Netbackup System Administrator's Guide for Windows, Volume II

Total Page:16

File Type:pdf, Size:1020Kb

Netbackup System Administrator's Guide for Windows, Volume II VERITAS NetBackupTM 6.0 System Administrator’s Guide, Volume II for Windows N152598 September 2005 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. VERITAS Legal Notice Copyright © 1993-2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo, and NetBackup are trademarks or registered trademarks of VERITAS Software Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Portions of this software are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Copyright 1991-92, RSA Data Security, Inc. Created 1991. All rights reserved. VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650-527-8000 Fax 650-527-2908 www.veritas.com Third-Party Copyrights For a list of third-party copyrights, see the NetBackup Release Notes appendix. ii NetBackup System Administrator’s Guide for Windows, Volume II Contents Preface . xiii Getting Help . xiii Finding NetBackup Documentation . xiii ▼ To access the NetBackup online glossary . xiv Accessing the VERITAS Technical Support Web Site . xiv Contacting VERITAS Licensing . .xv Accessibility Features . .xv Comment on the Documentation . xvi Chapter 1. Access Management . .1 NetBackup Access Management Components . 2 VxSS Components . 2 Root Broker . 3 Authentication Brokers . 3 Security Administrator . 4 Installation Overview . 5 Order for Installation . .5 Order for Upgrade . 5 Including VxSS Databases in the NetBackup Catalog Backup . 6 VxSS Component Distribution . 6 Installing and Configuring Access Control for Master Servers . 8 Installing and Configuring Access Control for Media Servers . 12 Installing and Configuring Access Control for Clients . 15 Establishing a Trust Relationship Between the Broker and the Windows Remote iii Console . 17 Installing the Authentication Service Root Broker (Root + AB) . 18 Configuring Authentication on the Root Broker for Use with NetBackup . 19 Installing the Authorization Server . 21 Configuring the Authorization Server . 21 Configuring Access Control Host Properties . 23 Master Server and Media Server Host Properties . 23 Access Control Host Properties Dialog . 23 VxSS Tab . 24 Authentication Domain Tab . 24 Authorization Service Tab . 26 Verifying Master Server Settings . 26 Client Host Properties . 27 Access Control Host Properties Dialog . 27 VxSS Tab . 27 Authentication Domain Tab . 27 Access Management Troubleshooting Guidelines . 28 Windows Verification Points . 28 Master Server Verification Points . 30 Media Server Verification Points . 32 Client Verification Points . 33 UNIX Verification Points . 35 Master Server Verification Points . 36 Media Server Verification Points . 38 Client Verification Points . 39 Verification Points in a Mixed Environment with a UNIX Master Server . 41 Master Server Verification Points . 43 Media Server Verification Points . 43 Client Verification Points . 44 Verification Points in a Mixed Environment with a Windows Master Server . 46 iv NetBackup System Administrator’s Guide for Windows, Volume II Master Server Verification Points . 48 Media Server Verification Points . 48 Client Verification Points . 49 Other Troubleshooting Topics . 51 Expired Credentials Message . 51 Useful Debug Logs . 51 If Uninstalling VxSS . 51 Where Credentials Are Stored . 51 How System Time Affects Access Control . 52 VxSS Ports . 52 Stopping VxSS Services . 52 If You Lock Yourself Out of NetBackup . 52 nbac_cron Utility . 53 Using the Access Management Utility . 54 Access Management Menus . 54 Determining Who Can Access NetBackup . 56 Individual Users . .56 User Groups . 58 Default User Groups . 58 Additional User Groups . 60 User Group Configuration . 60 ▼ To create a.
Recommended publications
  • Eyelink 1000 Installation Guide
    EyeLink® 1000 Installation Guide Tower, Desktop, LCD Arm, Primate, and Long Range Mounts Remote, 2000 Hz and Fiber Optic Camera Upgrades Version 1.5.0 Copyright ©2005-2009, SR Research Ltd. EyeLink is a registered trademark of SR Research Ltd., Mississauga, Ontario, Canada Read instructions before use. US Entela Safety Mark: Compliance of this product with UL 60950 3rd Edition, CSA C22.2 No 60950-00-CAN/CSA is certified by Entela, an independent testing body. C Certified CLASS 1 LED DEVICE IEC 60825-1 (Ed. 1.2:2001) CONTACT ADDRESS SR Research Ltd. 5516 Osgoode Main St., Ottawa, Ontario, Canada K0A 2W0 Fax: 613-482-4866 Phone: 613-826-2958 Toll Free: 1-866-821-0731 Email: [email protected] http://www.sr-research.com/ ii © 2005-2009 SR Research Ltd. Table of Contents 1. Introduction ....................................................................................................... 1 1.1 Suggested Equipment Layout ............................................................. 2 2. Installation and System Cabling .................................................................. 4 2.1 Unpacking ......................................................................................... 4 2.2 Display PC Hardware Installation ....................................................... 4 2.3 Setting up the Host PC ....................................................................... 5 2.3.1 Rebuilding the Host PC ............................................................................... 6 2.4 Host PC Wiring .................................................................................
