Title Page. for version 7.4 NVE A 11/21-05

Size: px
Start display at page:

Download "Title Page. for version 7.4 NVE A 11/21-05"

Transcription

1 itle Page for version 7.4 NVE A 11/21-05

2 Copyrights Software Copyright 2005 BakBone Software NetVault Configurator Guide (for Version 7.4) Documentation Copyright 2005 BakBone Software his documentation and its associated software product are copyrighted and all rights are reserved. he distribution and sale of this product are intended for the use of the original purchaser only per the terms of the License Agreement. All other product trademarks are the property of their respective owners. his document may not, in whole or part, be copied, photocopied, reproduced, translated, reduced or transferred to any electronic medium or machine-readable form without prior consent in writing from BakBone Software. HIS PUBLICAION IS PROVIDED AS IS WIHOU WARRANY OF ANY KIND, EIHER EXPRESS OR IMPLIED, INCLUDING, BU NO LIMIED O, HE IMPLIED WARRANIES OF MERCHANABILIY, FINESS FOR A PARICULAR PURPOSE, OR NON-INFRINGEMEN. HIS PUBLICAION COULD INCLUDE ECHNICAL INACCURACIES OR YPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED O HE INFORMAION HEREIN; HESE CHANGES WILL BE INCORPORAED INO NEW EDIIONS OF HE PUBLICAION. BAKBONE SOFWARE MAY MAKE IMPORVEMENS AND/OR CHANGES IN HE PRODUC(S) AND/OR HE PROGRAM(S) DESCRIBED IN HIS PUBLICAION A ANY IME. BakBone Software 9540 Pacific Heights Drive, Suite 100 San Diego, California

3 able of Contents Section 1: Introduction Chapter 1: Introduction 7 About the NetVault Configurator he NetVault Step Methodology Accessing the NetVault Configurator Layout of the NetVault Configurator echnical Support Helpdesk Support Lines BakBone Software s Web Site Section 2: Functions in the NetVault Configurator Chapter 2: he Configurator abs 17 he abs of the NetVault Configurator he Auditing ab he Device Scan ab he Encryption ab he Firewall ab he General ab he GUI ab he Job Manager ab he Language ab he License ab he Logging Daemon ab he Machine ab he Media Manager ab he Network Manager ab he Notification ab he Packages ab he Plugin Options ab he Process Manager ab... 53

4 iv able of Contents - he Reporting ab he Schedule Manager ab he Security ab he Service ab he ime Sync ab he race Level ab he Verify ab...69 Section 3: he Remote Configurator Chapter 3: he Remote Configurator 73 he Remote Configurator Accessing the Remote Configurator Using the Remote Configurator...76 Index 77

5 SECION 1: Introduction

6

7 Chapter 1: Introduction About the NetVault Configurator he NetVault Step Methodology Accessing the NetVault Configurator a - Executing from Linux and UNIX-based Operating Systems b - Executing from Windows-based Operating Systems c - Accessing the Configurator Remotely Layout of the NetVault Configurator a - he Configurator s Buttons - OK, Cancel and Apply echnical Support Helpdesk Support Lines BakBone Software s Web Site... 13

8 8 Chapter 1 Introduction

9 1.0.0 About the NetVault Configurator NetVault : Backup Configurator Guide 9 he NetVault Configurator serves as a tool allowing for the configuration of various NetVault operations. he Configurator is made available, regardless of the type of NetVault installation performed (e.g., Client or Server) and functions independently of the NetVault Graphical User Interface (GUI). Important: It is recommended that options contained in the Configurator be changed only if an administrator is completely confident with the changes that may result, or under the guidance of BakBone echnical Support (for details on contacting Support, please see the section echnical Support on page 12) he NetVault Step Methodology Important: o create continuity in NetVault s documentation, a step by step approach is being utilized when referencing each guide used for the NetVault :Backup product. By adhering to this step by step process, you will find it easy to install and get up and running with NetVault. As displayed on the cover of this guide, this guide represents Step 4 in the NetVault process, which consists of the following four phases: Step 1: he NetVault : Backup Installation/Upgrade Guide - A guide that provides full instructions on installing and upgrading NetVault Step 2: he NetVault : Backup - Getting Started Guide - Basic instructions on getting up and running with NetVault Step 3: he NetVault : Backup - Administrator s Guide - Complete, comprehensive guide that outlines all functionary available in NetVault Step 4: he NetVault : Backup - Configurator Guide - his guide, which is dedicated to describing the functionality available in NetVault s companion utility, the NetVault Configurator 1. If you have not yet completed a step covered in an earlier guide of this step-by-step procedure, please refer to any earlier guide(s) and thoroughly review their contents before continuing on with this guide. 2. All of the guides outlined in the points above are included on the NetVault installation CD or they can be downloaded from BakBone Software s web site, by clicking on the NetVault link located on the following page:

10 10 Chapter 1 Introduction Accessing the NetVault Configurator With NetVault installed the Configurator is placed in the following directory:...\netvault\bin\nvconfigurator Important: If the installation of NetVault was an upgrade from a previous version, the NetVault directory will be accompanied by the previous installation s version number (e.g.,...\netvault6\bin\nvconfigurator.exe ) a Executing from Linux and UNIX-based Operating Systems he NetVault Configurator utility can be launched from a terminal session opened to any directory, by issuing the following command: nvconfigurator Important: If desired, an ampersand ( & ) can be set at the end of the nvconfigurator command in order to maintain an open prompt in the terminal session window b Executing from Windows-based Operating Systems he Configurator utility can be launched through two different methods in a Windows-based environment: From a Command Line erminal (DOS Prompt) 1. Navigate to the...\netvault\bin\nvconfigurator directory (where... represents the path to the NetVault installation) 2. Run the nvconfigurator.exe executable file From the Start Menu Figure 1-1: Navigating the Start Menu in Windows 2000 to launch the NetVault Configurator 1. Access the Start menu. 2. From the Programs group, access the NetVault application group and select NetVault Configurator.

11 NetVault : Backup Configurator Guide c Accessing the Configurator Remotely It is also possible to access the Configurator remotely from another installation of NetVault (e.g., from the NetVault Server, the Configurator installed for an added client can be accessed). For complete details on this, please see Section 3: he Remote Configurator beginning on page Layout of the NetVault Configurator Figure 1-2: he NetVault Configurator window, with the Machine tab accessed (default) he NetVault Configurator is set up in a single window consisting of three rows of selectable tabs. hese tabs pertain to various areas of NetVault and in order to access a tabbed section, simply click on it to view the options available. As a tab is selected in the Configurator, it will be pulled to the front to reveal its options and be moved to the front row of available tabs so that all other tabs in this window remain selectable a Figure 1-3: he OK, Cancel and Apply buttons he Configurator s Buttons - OK, Cancel and Apply At the bottom of the Configurator s window, three buttons can be found. hese buttons are consistent, regardless of the current tab selection. hey are used once settings have been made in order to activate or cancel them. Each button serves a specific purpose, as explained below: OK - Select this button in order to enable any current settings and close the Configurator. It is important to note that the Configurator application will close when OK is selected. Cancel - Select this button in order to abort any changed settings in the currently active tab and close the Configurator. As with the OK button, it is important to note that selecting Cancel will close the Configurator.

12 12 Chapter 1 Introduction Apply - Select this button in order to enable any current settings and remain in the Configurator. Important: Many settings made in the Configurator require the manual starting and stopping of NetVault Services in order for them to take affect. herefore it is recommended that as a setting is changed here, these Services be stopped and re-started For complete details on starting/stopping NetVault Services, see the section he Service ab on page echnical Support BakBone Software is dedicated to providing friendly, expert advice to NetVault customers. Our highly trained professionals are available to answer questions, offer solutions to problems and generally help make the most of any NetVault purchase. Log on to our web site, or contact our Helpdesk, for more information Helpdesk Support Lines Region North America Europe China Korea Contact elephone BONE (2663) support@bakbone.com elephone support@bakbone.co.uk elephone support@bakbone.com.cn elephone koreasupport@bakbone.com

13 NetVault : Backup Configurator Guide 13 Region Asia/Pacific Rim Contact elephone Multiple offices exist in our Asia, Pacific Rim district. Please contact the closest support office for assistance: Japan Office: support@bakbone.co.jp South Pacific Office: anzsupport@bakbone.com India Office: indiansupport@bakbone.com Southeast Asia Office: aseansupport@bakbone.com BakBone Software s Web Site BakBone s web site can be reached at the following address:

14

15 SECION 2: Functions in the NetVault Configurator

16

17 Chapter 2: he Configurator abs he abs of the NetVault Configurator he Auditing ab he Device Scan ab he Encryption ab he Firewall ab a - Example Firewall Configuration b - Requirements for Firewall Setup c - he NDMP Port Fields he General ab he GUI ab a - he Refresh Rates Sub-ab b - he Colors Sub-ab c - he Jobs Sub-ab d - he Logging Sub-ab e - he Devices Sub-ab f - he Browser Sub-ab he Job Manager ab he Language ab a - he Font Sub-ab b - he Display Sub-ab c - he Locale Sub-ab he License ab he Logging Daemon ab he Machine ab he Media Manager ab he Network Manager ab a - he imeouts Sub-ab b - he Connections Sub-ab c - he Options Sub-ab he Notification ab a - he Mail Server Sub-ab b - he Global Notification Sub-ab c - he Default Printer Sub-ab... 49

18 18 Chapter 2 he Configurator abs he Packages ab he Plugin Options ab a - he Disk Devices Plugin Sub-ab b - he Duplicate Sub-ab c - he Filesystem Plugin Sub-ab he Process Manager ab he Reporting ab a - he HML ext Output Sub-ab b - he Plain ext Output Sub-ab c - he CSV Output Sub-ab d - he Misc Sub-ab e - he Stats Collection Sub-ab f - he Stats Provision Sub-ab g - he ables Sub-ab he Schedule Manager ab he Security ab he Service ab a - Starting/Stopping NetVault Services he ime Sync ab he race Level ab a - race Level Options b - race Level Settings c - Enabling racing he Verify ab... 69

19 2.0.0 he abs of the NetVault Configurator Important: NetVault : Backup Configurator Guide 19 his chapter covers each tab of the NetVault Configurator, alphabetically based on its title, with a description of its use as well as detailed information pertaining to all options and settings. 1. Prior to making changes to any settings located here, it is recommended that the section he Configurator s Buttons - OK, Cancel and Apply of Chapter 1 on page 11 be reviewed. 2. Many settings made in the Configurator require the manual starting and stopping of NetVault Services in order for them to take affect. herefore it is recommended that as a setting is changed here, these Services be stopped and re-started For complete details on starting/stopping NetVault Services, see the section he Service ab on page he Auditing ab Figure 2-1: he location of the Auditing tab when the Configurator is launched Figure 2-2: he options available from the Auditing tab NetVault s Access Control functionality is controlled through the Auditor. he Auditor only runs on the NetVault Server and its process is relatively simple -- when an action requiring authorization occurs in NetVault, the Auditor is asked for permission. If the proper authority has been granted to run the requested action, the Auditor will clear it, otherwise access will be denied. he Auditor records a list of these attempts and provides an Audit rail. he Auditing tab of the Configurator allows an administrator to set the level of records maintained in this Audit rail for all User Accounts. As well, this Audit rail can be viewed via a Report generated using NetVault s Reports window (see Chapter 12: he Reports Window of the NetVault : Backup - Administrator s Guide for details on reporting). Only Record Failed Requests in the Audit rail Select this option in order to only record requests to the audit trail that have failed. At default, this option is de-selected and all requests to an audit trail are recorded. Purge ype - this menu allows for the selection of the desired type of purge for existing Audit rail requests. hree selections are available:

20 20 Chapter 2 he Configurator abs c c c None - When selected, the Audit rail will not be purged. By Size - Audit rail entries will be purged according to size, largest first. By Age - Audit rail entries will be purged according to date, oldest first. Purge when rail Exceeds (mb) - Set the maximum allowable size of the Audit rail before purging will begin. Once reached, purging will begin. Important: In order for a setting made in this field to take place, By Size must be selected from the Purge ype field. Purge Entries hat Are Older han (days) - Set a number value in this field equal to the age of an Audit rail entry to be purged. Once an Audit rail entry reaches this age, it will be purged. Important: In order for a setting made in this field to take place, By Date must be selected from the Purge ype field. ime Interval Between Purges (hours) - Set a time value, in hours in this field that will serve as a schedule for Audit rail purges he Device Scan ab Figure 2-3: he location of the Device Scan tab when the Configurator is launched Figure 2-4: he option available from the Device Scan tab his tab allows an administrator to set the desired type of device(s) scanned for by a NetVault machine. he following option is available: Scan for Devices at Start of Day - Select the desired type of device that NetVault is to scan for via NetVault s Automatic Device Configuration, at the point in time NetVault Services are started. he following selections are available: c Both (default) - With this option selected, the NetVault Server will scan for both libraries and standalone drives that are available for addition. c Drives - With this option selected, the NetVault Server will only scan for standalone drives that are available for addition. c Libraries - With this option selected, the NetVault Server will only scan for standalone drives that are available for addition.

