Dell EMC Networker Administration Guide CONTENTS

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Dell EMC NetWorker Version 18.2 Administration Guide 302-005-314 REV 04 September, 2019 Copyright © 1990-2019 Dell Inc. or its subsidiaries. All rights reserved. Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. Dell EMC Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.DellEMC.com 2 Dell EMC NetWorker Administration Guide CONTENTS Figures 15 Tables 17 Preface 21 Chapter 1 Overview 25 The NetWorker environment.............................................................................26 NetWorker Components...................................................................... 26 NetWorker services.......................................................................................... 28 Processes on NetWorker hosts ...........................................................28 Stop and start the NMC Server........................................................... 32 Stop and start a NetWorker Server, Client, or Storage Node...............34 NetWorker user interfaces................................................................................36 NMC user interface..............................................................................36 NetWorker Administration window.......................................................38 NetWorker client interface...................................................................38 NetWorker character-based interface................................................. 38 NetWorker command-line interface..................................................... 38 Introduction to the NetWorker Management Web UI...........................39 Chapter 2 Getting Started 41 NetWorker Management Console interface...................................................... 42 Connecting to the Console window......................................................42 Connecting to the Administration window.........................................................47 Opening the Administration window.....................................................47 Administration window......................................................................... 47 Editing multiple resources.................................................................... 49 Drag-and-drop functionality.................................................................49 Multiple library devices and slots.......................................................... 51 Setting user interaction preferences.................................................... 51 Monitoring NetWorker Server activities in the Administration window.... 51 Getting started with a new installation.............................................................. 61 Common NetWorker tasks....................................................................61 Chapter 3 Backup Target 69 Label templates.................................................................................................70 Using label templates........................................................................... 70 How the NetWorker server uses volume labels.................................... 70 Preconfigured label templates.............................................................. 71 Guidelines for completing Label Template attributes............................ 71 Naming label templates........................................................................ 74 Working with label templates............................................................... 75 Setting up a label template to identify volumes.................................... 76 Dell EMC NetWorker Administration Guide 3 Contents Media pools.......................................................................................................77 Using media pools.................................................................................77 Storage nodes................................................................................................... 91 Requirements....................................................................................... 91 Licensing..............................................................................................92 Storage node configuration..................................................................92 Storage Node Options......................................................................... 98 Configuring a dedicated storage node..................................................99 Troubleshooting storage nodes............................................................ 99 Disk storage devices........................................................................................100 Example environment..........................................................................101 Considerations for Client Direct clients............................................... 101 Differences between FTDs, AFTDs, and DD Boost devices.................103 Device target and max sessions default values and ranges................. 106 Advanced file type devices................................................................. 107 DD Boost and Cloud Tier devices........................................................120 Libraries and silos.............................................................................................121 Overview of tape device storage......................................................... 121 Support for LTO-4 hardware-based encryption...................................121 Linux device considerations................................................................ 122 Solaris device considerations.............................................................. 123 HP-UX device considerations............................................................. 123 AIX device considerations...................................................................126 SCSI and VTL libraries........................................................................ 126 Silo libraries.........................................................................................161 NDMP libraries....................................................................................170 NetWorker hosts with shared libraries................................................ 170 Dynamic drive sharing.........................................................................173 File type devices.............................................................................................. 178 FTD capacity issues............................................................................ 178 Full FTD prevention.............................................................................178 Stand-alone devices........................................................................................ 179 Autodetecting and configuring a stand-alone tape drive..................... 179 Adding a stand-alone device manually.................................................179 Auto Media Management for stand-alone devices.............................. 180 Mounting or unmounting a volume in a stand-alone tape drive............ 181 Labeling and mounting a volume in one operation (stand-alone tape drive).................................................................................................. 181 Labeling volumes without mounting....................................................182 Mounting uninventoried volumes........................................................ 182 Labeling volumes............................................................................................. 183 Labeling or re-labeling library volumes................................................ 183 Verifying the label when a volume is unloaded.................................... 184 Troubleshooting devices and autochangers..................................................... 184 Additional attributes in the Autochanger resource.............................. 184 Maintenance commands..................................................................... 185 Autodetected SCSI jukebox option causes server to stop responding 185 Autochanger inventory problems........................................................ 185 Destination component full messages.................................................185 Tapes do not fill to capacity................................................................186 Tapes get stuck in drive when labeling tapes on Linux Red Hat platform ........................................................................................................... 186 Increasing the value of Save Mount Time-out for label operations......187 Server cannot access autochanger control port................................. 187 Changing the sleep times required for TZ89 drive types.....................188 Message displayed when CDI enabled on NDMP or file type device... 188 4 Dell EMC NetWorker Administration Guide Contents Verify
Recommended publications
  • Windows Phone App Security for Builders and Breakers