    [Show full text]
  • Implementing Hard Drives 10
    All-in-1 / A+ Certification Exm Gde, 6th Ed. / Meyers / 6311-3 CHAPTER Implementing Hard Drives 10 In this chapter, you will learn how to • Explain the partitions available in Windows • Discuss the formatting options • Partition and format hard drives • Maintain and troubleshoot a hard drive From the standpoint of your PC, a new hard drive successfully installed is nothing more than a huge pile of sectors. CMOS sees the drive; it shows up in your autodetect screen and BIOS knows how to talk to the drive; but as far as an operating system is concerned, that drive is unreadable. Your operating system must organize that big pile of sectors so you can create two things: folders and files. This chapter covers that process. Historical/Conceptual After you’ve successfully installed a hard drive, you must perform two more steps to translate a drive’s geometry and circuits into something usable to the system: partition- ing and formatting. Partitioning is the process of electronically subdividing the physical hard drive into groups of cylinders called partitions (or volumes). A hard drive must have at least one partition, and you can create multiple partitions on a single hard drive if you wish. In Windows, each of these partitions typically is assigned a drive letter such as C: or D:. After partitioning, you must format the drive. This step installs a file system onto the drive that organizes each partition in such a way that the operating system can store files and folders on the drive. Several different types of file systems are used in the Windows world.
    [Show full text]
  • Acronis Os Selector As a Boot Manager
    User's Guide OS Selector 8.0 Compute with confidence www.acronis.com Copyright © SWsoft, 2000-2002. All rights reserved. Linux is a registered trademark of Linus Torvalds. OS/2 is a registered trademarks of IBM Corporation. UNIX is a registered trademarks of The Open Group. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS YOU MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. The OS Selector (the Software) is copyright © 2000-2002 by SWsoft. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1. The license is to the original purchaser only, and is not transferable without prior written Permission from SWsoft. 2. The Original Purchaser may use the Software on a single computer owned or leased by the Original Purchaser.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • Red Hat Linux 7.3 the Official Red Hat Linux X86
    Red Hat Linux 7.3 The Official Red Hat Linux x86 Installation Guide Red Hat Linux 7.3: The Official Red Hat Linux x86 Installation Guide Copyright © 2002 by Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhl-ig-x86(EN)-7.3-HTML-RHI (2002-04-05T13:43-0400) Copyright © 2002 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. The admonition graphics (note, tip, and so on) were created by Marianne Pecci <[email protected]>. They may be redistributed with written permission from Marianne Pecci and Red Hat, Inc.. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group.
    [Show full text]
  • Reconfiguring the MBR for Multiple Boot Installations
    Hentzenwerke Whitepaper Series Reconfiguring the MBR for Multiple Boot Installations By Whil Hentzen I©ve written a couple of articles on multiple boot configurations. Upon adding a third operating system to a dual-boot machine, I managed to overwrite the machine©s MBR (master boot record) so that it pointed to the wrong bootloader. This paper addresses the solution. Hentzenwerke Publishing, Inc. · [email protected] · www.hentzenwerke.com Reconfiguring the MBR for Multiple Boot Installations Page 2 1. Preface 1.1 Copyright Copyright 2007 Whil Hentzen. Some rights reserved. This work is licensed under the Creative Commons Attribution- NonCommercial-NoDerivs License, which basically means that you can copy, distribute, and display only unaltered copies of this work, but in return, you must give the original author credit, you may not distribute the work for commercial gain, nor create derivative works based on it without first licensing those rights from the author. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/. 1.2 Revisions 1.2.1 History Version Date Synopsis Author 1.0.0 2007/12/03 Original WH 1.2.2 New version The newest version of this document will be found at www.hentzenwerke.com. 1.2.3 Feedback and corrections If you have questions, comments, or corrections about this document, please feel free to email me at ©[email protected]©. I also welcome suggestions for passages you find unclear. 1.3 Acknowledgments Thanks to MLUG members Ron Bean, Glenn Holmer, Gary Kramlich, among others, for pointers and suggestions, and to Ted Roche, for patiently reviewing version 1.0 and nitpicking every misplaced git.
