IBM TotalStorage DR550 SMB

Version 1.0 ------

27 May 2005

Page 31

ƒEnter the location of installation images that are to be copied to the DVD file system (if any) in the Location of packages to copy to DVD field. This field is required if additional packages are to be placed on the DVD (see the previous step). The location can be a directory or DVD device.

ƒYou can specify the full path name to a customization script in the Customization script field. If given, the mkcd command copies the script to the DVD file system. You must have the CUSTOMIZATION_FILE field already set in the bosinst.data file in the mksysb image or use a user-specified bosinst.data file with the CUSTOMIZATION_FILE field set. The mkcd command copies this file to the RAM file system. Therefore, the path in the CUSTOMIZATION_FILE field must be as follows: /../filename

ƒYou can use your own bosinst.data file, rather than the one in the mksysb image, by entering the full path name of your bosinst.data file in the User supplied bosinst.data file field.

ƒTo enable debugging for the mkdvd command, set Debug output? to yes. The debug output goes to the smit.log.

ƒYou can use your own image.data file, rather than the image.data file in the mksysb image, by entering the full path name of your image.data file for the User supplied image.data file field.

When you have created the DVD, please label it appropriately and keep it in a safe place. If you have a dual node configuration, you should repeat the steps and create a DVD-RAM for the second server as well. You may want to make a second copy of each DVD-RAM, keeping one in the data center and one off site.

Recovering from a problem using the Recovery DVD

Should a problem occur and you need to rebuild the server(s) – based on the advice of the support center, please follow these steps.

Boot from the Recovery DVD

Using the DVD produced with mkdvd command above)

1.Insert the DVD into the DVD-RAM device.

2.Make sure all external devices attached to the system (such as CD-ROM drives, tape drives, DVD drives, and terminals) are turned on. Only the DVD-RAM drive from which you will install AIX should contain the installation media.

3.Power on the system.

4.When the system beeps twice, press F5 on the keyboard (or 5 on an ASCII terminal). If you have a graphics display, you will see the keyboard icon on the screen when the beeps occur. If you have an ASCII terminal (also called a tty terminal), you will see the word keyboard when the beeps occur. The system will now boot from the installation media.

Note: If your system does not boot using the F5 key (or the 5 key on an ASCII terminal), refer to your hardware documentation for information on how to get your system to boot from an AIX product DVD.

5.Select the system console by pressing F1 (or 1 on an ASCII terminal) and press Enter. If you have more than one display or terminal, follow the instructions on the display or terminal to select one as the console.

6.Select the language for the BOS Installation menus by typing the corresponding number in the Choice field. Press Enter to open the Welcome to Base Operating System Installation and Maintenance screen.

7.Type 2 to select 2 Change/Show Installation Settings and Install in the Choice field and press Enter.

Welcome to Base Operating System

Installation and Maintenance

Type the number of your choice and press Enter. Choice is indicated by >>>.

IBM Storage Systems

Copyright © 2005 by International Business Machines Corporation

Page 31
Image 31
IBM DR550 SMB V.1 manual Recovering from a problem using the Recovery DVD, Boot from the Recovery DVD

DR550 SMB V.1 specifications

The IBM DR550 SMB V.1 is a robust data protection solution designed to meet the needs of small and medium-sized businesses (SMBs). This innovative platform combines advanced technologies with user-friendly features, making it an ideal choice for organizations looking to secure their data without overwhelming complexity or significant financial investments.

One of the main features of the IBM DR550 SMB V.1 is its integrated data deduplication capability. This technology significantly reduces the amount of storage space required for backups by eliminating redundant copies of data. As a result, businesses can store more information efficiently, leading to cost savings and more effective use of resources.

The platform also supports multi-tiered storage options, enabling users to easily manage data across various storage environments. This flexibility is crucial for SMBs that may have limited storage capabilities but still require scalable solutions to accommodate growth. The ability to migrate data seamlessly between different tiers enhances operational efficiency and ensures that businesses can handle their evolving data needs without frequent disruptions.

Another noteworthy characteristic of the DR550 SMB V.1 is its cloud integration support. The ability to back up data to the cloud provides additional protection and redundancy, allowing organizations to ensure data availability even in the event of hardware failures or disasters. This feature is especially important for SMBs operating with limited IT resources, as it simplifies disaster recovery processes and enhances overall business continuity.

The user interface of the IBM DR550 SMB V.1 is designed with accessibility in mind. Its intuitive dashboard allows users to monitor backup statuses easily, configure schedules, and manage recovery options without extensive technical expertise. This user-friendly approach reduces the learning curve for employees and empowers businesses to take control of their data protection strategies.

In terms of security, the DR550 SMB V.1 employs advanced encryption technologies to safeguard sensitive information both during transit and at rest. This focus on data security is vital for meeting compliance requirements and maintaining customer trust in an increasingly data-driven world.

Overall, the IBM DR550 SMB V.1 stands out as a comprehensive solution that merges advanced backup technology with essential features tailored for small and medium-sized businesses. Its combination of data deduplication, multi-tier storage support, cloud integration, and robust security measures makes it a valuable asset for organizations looking to enhance their data protection capabilities while ensuring ease of use and scalability.