21 NetVault : Backup Configurator Guide 21 c Neither - With this option selected, the NetVault Server will not scan for available devices at start of day he Encryption ab Figure 2-5: he location of the Encryption tab when the Configurator is launched Figure 2-6: he options available in the Encryption tab his tab houses all of the options made available with an installation of NetVault s Encryption Plugin, which is used for data encryption during backup and restore operations. With NetVault version 7.4 (and later), this plugin is installed by default. Important: Complete information on the use of this plugin and these options is outlined in Chapter 21: he Encryption Plugin of the NetVault : Backup - Administrator s Guide. Please thoroughly review this chapter before attempting to set any of the options available in this tab of the Configurator he Firewall ab Figure 2-7: he location of the Firewall tab when the Configurator is launched his tab is used to specify the port or range of ports NetVault will use for its message channels, data transfer channels and broadcast channels. Various fields pertaining to necessary ports are provided in this tab. Values can be input in one or a combination of two forms: Range - A range of ports can be input, separated by a dash ( - ). All ports within this range will be included (e.g., ). List - Individual ports can be input in a field separated by a comma (, ), in order to include a non-sequential list of necessary ports (e.g., 20044,20049).

22 22 Chapter 2 he Configurator abs Figure 2-8: he options available from the Firewall tab a Combination - Both of the above mentioned formats can be input into a single field in order to include all necessary ports (e.g., ,20049,20054) Valid ports can be input into the following fields: Valid Listen Ports for Devices Valid Connect Ports for Devices Valid Listen Ports for Message Channels Valid Connect Ports for Message Channels Valid Connect Ports for NDMP Control Channels Valid Listen Ports for NetVault NDMP Data Channels Valid Connect Ports for Inter-Machine Connection Setup Example Firewall Configuration As an example for properly configuring Firewall Support, use the instance of a NetVault Server with a four drive library directly attached and a single NetVault Client added. he Firewall tab is accessed from the Configurator and valid port values need to be input in the displayed fields. Important: Configuration must be completed on both the NetVault Server and all associated NetVault Clients. Methods for Inputting Port Values One of two methods for the designation of port values can be used: Input Individual Ports/Ranges - Comma-separated lists and/or ranges of ports can be input in the necessary fields in order to meet a required amount (i.e., if the field requires 10 ports, a combination of ranges and comma-separated port values can be input to equal 10). With this method, some fields require input while the remaining ones are left blank. Input a Broad Range of Ports - A large range of port values can be input in all fields of the tab. As a port is required, it will be taken from this range, leaving the others available. When using this method all field in the Firewall tab must contain this ranged entry.

23 NetVault : Backup Configurator Guide 23 Configuration on the NetVault Server Figure 2-9: One of two methods can be used to configure firewall settings for the NetVault Server, a) Valid ports individually input in specific fields (as highlighted), or b) A range, encompassing all valid ports is input in each field For the proper configuration of the NetVault Server, at least the following fields must have port values input accordingly: Valid Listen Ports for Devices - wo ports would need to be designated per drive contained in the NetVault Server s attached device (i.e., the device attached has four drives. herefore, at least eight ports would need to be designated in this field). Valid Connect Ports for Message Channels - wo ports would need to be input per active job that will run, as well as one additional (i.e., if it is decided that NetVault will be enabled to run up to three jobs at a single time, at least six ports would need to be input in this field as well as one additional one, totalling seven). Valid Connect Ports for Inter-Machine Connection Setup - A minimum of two ports per client used should be input in this field (i.e., this example provides for only one NetVault Client, therefore two ports would be input). Configuration on the NetVault Client For the proper configuration of the NetVault Client, the following fields must have port values input accordingly:

24 24 Chapter 2 he Configurator abs Figure 2-10: One of two methods can be used to configure firewall settings for a NetVault Client, a) Valid ports individually input in specific fields (as highlighted), or b) A range, encompassing all valid ports is input in each field Valid Connect Ports for Devices - wo ports would need to be designated per drive contained in the device to be used by this NetVault Client (i.e., the device to be used has four drives. herefore, at least eight ports would need to be designated in this field). Valid Listen Ports for Message Channels - wo ports would need to be input per active job that will run, as well as one additional (e.g., if it is decided that NetVault will be enabled to run up to three jobs at a single time, at least six ports would need to be input in this field as well as one additional one, totalling seven). Valid Connect Ports for Inter-Machine Connection Setup - A minimum of two ports per client used should be input in this field (i.e., this example provides for only one NetVault Client, therefore two ports would need to be input). Important: he port values input for the NetVault Server do not need to match those input for the NetVault Client, although it is possible to do so. It is recommended that this practice be followed in order to limit the number of open ports in a firewall.

25 NetVault : Backup Configurator Guide b Requirements for Firewall Setup A firewall's filtering rules must be set up in accordance with the rules stated in the following table (e.g., they must be set to allow NetVault messages to pass through). he port variables refer to the variables specified in the NetVault Configurator. From... o... Protocol Source Port Destination Port Server Client CP Valid Connect Ports for Inter-machine Connection Setup (as specified on the NetVault Server) Client Server CP Valid Connect Ports for Inter-machine Connection Setup (as specified on the NetVault Server) Server Client CP Valid Connect Ports for Message Channels (as specified on the NetVault Server) Client Server CP Valid Listen Ports for Message Channels (as specified on NetVault Client) Server Client UDP Client Server UDP Server Client CP Valid Listen Ports for Devices (as specified on the NetVault Server) Client Server CP Valid Connect Ports for Devices (as specified on the NetVault Client) Valid Listen Ports for Message Channels (as specified on NetVault Client) Valid Connect Ports for Message Channels (as specified on the NetVault Server) Valid Connect Ports for Devices (as specified on the NetVault Client) Valid Listen Ports for Devices (as specified on the NetVault Server) Important: 1. All of the configurations displayed in the table above presume that the NetVault Server will not be Domain Controlled by a NetVault Client; if this is required, more ports will be needed by NetVault. 2. A Firewall must not be using NA (Network Address ranslation) / IP Masquerading.

26 26 Chapter 2 he Configurator abs c he NDMP Port Fields wo fields are offered in this tab that are used for the configuration of firewall support in an NDMP environment. In the event that an NDMP-enabled device (e.g., a NAS device) exists outside of a firewall and it is configured as a SmartClient (i.e., it has a locally attached device that backups of its data will be sent to), port values must be input in the following fields to allow access to the device by the Netvault Server. Valid Connect Ports for NDMP Channels - At least two ports would need to be designated per active job that will run from the NAS device as well as one additional (e.g., with the NetVault Server administering jobs of the NAS Device to its locally attached backup device, three ports would need to be designated for each individual job to be run. o run two jobs concurrently, at least six ports would need to be designated in this field, etc.). Valid Listen Ports for NetVault NDMP Data Channels - wo ports would need to be designated per data channel in use by the NetVault Server to communicate, via NDMP protocol with the NAS device he General ab Figure 2-11: he location of the General tab when the Configurator is launched As its name states, the General tab of the Configurator allows an administrator to set and configure several general options pertaining to NetVault. he following options are available: Generate Debugging Files - When enabled, trace files will be generated for all NetVault processes. hese files are recorded and placed in a trace directory in the root of the NetVault directory. races are used by BakBone echnical Support for the purpose of troubleshooting and recording necessary information. Important: As trace files are only required by BakBone echnical Support, it is recommended that this setting be left at its default of de-selected unless instructed otherwise by a BakBone echnical Support representative. Use BakBone ime in Debugging Files (default selected) - When the Generate Debugging Files option is selected and trace files are generated any necessary time values will be based on the current setting for BakBone

27 NetVault : Backup Configurator Guide 27 Figure 2-12: he options available from the General tab time (see the section he ime Sync ab on page 66 for more details on BakBone ime). Lines per race File (x 1000) 0 = Do Not Split - Input a value in this field equal to the number of total lines to be included per trace file. If left at the default of zero ( 0 ), traces will not be split into individual files. race Files to Keep per Session (0 = Keep All) - Input a value in this field to serve as the total number of trace files that will be kept per process. It only serves a purpose if a value other than zero (0) is input in the Lines per race File field. Database Directory - At default, this field will contain the installation directory for the NetVault Database (as defined during the NetVault installation process). If this directory is ever moved, the path to its new destination must be input here. race Directory - his field contains the exact path to the directory NetVault will store trace files as they are generated (default =...NetVault\trace ). Log Directory - his field contains the exact path to the directory NetVault will store log files as they are generated (default =...NetVault\logs ). emporary Directory - his field contains the exact path to the directory NetVault will store temporary files as they are generated (default =...NetVault\tmp ). Reports Directory - his field contains the exact path to the directory NetVault stores the components used to generate reports as well as actual generated reports that have been saved (default =...NetVault\reports ). Statistics Directory - his field contains the exact path to the directory NetVault stores gathered statistical data (default =...NetVault\stats ). Language Selection - his pull-down menu allows the user to select the language items will be displayed in NetVault (in both the Configurator and NetVault GUI).

28 28 Chapter 2 he Configurator abs Minimum Network Send Buffer Size (Kb): Controls the minimum size of kernel memory NetVault can use to buffer data on network sockets. If the minimum buffer size is increased, performance may increase. Maximum Network Send Buffer Size (Kb): Controls the maximum size of kernel memory NetVault uses to buffer data on network sockets. If the buffer size is decreased, the reliability of the connection may be increased. Minimum Network Receive Buffer Size (Kb): Controls the size of the receive buffer. See minimum send buffer for further explanation. Maximum Network Receive Buffer Size (Kb): Controls the size of the receive buffer. See maximum send buffer for further explanation. Package Install System Check: When enabled, NetVault checks the installed packages and makes sure they are for the operating system the package requires. For instance, if you attempt to install a Solaris package on a Windows machine a warning message appears he GUI ab Figure 2-13: he location of the GUI tab when the Configurator is launched Figure 2-14: he sub-tabs available from the GUI tab a Figure 2-15: he Refresh Rates sub-tab of the GUI tab, with all of its available options his tab allows an administrator to set various options pertaining to the NetVault GUI. his tab is broken down in to six sub-tabs, all containing various options. he Refresh Rates Sub-ab Options in this tab allow an administrator to control the speed at which the screen is updated in the NetVault GUI to reflect changes in NetVault. he lower the number setting, the faster the refresh rate and vice versa.

29 NetVault : Backup Configurator Guide 29 Important: While lower values will result in a faster refresh rate, CPU usage is increased, thereby increasing its load. Decrease these values only if increasing a machine s CPU load is not an issue. As well, setting lower values in these fields may increase network traffic and negatively affect the NetVault GUI running from a remote machine. Job Refresh Rate in Milliseconds - he rate of screen update for the NetVault Jobs window. Device Refresh Rate in Milliseconds - he rate of screen update for the NetVault Device Management window. Policy ree Refresh Rate in Milliseconds - he rate of screen update for data displayed in the tree in the NetVault Policy Management window. Job Monitor Refresh Rate in Milliseconds - he rate of screen update for the Job Monitor window. Operator Messages Refresh Rate in Milliseconds - he rate of screen update for the Operator Messages window b Figure 2-16: he Colors sub-tab of the GUI tab, with all of its available options he Colors Sub-ab his sub-tab allows an administrator to change the highlight color indicators which define the three states of NetVault Jobs (e.g., jobs displayed in the Job Status frame of the Status window of the NetVault GUI are highlighted with one of three colors, indicating its current status). Values input in these fields are to be valid RGB numerical references (0-255), each prefaced with the proper color tag and separated by a space (e.g., R255 G10 B105). Color of Scheduled Jobs (RGB) - Values input in this field will determine the color that will highlight all scheduled jobs in the various windows of NetVault (default = light blue). Color of Running Jobs (RGB) - Values input in this field will determine the color that will highlight all currently running jobs in the various windows of NetVault (default = yellow). Color of Completed Jobs (RGB) - Values input in this field will determine the color that will highlight all completed jobs in the various windows of NetVault (default = white).

30 30 Chapter 2 he Configurator abs c Figure 2-17: he Jobs subtab of the GUI tab, with its available option d Figure 2-18: he Logging sub-tab of the GUI tab, with its available options displayed he Jobs Sub-ab his sub-tab contains a single option pertaining to the use of a target set when performing a duplication. Permit Duplicate Phase with no arget Set - A target set is required for duplicate media unless this option is selected to override it. If multiple duplication jobs claim all the drives to read the source media, there will be no drives available for the target media. o prevent a deadlock situation when using the same target for all your duplicates, leave this option cleared. he Logging Sub-ab his sub-tab allows an administrator to set various options pertaining to logging and log viewing in NetVault. he following options are available: Maximum Log Messages in Log Window - A log message entry displayed in the NetVault GUI uses system memory and time. Use this option to set an upper limit of log messages displayed by the NetVault GUI for the purpose of preserving system resources (e.g., If no value exists, or too high of one is set, system resources will be dramatically impacted while NetVault attempts to display too many log files, thereby delaying the GUI and possibly locking up the system). Disable Logs Screen - Select this option to prevent remote users from accessing the Logs window of the NetVault Server. When accessing remotely, network traffic may be dramatically impacted while large amounts of log entries are transferred. Disable Displaying of Event Logs on Device Screen - Select this option to prevent a remote user from displaying log entries that are displayed in the Device Logs tab of the Device Management window on the NetVault Server. When accessing remotely, network traffic may be dramatically impacted while large amounts of device log entries are transferred.

