Symantec 5 Computer Accessories User Manual


 
where you run installvcs program. This privilege facilitates to issue ssh or rsh
commands on all systems in the cluster. If ssh is used to communicate between
systems, it must be configured in a waysuch that it operateswithout requests for
passwords or passphrases.Similarly, rsh must be configuredin such a way to not
prompt for passwords.
If system communication is not possible between systems using ssh or rsh, you
have recourse.
Warning: The rsh and ssh commands to the remote systems, where VCS is to be
installed, must not print any extraneous characters.
Setting up ssh on cluster systems
Use the Secure Shell (ssh) to install VCS on allsystems in a cluster from a system
outside of the cluster. Before you start the installation process, verify that ssh is
configured correctly.
Use Secure Shell (ssh) to do the following:
Log on to another system over a network
Execute commands on a remote system
Copy files from one system to another
The ssh shell provides strong authentication and secure communications over
channels. It is intended to replace rlogin, rsh, and rcp.
The Remote Shell (rsh) is disabled by default to provide better security. Use ssh
for remote command execution.
Configuring ssh
Theprocedure toconfiguressh usesOpenSSH examplefile namesandcommands.
Note: You can configure ssh in other ways. Regardless of how ssh is configured,
complete the last step in the example to verify the configuration.
To configure ssh
1
Log on to the system from which you want to install VCS.
2
Generate a DSA key pair on this system by running the following command:
# ssh-keygen -t dsa
3
Accept the default location of ~/.ssh/id_dsa.
45Preparing to install VCS
Performing preinstallation tasks