    Windows Phone App Security for Builders and Breakers

    Windows Phone App Security for builders and breakers Luca De Fulgentis ~ [email protected] May 22nd, 2015 | Amsterdam About /me . Luca De Fulgentis ~ @_daath . Chief Technology Officer at Secure Network . OWASP Mobile Project Contributor . Nibble Security co-founder - blog.nibblesec.org . Consuming brain-power with InfoSec since 2001 2 Agenda . Introduction – Research overview and motivations . Mobile Top Ten for Windows Phone – Examples of real-world vulnerable code – Discussion on potential insecure APIs usage – Secure coding tips for builders . Final considerations Windows Phone App Security 3 Introduction . In 2014 we collected examples of insecure code for Windows Phone apps – Set of 60+ samples, of which 30% of mobile banking apps – Mostly developed with the Silverlight 8.x technology . Statistics on the initial study has been shared with the OWASP Mobile Project for the MTT 2015 definition . Later, we extended our research developing an automated script that allowed downloading 160+ AppX from US and IT regions of the WP Store – We needed to cover WP 8.1 Windows Runtime (WinRT) security as well Windows Phone App Security 4 Introduction – motivations . Too few (public) resources on WP apps security – MWR’s «Navigation a Sea of Pwn?» (SyScan, 2014) - pretty amazing paper on the topic – XDA Forum represents an invaluable source of information . We want both builders and breakers to be happy! – Provide a wide range of common APIs (MSDN) categorized on the basis of MTT 2014 and also define methods and strategies to mitigate these risks . We defined a public catalog of potentially insecure APIs – Focus on C#/XAML apps, still the most relevant development technologies .
  • Disk Clone Industrial

    Disk Clone Industrial

    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
  • Pass Microsoft 70-697 Exam with 100% Guarantee

    Pass Microsoft 70-697 Exam with 100% Guarantee

    https://www.certbus.com/70-697.html 2021 Latest certbus 70-697 PDF and VCE dumps Download 70-697Q&As Configuring Windows Devices Pass Microsoft 70-697 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: https://www.certbus.com/70-697.html 100% Passing Guarantee 100% Money Back Assurance Following Questions and Answers are all new published by Microsoft Official Exam Center 70-697 Practice Test | 70-697 Study Guide | 70-697 Braindumps 1 / 13 https://www.certbus.com/70-697.html 2021 Latest certbus 70-697 PDF and VCE dumps Download QUESTION 1 You provide IT support for a small startup company. The company wants users to have Read and Write permissions to the company\\'s shared folder. The network consists of a workgroup that uses Windows 10 Enterprise computers. You add each user to a group named NetworkUsers. You need to grant permissions to the share. You have the following requirements: All users must have Read and Write access to existing files. Any new files must allow the creator to modify the new file\\'s permissions. Which two actions should you take? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Grant Modify permissions to the NetworkUsers group on the shared folder. B. Grant Full Control permissions to the Domain Admins group on the shared folder. C. Grant List and Execute permissions to the NetworkUsers group on the shared folder. D. Grant Full Control permissions to the Creator Owner group on the shared folder.
  • Tabela De Manutenção E Garantia De Produto Da

    Tabela De Manutenção E Garantia De Produto Da

    EMC PRODUCT WARRANTY AND MAINTENANCE T ABLE The table below sets forth EMC® product-specific warranty and maintenance terms and information. Each product identified as equipment also includes its related operating system, operating environment or microcode (also defined in many contracts as “Core Software”), if any, unless the table indicates that such operating system is licensed as a separate product. Any EMC software that is licensed as a separate product and is not specifically identified on this table is governed by the terms stated in the row entitled “software.” EMC recommends that you locate products on the following table by simultaneously pressing the “Control” key and the letter “f” key to activate the “Find” feature, and then typing in the name of the applicable product. Additional information about available Support Options as well as other important information can be found by clicking the link found here. Notice: In accordance with widely used business practices in the IT industry and in support of EMC’s worldwide sustainability and recycling initiatives, Equipment may contain components that are (i) previously unused; or (ii) re-manufactured to contain the most current updates, meet all relevant test specifications and be functionally equivalent to previously unused components. Spare, upgrade and/or replacement components may be re-manufactured. EMC warranty terms apply equally to all components. For information on EMC’s recycling and sustainability efforts please click here. Product Standard Warranty Available Support
  • Repair up to 32 Major Windows Errors Using a Single Tool R 400/1