31 NetVault : Backup Configurator Guide 31 Important: 1. A value used in regards to the Maximum Log Messages in Log Window field depends on the hardware configuration of the target machine (i.e., the more powerful the machine, the higher this value can be). 2. Settings made pertaining to these options override any permissions granted/denied per NetVault User Account (i.e., if log viewing is a privilege granted to a specific User Account and the Disable Logs Screen option is selected in the Configurator, this user will still not be able to view logs in the NetVault Logs window) e Figure 2-19: he Devices sub-tab of the GUI tab, with its available options displayed he Devices Sub-ab his tab allows an administrator to set various options pertaining to the Device Management tab of the NetVault GUI. he following options are available: Enable Automatic Device Scanning - When the Device Management window of NetVault is accessed, the Automatic Device Configuration utility is launched and the network is then scanned looking for specific device types that it can add to the NetVault Server for use. he field allows a user to select or limit what is scanned for when the Device Management window is accessed. Selectable items from this menu include: c Libraries (default) - NetVault will only scan for and attempt to add library devices. c Libraries and Drives - NetVault will scan for both qualifying library and standalone drives and attempt to add them. c Neither - Selecting this option will shut down Automatic Device Configuration and no devices will be scanned for or added. Number of Days of Device Logs - he value in this field represents the number of days that NetVault will display logs in the Device Logs tab. Log entries older than this value will be removed from the display, but not deleted (the purging of actual log files is controlled via the Logging Daemon tab, as explained in the section he Logging Daemon ab on page 35).

32 32 Chapter 2 he Configurator abs f Figure 2-20: he Browser sub-tab of the GUI tab, with its available options displayed he Browser Sub-ab his sub-tab offers fields that are used to input Web Browser-related information. his information is used by NetVault for the purpose of running its built-in online help system as well as for the display of HML-based reports on UNIX-based and Linux operating systems. UNIX Default Browser - he exact path to the browser software to be used UNIX Browser Switches - Any required switches used in the running of the browser software. Important: 1. In order to access NetVault s On-line Help System and view HML-based Reports, the correct path to the desired browser software must be input in the UNIX Default Web Browser field. 2. Windows-based machines need not input a value in either of these fields. 3. NetVault s On-line Help System/HML Report Viewer is currently only supported for UNIX based systems running a browser capable of displaying HML 4.01 and CSS 1 (e.g., Netscape Navigator 4.5 and later). 4. When the On-line Help System is initially launched or the first HML-based report is viewed, NetVault will launch a window requesting this same information. Once properly configured, these values will automatically appear in the fields of this sub-tab and be used for future requests g Figure 2-21: he Advanced sub-tab of the GUI tab he Advanced Sub-ab his sub-tab is comprised of a single option that allows an administrator to set the level of functionality revealed in the Configurator. Settings View Level - his option makes it possible to input a numeric value that will determine the level of options revealed for use in the Configurator. Important: It is highly recommended that this option be left at its default setting of 6, unless instructed to do otherwise by BakBone echnical Support.

33 NetVault : Backup Configurator Guide he Job Manager ab Figure 2-22: he location of the Job Manager tab when the Configurator is launched Figure 2-23: he options available from the Job Manager tab his tab allows an administrator to set values pertaining to job timeout values. Job Keep Alive Rate (in minutes) - Input the desired amount of time, in minutes, that NetVault is to maintain for the Job Keep Alive Rate. his setting determines how often Keep Alive Packets are sent between the job manager on a NetVault Server and a plugin running a job on a NetVault Client. During a large job, the job manager and plugin can go a long period time without talking to each other. hese Keep Alive Packets are then sent, at a time interval set here in order to maintain contact between the two and keep the job running. his can be helpful in an environment where a Firewall separates the connection between the two machines. Processes may be marked as idle and get closed if these Keep Alive Packets are not sent. Important: his field has been set up so that any value input less than 10 indicates that NO Keep Alive Packets are being sent. his has been done to keep network traffic at a minimum (e.g., too many Keep Alive Packets sent could potentially hamper network traffic) he Language ab Figure 2-24: he location of the Language tab when the Configurator is launched Figure 2-25: he sub-tabs available from the Language tab his tab allows an administrator to set various options pertaining to the language text in use in the GUI. his tab is broken down in to three sub-tabs, all containing various options.

34 34 Chapter 2 he Configurator abs Important: he options available in this tab pertain only to the use of non-english language versions of NetVault (e.g., the Japanese version). If using the English version of NetVault, any setting made here will not affect the display of NetVault as described. herefore, it is recommended that English-version users leave all options available at their default values a Figure 2-26: he Font subtab of the Language tab, with its available option b Figure 2-27: he Display sub-tab of the Language tab, with its available option c Figure 2-28: he Locale sub-tab of the Language tab, with its available option he Font Sub-ab his sub-tab offers the following option: Default GUI Font Point Size - he default point size used for the English version of NetVault is eight ( 8 ). he font used in the Japanese version of NetVault requires the use of a nine ( 9 ) point font for legibility. Change this value accordingly, based on the language version in use. he Display Sub-ab his sub-tab offers the following option: Display Date in Order DoW - Select this option to change the order that date information is displayed in the NetVault Logs from its default setting of Year/Month/Date to Date/Month/Year. he Locale Sub-ab his sub-tab offers the following option: Allow GUI to Change Locale - Once selected, this option permits the GUI to select the locale of the machine (i.e., Japanese if the machine NetVault is installed on is running a Japanese O/S). Some machines are required to run English-based applications, even though the machine is running a Japanese O/S. herefore, this setting can be used to inhibit the GUI from switching to non-english (i.e., by de-selecting this option).

35 NetVault : Backup Configurator Guide he License ab Figure 2-29: he location of the License tab when the Configurator is launched Figure 2-30: he option available from the License tab his tab offers two windows which detail licensing information pertaining to the current installation of NetVault. As well, this window can be used to input additional keys as they are obtained from BakBone echnical Support. Server Capabilities - his window displays information about the currently licensed capacities for this installation of NetVault. Serial Numbers of Applied Keys - Each key granted by BakBone echnical Support enables various use levels for the NetVault Software. Each key has its own unique serial number and as a key is installed, its accompanying serial number is displayed in this window. Add New Key - Use this field to input any keys granted by BakBone echnical Support he Logging Daemon ab Figure 2-31: he location of the Logging Daemon tab when the Configurator is launched he Logging Daemon is a NetVault process that maintains NetVault's log data. Logs present information about the NetVault system to an administrator, and can be viewed using the GUI. he Logging Daemon also performs a secondary minor

36 36 Chapter 2 he Configurator abs Figure 2-32: he options available from the Logging Daemon tab role of checking that the file systems on which NetVault is installed are not becoming too full. he following thresholds can be set from this tab: Disk Space Warning hreshold (percent full) - Specifies the percentage of space which can be used for the storage of logs generated by NetVault operations. his value applies to two directories pertaining to NetVault Operations -- the NetVault home directory and the NetVault Database directory -- and therefore, two checks are made. If this level has been reached when either check is made, the following items occur: c NetVault will Generate an Entry in the NetVault Logs - this entry will inform that free disk space is running low. c A NetVault Event will be Raised - hrough NetVault s Global Notification functionality, a pre-set Event will be raised informing that space is running low (e.g., a message issued via a Windows event viewer). Important: 1. If the disk space level set here is exceeded, the NetVault Database can be damaged. 2. It is strongly recommended that administrators check the log messages and apply appropriate measures to assure adequate free disk space. 3. his value pertains only to space available on the partition that NetVault is installed and not the hard disk as a whole (e.g., if set to 95%, when the partition NetVault is installed on reaches 95% capacity, a warning will be issued). Log file page size (Kb): A value entered here represents the size of each of the two preliminary log files that are created at the time NetVault is opened. Activity is logged to the first file until the allocated space in that file is used. When full, NetVault will create a third file of the same size and continue to log activity to the second file. Once this file is full, it will create a fourth file of the same size and then begin logging activity to the third, and so on. his process, referred to as Sparse Filing pre-allocates space for these files as they are created allowing for logging to continue to avoid the loss of any data.

37 NetVault : Backup Configurator Guide 37 Important: his process only allows for a short term solution for available disk space allocated for log files (i.e., the size of one additional log file page). herefore it is recommended administrators regularly monitor available hard disk space. Message Response Interval (in milliseconds) - When opening the NetVault Logs window, a dialog box will appear pertaining to the window s opening progress. he Cancel button in this dialog box allows a user to abort the log display process and exit this window. A value input in this field corresponds to the amount of time NetVault will attempt to process all of the log files and display them before revealing the Cancel button. Important: 1. Depending on the number of log files currently contained in the system, NetVault may process the request to open the window before this time interval has elapsed (i.e., fewer log files will result in the window opening faster). 2. Decreasing the response interval in this field will increase the speed at which the Cancel button is made available, but this may result in a loss of CPU performance. Outgoing Message Bundle Size - Rather than sending all NetVault log entries to the Logs window in one lump sum, these messages are sent in bundles to improve performance, the size of which is defined in this field. Minimum ime (in milliseconds) Between Progress Updates: NetVault offers a Progress dialog box that appears when individual log entries are opened. his dialog box displays the number of log messages loaded and this setting specifies how often this dialog box information is updated. Important: A setting made in this field applies to the same dialog box explained in the option, Message Response Interval (in milliseconds), above. Auto-Purge Method - As NetVault log files tend to take up large amounts of space as their numbers increase, this option allows an administrator to set a method for automatic purging of log entries in order to conserve disk space (i.e., new log entries will overwrite older ones, based on settings made). c None - When selected, no NetVault log entries will be purged. c Exceeds Number of Pages - Log entries will be purged when a specific number of log page files is reached (based on the value input in the Auto- Purge When the Number of Log Pages Exceeds field) In this case, the oldest files will be purged first. c Exceeds Log Age (default) - Individual log entries will be purged when they have reached a certain age (based on the value input in the Auto- Purge Entries hat are Older han (Days) field). Oldest files are purged first.

38 38 Chapter 2 he Configurator abs Auto-Purge When the Number of Log Pages Exceeds - Set the maximum allowable number of log file pages that will exist before auto-purging is to begin (e.g., if 10 was input, the first log file page would then be purged to make room for the 11th, etc.). Important: In order for a setting made in this field to take effect, Exceeds Number of Pages must be selected from the Auto-Purge Method field. Auto-Purge Entries hat are Older han (Days) - Set a maximum age value for log entries that once reached, auto-purging will occur (e.g., if 10 was input, once a log file reached 10 days old, it would then be purged to make room for additional new log files). Important: In order for a setting made in this field to take place, Exceeds Log Age must be selected from the Auto-Purge Method field. Select the ime Interval to Auto-Purge (hours) - Set a time value, in hours, in this field that will serve as a schedule for automatic log file purges. Minimum Warning Level to Send to System Log: his setting controls how much of the NetVault logs are sent to the operating system s logs. Usable values and the level of log messages displayed are shown in the table below: Value Log Message ypes Sent to System and Displayed 112 Severe Errors 96 Severe Errors and Errors 80 Severe Errors, Errors and Warnings 64 Severe Errors, Errors, Warnings and Startup Messages 48 Severe Errors, Errors, Warnings, Startup Messages and Job Messages 32 Severe Errors, Errors, Warnings, Startup Messages, Job Messages and Informational Messages 16 Severe Errors, Errors, Warnings, Startup Messages, Job Messages, Informational Messages and Background Messages 0 All Messages Important: Startup Messages refer to those which refer to progress results when performing an upgrade of NetVault.

39 NetVault : Backup Configurator Guide he Machine ab Figure 2-33: he location of the Machine tab when the Configurator is launched Figure 2-34: he information provided in the Machine tab of the Configurator his is the default tab accessed when the Configurator is launched. It offers information relevant to the current machine and its installation of NetVault. Machine Name - NetVault s name for the machine (as set when NetVault was originally installed) Machine ID - Identification number assigned to the local machine Network Name - his represents the name of the machine as established for networking purposes with the operating system IP Address - Local machine s Internet Protocol address Version - he version, build and release numbers for the currently installed version of NetVault O.S. Version - Name and version of the currently installed operating system Platform - he current platform of NetVault installed he Media Manager ab Figure 2-35: he location of the Media Manager tab when the Configurator is launched he options in this tab are used to control the life of Backup Savesets kept on a piece of media.

