Getting Started Guide

shell) or ssh (secure shell) utilities. These utilities must run as root on all cluster
nodes or remote systems.
You can install products to remote systems using either secure shell (ssh) or
remote shell (remsh).Using ssh is the default, and is recommended, to configure
a secure shell environment before you install any Veritas product.
This section contains an example on how to set up the ssh password free
communication. The example sets up ssh between a source system (system1)
that contains the installation directories, and a target system (system2). This
procedure also applies to multiple target systems.
Configuring and enabling ssh
The ssh program enables you to log in and execute commands on a remote system.
ssh enables encrypted communication and an authentication process between
two untrusted hosts over an insecure network.
In this procedure, you must first create a DSA key pair. From the key pair, you
must append the public key from the source system to the authorized_keys file
on the target system or systems.
Figure 3-1 illustrates this procedure.
Figure 3-1
Creating the DSA key pair and appending it to target systems
Source System: system1
Target System: system2
Private
Key
Public
Key
authorized_keys
file
Read the ssh documentation and online manual pages before enabling ssh. For
information related to issues regarding ssh configuration contact your operating
system support provider.
Visit the OpenSSH website that is located at: http://openssh.org to access online
manuals and other resources.
19Installation overview
Configuring secure shell (ssh) or remote shell before installing products