    Repair up to 32 Major Windows Errors Using a Single Tool R 400/1

    R 400.qxp_March 2018 30/01/2018 14:07 Page 15 Repair Your Windows System R 400/1 Repair Up to 32 Major Windows Errors Using a Single Tool Using the information given in this article you will be able to: Create a restore point to protect your system against damage, Repair up to 32 different errors with just one mouse click, Select and correct a specific Windows problem. No Windows system is error-free! Most people are content to simply tolerate minor Windows bugs, because they don’t have the time to hunt for the cause of the error. But small bugs can quickly spiral out of control, so it is important you deal with them fast. There are many tools on the market that claim to help you fix errors, but lots of them are expensive and don’t actually work. In my PC workshop, I use the Windows Repair tool. You can use this tool to look for errors, correct problematic settings and configure Windows to be more stable. And the best thing is that this tool is completely free. In this article, I’ll show you which errors Windows Repair can solve and how to successfully use this tool in practice. • Perform a Professional Error Check on Your Windows System .............................................................. R 400/2 • Important: Create a System Restore Point Before Applying Any Fixes ........................................................... R 400/3 • Use Windows Repair to Quickly Fix Your System ......... R 400/4 • Additi onal Repair Options in Windows Repair .............. R 400/5 • Back up Your Registry and Create a Restore Point ......
  • IBM Endpoint Manager for Remote Control Installation Guide Chapter 1

    IBM Endpoint Manager for Remote Control Installation Guide Chapter 1

    IBMEndpointManagerforRemoteControl Installation Guide Version 9.0.0 IBMEndpointManagerforRemoteControl Installation Guide Version 9.0.0 Note Before using this information and the product it supports, read the information in “Notices” on page 115. This edition applies to version 9, release 0, modification level 0 of IBM Endpoint Manager and to all subsequent releases and modifications until otherwise indicated in new editions. Contents Chapter 1. IBM Endpoint Manager for Installing Windows broker support .....63 Remote Control Installation Guide . 1 Installing Linux broker support.......64 Audience ...............1 Versions ................1 Chapter 5. Utility for extracting the Terms used in this guide ..........1 component installation files .....65 Using the additional setup utility .......65 Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system . 3 Chapter 6. Managing the component Using this guide .............5 services ..............67 IBM Endpoint Manager for Remote Control operating Starting, stopping, or restarting the Windows requirements ..............5 components ..............67 A Basic installation ...........6 Starting, stopping, or restarting the Linux Installation with support for firewall and NAT components ..............67 traversal ...............7 Installation with support for remote control Chapter 7. Performing required sessions over the internet .........8 configuration ............69 Server requirements ...........9 Enabling email .............69 Server environment guidelines .......10 Configuring
  • STORAGE CAPACITY OPTIMIZATION Truesight Capacity Optimization for Storage