40 40 Chapter 2 he Configurator abs Figure 2-36: he options available in the Media Manager tab Minimum Life for Imported Backups (days) - When media is deleted from the NetVault database or a tape from another NetVault Server is used, it will appears in NetVault s Media Management window with a label of FOREIGN. o access the data through NetVault, it is necessary to scan the tape to build a record of its contents back into the database using the tape index. he value entered here controls the life of the savesets on the tape once it has been scanned. Any existing life span of savesets on tape will remain in effect after it has been scanned; the setting in this option affects only expired savesets and designates its life span after being imported into the database (for details on scanning media into the NetVault database, please see Chapter 4: Device Management of the NetVault : Backup - Administrator s Guide). Use Barcodes As Labels - With this option selected the unique barcode value assigned to a piece of media will be used as the media s label. Important: his option only applies to libraries with barcode readers and media (e.g., tapes) containing barcodes. Continuation Request Priority Fields - A Continuation Request occurs when an unfinished job requires more than one piece of media to complete successfully. A job paused for media changes can possibly be pre-empted by another request. In order to avoid this and allow the original job to continue without interruption, the priority number values for a continuation request should be set to a smaller number than that of other requests. Continuation requests can be set for the following job types:

41 NetVault : Backup Configurator Guide 41 c c Restore Jobs - via the Continuation Restore Request Priority Boost field. Backup Jobs - via the Continuation Backup Request Priority Boost field. Request Priority Fields - hese fields are used to change the priority level set for various types of jobs as they run NetVault. he lower the number value input in these fields, the higher priority the job type (e.g., a Job Priority set to 1 is the highest priority job). If zero (0) is input, the selected job type will be run in the background (i.e., run at a lower priority than all other, nonbackground jobs). Priority levels can be set for the following jobs: c Labelling Media - via the Label Request Priority field c Blanking Media - via the Blank Request Priority field Bulk Label Callback imeout (secs) - Use this field to set a time limit (in seconds) that will serve as a timeout for a bulk label request (e.g., if the OK button is not clicked in the confirmation dialog box that appears when this request is issued in this time span, the request will be refused). Bulk Blank Callback imeout (secs) - Use this field to set a time limit (in seconds) that will serve as a timeout for a bulk blank request (e.g., if the OK button is not clicked in the confirmation dialog box that appears when this request is issued in this time span, the request will be refused). Minimum Interval Between Reporting Online Capacity (mins) - Use this field to set a time interval (in minutes) between which online capacity will be reported. Mark Expired Read Only Media as Writable - Once a piece of media has been assigned a media label in NetVault, it can be marked as Read Only to prevent NetVault from performing future writes to it. NetVault also makes it possible to set an expiration date for media in the Media Manager window of the GUI. With the Mark Expired Read Only Media as Writable option enabled in this tab, NetVault will disable the Read Only label assigned to a selected piece of media once the set expiration date has been met. Important: Use this functionality with caution. Once enabled, NetVault will automatically target Read Only media for writing once its expiration parameters have been met (i.e., no warning is given once a piece of media that was previously marked as Read Only is targeted for a write as a result of this setting). Index Related Fields - hese three fields correspond to the compression of individual indexes pertaining to NetVault backup job entries in the NetVault Database (NVDB). his can be useful to conserve space on the NetVault Server. he following fields are available for this purpose: c Days of Inactivity Before an Index is Compressed (0 = Never) - Input a value in this field to serve as a period of time that an Index within the NVDB must remain inactive before it will be compressed. Inputting a value

42 42 Chapter 2 he Configurator abs Important: of zero ( 0 ) in this field will result in no index compression of the Netvault Database. he default value for this field is 90 days. c Hours Between Scans for Indexes to be Compressed (0 = Never) - Use this field to input an interval of hours in which NetVault will scan NVDB index entries to see if they meet the inactivity period set. c Minimum Space for Index Decompression - he value input in this field serves as the absolute minimum amount of space that should be left on the hard drive/partition containing the NetVault Database (NVDB) after decompression of an index occurs. he decompressed size of a NVDB index is held in its header information. When a decompression command is sent for a specific index entry, NetVault will read this header information and determine, based on this minimum space setting, if the partition will still contain this amount of free space once decompression has occurred. For example, if this value is set at its default value of 500 MB, and less than 500 MB of free space will exist on that partition after decompression, any attempt to decompress an index will result in an error. If enough space exists, the index will decompress successfully. 1. Decompression of individual index entries pertaining to NetVault backup jobs is handled in the Selections tab of the NetVault Restore window. For more details on this the Restore window and its use, please see the NetVault : Backup - Administrator s Guide 2. If the value set in the Minimum Space for Index Decompression field is reached, the decompression of a new index entry will fail. his is noted with a warning message that can be issued in two places: In the Restore window of the NetVault GUI (if currently attempting to Uncompress an index in the Selections tab). In the NetVault Log entry for a Restore or Incremental backup that attempted to decompress an index. Maximum Characters in a Media Request Diagnosis (thousands) - Input a value in this field to serve as a total number of characters, in thousands, that can be displayed for a Media Request (i.e., as revealed in the Media Requests tab of the Device Management window. he fewer the characters set, the faster media requests will be displayed in this tab. Important: It is recommended that this setting be left at its default. While setting to a smaller value may result in faster display, too small a value may truncate a Media Request, and valid information may not be obtainable. Do Not Display Device Activity in the Device Window - With this option selected, actual library and drive activity will be hidden from the display in the Devices tab of the Device Management window. his can be beneficial

43 NetVault : Backup Configurator Guide 43 when several devices are under the control of a single NetVault Server (i.e., Operations in the Device Management window may be slowed as NetVault attempts to stay current and update device status in the Devices tab). Do Not Display Drives that are Available but Not Active - With this option selected, all currently added but unavailable (e.g., offline ) drives will not be revealed in the Devices tab of the Device Management window. his will reduce the total number of drives displayed in large libraries, making administration easier. Only Check Available Drives and Media when Processing a Media Request - By default, NetVault performs regular checks of added drives and media, to ensure they are available for use. Selecting this option will tell NetVault to only perform these checks when a drive/media is required for a NetVault job. his can be beneficial in environments that incorporate several backup devices and large amounts of media, in order to reduce the overall network traffic created by NetVault s automatic checks. However, selecting this option may result in job delay if several NetVault jobs are all launched simultaneously (or in close proximity). Only Check Available Drives when Processing a Media Request - Same as the Only Check Available Drives and Media when Processing a Media Request option, except when this is enabled, checks for actual drives will only be performed when a NetVault job requires one. Only Check Available Media when Processing a Media Request - Same as the Only Check Available Drives and Media when Processing a Media Request option, except when this is enabled, checks for actual media will only be performed when a NetVault job requires available media. Do Not Issue Prevent/Allow Media Remove Commands to Drives - Select this option to prevent NetVault from issuing remove commands (i.e., prevent or allow) to a drive. Do Not Open a Device if the Serial Number has Changed - With this option enabled, any commands sent by NetVault to a device whose serial number has changed since it was last configured by NetVault, will be denied. Unavailable Device Retry Interval (mins) - Input a value in this field to serve as a period of time (in minutes) that NetVault should wait between attempts to locate a device (i.e., in the event that NetVault was unable to locate the device). By default, NetVault will re-attempt connection with a device every one minute.

44 44 Chapter 2 he Configurator abs he Network Manager ab Figure 2-37: he location of the Network Manager tab when the Configurator is launched Figure 2-38: he sub-tabs available from the GUI tab a Figure 2-39: he imeouts sub-tab of the Network Manager tab, with all of its available options his tab allows an administrator to set time intervals pertaining to NetVault waiting on network connections as well as settings pertaining to broadcasts. his tab is broken down in to three subtabs, all containing various options. he imeouts Sub-ab Settings in this tab can be used to control the amount of time NetVault will wait for remote connections. he following options are available: ime (in seconds) to Complete a Remote Connection - Input a time value (in seconds) which represents the amount of time NetVault will attempt to create a remote connection. ime (in seconds) Wait Before Dropping Inactive Connection - Input a time value which represents the maximum amount of time NetVault will keep a CP connection open before terminating it. Successfully received Keep Alive messages in this time frame (whose frequency can be set in the following option) are enough to maintain this connection. Keep Alive Rate (in seconds) - NetVault sends broadcasts at designated intervals during active connections to assure that the network connection is still active between NetVault machines in a domain (e.g., during backups and restores). Adjust this setting as desired to send messages more or less frequently. ime (in seconds) Between Availability Broadcasts - An availability broadcast is a message sent from one NetVault machine to all other NetVault machines informing them of its name and how it can be contacted. A value in this field defines the time between these availability broadcasts.

45 NetVault : Backup Configurator Guide 45 Important: Ensure that the value input in this field meets necessary requirements; if this interval is set to too small a value, network traffic will increase; if set too large, the list of available machines may not be displayed as quickly as necessary. ime (in seconds) Between Security Broadcasts - A security broadcast will result in changing the icon associated with an eligible NetVault Client from a blue monitor to a blue monitor with a key through it. his key indicates the presence of security and the need for a password to access that machine. A setting in this field represents the time span between checks for this security b Figure 2-40: he Connections sub-tab of the Network Manager tab, with all of its available options he Connections Sub-ab he settings available in this tab pertain to how the instance of NetVault on the current machine is to be accessed by other NetVault machines in the network. he Broadcast Details to Machines on Local Networks Option With this option selected, eligible NetVault Clients will be automatically searched for and displayed in the Client Management window. When disabled no Clients will be displayed, and it will be necessary to manually locate any eligible Clients (i.e., through the use of the Find NetVault Machine frame of the Client Management window). However, if network traffic is an issue in the current environment, disabling this option will reduce it. Important: 1. If the Broadcast Details to Machines on Local Networks option is disabled, it will only be possible to add clients from the Client Management window through using the Find utility (for details on the use of this utility, please see Chapter 3: he Client Management Window of the NetVault : Backup - Administrator s Guide). 2. he Broadcast Details to Machines on Local Networks option should only be disabled when it is necessary to reduce network traffic.

46 46 Chapter 2 he Configurator abs NetVault Address Fields he Preferred Network Address, Comma Separated List of Fallback Addresses, and the Comma Separated List of Barred Addresses fields all relate to how other NetVault machines will initiate contact with this instance of NetVault. he local machine will pass the values input in these fields on to other NetVault machines and they will then use this information when initiating contact with this local instance of NetVault. Important: 1. hese settings do not relate to which addresses this local instance of NetVault will listen for traffic from other NetVault machines. Values input in these fields are specific to the local machine only, and are exclusively used by other instances of NetVault to contact this local machine. 2. Unless it is necessary to define specific IP addresses for use/non-use on the local machine, these fields can be left at their default state of blank. NetVault will automatically see another NetVault machine in a properly established network, and it will be accessible as a Client or for Domain Management (i.e., if security is set up properly and the proper versions of NetVault are installed). For more information on adding Clients and security, please see the section, he Security ab on page 64. For details on Domain Management, please see Chapter 12: he Domain Management Window of the NetVault : Backup - Administrator s Guide. Address Field Use Logic - he sub-points below illustrate the logic used when a remote instance of NetVault attempts to contact the local machine: c Phase 1: Query the O/S for all Current Interfaces - he remote machine will attempt to contact the local machine and gather a list of all available IP addresses in use. c Phase 2: Filter Out Noted Addresses - he remote machine will then read from the IP addresses to be blocked (i.e., those input in the Comma Separated List of Barred Addresses field) and remove them from the list of eligible IP addresses taken in Phase 1. c Phase 3: Add Applicable Addresses - In this phase, the remote machine will read from the IP addresses to be used as a backup address (i.e., those input in the Comma Separated List of Fallback Addresses field) and add them to the list of eligible IP addresses taken in Phase 1. c Phase 4: Decide on the Contact Address for the Local Machine - With the eligible list of IP addresses defined by the remote machine, it will attempt to contact the local machine. It s primary point of contact will be any entry input in the Preferred Network Address field. his address will be seen as the local machine s designated primary point

47 NetVault : Backup Configurator Guide 47 c of contact (i.e., its primary Contact Address ). Only a single address will be recognized in this field. Phase 5: Refer to the Created List of Eligible IP Addresses (if Applicable) - If no address is input in the Preferred Network Address field (or the value input is ineligible), the remote machine will then refer to its created list of available addresses and use an available entry (e.g., the remote machine will attempt to use an IP address gathered as a result of reverse-looking up the local machine s host name first, and then it will use the first address in its created list, based on the results of Phases 1-3). Important: 1. he option, Preferred Network Address should only be used when the local machine is connected to multiple networks, either via multiple Network Interface Cards or through virtual IP addressing. 2. If an address input in the Comma Separated List of Fallback Addresses field exists in the network stack before the address value input in the Preferred Network Address field, the address designated as a fallback may be used instead of the one designated as preferred. he network stack refers to the Binding Order as established on a Windowsbased machine, or the /etc/networks order established on a Linux/UNIX-based one. herefore, it is recommended that the network stack be reviewed before establishing addresses in these fields, in order to ensure the proper values are input. 3. Ensure that no conflicting addresses exist in the Comma Separated List... fields. he Comma Separated List of Networks and Addresses Not to Resolve Field In a clustered environment (i.e., users taking advantage of NetVault s Application Cluster Support), NetVault start up may be slow. his is due to the fact that NetVault is trying to resolve several addresses including private cluster connections. Setting this option either with a specific IP address or a Network IP mask will stop NetVault from trying to resolve these addresses at start up. For example, if the individual IP address, was input here, NetVault would refuse to resolve that specific IP Address. If the value, were input, NetVault would refuse to resolve any address that fall into the x.x range.

