Veritas Storage Foundation™ and High Availability Solutions 5.0.1 Getting Started Guide

Configuring secure shell (ssh) or remote shell before
installing products
Establishing communication between nodes is required to install Veritas software
from a remote system, or to install and configure a cluster. The node from which
the installation utility is run must have permissions to run remsh (remote shell)
or ssh (secure shell) utilities. These utilities must run as root on all cluster nodes
or remote systems.
You can install products to remote systems using either secure shell (ssh) or
remote shell (remsh).Using ssh is the default, and is recommended, to configure
a secure shell environment before you install any Veritas product.
This section contains an example of how to set up ssh password free
communication. The example sets up ssh between a source system (system1) that
contains the installation directories, and a target system (system2). This procedure
also applies to multiple target systems.
Configuring and enabling ssh
The ssh program enables you to log into and execute commands on a remote
system. ssh enables encrypted communications and an authentication process
between two untrusted hosts over an insecure network.
In this procedure, you first create a DSA key pair. From the key pair, you append
the public key from the source system to the authorized_keys file on the target
systems.
Figure 3-1 illustrates this procedure.
23Installation overview
Configuring secure shell (ssh) or remote shell before installing products