    [Show full text]
  • Redcell™ System Commander
    Redcell™ System Commander Redcell System Commander is an agentless systems management solution for health monitoring, compliance auditing, troubleshooting and patching multi-vendor client and server environments. Key functions are deep system and client discovery, inventory management and reporting, configuration, health management, remote access and control, patch provisioning, and performance monitoring. Key Benefits Redcell’s consolidated view of the datacenter offers IT administrators the power and flexibility to manage their servers and clients with a customizable permission-based graphical user interface Increase Operational Efficiency (GUI). Real-time configuration management offers normalized presentations of multi-vendor • Reduce errors when performing tasks environments and can greatly reduce or even eliminate the need for maintaining, licensing, and like discovery and group operations training IT staff on the use of multiple solutions. • Centrally register and track all Systems Component elements Redcell System Commander supports the health monitoring and remote management of any system including status, credentials, with CIM indications, SNMP traps and/ or a BMC (Baseboard Management Controller) compatible management attributes and with IPMI v1.5 or above. IPMI allows a standards-based approach for monitoring systems health relationships • Using the common set of and remotely managing heterogeneous system types regardless of OS type and power state. configuration primitives that are Redcell can integrate seamlessly into existing framework deployments by acting as a consolidation vendor-and device-independent point for SNMP or Syslog events from previously deployed Third party agents. Redcell’s hardware manner shortens learning period and and OS patch provisioning lets IT administrators push BIOS, Firmware, OS Driver and security reduces chance of errors in day-to-day TM operations updates out to managed Windows systems and groups of systems across the network from one central console.
    [Show full text]
  • Microsoft Windows Millennium README for General Information June 2000
    ------------------------------------------------- Microsoft Windows Millennium README for General Information June 2000 ------------------------------------------------- (c) Copyright Microsoft Corporation, 1999 This document provides complementary or late-breaking information to supplement the Microsoft Windows Millennium (Windows Me) documentation. ------------------------ HOW TO USE THIS DOCUMENT ------------------------ To view General.txt on-screen in Notepad, maximize the Notepad window. To print General.txt, open it in Notepad or another word processor, and then on the File menu, click Print. -------- CONTENTS -------- STARTUP PROBLEMS APPLETS LARGE DISK SUPPORT (FAT32) DRIVERS PAN-EUROPEAN - KNOWN ISSUES USING ACCESSIBILITY SHORTCUTS IN HELP LOGITECH WHEEL MOUSE ----------------------------- STARTUP PROBLEMS ================= System Detection Error - BIOS Could Lead to Data Loss ----------------------------------------------------- If your computer displays the following message: System Detection Your computer uses a BIOS that could lead to data loss if you run Windows Me. Please update the BIOS before installing Windows Me. For more information, contact your computer manufacturer. You can still install Windows Me by following the procedure below. NOTE: Microsoft takes no responsibility for any damage that may result from this operation. 1. Copy the contents of the Windows Me CD-ROM to your hard disk. 2. At the Command prompt, type: extract precopy2.cab msdet.inf 3. At the command prompt, type: edit msdet.inf 4. On the Search menu, select Find. 5. In the Find What box, type: [BadDSBios] 6. Select Find Now. 7. Insert a semicolon before each of the two lines following the [BadDSBios] heading. 8. Save your changes, and then run Setup again. APPLETS ======== HyperTerminal: Known Problems and General Information ----------------------------------------------------- - When it receives a file, HyperTerminal cannot determine whether the disk is full.
    [Show full text]
  • Red Hat Enterprise Linux 3 Installation Guide For
    Red Hat Enterprise Linux 3 Installation Guide for the x86, Itanium™, and AMD64 Architectures Red Hat Enterprise Linux 3: Installation Guide for the x86, Itanium™, and AMD64 Ar- chitectures Copyright © 2003 by Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhel-ig-x8664-multi(EN)-3-Print-RHI (2003-07-25T17:10) Copyright © 2003 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. Intel and Pentium are a registered trademarks of Intel Corporation. Itanium and Celeron are trademarks of Intel Corporation. AMD, Opteron, Athlon, Duron, and K6 are registered trademarks of Advanced Micro Devices, Inc.
