3 arrows

Get 50% Off ForgeRock Training Bundles


Veritas Access 7.3: Administration

  • Tuition USD $4,000 GSA  $3,425.69
  • Reviews star_rate star_rate star_rate star_rate star_half 3223 Ratings
  • Course Code VA-7-3-ADMIN
  • Duration 5 days
  • Available Formats Classroom

The Veritas Access 7.3: Administration course is intended for the IT professional tasked with designing, installing, configuring, and maintaining Veritas Access environments. This course covers how to use Veritas Access to manage storage, file systems, and shares using the Veritas Access web-based GUI and command line. You learn about file system and file share administration as well as creating and maintaining NFS, CIFS, S3, and FTP file shares. In this course, you configure cloud-based storage as a secondary tier in Veritas Access. You also learn how to integrate Veritas Access as LTR storage for NetBackup.

Skills Gained

By the completion of this course, you will be able to:

  • Install and configure a Veritas Access cluster.
  • Configure authentication services in Veritas Access.
  • Configure Veritas Access shares (NFS/CIFS/S3/FTP).
  • Configure and administer storage tiers.
  • Deduplicate and compress data.
  • Configure quality of service (QoS).
  • Configure file retention for WORM-enabled file systems.
  • Configure continuous and episodic replication.
  • Create a scale-out file system.
  • Configure a cloud tier in AWS S3 and Glacier.
  • Move files between primary and cloud tiers.
  • Backup and restore data using NetBackup.
  • Install and configure Veritas Access as NetBackup LTR storage with optional migration to the cloud.
  • Perform basic troubleshooting tasks.

Who Can Benefit

This course is for UNIX/Linux system architects, system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration/development staff who will be designing, installing, operating, and/or integrating Veritas Access.


You must have working knowledge of advanced computer terminology, including TCP/IP networking and Internet concepts, and administrator-level knowledge of RedHat Enterprise Linux 7.4. Knowledge of cloud technologies and Microsoft Windows 2008/2012 operating systems is a plus.

Course Details


This course includes practical hands-on exercises that enable you to test your new skills and begin to transfer them into your working environment.

Course Outline

Introducing Veritas Access

  • Need for Veritas Access
  • Business Benefits and use cases
  • Technical benefits


  • Exercise A: Viewing the virtual machine configuration
  • Exercise B: Verifying network connectivity

Installing Veritas Access

  • Installation requirements
  • Licensing in Veritas Access
  • Installing Veritas Access
  • Using response files
  • Locating installation log files


  • Exercise A: Installing Veritas Access locally
  • Exercise B: Installing Veritas Access using a driver node
  • Exercise C: Verifying the installations in the lab environment

Exploring Veritas Access User Interfaces

  • Veritas Access users and user interfaces
  • Navigating the CLISH interface
  • Using the GUI to administer Veritas Access
  • Managing licenses
  • Configuring networking


  • Exercise A: Verifying the support user
  • Exercise B: Working with built-in accounts
  • Exercise C: Verifying the Veritas Access cluster installations
  • Exercise D: Navigating the Command Line Shell (CLISH)
  • Exercise E: Configuring the firewall
  • Exercise F: Connecting to the Veritas Access GUI
  • Exercise G: Exploring the Veritas Access GUI dashboard
  • Exercise H: Creating a user in Veritas Access
  • Exercise I: Configuring the Veritas Access IP load balancer

Configuring Authentication Services

  • Introducing authentication services
  • Configuring LDAP server settings
  • Configuring the NIS-related settings
  • Configuring NSS lookup order
  • Configuring authentication for NFS shares
  • Configuring authentication for CIFS shares
  • Locating authentication-related log files


  • Exercise A: Enabling Active Directory authentication in the vaa cluster
  • Exercise B: (Optional) Showing the CIFS components
  • Exercise C: Enabling Active Directory authentication in the vab cluster

Provisioning Storage

  • Overview of storage provisioning in Veritas Access
  • Performing storage discovery
  • Administering storage pools
  • Using Flexible Storage Sharing
  • Using iSCSI disks
  • Performing disk management operations
  • Locating log files