48 48 Chapter 2 he Configurator abs c Figure 2-41: he Options sub-tab of the Network Manager tab, with its available option he Options Sub-ab he single option available in the sub-tab, Doublecheck Connections as SO_ERROR Does Not Work allows an administrator to select it in order to have a connection double-checked when an SO_ERROR is encountered on its first attempt. At default, this option is de-selected he Notification ab Figure 2-42: he location of the Notification tab when the Configurator is launched Figure 2-43: he sub-tabs available from the Notification tab a Figure 2-44: he Mail Server sub-tab of the Notification tab, with all of its available options his tab allows an administrator to set details pertaining to NetVault s capacity for notification. his tab is broken down into three sub-tabs. he Mail Server Sub-ab Settings in this tab are used to configure mail server information for NetVault in order to use its notification capacity. he following fields are present: Outgoing Server (SMP): Enter the name of the machine in the network on which the server resides, or a valid address to it, in this field (e.g., a valid IP Address or the resolvable name of the mail server). Port Number (Default value of 25) - Set this to the required port number, if necessary. NetVault s Address: Enter the address that NetVault will use to send from in

49 NetVault : Backup Configurator Guide 49 this field. If a reply were sent to an sent by NetVault, this would be the recipient address. NetVault s Real Name (Default is NetVault): his is the alias that will appear in the From section of an sent by NetVault. Perform Authentication - Select this option to have NetVault authenticate access between the NetVault Server and its added Clients, as requests are sent between the two. Authentication Password - With the Perform Authentication option enabled, use this field to input the password value required for authentication b Figure 2-45: he Global Notification sub-tab of the Notification tab, with all of its available options he Global Notification Sub-ab Settings in this sub-tab are used in conjunction with the Global Notification window in the NetVault GUI. his sub-tab offers the follow options for use: Address of System Administrator - From the Global Notification window of NetVault, it is possible to mark certain events for notification. Various methods of notification can be selected, including the Sysop method. herefore, with the Sysop method chosen for an event, when this event occurs, the address input in this field will receive a notification . Important: his single address serves as the address for all events marked for notification with the Sysop method in the Global Notification window. herefore, it is strongly recommended that a system administrator s address be used. Real Name of the System Administrator (default = sysop) - he value in this field is what will be displayed as the sender of an that has been sent by NetVault c Figure 2-46: he Default Printer sub-tab of the Notification tab, and its available option he Default Printer Sub-ab his tab offers a single field, the Default Printer Name field. Used for Windows-based installations of NetVault, this field is used to input details relating to a printer that NetVault will use as its default printer. his field can contain either exact path information for a network connected printer, or the Windows-related name for a local printer. NetVault uses this default printer for its Print Report notification method, in which a completed

50 50 Chapter 2 he Configurator abs report will be automatically sent to a local printer on a successful run (for more details on the Print Report notification method and its use, please see Chapter 15: he Global Notification Window of the NetVault : Backup - Administrator s Guide). Important: 1. UNIX-based installations of NetVault (including Linux) do not need to input a value in this field to set up a default printer. NetVault recognizes the operating system s configuration for a printer set up as its default and will use this printer. 2. If a value is not input in this field for a Windows-based installation, NetVault will attempt to search for a printer configured as the default. However, due to the Windows-based operating systems configuration, it will more than likely not locate the printer. herefore it is recommended that this field be properly used to set up a printer he Packages ab Figure 2-47: he location of the Packages tab when the Configurator is launched Figure 2-48: he options and information available from the Packages tab his tab is used as an alternative method for the installation and removal of NetVault plugins and APMs. his method is especially useful when it is necessary to install a NetVault Plugin or APM on a machine with the client installation of NetVault which offers access to the Configurator utility, but does not give access to a Graphical User Interface. he following controls are offered from this tab: Install Software Button - Use this button to launch the software installation wizard that will allow an administrator to navigate to a specific directory and locate NetVault package installation (.npk) files for installation. Installed Packages Window - his window serves a dual purpose. Mainly it is used to display all NetVault packages (Plugins and APMs) installed on the current system. he window offers several information columns including a description of the installed package,

51 NetVault : Backup Configurator Guide 51 its installation date and time and any flags assigned to a package. As well, items displayed in this window can be selected and the Remove Software button used to uninstall the package. Remove Software Button - As noted above, when an item is first selected from the Installed Packages window, this button can be used to initiate the removal of the selected package he Plugin Options ab Figure 2-49: he location of the Plugin Options tab when the Configurator is launched Figure 2-50: he default sub-tabs available from the Plugin Options tab his tab allows an administrator to set various additional options pertaining to plugins/ APMs installed on the current machine. As a plugin/apm is installed a sub-tab for it will be added to this tab. With a default installation of NetVault, the sub-tabs detailed in the following sections are made available. Important: Only plugins/apms that offer additional options configurable via the NetVault Configurator will generate a sub-tab here a he Disk Devices Plugin Sub-ab his sub tab is comprised of a single option: Allow Disk Libraries to Have Entry/Exit Ports - Select this option in order to allow a Virtual library device to be set up with Entry/Exit Ports.

52 52 Chapter 2 he Configurator abs b Figure 2-51: he Duplicate sub-tab of the Plugin Options tab, with all of its available options he Duplicate Sub-ab Settings in this sub-tab are used in conjunction with NetVault s Duplicate Plugin. he following options are available: Always Run Duplicate Locally - With this option selected, the plugin will be launched and run locally (rather than on the NetVault Server) in regards to running duplications of backups performed on the local machine (e.g., a backup of a client was performed with this option selected. When a duplication of this backup is later generated, the plugin will launch and run it locally, rather than on the NetVault Server). Comma Separated List of Clients that Duplicate Locally - Input a list of NetVault Client machines, each separated with a comma, that are to generate duplicates locally (i.e., launch and run the plugin locally). Default Client to Run Duplicate (Default: Server) - Input the name of the client machine that duplicates are to be generated on (i.e., the machine where the plugin is launched and duplicates run), if a machine other than the NetVault Server is to be used for this purpose. When left blank, the default NetVault Server is used. Prioritize Selection of the Source Drive to be Local to the Duplicate Plugin - Select this option to have NetVault use the same drive that the Duplicate Plugin is installed on as its primary location for the duplication process. Important: 1. he Comma Separated List of Clients that Duplicate Locally and Default Client to Run Duplicate fields only apply to the NetVault Server (i.e., settings can only be made in these fields of the Configurator on the NetVault Server). 2. Values input in the Comma Separated List of Clients that Duplicate Locally and Default Client to Run Duplicate fields are only acknowledged if the Always Run Duplicate Locally option is de-selected. 3. Only NetVault Clients that have been successfully added to the NetVault Server via the Client Management window can be input for use in the Comma Separated List of Clients that Duplicate Locally field.

53 NetVault : Backup Configurator Guide c Figure 2-52: he Filesystem Plugin sub-tab of the Plugin Options tab, with all of its available options he Filesystem Plugin Sub-ab his sub-tab houses the configuration options available for the local machine s installation of the File System plugin. he options located here are identical to those revealed in the Configure window accessed from the Backup window of the NetVault GUI. For complete information on options available in this sub-tab as well as the File System Plugin, please see Chapter 16: he File System Plugin of the NetVault : Backup - Administrator s Guide. Important: Any settings made here will be reflected in the Configure window of the File System Plugin, available in the Backup window of the NetVault GUI (and vice versa) he Process Manager ab Figure 2-53: he location of the Process Manager tab when the Configurator is launched Figure 2-54: he options available from the Process Manager tab his tab contains a sub-tab entitled the Process able tab which allows a user to set various options in regards to NetVault processes. Shared Memory (Kb) Used for Process able - Input a value in this field to serve as the amount of shared memory (in Kilobytes) to be used for this process. Shared Memory (Kb) Allocated to the race Buffer of Each Process - Input a value in this field to serve as the amount of shared memory (in Kilobytes) to be used. Shared Memory (Kb) Allocated to a Progress Buffer - Input a value here to serve as the amount of shared memory (in Kilobytes) to be use. Number of Progress Buffers Available to Plugins - Input a value in this field to serve as the number of Progress Buffers available.

54 54 Chapter 2 he Configurator abs he Reporting ab Figure 2-55: he location of the Reporting tab when the Configurator is launched Figure 2-56: he sub-tabs available from the Reporting tab his tab allows an administrator to set various configuration options pertaining to NetVault s Reporting functionality. he tab is broken down into several sub-tabs, each of which contains several options a he HML ext Output Sub-ab Figure 2-57: A few of the available fields from the HML ext Output sub-tab One of the report output methods utilized by NetVault is HML. Using various preset HML code, generated reports are displayed on-screen for viewing. his subtab offers several fields that contain default values for the HML tags used by NetVault to display these generated report jobs. he fields can be edited as desired with new HML tags for each. Important: It is recommended that only those well-versed in HML code and its use attempt to change these values (or if instructed to do so by a BakBone echnical Support Representative). Improper values input in these fields could result in the incorrect display of HML-based report jobs.

55 NetVault : Backup Configurator Guide b he Plain ext Output Sub-ab Figure 2-58: A few of the available fields from the Plain ext Output sub-tab As with the HML report view, NetVault can generate a report job to output in plain text (for report viewing from a command line prompt or in simple text editing software). his sub-tab offers several fields that allow for the manual input of text formats for use by a Plain text report as well as specific text that appears at the various levels of the report. Important: It is recommended that these values be left at their default unless the administrator changing them is well-versed in the use of scripting language. Improper values input in these fields could result in the incorrect output of the report c he CSV Output Sub-ab Figure 2-59: A few of the available fields from the CSV Output sub-tab NetVault can also generate a report job to output in comma separated value (CSV) text. his allows for the completed report to be imported into various spreadsheet applications for viewing. his sub-tab offers several fields that allow for the manual input of text formats for use by a CSV report as well as specific text that appears at the various levels of the report.

56 56 Chapter 2 he Configurator abs Important: It is recommended that these values be left at their default unless the administrator changing them is well-versed in the use of scripting language and its proper format in order to achieve the proper comma separated results. Improper values input in these fields could result in the incorrect output of the report d he Misc Sub-ab Figure 2-60: he options available from the Misc subtab his sub-tab allows for the setting of various miscellaneous options pertaining to NetVault Reporting functionality. he following options are available: Default Output ype - When designing a custom component for use in a Report job it is necessary to select an output type for the purpose of viewing the Report generated using it. From this pull-down field, it is possible to select the default format available when creating a custom component. his only applies to custom created Report Components (i.e., because all pre-set components have their own built-in output type). Default Filter View - he Filter tab located in the Report Component Editor window of NetVault offers two selectable levels of view for the display of filters. his option allows the administrator to select the value to serve as the default viewing method for filters in this window (for more details on filters in the Report Component Editor window, please see the NetVault : Backup - Administrator s Guide). Duration to Keep Produced Reports (Days) - Once a Report job is generated, it is added to a list of Reports eligible to be considered a Historic Report (and therefore accessible from this sub-window of the Reports window). Set a value in this field (in days) to keep these report jobs in this list for access. Default Keep Filtered Out Records Setting - Select this option to keep all filtered out records by default.

57 NetVault : Backup Configurator Guide e he Stats Collection Sub-ab Figure 2-61: his options available from the Stats Collection sub-tab his sub-tab allows for the setting of various options pertaining to the collection of statistics. NetVault gathers this statistical information in storage files that are referenced by NetVault s Reporting functionality to generate reports. he following options are available: Statistics Gathering Window Start - Based on a 24-hour clock, input the exact hour, minute and second, separated by a colon, that NetVault will begin the statistic gathering process for each calendar day. Statistics Gathering Window End - Working in conjunction with the value set in the previous field, input the exact hour, minute and second that NetVault will end the statistic gathering process for each calendar day (this is also based on a 24 hour clock, with each value separated by a colon). Important: 1. Limiting the value set between these two fields can decrease network traffic (as the time frame window that statistic transfer occurs in is minimized). 2. A start time value can be input that is later than the end time value if it is necessary to have a single statistics session last longer than 24 hours (e.g., 10:00 am as a start time and 7:00 am as an end time would result in a 27 hour statistic gathering session). Frequency (seconds) - Input a time value, in seconds, that will serve as the time interval between statistic gathering sessions, for the time period set in the previous two fields (e.g., with the default value of 10, NetVault will begin gathering statistical information every 10 seconds). Records Per Storage File - Since statistics are gathered and held in storage files, this field allows an administrator to set the maximum allowable number of statistic records held in each of these storage file. Once reached, NetVault will create a new storage file and begin saving statistical data in it.

58 58 Chapter 2 he Configurator abs f he Stats Provision Sub-ab Used to set various provisions pertaining to NetVault statistic gathering for both a NetVault Server and it Clients, this sub-tab contains the following options: Figure 2-62: he options available from the from the Stats Provision sub-tab Enable Stats Collection on this Machine - Default selected, this option makes statistic gathering possible on the local machine. If statistic gathering is not required on this machine, de-select this option. Disabling this option may result in a very slight performance increase on the target machine. Important: By de-selecting this option and disabling statistic gathering on this machine, some reports pertaining to NetVault operations from this machine will be misleading or incorrect. Absent Server hreshold (Hours) - Input a value in this field to serve as the maximum amount of time (in hours) that statistic generation can be delayed without access to the NetVault Server. At this point, a warning message will be issued on the local machine stating that the following will occur: c Any statistic files not yet transferred will be deleted c No further statistic files will be kept for the server until this machine reestablishes contact with it. ransmit Block Size (Kb) - Input a value, in kilobytes, that will serve as the overall block size for a bundle of gathered statistic information as it is transmitted to the NetVault Server. Minimum Stats Manager Cache (Records) - Input a value here to serve as the minimum number of records to be held in the statistic gathering cache (i.e., a cache of memory in the target system). Lowering this setting may preserve a small amount of system memory (but not impact overall performance too dramatically).

