Data Protector Express User Guide.pdf
(
1139 KB
)
Pobierz
Data Protector Express
User Guide
Abstract
This document provides information for system administrators who are using Data Protector Express to backup or restore data,
and configure Data Protector Express to work with other applications.
HP Part Number: TC330-96005
Published: August 201
1
Edition: First
© Copyright 201 Hewlett-Packard Development Company, L.P.
1
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.21 and 12.212, Commercial
1
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
Acknowledgments
Microsoft®, Windows®, Windows® XP, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
UNIX® is a registered trademark of The Open Group.
Contents
1 Overview..................................................................................................5
Concepts.................................................................................................................................5
A Simple, Immediate Backup......................................................................................................7
Restore to a Different Location....................................................................................................8
2 Administering Backup...............................................................................10
Using the Administrator...........................................................................................................10
Using Quick Access from Taskbar.............................................................................................12
About the Data Protector Express Service...................................................................................14
3 Configuring Backup Jobs...........................................................................16
Selecting Files........................................................................................................................16
Selecting Devices....................................................................................................................16
Encryption.............................................................................................................................17
Configuration.........................................................................................................................17
Advanced Settings..................................................................................................................21
4 Configuring Restore and Verify Jobs............................................................23
Selecting Files........................................................................................................................23
Selecting Devices....................................................................................................................25
Configuration.........................................................................................................................25
Advanced Settings..................................................................................................................25
5 Working With Devices..............................................................................28
Selecting Devices for Jobs........................................................................................................28
Device Properties....................................................................................................................28
Device Commands..................................................................................................................29
Working with Tape Libraries.....................................................................................................32
Sharing storage devices on a SAN...........................................................................................34
6 Scheduling, Rotations, and Media Management...........................................35
Backup Schedule Considerations..............................................................................................35
Scheduling Concepts..............................................................................................................36
Media Rotation Types..............................................................................................................38
Running Jobs with Rotations.....................................................................................................39
7 Encryption and Compression......................................................................40
8 Working with Third-Party Applications.........................................................43
Microsoft Exchange Server.......................................................................................................43
Configuring a Microsoft Exchange Server..............................................................................43
Backing up Microsoft Exchange Server.................................................................................44
Restoring Microsoft Exchange Databases..............................................................................45
Disaster Recovery with Microsoft Exchange Server..................................................................46
Mailbox Backup and Recovery............................................................................................47
Working with Microsoft SQL Server...........................................................................................49
Microsoft SQL server concepts.............................................................................................50
Configuring the Microsoft SQL Server...................................................................................50
Backing up Microsoft SQL Server.........................................................................................51
Microsoft SQL Server Databases and the backup mode......................................................52
Using Data Protector Express with SQL Server’s Backup Routine...........................................52
Restoring Microsoft SQL Server............................................................................................52
Restoring Microsoft SQL Server user databases......................................................................53
Restoring Microsoft SQL Server master databases...................................................................54
Restoring Microsoft SQL Server 2000 master databases..........................................................54
Contents
3
Restoring Microsoft SQL Server 7 master databases................................................................58
Protecting Microsoft Windows SharePoint Services......................................................................62
Windows SharePoint Services protection concepts..................................................................62
Protecting Windows SharePoint Services ..............................................................................62
Restoring SharePoint Services...............................................................................................63
Using Disaster Recovery with Windows SharePoint Services.....................................................64
Working with Certificate Services.............................................................................................64
9 Disaster Recovery.....................................................................................65
Preparing For a Disaster..........................................................................................................66
Recovering From a Disaster......................................................................................................69
Limitations.............................................................................................................................72
10 Backup Domain Configuration .................................................................73
1 Advanced Job Options............................................................................75
1
12 Support and other resources.....................................................................79
Contacting HP........................................................................................................................79
Related information.................................................................................................................79
Websites..........................................................................................................................79
Typographic conventions.........................................................................................................79
Documentation feedback.........................................................................................................80
Index.........................................................................................................81
4
Contents
1 Overview
CAUTION:
Data Protector Express security is disabled at installation to simplify the evaluation
process. When installing the product in a production environment HP recommends, at a minimum,
that you set a user password for the Admin user. Doing so will result in the Administrator prompting
the user for a password before starting. See
“Setting a User Password”
for details.
Concepts
Data Protector Express is designed to operate within your existing network to protect your vital
data. Each
machine
that will be protected must have Data Protector Express installed. One machine
acts as the Domain Server which houses the
catalog
and establishes a
Backup Domain.
Other
machines become
clients
of the
Backup Domain
by identifying themselves as clients of the Domain
Server during installation.
Data Protector Express can back up data from clients over a network to a backup device attached
to a remove machine. A client with an attached device acts as a
Media Server.
When a machine is being backed up or restored it is operating the client role. When it is providing
access to a backup device it is operating as a Media Server. And when a machine is hosting the
catalog it is operating as the Domain Server. A single machine can operate in one or more roles
at the same time.
Data on client machines is read and written with
agents
such as the File System, Windows System
State, Microsoft SQL, and Microsoft Exchange agents. The configuration of agents is done on a
client by client basis.
A typical installation of Data Protector Express is shown in
Figure 1 (page 5).
Figure 1 Basic Architecture
Terminology
The following terms are used throughout this document ...
•
Clients—
A client is any computer (or
Machine)
in the Backup Domain other than the Domain
Server. This includes file servers, application servers, and user PCs (desktops and laptops).
All client computers must have Data Protector Express installed. For licensing purposes, clients
are classified as being
server
or
workstation
class machines. All clients are considered to be
server class clients unless they are running Windows XP, Vista, or Windows 7.
Backup Domain—
A Backup Domain is a collection of computers and backup devices that is
managed together as a group. A Backup Domain can encompass an entire company or each
Concepts
5
•
Plik z chomika:
odon77
Inne pliki z tego folderu:
hp_data_protector_cell_manager_part_2_of_2.mp4
(42893 KB)
Data_Protector.mp4
(28092 KB)
HP_data_protector_cell_manager_part_1_of_2.mp4
(13704 KB)
Concepts.pdf
(5151 KB)
HP_Data_Protector_Best_Practice_Guide_enu.pdf
(5245 KB)
Inne foldery tego chomika:
3COM 4400
Aruba 2530
HP 5120
HP 5130
HP ProCurve
Zgłoś jeśli
naruszono regulamin