BCC 1.2.2 Administration Guide for OES 2 SP3

  BCC 1.2.2 Administration Guide for OES 2 SP3
    Overview of Business Continuity Clustering
      Disaster Recovery Implications
      Disaster Recovery Implementations
      Business Continuity Clustering
      BCC Deployment Scenarios
      Key Concepts
    What’s New for BCC
      What’s New for BCC 1.2.2
      What’s Next
    Planning a Business Continuity Cluster
      Determining Design Criteria
      Best Practices
      LAN Connectivity Guidelines
      SAN Connectivity Guidelines
      Storage Design Guidelines
      eDirectory Design Guidelines
      Cluster Design Guidelines
    Installing Business Continuity Clustering
      Requirements for BCC 1.2.2
      Getting the Business Continuity Clustering Software
      Configuring a BCC Administrator User and Group
      Installing and Configuring the Novell Business Continuity Clustering Software
      Using a YaST Auto-Configuration File to Install and Configure Business Continuity Clustering Software
      What’s Next
    Upgrading to Identity Manager 3.6.1
      Requirements for Using Identity Manager
      Upgrading to 32-Bit Identity Manager 3.6.1
      Upgrading to 64-Bit Identity Manager 3.6.1
      Patching IDM 3.6.1 for OES 2 SP3
    Upgrading to BCC 1.2.2 on OES 2 SP3
      System Requirements for the BCC 1.2.2
      Preparing to Upgrade to BCC 1.2.2 on OES 2 SP3
      Upgrading to BCC 1.2.2
    Converting BCC Clusters from NetWare to Linux
      Understanding the Conversion Process
      Prerequisites for Converting from NetWare to Linux
      Converting Clusters from NetWare to Linux
      Deleting and Re-Creating the BCC Identity Manager Drivers
      Finalizing the BCC Cluster Conversion
      What’s Next
    Configuring the Identity Manager Drivers for BCC
      Understanding the BCC Drivers
      Prerequisites for Configuring the BCC Drivers for Identity Manager
      Configuring the BCC Drivers
      Creating SSL Certificates
      Enabling or Disabling the Synchronization of e-Mail Settings
      Synchronizing Identity Manager Drivers
      Preventing Synchronization Loops for Identity Manager Drivers
      Changing the Identity Manager Synchronization Drivers
      What’s Next
    Configuring BCC for Peer Clusters
      Enabling Clusters for Business Continuity
      Adding Peer Cluster Credentials
      Adding Search-and-Replace Values to the Resource Replacement Script
      Adding Storage Management Configuration Information
      Configuring CIMOM Daemons to Bind to IP Addresses
      Enabling Linux POSIX File Systems to Run on Secondary Clusters
      Verifying BCC Administrator User Trustee Rights and Credentials
      Disabling BCC for a Peer Cluster
      What’s Next
    Managing a Business Continuity Cluster
      Migrating a Cluster Resource to a Peer Cluster
      Bringing a Downed Cluster Back in Service
      Changing Peer Cluster Credentials
      Viewing the Current Status of a Business Continuity Cluster
      Generating a Cluster Report
      Resolving Business Continuity Cluster Failures
    Configuring BCC for Cluster Resources
      Requirements for Cluster Resources
      BCC-Enabling Cluster Resources
      Configuring Search-and-Replace Values for an Individual Cluster Resource
      Assigning Preferred Peer Clusters for the Resource
      Assigning Preferred Nodes in Peer Clusters
      Disabling BCC for a Cluster Resource
      Changing the IP Address of a Cluster Resource
      Deleting or Unsharing a BCC-Enabled Shared NSS Pool Resource
    Troubleshooting Business Continuity Clustering
      NSS Takes Up to 10 Minutes to Load When the Server Is Rebooted
      Identity Manager Plug-Ins Do Not Appear in iManager
      Cluster Connection States
      Driver Port Number Conflicts
      Excluded Users
      Security Equivalent User
      SSL Certificates
      Clusters Cannot Communicate
      BCC Startup Flags
      Identity Manager Drivers for Cluster Synchronization Do Not Start
      Identity Manager Drivers Do Not Synchronize Objects from One Cluster to Another
      Tracing Identity Manager Communications
      Peer Cluster Communication Is Not Working
      A Resource Does Not Migrate to a Peer Cluster
      Resource Cannot Be Brought Online
      Administration of Peer Clusters Is Not Functional
      Resource Script Search-and-Replace Functions Do Not Work
      Virtual NCP Server IP Addresses Won’t Change
      The IP Address, Virtual Server DN, or Pool Name Does Not Appear on the iManager Cluster Configuration Page
      Blank Error String iManager Error Appears While Bringing a Resource Online
      Mapping Drives in Login Scripts
      Mapping Drives to Home Directories by Using the %HOME_DIRECTORY Variable
      BCC Error Codes
      Clustered Pool Is Stuck in an eDirectory Synchronization State
    Security Considerations
      Security Features
      Security Configuration
      General Security Guidelines
      Security Information for Dependent Products
    Console Commands for BCC
      Using Console Commands
      Setting Up Linux Scan Commands in /opt/novell/ncs/bin/device_scan.sh
    Setting Up Auto-Failover
      Enabling Auto-Failover
      Creating an Auto-Failover Policy
      Refining the Auto-Failover Policy
      Adding or Editing Monitor Configurations
    Configuring Host-Based File System Mirroring for NSS Pools
      Creating and Mirroring NSS Pools on Shared Storage
      Creating NSS Volumes
      Novell Cluster Services Configuration and Setup
      Checking NSS Volume Mirror Status
    Configuration Worksheet for the BCC Drivers for Identity Manager
      Cluster1 to Cluster2
      Cluster2 to Cluster1
    Using Dynamic DNS with BCC
      Requirements and Assumptions
      Configuring the DNS Server for Dynamic DNS
      Configuring the Cluster Resources for Dynamic DNS
      Testing the Dynamic DNS Solution
    Using Virtual IP Addresses with BCC 1.2
      Understanding Internal Virtual IP Networks
      Virtual IP Address Benefits
      Planning a Virtual IP Network Implementation
      Configuring a Virtual Router with OSPF
      Configuring Virtual IP Addresses
    Removing Business Continuity Clustering Core Software
    Legal Notices