59 NetVault : Backup Configurator Guide g he ables Sub-ab his sub-tab is used for the cycling of data held in the storage file databases created through statistic gathering. he following options are available: Figure 2-63: Some of the options available from the from the ables sub-tab ables Default to Being a Part of the Global Purge Group (default selected) - With this option selected, statistic storage file database tables are subject to the purge values set in the Global fields of this tab. De-select the option in order to manually set purge parameters in the fields of this tab. Important: With this option selected, individual table item purge settings are ignored. Purge Check Frequency (Hours) - Input a value in this field to serve as a frequency for the purges set in this tab to take place. he Global Purge Fields Settings made in the fields of this sub-tab, labelled as Global, are made in order to potentially affect all of an individual table item s purge settings. Each individual table item offers a able Purge Method field in which the setting Use Global Purge Policy can be selected. When selected, values input for these Global fields will apply to that specific table item s purge settings (and its individual settings will be ignored). As well, the option ables Default to Being a Part of the Global Purge Group can be selected, making these settings automatically apply to each. he following fields are made available: Global Purge Method - Allows for the selection of a purge method to be used by the individual table items revealed in this sub-tab. his purge method will then be applied to tables with Global Purge Method selected as their Purge Method. Each individual table item offers a able Purge Method field in which the setting Use Global Purge Policy can be selected. When selected, the settings made in all of the Global fields will apply. he following selections are available:

60 60 Chapter 2 he Configurator abs Figure 2-64: Global Purge settings made followed by the Global Purge Policy item selected for the able mediacapacities purge method. With this, all purge settings made specifically for this table item are ignored and the values input in the Global fields are used instead c By Space Used - With this item selected, the purge method is based on the space used setting made in the Global Purge Space Limit (MB) field. c By Date - With this item selected, the purge method is based on the date setting made in the Global Purge ime Limit (Days) field. Global Purge Space Limit (MB) - his field allows for a value to be input that will serve as maximum space limit (in Mbytes) that all table items combined can utilize before purging will occur. Global Purge ime Limit (Days) - his field allows for a value to be input that will serve as maximum time limit (in days) that the table item will exist before purging will occur. Important: 1. Only one purge value applies based on the selected purge method (e.g., if By Date is selected, the value in the Global Purge ime Limit (Days) is used as the purge parameter and the Global Purge Space Limit (MB) value is ignored). 2. At default, all table items in this sub-tab are set to Use Global Purge Policy (and the option ables Default to Being a Part of the Global Purge Group is selected). herefore, the settings input for these fields are in use by all table items. he Default Purge Fields Figure 2-65: he Default purge fields As new tables are created (e.g., a custom report component is created which, through it s report generation, creates new storage file database tables), the settings made in this sub-tab are used for the purpose of purging these reports storage file database table items. he following fields are available: able Default Purge Method - Allows for the selection of a purge method to be used. he following selections are available: c By Space Used - With this item selected, the purge method is based on the space used setting made in the able Default Purge Space Limit (MB) field. c By Date - With this item selected, the purge method is based on the date setting made in the able Default Purge ime Limit (Days) field.

61 NetVault : Backup Configurator Guide 61 able Default Purge Space Limit (MB) - his field allows for a value to be input that will serve as maximum space limit (in Mbytes) that can be utilized by a table before purging will occur. able Default Purge ime Limit (Days) - his field allows for a value to be input that will serve as maximum time limit (in days) that a table will exist before purging will occur. Important: 1. For settings made in these fields to apply, the option ables Default to Being a Part of the Global Purge Group must be de-selected. 2. Only one purge value applies based on the selected purge method (e.g., if By Date is selected, the value in the Default Purge ime Limit (Days) is used as the purge parameter and the Default Purge Space Limit (MB) value is ignored). Individual able Item Purge Fields Figure 2-66: he able events item with individual values set It is also possible to set the purge parameters for the individual table items contained in the reports storage file database. Settings can be made for the several specific table items, including: able events - he table item containing a history of the NetVault Events that have been raised. able mediacapacities - he table item containing records pertaining to media usage by NetVault. able mediarequests - he table item containing records pertaining to requests made for media in NetVault. able mediatransfers - he table item containing records pertaining to the transfer of data to media. able driveevents - he table item containing records pertaining to a record of when a drive started or stopped reading/writing information for a specific NetVault job. able driveperformance - he table item containing records pertaining to the performance of drives used by NetVault. able jobfiletallies - he table item containing records pertaining to the number of items backed up by a specific NetVault job. Each table item offers the following fields: able <table name> Purge Method - Allows for the selection of a purge method to be used for the individual table item. he following selections are available:

62 62 Chapter 2 he Configurator abs c By Space Used - With this item selected, the purge method is based on the space used setting made in the able <table name> Purge Space Limit (MB) field. c By Date - With this item selected, the purge method is based on the date setting made in the able <table name> Purge ime Limit (Days) field. c Use Global Policy - When selected, all settings made in the Global fields of this sub-tab will be used for this individual table item and any individual settings made in the accompanying fields will be ignored. able Default Purge Space Limit (MB) - his field allows for a value to be input that will serve as maximum space limit (in Mbytes) that can be utilized by a table before purging will occur. able Default Purge ime Limit (Days) - his field allows for a value to be input that will serve as maximum time limit (in days) that a table will exist before purging will occur. Important: 1. For settings made in these fields to apply, the option ables Default to Being a Part of the Global Purge Group must be de-selected. 2. Only one purge value applies based on the selected purge method (e.g., if By Date is selected, the value in the Default Purge ime Limit (Days) is used as the purge parameter and the Default Purge Space Limit (MB) value is ignored) he Schedule Manager ab Figure 2-67: he location of the Schedule Manager tab when the Configurator is launched his tab allows an administrator to set various options pertaining to the scheduling of operations in NetVault. he following options are available: Number of Days to Keep Job Status - As a NetVault job is run, an entry is created in the Job Status frame of the Status window. Input a value in this field to serve as the length of time these job entries will be displayed here before they are removed. hese records are not actually deleted, just removed from this display (for details on the purging of these actual records from the NetVault Database, see the following Number of Days to Keep... options).

63 NetVault : Backup Configurator Guide 63 Figure 2-68: he options available in the Schedule Manager tab Number of Days to Keep Report Jobs in Database - he NetVault Database keeps a record of each report job as it is run. Input a value in this field to serve as the length of time records pertaining to these report jobs are maintained in the NetVault Database before they are overwritten. Number of Days to Keep Other Job Histories in the Database - Functioning in the same manner as the Number of Days to Keep Report Jobs in Database option, this option is used to define how long NetVault should maintain job history information in the NetVault Database. Number of Days to Keep Non-Scheduled Jobs in the Database (0 = Forever) - Input a value in this field to serve as a point in time (in days) that NetVault will keep entries in the NetVault Database for all jobs that are not scheduled to run at a future time (e.g., NetVault jobs that were only run a single time or jobs whose schedules have been deleted). If the default value of zero ( 0 ) is left in this field, these jobs will be kept indefinitely. Maximum Simultaneously Active Jobs - Input a number in this field to serve as the maximum number of Netvault jobs running at a single time. his option refers to all NetVault jobs, including Backup, Restore and report jobs. When setting this value, it is important to keep the following in mind: c Shared Memory Usage - Each running job consumes a small amount of shared memory, so it can be advantageous to specify a smaller number of jobs in this field in order to speed up the overall process (e.g., reducing the amount of shared memory, overall network bandwidth used, etc.). Exclude Reports Jobs from Job Management Views (default selected) - With this option selected, Report jobs are omitted from the various tabs of the Job Management window. De-select the option to have them included. Exclude Reports Jobs from Policy Management Views (default selected) - With this option selected, Report jobs are omitted from the various frames of the Policy Management window.

64 64 Chapter 2 he Configurator abs Exclude Restore Jobs from Policy Management Views (default selected) - With this option selected, Restore jobs are omitted from the various tabs of the Policy Management window. Important: As both Reports and Restore Jobs cannot be used with NetVault Policies, it is recommended that these two options be left at their default selected setting to allow for faster navigation of the Policy Management window views. Default Job Priority Fields (Backup, Restore and Reports) - hese options allow a user to set a default priority level for each type of NetVault job. If multiple jobs are scheduled at the same time, the job with the highest priority level set will be run first. he allowable range in these fields is from zero to 100, with an entry of one ( 1 ), being the highest priority. If a value of zero is input, the selected job type will always be run in the background. Values can be manually input in these fields, or increased/decreased in increments of one with the arrow buttons. Default values are 30 for a backup job, 20 for a restore and 50 for a report job he Security ab Figure 2-69: he location of the Security tab when the Configurator is launched Figure 2-70: he option available from the Security tab his tab allows an administrator to set various options pertaining to the security of the local machine s installation of NetVault and its availability to other NetVault machines on the network. he following options are available: Disable Security - When selected, security will be disabled and any other NetVault machine on the network capable of accessing this machine will be able to add it as a NetVault Client. If this option remains de-selected, it will only be possible to add this machine in this manner if the proper password is given during the add client process. As well, this password will also be required if attempting to Domain Manage this machine.

65 NetVault : Backup Configurator Guide 65 Important: he password required for access when this option is de-selected is the password value established when NetVault was originally installed, unless changed using the Master Password fields located in this tab. Master Password Fields (New Password/Confirm Password) - Use the fields here as desired in order to change the existing password used to access this machine for addition as a Client. Input the new value in the New Password field and re-input this same value in the Confirm Password field in order to make the change. his Client May be Added as a Client to a Server - his option varies, based on the installation version of NetVault (e.g., Client vs. Server): c Client Install - his option is default selected, indicating that settings made in this tab determine its accessibility as an addable client. If deselected, all security settings will be overridden and the machine will not be available as an addable client. c Server Install - his option is de-selected at default. NetVault Server machines act as clients of themselves and can therefore be added as a client to another NetVault Server in the domain. With this option deselected, the server can not be added as a client to another NetVault Server. Select the option to make it available for addition. Important: With this option selected, it will still be necessary to provide the proper password to add the machine as a client he Service ab Figure 2-71: he location of the Service tab when the Configurator is launched his tab allows an administrator to stop and/or start NetVault Services. NetVault Services must be running in order for NetVault to function, although occasionally it may be necessary to stop these services and then re-start them to let various settings take effect. Important: It is recommended that NetVault Services only be stopped at the instruction of a BakBone echnical Support representative.

66 66 Chapter 2 he Configurator abs a Figure 2-72: he Service tab as revealed in the NetVault Configurator Starting/Stopping NetVault Services he process below explains how to Start/Stop NetVault Services. 1. Launch the NetVault Configurator. 2. Select the Service tab. 3. Click on the Stop Service button to stop NetVault services. 4. Clicking on the Start Service buttonwill restart NetVault services 5. Click on OK to apply all changes and exit the Configurator he ime Sync ab Figure 2-73: he location of the ime Sync tab when the Configurator is launched Figure 2-74: he options available from the ime Sync tab his tab allows an administrator to set various options pertaining to BakBone ime. BakBone ime is the NetVault name given to a time variable which enables all NetVault Clients to be synchronized to a single time. As time values can vary among Clients in a NetVault Domain, this setting allows a single NetVault machine (e.g., the NetVault Server) to use its local system time setting as a constant between all machines in the domain. BakBone ime is essential for: NetVault s Reporting tool in which reports are generated using data from multiple machines across a domain. he synchronization of race Files (as required by NetVault echnical Support) gathered from multiple clients throughout a domain. he following options are available in this tab: his Machine is the BakBone ime Server - With a server installation of NetVault, this option is default selected as it is recommended that the NetVault Server be used as the BakBone ime Server (and it is de-selected with a client install). When selected, NetVault will use this machine s system

67 NetVault : Backup Configurator Guide 67 time setting for the purpose of establishing BakBone ime. Set as such, a few rules apply to the NetVault Domain this machine is in control of: c System time settings on all other machines added as NetVault Clients will be ignored. c All NetVault jobs scheduled (e.g., via an added Client or locally) will use this machine s time settings to determine their start time. c Any time-specific operation in NetVault will be determined by the time value on this machine. Synchronize BakBone ime with System - If a machine other than the local machine is to be used as the time server to establish BakBone ime, input its NetVault name in this field. Only a single machine can be input in this field and once input the same rules noted in the his Machine is the BakBone ime Server description apply. Number of Ping-Pongs to Determine ime Difference - Input a value in this field to serve as the number of times that NetVault should attempt to sync its time with that of the established BakBone ime Server. Number of Seconds Between ime Sync Updates - Input a value in this field to serve as the amount of time that NetVault will wait between successful time syncs between itself and the established BakBone ime Server. Important: he two previous fields work in conjunction with one another. As the amount of time input in the Number of Seconds Between ime Sync Updates field elapses, NetVault will then attempt, up to as many times as set in the Number of Ping-Pongs to Determine ime Difference field, to synchronize these two times. For example, using the default values of five (5) and thirty: Every thirty seconds NetVault will attempt, up to five times to sync these two times. If the time is synced in fewer than five tries, NetVault will begin the thirty second timer from the point in time of the successful attempt. If it fails all five, it will reset the thirty second timer after the fifth and try again once it has elapsed. Number of Milliseconds of ime Difference Allowed Between wo Servers - Also working in conjunction with the previous two fields, this field allows the user to input a value (in milliseconds) to serve as a sort of margin of error for a sync attempt. A successful sync attempt will occur when a time difference occurs that is equal to or less than the value input in this field.