    STORAGE CAPACITY OPTIMIZATION Truesight Capacity Optimization for Storage

    STORAGE CAPACITY OPTIMIZATION TrueSight Capacity Optimization for Storage EMC SMI-S Agent ETL TrueSight Capacity Optimization Architecture SAN EMC Disk Arrays Symmetrix, CLARiiON, VNX Native EMC (over FC or IP) BMC TrueSight Capacity Optimization SMI-S Provider SAN WBEM EMC Disk Arrays VNX EMC SMI-S Agent ETL for TrueSight Capacity Optimization Native EMC EMC SMI-S Provider (over FC or IP) Scheduler WBEM CONTROL STATION NAS EMC Disk Arrays Celerra, VNX Architecture Diagram for EMC SMI-S Provider EMC SMI-S Agent ETL for TrueSight Capacity Optimization WBEM CONTROL STATION MAIN FEATURES • Unmatched visibility into storage realm • Detailed capacity metrics on storage systems, storage pools, volumes, and hosts • Valuable performance and capacity reporting, trending, and modeling for all supported systems • Leverage existing BMC TrueSight Capacity Optimization storage-related dashboards, views, and report FEATURED PRODUCTS • Dell Compellent Enterprise Manager ETL for TrueSight Capacity Optimization • IBM SVC-Storwize ETL for TrueSight Capacity Optimization • Dell EMC Elastic Cloud Storage ETL for TrueSight Capacity Optimization • IBM XiV ETL for TrueSight Capacity Optimization • Dell EMC Unity CIM Server ETL for TrueSight Capacity Optimization • NetApp Capacity Views for TrueSight Capacity Optimization • EMC SMI-S Agent ETL for TrueSight Capacity Optimization • NetApp Data ONTAP ETL for TrueSight Capacity Optimization • EMC XtremIO Management Server ETL for TrueSight Capacity Optimization • Pure Storage REST API ETL for TrueSight Capacity Optimization • Hitachi Device Manager ETL for TrueSight Capacity Optimization • Storage All-in-One ETL for TrueSight Capacity Optimization • HP 3PAR ETL for TrueSight Capacity Optimization • Storage Capacity Views and Reports for TrueSight Capacity Optimization SUPPORTED PLATFORMS • Any Dell Compellent Storage Center compatible with Dell Compellent Enterprise Manager 6.3 and higher.
  • Forest Quickstart Guide for Linguists

    Forest Quickstart Guide for Linguists

    Forest Quickstart Guide for Linguists Guido Vanden Wyngaerd [email protected] June 28, 2020 Contents 1 Introduction 1 2 Loading Forest 2 3 Basic Usage 2 4 Adjusting node spacing 4 5 Triangles 7 6 Unlabelled nodes 9 7 Horizontal alignment of terminals 10 8 Arrows 11 9 Highlighting 14 1 Introduction Forest is a package for drawing linguistic (and other) tree diagrams de- veloped by Sašo Živanović. This manual provides a quickstart guide for linguists with just the essential things that you need to get started. More 1 extensive documentation is available from the CTAN-archive. Forest is based on the TikZ package; more information about its commands, in par- ticular those controlling the appearance of the nodes, the arrows, and the highlighting can be found in the TikZ documentation. 2 Loading Forest In your preamble, put \usepackage[linguistics]{forest} The linguistics option makes for nice trees, in which the branches meet above the two nodes that they join; it will also align the example number (provided by linguex) with the top of the tree: (1) CP C IP I VP V NP 3 Basic Usage Forest uses a familiar labelled brackets syntax. The code below will out- put the tree in (1) above (\ex. requires the linguex package and provides the example number): \ex. \begin{forest} [CP[C][IP[I][VP[V][NP]]]] \end{forest} Forest will parse the above code without problem, but you are likely to soon get lost in your labelled brackets with more complicated trees if you write the code this way. The better alternative is to arrange the nodes over multiple lines: 2 \ex.
  • Metadata for Everyone a Simple, Low-Cost Methodology Timothy D

    Metadata for Everyone a Simple, Low-Cost Methodology Timothy D

    SAS Global Forum 2008 Data Integration Paper 138-2008 Metadata for Everyone A Simple, Low-Cost Methodology Timothy D. Brown, Altoona, IA ABSTRACT In the context of Base SAS® programming, this paper uses “hardcoded” values as an introduction to “metadata” and the reasons for using it. It then describes a low cost and simple methodology for maintaining any kind of metadata. INTRODUCTION This discussion will take an indirect approach to defining metadata. It’ll describe the metadata which might be included, or hard-coded, in a Base SAS program and propose alternatives to storing and using the metadata. Outside of programs “data” and “code” are distinct. However within programs, the distinction gets blurred when data values, called “hardcoded” data, are included within the code. Hardcoded values include, but are not limited to: • Text constants, literals • Names of companies, people, organizations and places • Directory paths and file names • Parameters on SAS procedures such as WHERE, KEEP, DROP, RENAME, VARS, BY etc • Numeric constants including dates* • Statistical constants • Period begin and end dates • Mixed text and numeric values • Expressions in IF and WHERE clauses • What-if scenarios (* excluding dates which are derived logically using a SAS functions such as TODAY(), DATETIME(), INTNX and NXTPD) In addition, many small conversion, cross-reference and look-up tables, which might be hardcoded as SAS formats or read into a program from many different sources, work well as metadata and fit into this framework. Obviously, some hardcoded values might never change in the life of a program. So it might be prudent to leave some hardcoded values in the code.
  • Four Ways to Reorder Your Variables, Ranked by Elegance and Efficiency Louise S

