Vaulting ................................................................................................... | |
Restoring from media in a vault ................................................................... | |
Devices .......................................................................................................... | |
Device lists and load balancing .................................................................. | |
How load balancing works .................................................................. | |
Device streaming and concurrency .............................................................. | |
Segment size ............................................................................................ | |
Block size ................................................................................................ | |
Number of disk agent buffers ..................................................................... | |
Device locking and lock names ................................................................... | |
Standalone devices .......................................................................................... | |
Small magazine devices ................................................................................... | |
Large libraries ................................................................................................. | |
Handling of media .................................................................................... | |
Size of a library ........................................................................................ | |
Sharing a library with other applications ..................................................... | |
Enter / eject mail slots ............................................................................... | |
Barcode support ....................................................................................... | |
Cleaning tape support ............................................................................... | |
Sharing a library with multiple systems ........................................................ | |
Data Protector and Storage Area Networks ......................................................... | |
Storage Area Networks ............................................................................. | |
Fibre Channel .......................................................................................... | |
Loop topology .................................................................................... | |
Switched topology .............................................................................. | |
Device sharing in SAN .............................................................................. | |
Configuring multiple paths to physical devices ........................................ | |
Device locking ................................................................................... | |
Indirect and Direct Library Access ............................................................... | |
Indirect Library Access ........................................................................ | |
Direct Library Access .......................................................................... | |
Device sharing in clusters ........................................................................... | |
Static drives ....................................................................................... | |
Floating drives ................................................................................... | |
4 Users and user groups ................................................... | |
In this chapter ................................................................................................. | |
Increased security for Data Protector users .......................................................... | |
Access to backed up data .......................................................................... | |
Users and user groups ..................................................................................... | |
Using predefined user groups ..................................................................... |
Concepts guide | 7 |