
  •  Characterize the authentication methods supported by Veritas Access Appliance and configure them. 
  • Utilize the cloud as a Tier for scale-out file systems.
  •  Provision the Access Appliance as primary & secondary Storage for Enterprise Vault & replicate data storage. 
  • Monitor Appliance health utilizing Veritas Remote Management, Appliance Shell Menu, Access Shell Menu, & the Access GUI. 
  • Configure user roles, LDAP & AD authentication, and maintain Storage and appliance security. 
  • Perform physical inspection & resolve hardware faults. 
  •  Reconfigure the Access Appliance

Content Outline

Lessons 

  • About this course 
  • Education and support resources

Lessons 

  • Access 3340- Overview 
  • Supported Operating Systems (7.4.2) 
  • Access appliance overview and use cases 
  • Access appliance software overview 
  • Access appliance hardware overview

 

Lab - 

  • Exercise A- Reviewing the Veritas Access 3340 Appliance hardware 
  • Exercise B- Understanding the simulated lab environment 
  • Exercise C- Accessing the lab environment 
  • Exercise D- Preparing for cluster configuration 
  • Exercise E- (Optional) Performing an Access patch verification checks on SORT

 Lessons 

  • Preparing for configuration 
  • Configuring the appliance for the first time 
  • Deployment Enhancements 
  • Validating the configuration using Veritas Access interfaces

Lab - 

  • Exercise A- Configuring the Veritas Access cluster 
  • Exercise B- Verifying the cluster configuration

Lessons 

  • Configuring Storage 
  • Configuring the S3 server 
  • Activating an LTR policy 
  • Generating S3 keys 
  • Provisioning an S3 bucket 
  • Reviewing the storage configuration 

 

Labs-

  • Exercise A- Using the Veritas Access Appliance Setup wizard 
  • Exercise B- Observing the configuration using Veritas Access GUI 
  • Exercise C- Navigating the Veritas Access Command Line Shell (CLISH)

Lessons

  • Configuring the access as a cloud storage server 
  • Configuring access Appliance as a primary backup mark for verification 
  • Configuring the Access Appliance as an LTR Target 
  • Integrating appliances in a NetBackup environment 
  •  Performing backups and restores with appliances 
  • Veritas Data Deduplication (7.4.2) 
  •  Benefits of MSDP Integration (7.4.2) 

 

Labs-

  • Exercise A- Preparing the NetBackup servers 
  • Exercise B- Configuring the cloud storage server with CloudCatalyst 
  • Exercise C- Using the Access Appliance as the primary backup target with deduplication 
  • Exercise D- Using the Access Appliance for long-term retention 
  • Exercise E- (Optional) Configuring the cloud storage server without CloudCatalyst 
  • Exercise F- (Optional) Using the Access Appliance as the primary backup target without deduplication

Lessons 

  • Overview of storage provisioning in Veritas Access 
  • Administering storage pools 
  • Displaying disk information 
  • Protecting data using I/O fencing
  • Different storage protocols support 
  • Storage provisioning in Access Appliance

 

Labs- 

  • Exercise A- Using the Access CLISH to create a storage pool 
  • Exercise B- Using the Access GUI to create a storage pool

Lessons

  • File systems in Veritas Access Appliance 
  • Creating a file system 
  • Modifying and deleting a file system 
  • Checking and repairing a file system 

 

Labs- 

  • Exercise A- Enabling Active Directory authentication 
  • Exercise B- Creating a CIFS share using the Access CLISH 
  • Exercise C- Accessing the CIFS share from the client system 
  • Exercise D- Creating S3 objects 
  •  Exercise E- (Optional) Using Active Directory accounts for S3 shares

Lessons

  • Cloud tiering overview 
  • Architecture 
  • Utilizing a cloud as a tier in AWS 
  • Moving files between tiers 
  • Using data movement policies 
  • Monitoring data usage in the cloud tier 

 

