Cisco Training Courses

Insoft has been serving IT community with official Cisco training offering since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

The Fortinet Network Security Expert (NSE) program is an eight-level training and certification program to teach engineers of their network security for Fortinet FW skills and experience.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

HA0414 – Symantec Cluster Server 6.x for Unix: Advanced Administration

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Close

HA0414 – Symantec Cluster Server 6.x for Unix: Advanced Administration

Enroll Now
Duration
5 Days
Delivery
(Online and onsite)
Price
Price Upon Request

The Symantec Cluster Server 6.x: Advanced Administration (HA0414) course is designed for the IT professional tasked with managing, configuring, and using clusters in an enterprise environment.

This class covers how to set up advanced network and data protection configurations, customize VCS behavior using triggers and service group dependencies, and manage system outages.
Students also learn how to control VCS behavior for service group startup and failover. In addition, students learn how to reconfigure cluster membership, upgrade a cluster, and configure campus clusters.

  • Set up alternative configurations for the public and private networks.
  • Use triggers and service group dependencies to control service groups.
  • Implement different types of fencing configurations for data protection.
  • Reconfigure cluster memberships.
  • Customize service group startup, shutdown, and failover.
  • Manage system outages.
  • Administer campus clusters.
  • Upgrade a cluster.

Reviewing an Existing VCS Environment

  • Understanding the VCS architecture
  • Building the cluster configuration
  • Configuring VCS

Configuring LLT

  • LLT over bonded interfaces
  • LLT over UDP
  • LLT over RDMA
  • LLT with different network interfaces
  • Manually configuring LLT

Using Multiple Public Network Interfaces

  • Configuring multiple service groups with network resources
  • MultiNICB and IPMultiNICB
  • MultiNICA and IPMultiNIC

Using Triggers to Customize VCS Behavior

  • Understanding triggers
  • Configuring triggers
  • Using multiple trigger scripts
  • Controlling applications with triggers

Managing Service Group Dependencies

  • Common application relationships
  • Service group dependencies
  • Service group dependency examples
  • Configuring service group dependencies
  • Limitations of service group dependencies

Using I/O Fencing for Application Data Integrity

  • Data protection requirements
  • I/O fencing concepts
  • I/O fencing operations
  • I/O fencing implementation
  • Fencing configuration

Using Coordination Point Server for Application Data Integrity

  • Coordination point concepts
  • Server-based fencing architecture
  • CPS operations
  • Installing and configuring a CP server
  • Configuring I/O fencing with CPS
  • Coordination point agent

Administering Fencing Configurations

  • Installing and configuring clustered CP servers
  • Administering CPS
  • Administering disk-based I/O fencing
  • Configuring preferred fencing

Reconfiguring Cluster Memberships

  • Removing a cluster node
  • Adding a cluster node
  • Merging clusters

Controlling Application Startup and Shutdown

  • Resource online and offline processes
  • Cluster startup
  • Startup rules and policies
  • Limits and Prerequisites

Controlling Application Failover

  • Failover rules and policies
  • Limits and Prerequisites
  • AdaptiveHA

Customizing Application Failover Behavior

  • VCS response to resource faults
  • Controlling failover with service group attributes
  • Controlling failover with resource type attributes

Managing System Outages

  • Differentiating between a system shutdown and an outage
  • Controlling cluster shutdown
  • Controlling applications during a system outage

Administering Campus Clusters

  • Disaster recovery solutions with SFHA
  • Preparing to set up a campus cluster configuration
  • Configuring Storage Foundation for campus clustering
  • Configuring a VCS service group for campus clusters
  • Testing site-awareness
  • Failure scenarios with campus clusters
  • Legacy campus clustering

Upgrading Storage Foundation High Availability

  • Planning to upgrade SFHA
  • Online upgrade
  • Full upgrade
  • Rolling upgrade
  • Phased upgrade
  • Finding and installing SFHA patches

This course is for UNIX system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration development staff, who will be installing, operating, or integrating Symantec Cluster Server.