68 68 Chapter 2 he Configurator abs he race Level ab Figure 2-75: he location of the race Level tab when the Configurator is launched Figure 2-76: Several of the NetVault operations that can have various levels of race set for them from the race Level tab of the Configurator a racing is a NetVault utility that allows a user to capture and store a history of events pertaining to one or multiple jobs. his history is stored in a file that can be provided to NetVault echnical Support in order to diagnose a problem and arrive at the appropriate solution. race Levels are set to determine the amount of information contained in the aforementioned file. race Level Options As shown in the graphic above, it is possible to set the trace level for a number of NetVault operations. he table below lists these operations. NetVault Operation NetVault Operation NetVault Operation Process Manager Communication Manager Network Manager Script Plugin GUI Core Plugin GUI Proxy Schedule Manager Job Manager Device Manager NDMP Device Manager Library Manager NDMP Library Manager ACSLS Manager Media Manager Logging Daemon Database Browser Verify Browser Duplicate Browser SysExec Plugin Utility Plugin Device Scan Screen Control Daemon Screen Control Engine Statistic Manager Reports Database Auditor Manager CLI Proxy Gateway SnapVault Listener SnapVault ask NDMP Server QSM Server Consolidate Incremental Backups Data Copy Notification Plugin NetVault Databases Raw Device Reports Producer File System Disk Device Creator

69 NetVault : Backup Configurator Guide b Figure 2-77: he race Level settings available for selection with each NetVault Operation displayed in this tab c Figure 2-78: he Generate Debugging Files option enabled in the General tab race Level Settings Each NetVault operation item is accompanied by a pull-down menu that allows for the selection of the desired level of race Level. Default (the default setting) Normal Always Verbose Libnormal Libverbose Enabling racing Once appropriate settings have been made in the race Levels tab, it is necessary to access the General tab of the Configurator and select the option Generate Debugging Files to enable tracing. Important: 1. Since traces are used primarily by NetVault echnical Support, it is strongly recommended that options available in this tab be left at their default unless instructed otherwise by a BakBone echnical Support Representative. 2. A NetVault echnical Support Representative will recommend what level of trace to set for the various NetVault operations. 3. he fields present in this tab (and described in the section) do not account for all possible fields. As a plugin or APM is added to NetVault, it will be added to this tab as well he Verify ab Figure 2-79: he location of the Verify tab when the Configurator is launched his tab allows an administrator to configure how NetVault relates to the operation of its internal Verification Plugin. his Plugin operates when the Verify After Backup option is selected from the Advanced Options tab of the Backup window. With the option selected for a backup, once the job has completed, NetVault will Verify its status and if the job was successful, a job message will be

70 70 Chapter 2 he Configurator abs created in the NetVault Job Log stating the backup job has verified successfully. he following options can be set in this tab pertaining to verification. Figure 2-80: he option available from the Verify tab Always Run Verify Locally - At default, verification of a backup job is run on the NetVault Server. Select this option to have the local machine perform this verification. Doing so may free up resources on the NetVault Server, in regards to CPU usage, but may impact overall network traffic as results are returned to the NetVault Server for display in the Logs window. Comma Separated List of Clients that Verify Locally - Use this field to input a list of added NetVault Client machines, each separated with a comma, that are to perform a verification locally (i.e., launch and run the built-in verification plugin locally for the purpose of verifying a backup of the local machine). Default Client to Run Verify (Default: Server) - If a machine other than the local machine or the designated NetVault Server is to serve as the verification machine, input its assigned NetVault name in this field. If this field is left blank, the NetVault Server will be used for verification.

71 SECION 3: he Remote Configurator

72

73 Chapter 3: he Remote Configurator he Remote Configurator Accessing the Remote Configurator Using the Remote Configurator... 76

74 74 Chapter 3 he Remote Configurator

75 NetVault : Backup Configurator Guide he Remote Configurator NetVault makes it possible to access a local machine s installation of the Configurator remotely from another installation of NetVault (e.g., a client machine s installation of the Configurator can be accessed and options set from the NetVault Server). his makes it possible to administer the settings made in the Configurator for every machine in a NetVault Domain from a single machine. Only a select number of the full Configurator s tabs can be accessed in this manner and this section not only provides a list of those provided, but also complete details on how the Remote Configurator is accessed Accessing the Remote Configurator Figure 3-1: he various methods used to access the Client Management window of the NetVault GUI Figure 3-2: An added client has been right-clicked to access the pop-up menu and the Configure command has been selected in the Client Management window his is accomplished via the NetVault GUI and can be accomplished by performing the following steps: 1. From the main GUI of NetVault, access the Client Management window (e.g., via the buttons from the command tool bar or the Client Management command of the Administration pull-down menu). 2. With the window opened, locate the added client from which the Remote Configurator is to be accessed and right click on it to reveal the pop-up menu. From this menu, select the Configure option. his will launch a separate window containing the Remote Configurator.

76 76 Chapter 3 he Remote Configurator Important: 1. In order to access a desired Client s Remote Configurator window, it must first be successfully added as a Client. For complete details on this process, please see Chapter 3: he Client Management Window of the NetVault : Backup - Administrator s Guide. 2. his procedure can only be performed from a machine able to access the NetVault GUI (nvgui). herefore, it is recommended that it only be performed from the NetVault Server Using the Remote Configurator Figure 3-3: he tabs available from the Remote Configurator With the Remote Configurator window launched, options in it can be set to alter the installation of NetVault on the selected remote machine. As previously noted, not all of the Configurator tabs accessible from a local launch are available from the Remote Configurator window. he following tabs are available. Important: Auditing Logging Daemon Reporting Device Scan Media Manager Schedule Manager Firewall Network Manager Security General Notification ime Synchronization GUI Plugin Options race Level Job Manager Process Manager Verify he options available and their settings are exactly the same as those explained in the section he abs of the NetVault Configurator of Chapter 2 on page 19. Once settings are made here, they are set for that machine s installation of NetVault. 1. All guidelines for use of the Configurator in regards to a local launch apply to option settings/use in the Remote Configurator (see the section Layout of the NetVault Configurator of Chapter 1 on page 11 for more information). 2. It is important to remember that settings made in the Remote Configurator affect how NetVault is configured on the selected target machine. herefore it is recommended only an administrator utilize this functionality (e.g., NetVault s Access Control functionality can be utilized to limit access to the Remote Configurator to specific users).

Title Page. for version 7.1.x. Version 1.3 Release Date 02/22/2005 NVE C 09/22-05

Title Page. for version 7.1.x. Version 1.3 Release Date 02/22/2005 NVE C 09/22-05 itle Page for version 7.1.x Version 1.3 Release Date 02/22/2005 NVE 7003-18C 09/22-05 Copyrights Software Copyright 2005 BakBone Software NetVault Configurator Guide (for Version 7.1.x) Copyright 2005

More information

Quest NetVault Backup

Quest NetVault Backup Quest NetVault Backup version 8.6.x Configuration Guide Version: Product Number: NVG-103-8.6.x-EN-01 NVG-103-8.6.x-EN-01 09/29/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

NetVault:Backup for Mac OS X

NetVault:Backup for Mac OS X NetVault:Backup 7.4.3 for Mac OS X Copyright 2006 BakBone Software, Inc. This document contains important end user release information on NetVault:Backup 7.4.3 for Mac OS X. This document also includes

More information

NetVault : Backup Built-in Plugins

NetVault : Backup Built-in Plugins NetVault : Backup Built-in Plugins Version: 8.5Product Number: NVG-129-8.5.1-EN-02 version 8.5.1 User s Guide NVG-129-8.5.1-EN-02 04/26/10 Copyrights NetVault: Backup Built-in Plugins User s Guide Software

More information

Title Page. Guide. to Migrating a NetVault Smart Client to a Backup Server

Title Page. Guide. to Migrating a NetVault Smart Client to a Backup Server Title Page Guide to Migrating a NetVault Smart Client to a Backup Server Copyrights Guide to Migrating a NetVault Smart Client to a Backup Server Software Copyright 2008 BakBone Software Documentation

More information

Quest NetVault Backup Plug-in for SnapMirror To Tape. User s Guide. version 7.6. Version: Product Number: NTG EN-01 NTG

Quest NetVault Backup Plug-in for SnapMirror To Tape. User s Guide. version 7.6. Version: Product Number: NTG EN-01 NTG Quest NetVault Backup Plug-in for SnapMirror To Tape version 7.6 User s Guide Version: Product Number: NTG-101-7.6-EN-01 NTG-101-7.6-EN-01 09/30/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide

More information

NetVault for MAC OS X. Contents

NetVault for MAC OS X. Contents NetVault 7.4.2 for MAC OS X Copyright 2006 BakBone Software, Inc. This document contains important end user release information on NetVault 7.4.2 for MAC OS X. This document also includes a brief description

More information

Quest NetVault Backup Plug-in for SnapMirror to Tape

Quest NetVault Backup Plug-in for SnapMirror to Tape Quest NetVault Backup Plug-in for SnapMirror to Tape version 7.6.107 User s Guide Version: Product Number: NTG-101-7.6.107-EN-01 NTG-101-7.6.107-EN-01 12/12/12 2012 Quest Software, Inc. ALL RIGHTS RESERVED.

More information

NetIQ Secure Configuration Manager Installation Guide. October 2016

NetIQ Secure Configuration Manager Installation Guide. October 2016 NetIQ Secure Configuration Manager Installation Guide October 2016 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

Managing Configurations

Managing Configurations CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main

More information

Network Management Utility

Network Management Utility 4343-7705-02 Network Management Utility Foreword Welcome Network Management Utility is utility software that provides central control over printers, copiers, and other devices on a network. With Network

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

IBM i Version 7.2. Connecting to your system Connecting to Your system with IBM Navigator for i IBM

IBM i Version 7.2. Connecting to your system Connecting to Your system with IBM Navigator for i IBM IBM i Version 7.2 Connecting to your system Connecting to Your system with IBM Navigator for i IBM IBM i Version 7.2 Connecting to your system Connecting to Your system with IBM Navigator for i IBM Note

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

Salto Offline Lock Integration Guide

Salto Offline Lock Integration Guide Salto Offline Lock Integration Guide August 2015 SATEON Salto Offline Lock Integration Guide Issue 1.0, released August 2015 Disclaimer Copyright 2015, Grosvenor Technology. All rights reserved. SATEON

More information

Inventory File Data with Snap Enterprise Data Replicator (Snap EDR)

Inventory File Data with Snap Enterprise Data Replicator (Snap EDR) TECHNICAL OVERVIEW File Data with Snap Enterprise Data Replicator (Snap EDR) Contents 1. Abstract...1 2. Introduction to Snap EDR...1 2.1. Product Architecture...2 3. System Setup and Software Installation...3

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

10 MONITORING AND OPTIMIZING

10 MONITORING AND OPTIMIZING MONITORING AND OPTIMIZING.1 Introduction Objectives.2 Windows XP Task Manager.2.1 Monitor Running Programs.2.2 Monitor Processes.2.3 Monitor System Performance.2.4 Monitor Networking.2.5 Monitor Users.3

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished

More information

Quest NetVault Backup Plug-in for SAP R/3 Backint

Quest NetVault Backup Plug-in for SAP R/3 Backint Quest NetVault Backup Plug-in for SAP R/3 Backint version 5.0 User s Guide SBG-101-5.0-EN-01 11/30/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Wavelink Avalanche Site Edition Java Console User Guide. Version 5.3

Wavelink Avalanche Site Edition Java Console User Guide. Version 5.3 Wavelink Avalanche Site Edition Java Console User Guide Version 5.3 Revised 04/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

AST2500 ibmc Configuration Guide

AST2500 ibmc Configuration Guide AST2500 ibmc Configuration Guide Version 1.0b Copyright Copyright 2017 MITAC COMPUTING TECHNOLOGY CORPORATION. All rights reserved. No part of this manual may be reproduced or translated without prior

More information

Mercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007

Mercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide Version 9.2 Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide, Version 9.2 This document, and the accompanying software and other documentation,

More information

CounterACT Syslog Plugin

CounterACT Syslog Plugin Version 3.2.0 Table of Contents About the Syslog Plugin... 3 Multiple Destination Syslog Server Support... 3 Receiving Event Messages... 3 Sending Syslog Messages... 4 Sending CounterACT Event Messages...