    [Show full text]
  • Software Libre Vs Software Propietario Ventajas Y Desventajas
    Software libre vs software propietario Ventajas y desventajas Culebro Ju´arez, Montserrat. G´omezHerrera, Wendy Guadalupe. Torres S´anchez, Susana. M´exico,Mayo 2006. ii ´Indice general Agradecimientos. VII Pr´ologo. IX Introducci´on. 1 1. Conceptos fundamentales sobre software. 3 1.1. Definici´onde software. 3 1.2. Definici´onde software libre. 3 1.3. Definici´onde software propietario. 4 1.3.1. Software propietario. 4 1.3.2. Objeciones al t´ermino “propietario”. 5 1.3.3. Software privativo. 5 1.3.4. Objeciones al t´ermino “privativo”. 5 1.3.5. Software no libre. 5 1.3.6. Objeciones al t´ermino “no libre”. 5 1.3.7. Software privado. 5 1.3.8. Objeciones al t´ermino “privado”. 6 1.3.9. Software con propietario. 6 1.3.10. Objeciones al t´ermino “con propietario”. 6 1.4. Software semilibre. 6 1.5. Freeware. 6 1.6. Shareware. 7 1.7. Abandonware. 7 1.8. Warez. 7 2. Visi´onhist´oricadel software. 9 2.1. La importancia del software. 9 2.2. Incursi´onde los hackers. 10 2.3. La cultura Unix. 10 2.4. GNU. 11 2.5. Libertad y costo. 12 2.6. Linux. 12 2.7. Open Source (c´odigoabierto). 14 2.8. El papel del software libre en el crecimiento de Internet. 14 2.9. Formatos abiertos. 15 2.10. Visi´onhist´oricadel Software propietario (Microsoft). 15 iii 3. Copyright, copyleft y patentes. 17 3.1. Copyright. 17 3.1.1. Derecho de autor y Copyright. 17 3.1.2. El contrato de copyright.
    [Show full text]
  • The Need for Hands-On IT Classes Honors Thesis I by Jeff Squibb I I I I I I I I I I I I I I Hands-On IT 2
    Southern Illinois University Carbondale OpenSIUC Honors Theses University Honors Program 5-2000 The eedN For Hands-On IT Classes Jeffery L. Squibb Southern Illinois University Carbondale Follow this and additional works at: http://opensiuc.lib.siu.edu/uhp_theses Recommended Citation Squibb, Jeffery L., "The eN ed For Hands-On IT Classes" (2000). Honors Theses. Paper 139. This Dissertation/Thesis is brought to you for free and open access by the University Honors Program at OpenSIUC. It has been accepted for inclusion in Honors Theses by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. I Hands-On IT 1 I I I I The need for Hands-On IT Classes Honors Thesis I By Jeff Squibb I I I I I I I I I I I I I I Hands-On IT 2 I Contents I Abstract 5 Hands On Classes for Sill 6 I History Of the Internet 6 IT Employment Outlook 7 The gap between supply and demand 8 I The hottest. most in demand jobs 9 The skills workers need to grab one ofthese hot jobs 9 The best ways for workers to acquire these skills 10 I Hands On Classes 13 The Internet Future 15 SIU Benefits 16 I ELM 415 Advance Telecommunications Class Structure 16 Master Syllabus 17 ELM Independent Study - Advanced Telecommunications Presentation Outline 23 I Cisco 2503 Router Configuration 25 3ComImpact 10 EXTERNAL ISDN MODEM 32 Installing Windows NT Server 4.0 41 I Beginning Installation 41 What You Should Know Before Running Setup 41 System Requirements 43 I Starting Setup 43 Configuring a Mass Storage Device 45 Verifying Your Hardware 45 I
    [Show full text]
  • DATA BUS Deadline (7Th Day After Meeting)
    Official Newsletter SouthEastern Michigan Computer Organization, Inc. Volume 28 August, 2003 Number 8 IN THIS ISSUE MEETINGS SCHEDULE ............................................................................................... 3 Deals Column, by Bob (The Cheapskate) Click ...................................................... 3 Windows Upgrade Options, by Michael Horowitz .................................................. 5 SPAM—Bane Of The Internet, by Ira Wilsker ........................................................ 11 LCD Monitors, by Tom Zinneman ........................................................................... 13 Right Click, Try It—You May Like It, by Les J. Kizer ............................................ 15 Hunt For The Lost Font, by Mick Topping ............................................................. 16 A Windows Tip From Elliott Chandler .................................................................... 17 Natural Mousing: Vertical Mouse Optical, A Review by Linda Webb ................. 18 Sony Digital Camera, A Review, by Bill Moeller .................................................... 18 Network Basics, Broadband Routers, by John Woody & Michael Espinoza .... 20 What Is A CPU, by Lee Alexander ........................................................................... 23 Ultimate Backup—Part 2, by Warner Mach ............................................................ 25 Security Testing Online—Fraud Or Not, by Greg West ........................................ 27 The Windows Registry Demystified,
    [Show full text]