Veritas Storage Foundation™ and High Availability Solutions 5.0.1 Getting Started Guide

To verify that you can connect to a target system
1
On the source system (system1), type the following command:
system1 # ssh -l root system2 uname -a
where system2 is the name of the target system.
2
The command should execute from the source system (system1) to the target
system (system2) without the system requesting a passphrase or password.
3
Repeat this procedure for each target system.
Enabling remsh
Remote shell functionality is enabled automatically after installing an HP-UX
system.
Typically, the only requirement to enable remote installations is to modify the
.rhosts file. A separate .rhosts file is in the $HOME directory of each user. You
must modify this file for each user who remotely accesses the system using remsh.
Each line of the .rhosts file must contain a fully qualified domain name or IP
address for each remote system that has access to the local system. For example,
if the root user must remotely access system1 from system2, add an entry for
system2.companyname.com to the /.rhosts file on system1.
# echo "system2.companyname.com" >> $HOME/.rhosts
After you complete an installation procedure, delete the .rhosts file from each
users $HOME directory to ensure security:
# rm -f $HOME/.rhosts
See the operating system documentation and the remsh(1M) manual page for more
information on configuring remote shell.
Mounting a software disc
Veritas software is provided on a DVD format disc. If you have the media kit, then
get the software disc from the media kit.
Installation overview
Mounting a software disc
28