Labs-

  • Exercise A- Creating a scale-out file system with a cloud tier 
  • Exercise B- Migrating files to the cloud 
  • Exercise C- Creating a data movement policy 
  • Exercise D- Scheduling data movement policies 
  • Exercise E- Removing the policies from a scale-out file system 
  • Exercise F- Using multi-cloud tiering 

 

Labs- Additional 

  • Exercise A- Creating NBU user Active Directory account for S3 
  • Exercise B- Configuring Veritas Access for LTR to cloud 
  • Exercise C- Configuring NetBackup to use Veritas Access storage 
  • Exercise D- Verifying the configuration 
  • Exercise E- Removing the cloud tier from the scale-out file system used for NetBackup

Lessons 

  • Veritas Access Appliance integration with Enterprise Vault 
  • Provisioning primary storage for Enterprise Vault 
  • Provisioning secondary storage for Enterprise Vault 
  • Replicating Data storage for Enterprise Vault

 

Labs-

  • Exercise A- Configuring simple file system (CIFS share) for server 
  • Exercise B- Configuring Primary Storage (server) on Access appliance 
  • Exercise C- Performing archiving data tasks on the Access appliance 
  • Exercise D- Configuring Secondary Storage (server) on Access appliance

Lessons 

  • Configuring event notifications 
  • Monitoring with Veritas Remote Management 
  • Monitoring with the Appliance Shell Menu (CLISH) 
  • Monitoring with Access CLISH 
  • Monitoring with the Appliance GUI 
  • Using Veritas AutoSupport 

 

Labs- 

  • Exercise A- Checking the storage details from the Access CLISH interface 
  • Exercise B- Checking the Appliance network details from the Access CLISH interface 
  • Exercise C- (Optional) Monitoring the AutoSupport details with the Access SHELL menu interface

Lessons

  • Configuring User Roles 
  • Configuring LDAP and AD Authentication 
  • Maintaining Storage 
  • Maintaining Appliance Security 

 

Labs- 

  • Exercise A- Checking the storage details from the Access CLISH interface 
  • Exercise B- Checking the Appliance network details from the Access CLISH interface

Lessons-

  • Appliance Online Resources 
  • Appliance Physical Inspection 
  • Resolving common hardware faults 
  • Viewing and gathering appliance log files

 

Labs-

  • Exercise A- Checking the hardware details from the Access Appliance Shell menu interface 
  • Exercise B- Checking the Appliance log details from the Access Shell menu interface

Lessons

  • Access appliance factory reset overview 
  • Performing a single node factory reset 
  • Performing a full appliance cluster factory reset 
  • Managing software and Storage 

 

Labs- 

  • Exercise A- Checking the Appliance software details from the Access Appliance SHELL menu interface 
  • Exercise B- Checking the Appliance support details from the Access Shell menu interface

FAQs

A- For scheduled classes, the start times will be communicated in your enrolment confirmation notification.

A- The details are as follows- 

For any virtual instructor-led course, you may download your course training guide PDFs ("eBooks") and keep them for reference after the class is completed. Distribution of course training guide PDFs to individuals who did not attend the class is strictly prohibited.

Virtual instructor-led classes are NOT recorded, so you will not have access to these training sessions after the course ends.

Lab environments are accessible for six months following a scheduled class. We monitor the usage of our labs and remind you that lab access is strictly limited to the student who attended the course.

 

A- We would always recommend you attend the live session to practice & clarify your doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

A- The learners will be enthralled as we engage them in real-world and industry Oriented projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

A- You can request a refund if you do not wish to enroll in the course.

A- Yes, you can.

 

A- We use the ideal standards in Internet security. Any data retained is not communicated with third parties.

 

A- It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

A- The course completion certification will be awarded to all the professionals who have completed the training program and the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to achieve your dream job.

A- Radiant believes in a practical and creative approach to training & development, which distinguishes it from other training and developmental platforms. Moreover, training courses are undertaken by some experts with a range of experience in their domain.

 

Send a Message.


  • Enroll