More information

SystemWalker/StorageMGR User's Guide Solaris-

SystemWalker/StorageMGR User's Guide Solaris- SystemWalker/StorageMGR User's Guide 10.0 -Solaris- Preface ++ Purpose This manual explains how to operate Web-GUI with SystemWalker/StorageMGR. SystemWalker is a generic name for products for operation

More information

iprint Manager Health Monitor for Linux Administration Guide

iprint Manager Health Monitor for Linux Administration Guide www.novell.com/documentation iprint Manager Health Monitor for Linux Administration Guide Open Enterprise Server OES 2 SP2 March 2012 Legal Notices Novell, Inc. makes no representations or warranties with

More information

Quest NetVault Bare Metal Recovery for Quest NetVault Backup Server

Quest NetVault Bare Metal Recovery for Quest NetVault Backup Server Quest NetVault Bare Metal Recovery for Quest NetVault Backup Server version 4.3 User s Guide VOG-103-4.3-EN-01 12/02/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information

More information

Metasys Database Manager Help Code No. LIT Software Release 9.0 Issued August 2017

Metasys Database Manager Help Code No. LIT Software Release 9.0 Issued August 2017 Code No. LIT-12011202 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Document Introduction...2 Summary of Changes...2 Metasys Database

More information

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A HP StorageWorks Performance Advisor Installation Guide Version 1.7A notice Copyright 2002-2004 Hewlett-Packard Development Company, L.P. Edition 0402 Part Number B9369-96068 Hewlett-Packard Company makes

More information

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3 PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000 User Manual Version 1.3 Promise Array Management Copyright 2003 Promise Technology, Inc. All Rights Reserved. Copyright by

More information

Release Date March 10, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312)

Release Date March 10, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312) Adeptia Server 4.9 Installation Guide Version 1.2 Release Date March 10, 2009 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312) 229-1727 Copyright Copyright 2000-2008 Adeptia,

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Abila MIP. Human Resource Management Installation Guide

Abila MIP. Human Resource Management Installation Guide Human Resource Management Installation Guide This is a publication of Abila, Inc. Version 2017.2 2017 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila

More information

PI Connector for Ping 1.0. User Guide

PI Connector for Ping 1.0. User Guide PI Connector for Ping 1.0 User Guide OSIsoft, LLC 777 Davis St., Suite 250 San Leandro, CA 94577 USA Tel: (01) 510-297-5800 Fax: (01) 510-357-8136 Web: http://www.osisoft.com PI Connector for Ping 1.0

More information

Quick KVM 1.1. User s Guide. ClearCube Technology, Inc.

Quick KVM 1.1. User s Guide. ClearCube Technology, Inc. Quick KVM 1.1 User s Guide ClearCube Technology, Inc. Copyright 2005, ClearCube Technology, Inc. All rights reserved. Under copyright laws, this publication may not be reproduced or transmitted in any

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Administration Deployment Settings, page 3 Device Admin Policy Sets,

More information

Paragon Manager. Single View Data Center Management For Paragon II Systems. Release User Guide

Paragon Manager. Single View Data Center Management For Paragon II Systems. Release User Guide Paragon Manager Single View Data Center Management For Paragon II Systems Release 2.0.2 User Guide Copyright 2007 Raritan, Inc. PMG-0H-E December 2007 255-30-6100-00 This page intentionally left blank.

More information

Oracle Communications Session Delivery Manager

Oracle Communications Session Delivery Manager Oracle Communications Session Delivery Manager Administration Guide Release 7.3 Formerly Net-Net Central December 2013 Copyright 2013, 2012 Oracle and/or its affiliates. All rights reserved. This software

More information

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection!

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection! jproductivity LLC Protect your investments with Protection! User Guide Protection! L i c e n s i n g S e r v e r v 4. 9 A d m i n i s t r a t o r G u i d e tm http://www.jproductivity.com Notice of Copyright

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

Release Notes for Avaya Proactive Contact 5.0 Agent. Release Notes for Avaya Proactive Contact 5.0 Agent

Release Notes for Avaya Proactive Contact 5.0 Agent. Release Notes for Avaya Proactive Contact 5.0 Agent Release Notes for Avaya Proactive Contact 5.0 Agent Copyright@2011 Notice: While reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing,

More information

Veritas NetBackup Vault Administrator s Guide

Veritas NetBackup Vault Administrator s Guide Veritas NetBackup Vault Administrator s Guide UNIX, Windows, and Linux Release 6.5 12308354 Veritas NetBackup Vault Administrator s Guide Copyright 2001 2007 Symantec Corporation. All rights reserved.

More information

NetVault : Backup. Administrator s Guide. version 8.5. Version: Product Number: NVG EN-02 NVG EN-02 02/08/10

NetVault : Backup. Administrator s Guide. version 8.5. Version: Product Number: NVG EN-02 NVG EN-02 02/08/10 NetVault : Backup version 8.5 Administrator s Guide Version: Product Number: NVG-101-8.5-EN-02 NVG-101-8.5-EN-02 02/08/10 Copyrights NetVault: Backup Administrator s Guide Software Copyright 2009 BakBone

More information

III Post Offices. Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163.

III Post Offices. Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163. III Post Offices Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163 Post Offices 141 142 GroupWise 7 Administration Guide 11 Creating a New Post Office As

More information

MDCStoreTools Data Management Utility

MDCStoreTools Data Management Utility MDCStoreTools Data Management Utility Version 1.1 User Guide 0112-0195 F July 2012 This document is provided to customers who have purchased Molecular Devices, LLC ( Molecular Devices ) equipment, software,

More information

Release Date April 9, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA

Release Date April 9, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Adeptia Suite 5.0 SP2 Installation Guide Release Date April 9, 2010 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Copyright Copyright 2000-2009 Adeptia, Inc. All rights reserved. Trademarks

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Archiving and Purging Data

Archiving and Purging Data CHAPTER 10 These topics provide basic information about data purging and archiving and system stability: Prime Network Database Schemas, page 10-1, describes the schemas supported by the Prime Network

More information

RedBeam Inventory Tracking User Manual

RedBeam Inventory Tracking User Manual RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer

More information

CorpSystem Workpaper Manager

CorpSystem Workpaper Manager CorpSystem Workpaper Manager Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced

More information

RC2000. User's Guide

RC2000. User's Guide RC2000 User's Guide Edition February 2003 Preface Purpose This manual describes the functions and operation of RC2000. RC2000 is a software product that provides functions for operating an OS console

More information

IBM DB2 Query Patroller. Administration Guide. Version 7 SC

IBM DB2 Query Patroller. Administration Guide. Version 7 SC IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure

More information

Nasuni Desktop Client User Guide

Nasuni Desktop Client User Guide Nasuni combines the best features of consumer file-sharing applications with the secure and robust storage infrastructure that enterprises demand. The Nasuni Desktop Client provides an easy-to-use, enterprise-friendly

More information

Abstract. XV Sync Installation Guide & User Manual. Abstract Abstract

Abstract. XV Sync Installation Guide & User Manual. Abstract Abstract Apteryx Inc. 313 S. High St. Suite 200 Akron, OH 44308 330-376-0889 voice 330-376-0788 fax sales@apteryx.com www.apteryx.com XV Sync Installation Guide & User Manual Abstract Abstract Abstract This document

More information

DSView. Installer/User Guide

DSView. Installer/User Guide DSView Installer/User Guide DSView Installer/User Guide Avocent, the Avocent logo, The Power of Being There, OutLook, DSView, AutoView, DSR, Dambrackas Video Compression, Click and Connect and OSCAR are

More information

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. User's Guide V10.0L10

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. User's Guide V10.0L10 Microsoft Windows NT Microsoft Windows 2000 SystemWalker/StorageMGR User's Guide V10.0L10 Preface ++ Purpose This manual explains how to operate Web-GUI with SystemWalker/StorageMGR. SystemWalker is a

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

Product Guide. McAfee Performance Optimizer 2.2.0

Product Guide. McAfee Performance Optimizer 2.2.0 Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

HP Data Protector 9.0 Deduplication

HP Data Protector 9.0 Deduplication Technical white paper HP Data Protector 9.0 Deduplication Introducing Backup to Disk devices and deduplication Table of contents Summary 3 Overview 3 When to use deduplication 4 Advantages of B2D devices

More information

Document Management System GUI. v6.0 User Guide

Document Management System GUI. v6.0 User Guide Document Management System GUI v6.0 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. www.helpsystems.com US: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148 IBM, AS/400, OS/400,

More information

SoftPro Installation Guide

SoftPro Installation Guide SoftPro Installation Guide UPGRADING TO STANDARD EDITION VERSION 12.0 MICROSOFT JET DATABASE ENGINE 4800 FALLS OF NEUSE ROAD, SUITE 400 / RALEIGH, NC 27609 phone: 800 848 0143 / fax: 919 755 8350 / e mail:

More information

Dell NetVault Backup Administrator s Guide

Dell NetVault Backup Administrator s Guide Dell NetVault Backup 10.0.1 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

StarWind iscsi SAN Software: Virtual Tape Library (Part 1)

StarWind iscsi SAN Software: Virtual Tape Library (Part 1) StarWind iscsi SAN Software: Virtual Tape Library (Part 1) www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No part of this publication

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Administration GUIDE. OSSV Plug-In. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 100

Administration GUIDE. OSSV Plug-In. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 100 Administration GUIDE OSSV Plug-In Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 100 User Guide - OSSV Plug-In Table of Contents Overview New Features System Requirements Getting Started Setup

More information

IBM i Version 7.3. Systems management Disk management IBM

IBM i Version 7.3. Systems management Disk management IBM IBM i Version 7.3 Systems management Disk management IBM IBM i Version 7.3 Systems management Disk management IBM Note Before using this information and the product it supports, read the information in

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

Version Double-Take Move for Linux User's Guide

Version Double-Take Move for Linux User's Guide Version 8.0.1 Double-Take Move for Linux User's Guide Notices Double-Take Move for Linux User's Guide Version 8.0.1, January 18, 2018 Check your service agreement to determine which updates and new releases

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

Cisco Terminal Services (TS) Agent Guide, Version 1.1

Cisco Terminal Services (TS) Agent Guide, Version 1.1 First Published: 2017-05-03 Last Modified: 2017-10-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd. IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1

More information

PowerCenter Repository Maintenance

PowerCenter Repository Maintenance PowerCenter Repository Maintenance 2012 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without

More information

Arcserve Backup for Windows

Arcserve Backup for Windows Arcserve Backup for Windows Agent for Sybase Guide r17.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Archiving and Purging Data from the Database

Archiving and Purging Data from the Database CHAPTER 10 These topics provide basic information about data purging and archiving and system stability: Prime Network Database Schemas, page 10-1, describes the schemas supported by the Prime Network

More information

EMC Voyence Payment Card Industry Advisor. User s Guide. Version P/N REV A01

EMC Voyence Payment Card Industry Advisor. User s Guide. Version P/N REV A01 EMC Voyence Payment Card Industry Advisor Version 1.1.1 User s Guide P/N 300-007-495 REV A01 EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com COPYRIGHT Copyright

More information

Setup Guide. Before Setting Up. Installation. Start-up/Shutdown

Setup Guide. Before Setting Up. Installation. Start-up/Shutdown Setup Guide Before Setting Up Installation Start-up/Shutdown For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this product

More information

Ericsson Mobile Organizer 5.1

Ericsson Mobile Organizer 5.1 Preface Welcome to Ericsson Mobile Organizer (EMO) 5.1, which offers a full range of mobile office applications to help you keep up with your important emails, calendar and contacts. EMO 5.1 uses Push

More information

RISO Controller PS7R-9000/5000

RISO Controller PS7R-9000/5000 RISO Controller PS7R-9000/5000 for Printer Driver 00E Preface The RISO PS7R Controller Printer Driver is a dedicated printer driver for the RISO PS7R Controller. This manual describes various functions

More information

Hitachi File Services Manager Release Notes

Hitachi File Services Manager Release Notes Hitachi File Services Manager Release Notes Copyright 2011, 2015, Hitachi, Ltd., Hitachi Data Systems Corporation, ALL RIGHTS RESERVED Notice: No part of this publication may be reproduced or transmitted

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Interstage Shunsaku Data Manager Operator s Guide

Interstage Shunsaku Data Manager Operator s Guide Interstage Shunsaku Data Manager Operator s Guide Operator s Guide Trademarks Trademarks of other companies are used in this manual only to identify particular products or systems. Product Microsoft, Visual

More information

2016. All rights reserved. ecconnect V.11 User Guide

2016. All rights reserved. ecconnect V.11 User Guide 2016. All rights reserved. ecconnect V.11 User Guide Copyright and trademarks ecconnect User Guide Copyright and trademarks The information in this document is subject to change without notice. This document

More information

SPECTRUM. Control Panel User Guide (5029) r9.0.1

SPECTRUM. Control Panel User Guide (5029) r9.0.1 SPECTRUM Control Panel User Guide (5029) r9.0.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes

More information

OnCommand Unified Manager 7.2: Best Practices Guide

OnCommand Unified Manager 7.2: Best Practices Guide Technical Report OnCommand Unified : Best Practices Guide Dhiman Chakraborty August 2017 TR-4621 Version 1.0 Abstract NetApp OnCommand Unified is the most comprehensive product for managing and monitoring

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

Top Producer for Palm Handhelds

Top Producer for Palm Handhelds Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick

More information