Vaulting ...................................................................................................

151

Restoring from media in a vault ...................................................................

153

Devices ..........................................................................................................

153

Device lists and load balancing ..................................................................

155

How load balancing works ..................................................................

156

Device streaming and concurrency ..............................................................

156

Segment size ............................................................................................

157

Block size ................................................................................................

158

Number of disk agent buffers .....................................................................

159

Device locking and lock names ...................................................................

159

Standalone devices ..........................................................................................

160

Small magazine devices ...................................................................................

161

Large libraries .................................................................................................

162

Handling of media ....................................................................................

162

Size of a library ........................................................................................

162

Sharing a library with other applications .....................................................

163

Enter / eject mail slots ...............................................................................

163

Barcode support .......................................................................................

163

Cleaning tape support ...............................................................................

164

Sharing a library with multiple systems ........................................................

164

Data Protector and Storage Area Networks .........................................................

170

Storage Area Networks .............................................................................

171

Fibre Channel ..........................................................................................

172

Point-to-point topology .........................................................................

173

Loop topology ....................................................................................

173

Switched topology ..............................................................................

174

Device sharing in SAN ..............................................................................

175

Configuring multiple paths to physical devices ........................................

175

Device locking ...................................................................................

177

Indirect and Direct Library Access ...............................................................

178

Indirect Library Access ........................................................................

178

Direct Library Access ..........................................................................

179

Device sharing in clusters ...........................................................................

180

Static drives .......................................................................................

180

Floating drives ...................................................................................

181

4 Users and user groups ...................................................

183

In this chapter .................................................................................................

183

Increased security for Data Protector users ..........................................................

183

Access to backed up data ..........................................................................

183

Users and user groups .....................................................................................

184

Using predefined user groups .....................................................................

185

Concepts guide

7