After you configure SFCFSHA, you must configure the cluster for data integrity. Review the configuration requirements.
See Configuring SFCFSHA using the Web-based installer.
See About planning to configure I/O fencing.
To configure SFCFSHA for data integrity
Click Next.
The installer performs the initial system verification. It checks for the system communication. It also checks for release compatibility, installed product version, platform version, and performs product prechecks.
If you chose to configure disk-based fencing, go to step 7.
If you chose to configure server-based fencing, go to step 10.
You can configure non-SCSI-3 server-based fencing in a virtual environment that is not SCSI-3 PR compliant.
Click Next.
Go to step 16.
On the Configure Fencing page, the installer prompts for details based on the fencing type you chose to configure. Specify the coordination points details.
Click Next.
If your server-based fencing configuration also uses disks as coordination points, perform the following steps:
If you have not already checked the disks for SCSI-3 PR compliance, check the disks now, and click OK in the dialog box.
If you do not want to use the default coordinator disk group name, enter a name for the new coordinator disk group you want to create.
Select the disks to create the coordinator disk group.
Choose the fencing disk policy for the disk group.
The installer stops and restarts the VCS and the fencing processes on each application cluster node, and completes the I/O fencing configuration.
On the Completion page, view the summary file, log file, or response file, if needed, to confirm the configuration.
Click Finish. The installer prompts you for another task.