You must have administrator-level experience with UNIX or Linux, TCP/IP networking, and clustering using Symantec Cluster Server.

The Symantec Cluster Server 6.x: Advanced Administration (HA0414) course is designed for the IT professional tasked with managing, configuring, and using clusters in an enterprise environment. This class covers how to set up advanced network and data protection configurations, customize VCS behavior using triggers and service group dependencies, and manage system outages. Students also learn how to control VCS behavior for service group startup and failover. In addition, students learn how to reconfigure cluster membership, upgrade a cluster, and configure campus clusters.
  • Set up alternative configurations for the public and private networks.
  • Use triggers and service group dependencies to control service groups.
  • Implement different types of fencing configurations for data protection.
  • Reconfigure cluster memberships.
  • Customize service group startup, shutdown, and failover.
  • Manage system outages.
  • Administer campus clusters.
  • Upgrade a cluster.

Reviewing an Existing VCS Environment

  • Understanding the VCS architecture
  • Building the cluster configuration
  • Configuring VCS

Configuring LLT

  • LLT over bonded interfaces
  • LLT over UDP
  • LLT over RDMA
  • LLT with different network interfaces
  • Manually configuring LLT

Using Multiple Public Network Interfaces

  • Configuring multiple service groups with network resources
  • MultiNICB and IPMultiNICB
  • MultiNICA and IPMultiNIC

Using Triggers to Customize VCS Behavior

  • Understanding triggers
  • Configuring triggers
  • Using multiple trigger scripts
  • Controlling applications with triggers

Managing Service Group Dependencies

  • Common application relationships
  • Service group dependencies
  • Service group dependency examples
  • Configuring service group dependencies
  • Limitations of service group dependencies

Using I/O Fencing for Application Data Integrity

  • Data protection requirements
  • I/O fencing concepts
  • I/O fencing operations
  • I/O fencing implementation
  • Fencing configuration

Using Coordination Point Server for Application Data Integrity

  • Coordination point concepts
  • Server-based fencing architecture
  • CPS operations
  • Installing and configuring a CP server
  • Configuring I/O fencing with CPS
  • Coordination point agent

Administering Fencing Configurations

  • Installing and configuring clustered CP servers
  • Administering CPS
  • Administering disk-based I/O fencing
  • Configuring preferred fencing

Reconfiguring Cluster Memberships

  • Removing a cluster node
  • Adding a cluster node
  • Merging clusters

Controlling Application Startup and Shutdown

  • Resource online and offline processes
  • Cluster startup
  • Startup rules and policies
  • Limits and Prerequisites

Controlling Application Failover

  • Failover rules and policies
  • Limits and Prerequisites
  • AdaptiveHA

Customizing Application Failover Behavior

  • VCS response to resource faults
  • Controlling failover with service group attributes
  • Controlling failover with resource type attributes

Managing System Outages

  • Differentiating between a system shutdown and an outage
  • Controlling cluster shutdown
  • Controlling applications during a system outage

Administering Campus Clusters

  • Disaster recovery solutions with SFHA
  • Preparing to set up a campus cluster configuration
  • Configuring Storage Foundation for campus clustering
  • Configuring a VCS service group for campus clusters
  • Testing site-awareness
  • Failure scenarios with campus clusters
  • Legacy campus clustering

Upgrading Storage Foundation High Availability

  • Planning to upgrade SFHA
  • Online upgrade
  • Full upgrade
  • Rolling upgrade
  • Phased upgrade
  • Finding and installing SFHA patches

This course is for UNIX system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration development staff, who will be installing, operating, or integrating Symantec Cluster Server.

You must have administrator-level experience with UNIX or Linux, TCP/IP networking, and clustering using Symantec Cluster Server.

    Upcoming Dates
  • ` Jun 26 - Jun 30, 2023
  • ` Jul 24 - Jul 28, 2023
  • ` Aug 21 - Aug 25, 2023
  • ` Sep 18 - Sep 22, 2023
  • ` Oct 16 - Oct 20, 2023
  • ` Nov 13 - Nov 17, 2023