    Four Ways to Reorder Your Variables, Ranked by Elegance and Efficiency Louise S

    Order, Order! Four Ways To Reorder Your Variables, Ranked by Elegance and Efficiency Louise S. Hadden, Abt Associates Inc. ABSTRACT SAS® practitioners are frequently required to present variables in an output data file in a particular order, or standards may require variables in a production data file to be in a particular order. This paper and presentation offer several methods for reordering variables in a data file, encompassing both DATA step and procedural methods. Relative efficiency and elegance of the solutions will be discussed. INTRODUCTION SAS provides us with numerous methods to control all types of SAS output, including SAS data files, data tables in other formats, and ODS output. This paper focuses solely on output SAS data files (which may then be used to generate SAS data files and other types of output from SAS processes), and specifically on DATA step and PROC SQL methods. This short paper and presentation is suitable for all SAS practitioners at all levels of expertise. Attendees will gain a greater understanding of the processes by which SAS assigns variable attributes, including variable/column order within a data file, and how to obtain information on variable attributes – and in the process, learn how to reorder variables within a SAS data file. KNOW THY DATA It is always important to understand fully and explore the inputs to SAS-created output. SAS has provided users with a variety of possibilities in terms of determining locations of variables or columns (and other important details comprising metadata). These possibilities include, but are not limited to: 1. The CONTENTS Procedure 2.
  • RECOVER Recover Systems Directly from Networker Backups

    RECOVER Recover Systems Directly from Networker Backups

    NBMR RECOVER Recover systems directly from NetWorker backups With Cristie NBMR you can protect critical servers from the consequences of failure or disaster by recovering them directly from your EMC NetWorker backups. Recover your protected servers, including; operating systems, applications, user configuration and data to any point in time provided by NetWorker. Highlights Features Benefits 9 Leverage existing NetWorker 9 Saves storage space, network Integrated system backups without extra infrastructure, bandwidth, processing power and recovery or management management resources Point in time 9 Recover to any point in time 9 Recoveries can be rolled back to a recoveries provided by the NetWorker backups time before the disaster occurred 9 Supports Windows, Linux, AIX and Support for multiple 9 Most systems can be protected Solaris and dissimilar hardware, OS and cloud using NBMR virtual and cloud environments 9 Recover entire workloads including; 9 The recovered machine does not Recovered system OS, applications, data and need to be calibrated and tuned to identical configuration information run as it did before 9 Improve recovery time objectives 9 Meet aggressive service level by restoring your server in as little as Fast recovery times agreements recovery time and point ten minutes. Multiple servers can be objectives recovered simultaneously Flexible recovery 9 Recover to a range of system 9 Flexibility to suit most environments targets recovery targets Remote 9 Manage multiple, simultaneous 9 Easy, secure, mobile access management system recoveries on site, or remotely 9 NBMR is re-sold globally by EMC Recommended 9 NBMR is a recommended recovery and its channel partners as a solution solution for NetWorker recommended recovery solution for NetWorker Support is very cooperative and give a timely response to any technical issues raised with them.
  • VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision History

    VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision History

    VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision history www.vce.com VCE Vblock™ System 720 Gen 4.1 Architecture Overview Document revision 4.3 June 2013 © 2013 VCE Company, LLC. © 2013 VCE Company,1 LLC. All Rights Reserved. All Rights Reserved. Revision history VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision history Date Vblock Document Author Description of changes System revision February Gen 4.0 4.0 Julie Gen 4.0 release 2013 Hamm March 2013 Gen 4.0 4.1 Julie Updated for VCE rebranding Hamm April 2013 Gen 4.1 4.2 Julie • Added VCE Vision™ Intelligent Hamm Operations • Updated VMware vSphere information • Integrated into the Gen 4.1 release June 2013 Gen 4.1 4.3 Julie Updated the bare metal support policy Hamm 2 © 2013 VCE Company, LLC. All Rights Reserved. VCE Vblock™ System 720 Gen 4.1 Architecture Overview Table of contents Table of contents Introduction ................................................................................................................................................. 6 Accessing VCE documentation ................................................................................................................. 7 Overview ...................................................................................................................................................... 8 Vblock™ System 720 overview .............................................................................................................. 8 Base configurations and scaling ..........................................................................................................