  • Exercise A: Adding iSCSI storage to the vaa cluster
  • Exercise B: Adding iSCSI storage to the vab cluster
  • Exercise C: Creating a storage pool in the vaa cluster using the GUI
  • Exercise D: Creating an FSS storage pool in the vaa cluster using CLISH
  • Exercise E: (Optional) Viewing storage from the OS command line

Creating File Systems

  • Creating, modifying, and deleting a filesystem
  • Using storage policies
  • Upgrading disk layout versions
  • Checking and repairing a file system
  • Configuring SmartIO
  • Locating log files


  • Exercise A: Creating a simple file system using the GUI
  • Exercise B: (Optional) Viewing the InfoScale objects created
  • Exercise C: Creating file systems using CLISH
  • Exercise D: Using SmartIO in Veritas Access

Configuring Veritas Access Shares

  • Introducing file sharing protocols
  • Using Veritas Access as a NFS server
  • Using Veritas Access as a CIFS server
  • Using Veritas Access as a S3 server
  • Providing FTP services using Veritas Access
  • Using Veritas Access as an iSCSI target
  • Locating log files


  • Exercise A: Creating an NFS share using the GUI
  • Exercise B: Starting the NFS server
  • Exercise C: Creating a CIFS share using the GUI
  • Exercise D: Accessing the CIFS share from the client
  • Exercise E: Creating an S3 share in the vab cluster
  • Exercise F: Creating an S3 user in Active Directory and generating S3 keys
  • Exercise G: Creating S3 Objects
  • Exercise H: Using Veritas Access as an FTP server
  • Exercise I: Configuring multi-protocol access for S3 and NFS
  • Exercise J: (Optional) Test the s3user login

Administering File Systems

  • Deduplicating data
  • Compressing files
  • Encrypting Volumes
  • Configuring Quality of Service – Max IOPS
  • Configuring file retention
  • Configuring erasure coding
  • Locating log files


  • Exercise A: Setting up a file system for deduplication
  • Exercise B: Deduplicating a Veritas Access file system
  • Exercise C: Setting up MAXIOPS
  • Exercise D: Configuring file retention

Replicating Data

  • Replication concepts
  • Episodic replication
  • Configuring episodic replication
  • Configuring continuous replication
  • Locating log files


  • Exercise A: Creating replication storage and network resources in the source (vaa) cluster
  • Exercise B: Creating replication storage and network resources in the target (vab) cluster
  • Exercise C: Creating the VFR link
  • Exercise D: Adding replication to the file system
  • Exercise E: Populating the replicated file system from an NFS client and verifying replication
  • Exercise F: Reversing episodic replication
  • Exercise G: Creating continuous replication network resources in the source (vaa) cluster
  • Exercise H: Creating continuous replication network resources in the target (vab) cluster
  • Exercise I: Creating the continuous replication link
  • Exercise J: Creating a continuously replicated file system
  • Exercise K: (Optional) Examining the objects created
  • Exercise L: Populating the replicated file system from an NFS client and pausing replication
  • Exercise M: Reversing continuous replication
  • Exercise N: (Optional) Exploring continuous replication

Using Point-In-Time Copies

  • File system snapshots
  • Creating snapshots
  • Instant rollbacks
  • Creating instant rollbacks
  • Locating PITC log files


  • Exercise A: Creating a file system snapshot
  • Exercise B: Using the snapshot on an NFS client
  • Exercise C: Restoring the file system from its snapshot
  • Exercise D: Using rollbacks

Configuring On-premise Storage Tiering

  • Overview of the SmartTier solution
  • Adding tiers to a file system
  • Administering storage tiers using SmartTier
  • Configuring policies for a tiered file system
  • Configuring schedules for a tiered file system
  • Locating SmartTier log files


  • Exercise A: Creating a storage pool and file system for on-premises storage tiering
  • Exercise B: Adding a second on-premises storage tier to an existing file system
  • Exercise C: Populating the file system and observing the impact of the storage tiering policy
  • Exercise D: (Optional) Investigating the underlying InfoScale Storage configuration

