VCS clusters support different failover configurations, storage configurations, and cluster topologies.
See the Veritas Cluster Server Administrator's Guide for more details.
Some of the typical VCS setup models are as follows:
VCS clusters in secure mode using Symantec Product Authentication Service (AT)
See Figure: Typical configuration of VCS clusters in secure mode.
VCS clusters centrally managed using Veritas Cluster Server Management Console (VCS MC)
See Figure: Typical configuration of VCS MC-managed clusters.
VCS clusters with I/O fencing for data protection
See Typical VCS cluster configuration with disk-based I/O fencing.
See Typical VCS cluster configuration with server-based I/O fencing.
VCS clusters such as global clusters, replicated data clusters, or campus clusters for disaster recovery
See the Veritas Cluster Server Administrator's Guide for disaster recovery cluster configuration models.
Figure: Typical two-node VCS cluster illustrates a simple VCS cluster setup with two nodes.
Figure: Typical configuration of VCS clusters in secure mode illustrates typical configuration of VCS clusters in secure mode. You can use one of the cluster nodes as AT root broker or you can use a stable system outside the cluster as AT root broker.
Figure: Typical configuration of VCS MC-managed clusters illustrates a typical setup of VCS clusters that are centrally managed using VCS Management Console. In this example, the setup uses a single external AT root broker which serves both the management server and the VCS clusters.