Setting up the private network

VCS requires you to set up a private network between the systems that form a cluster. You can use either NICs or aggregated interfaces to set up private network.

You can use network switches instead of hubs.

Refer to the Symantec Cluster Server Administrator's Guide to review VCS performance considerations.

Figure: Private network setups: two-node and four-node clusters shows two private networks for use with VCS.

Figure: Private network setups: two-node and four-node clusters

Private network setups: two-node and four-node clusters

You need to configure at least two independent networks between the cluster nodes with a network switch for each network. You can also interconnect multiple layer 2 switches for advanced failure protection. Such connections for LLT are called cross-links.

Figure: Private network setup with crossed links shows a private network configuration with crossed links between the network switches.

Figure: Private network setup with crossed links

Private network setup with crossed links

Symantec recommends one of the following two configurations:

To set up the private network

  1. Install the required network interface cards (NICs).

    Create aggregated interfaces if you want to use these to set up private network.

  2. Connect the SFHA private NICs on each system.
  3. Use crossover Ethernet cables, switches, or independent hubs for each SFHA communication network. Note that the crossover Ethernet cables are supported only on two systems.

    Ensure that you meet the following requirements:

    • The power to the switches or hubs must come from separate sources.

    • On each system, you must use two independent network cards to provide redundancy.

    • If a network interface is part of an aggregated interface, you must not configure the network interface under LLT. However, you can configure the aggregated interface under LLT.

    • When you configure Ethernet switches for LLT private interconnect, disable the spanning tree algorithm on the ports used for the interconnect.

    During the process of setting up heartbeat connections, consider a case where a failure removes all communications between the systems.

    Note that a chance for data corruption exists under the following conditions:

    • The systems still run, and

    • The systems can access the shared storage.

  4. Test the network connections. Temporarily assign network addresses and use telnet or ping to verify communications.

    LLT uses its own protocol, and does not use TCP/IP. So, you must ensure that the private network connections are used only for LLT communication and not for TCP/IP traffic. To verify this requirement, unplumb and unconfigure any temporary IP addresses that are configured on the network interfaces.

    The installer configures the private network in the cluster during configuration.

    You can also manually configure LLT.