Creating a Scale-Out File System

  • Overview of the scale-out file system
  • Specifications of a scale-out file system
  • Scale-out file system architecture
  • Creating and using a scale-out file system
  • Troubleshooting scale-out file system issues


  • Exercise A: Creating the scale-out file system
  • Exercise B: Mounting the NFS share on a client
  • Exercise C: Growing a scale-out file system
  • Exercise D: (Optional) Observing the InfoScale Storage objects supporting the scale-out file system

Using Cloud as a Tier for Scale-Out File System

  • Cloud Tiering overview
  • Architecture
  • Using cloud as a tier in AWS
  • Moving files between tiers
  • Using data movement policies
  • Monitoring data usage in the cloud tier
  • Locating log files


  • Exercise A: Adding a cloud tier to the scale-out filesystem
  • Exercise B: Migrating files to the cloud
  • Exercise C: Creating a data movement policy
  • Exercise D: Scheduling data movement policies
  • Exercise E: Removing the cloud tier from a scale-out file system
  • Exercise F: Using multi-cloud tiering

Using NetBackup with Veritas Access

  • NetBackup and Veritas Access integration overview
  • NetBackup workflow
  • SAN-based backup
  • Configuring Veritas Access for NetBackup
  • Monitoring and managing NetBackup Client
  • Backing up and restoring over NetBackup SAN client
  • Uninstalling and installing NetBackup Client
  • Troubleshooting


  • Exercise A: Configuring the NBU client in the cluster GUI
  • Exercise B: Verifying the backup configuration from CLISH
  • Exercise C: Backing up the Veritas Access file systems
  • Exercise D: Restoring files on Veritas Access cluster

Using Veritas Access for LTR in NetBackup

  • Overview of the LTR solution
  • High-level architecture
  • Installing and configuring LTR components
  • Locating log files


  • Exercise A: Configuring Veritas Access for LTR to cloud
  • Exercise B: Configuring Veritas Access storage as OpenDedup volumes on nbumaster
  • Exercise C: Configuring NetBackup for LTR to cloud
  • Exercise D: Running an LTR backup job
  • Exercise E: Verifying the LTR backup images
  • Exercise F: Removing the cloud tier from the scale-out file system used for LTR

Troubleshooting Veritas Access

  • Using Log files
  • Debugging, monitoring, and reporting
  • Recovering from failures
  • Troubleshooting network connectivity
  • Troubleshooting cloud tiering
  • Troubleshooting installation


  • Exercise A: Gathering Support information
  • Exercise B: Investigating Veritas Access logging
  • Exercise C: Identifying logs related to a CLISH command
  • Exercise D: (Optional) Observing the underlying InfoScale configuration
  • Exercise E: Deleting and re-adding a node to a Veritas Access cluster
  • Exercise F: (Optional) Understanding Veritas Access internals

When does class start/end?

Classes begin promptly at 9:00 am, and typically end at 5:00 pm.

Does the course schedule include a Lunchbreak?

Lunch is normally an hour long and begins at noon. Coffee, tea, hot chocolate and juice are available all day in the kitchen. Fruit, muffins and bagels are served each morning. There are numerous restaurants near each of our centers, and some popular ones are indicated on the Area Map in the Student Welcome Handbooks - these can be picked up in the lobby or requested from one of our ExitCertified staff.

How can someone reach me during class?

If someone should need to contact you while you are in class, please have them call the center telephone number and leave a message with the receptionist.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does ExitCertified deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

Does ExitCertified deliver group training?

Yes, we provide training for groups, individuals, and private on sites. View our group training page for more information.

Excellent foundation course. Michael was a very good instructor. Looking forward to doing the Practitioner course on Doors 9.7.

Great delivery skills by the facilitator and good course content.

well organized and designed course. Tommy is good teacher and answer our all the questions

Instructor, Training material & span of the training is neatly planned.

For my first virtual training with Learning Tree, after the 2nd lab exercises, I was able to keep up.

0 options available

There are currently no scheduled dates for this course. If you are interested in this course, request a course date with the links above. We can also contact you when the course is scheduled in your area.

Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward