Consider the following before you install Mail Security on a Veritas Cluster Server:
Ensure there is sufficient room on the volume for the Mail Security shared settings and quarantine.
Settings are copied to the shared storage when you deploy your changes.
Exclude the quarantine from all scanning.
The Mail Security quarantine is stored on the shared storage.
Install Mail Security on all of the nodes in the cluster.
You are prompted to register the resource on only one node.
Use an IP address to specify the computer since the name of the server is usually used when installing to a cluster.
If you use IP addresses, use the IP address of the computer and not the IP address of the cluster or virtual server.
Install Mail Security on each of the passive nodes first. Then failover an active node to a passive node and install Mail Security on it. Repeat this process until you install Mail Security on all of the active nodes and passive nodes.
This process lets you install the product cleanly on all of the nodes. Uninstallation of the product should be handled the same way.
You can install Mail Security in any of the following types of Veritas Cluster Server environments:
Configure LiveUpdate to perform regularly scheduled updates on each node in the cluster to ensure that your definitions stay current.
Definitions are updated and stored locally, not on the shared storage.
You should not use the remote installation procedures when you install the product on cluster server nodes.
Rate this Article