Veritas NetBackup™ Administrator's Guide, Volume I
- Section I. About NetBackup
- Section II. Configuring hosts
- Configuring Host Properties
- About the NetBackup Host Properties
- Access Control properties
- Bandwidth properties
- Busy File Settings properties
- Client Attributes properties
- Client Settings properties for UNIX clients
- Client Settings properties for Windows clients
- Data Classification properties
- Default Job Priorities properties
- Encryption properties
- Exchange properties
- Exclude Lists properties
- Fibre Transport properties
- Firewall properties
- General Server properties
- Global Attributes properties
- Logging properties
- Login Banner Configuration properties
- Media properties
- Network Settings properties
- Port Ranges properties
- Preferred Network properties
- Resilient Network properties
- Restore Failover properties
- Retention Periods properties
- Scalable Storage properties
- Servers properties
- SharePoint properties
- SLP Parameters properties
- Throttle Bandwidth properties
- Universal Settings properties
- User Account Settings properties
- Configuration options for NetBackup servers
- THROTTLE_BANDWIDTH option for NetBackup servers
- Configuration options for NetBackup clients
- IGNORE_XATTR option for NetBackup clients
- VXSS_NETWORK option for NetBackup clients
- Configuring server groups
- Configuring host credentials
- Managing media servers
- Configuring Host Properties
- Section III. Configuring storage
- Configuring disk storage
- Configuring robots and tape drives
- About configuring robots and tape drives in NetBackup
- Adding a robot to NetBackup manually
- Managing robots
- Adding a tape drive to NetBackup manually
- Adding a tape drive path
- Correlating tape drives and SCSI addresses on Windows hosts
- Correlating tape drives and device files on UNIX hosts
- Managing tape drives
- Performing device diagnostics
- Configuring tape media
- About NetBackup volume pools
- About WORM media
- About adding volumes
- Configuring media settings
- Media settings options
- Media type (new media setting)
- Media settings options
- About barcodes
- Configuring barcode rules
- Configuring media ID generation rules
- Adding volumes by using the Actions menu
- Configuring media type mappings
- Managing volumes
- About exchanging a volume
- About frozen media
- About injecting and ejecting volumes
- About rescanning and updating barcodes
- About labeling NetBackup volumes
- About moving volumes
- About recycling a volume
- Managing volume pools
- Managing volume groups
- Inventorying robots
- About showing a robot's contents
- About updating the NetBackup volume configuration
- About the vmphyinv physical inventory utility
- Configuring storage units
- About the Storage utility
- Creating a storage unit
- About storage unit settings
- Absolute pathname to directory or absolute pathname to volume setting for storage units
- Maximum concurrent jobs storage unit setting
- Staging backups
- Creating a basic disk staging storage unit
- Configuring storage unit groups
- Section IV. Configuring storage lifecycle policies (SLPs)
- Configuring storage lifecycle policies
- Storage operations
- Index From Snapshot operation in an SLP
- Snapshot operation in an SLP
- Retention types for SLP operations
- Capacity managed retention type for SLP operations
- Storage lifecycle policy options
- Using a storage lifecycle policy to create multiple copies
- Storage lifecycle policy versions
- Section V. Configuring backups
- Creating backup policies
- Planning for policies
- Policy Attributes tab
- Policy storage (policy attribute)
- Policy volume pool (policy attribute)
- Take checkpoints every __ minutes (policy attribute)
- Backup Network Drives (policy attribute)
- Cross mount points (policy attribute)
- Encryption (policy attribute)
- Collect true image restore information (policy attribute) with and without move detection
- Use Accelerator (policy attribute)
- Enable optimized backup of Windows deduplicated volumes
- Use Replication Director (policy attributes)
- Schedule Attributes tab
- Type of backup (schedule attribute)
- Frequency (schedule attribute)
- Multiple copies (schedule attribute)
- Retention (schedule attribute)
- Media multiplexing (schedule attribute)
- Start Window tab
- Include Dates tab
- How open schedules affect calendar-based and frequency-based schedules
- About the Clients tab
- Backup Selections tab
- Adding backup selections to a policy
- Verifying the Backup Selections list
- Pathname rules for UNIX client backups
- About the directives on the Backup Selections list
- ALL_LOCAL_DRIVES directive
- Files that are excluded from backups by default
- Disaster Recovery tab
- Active Directory granular backups and recovery
- Synthetic backups
- Using the multiple copy synthetic backups method
- Protecting the NetBackup catalog
- Parts of the NetBackup catalog
- Protecting the NetBackup catalog
- Archiving the catalog and restoring from the catalog archive
- Estimating catalog space requirements
- About the NetBackup relational database
- About the NetBackup relational database (NBDB) installation
- Using the NetBackup Database Administration utility on Windows
- Using the NetBackup Database Administration utility on UNIX
- Post-installation tasks
- About backup and recovery procedures
- Managing backup images
- Creating backup policies
- Section VI. Configuring replication
- About NetBackup replication
- About NetBackup Auto Image Replication
- Viewing the replication topology for Auto Image Replication
- About the storage lifecycle policies required for Auto Image Replication
- Removing or replacing replication relationships in an Auto Image Replication configuration
- About NetBackup replication
- Section VII. Monitoring and reporting
- Monitoring NetBackup activity
- About the Jobs tab
- About the Daemons tab
- About the Processes tab
- About the Drives tab
- About the jobs database
- About pending requests and actions
- Reporting in NetBackup
- Using the Logging Assistant
- Monitoring NetBackup activity
- Section VIII. Administering NetBackup
- Management topics
- Accessing a remote server
- Using the NetBackup Remote Administration Console
- Run-time configuration options for the NetBackup Administration Console
- About improving NetBackup performance
- About adjusting time zones in the NetBackup Administration console
- Alternate server restores
- About performing alternate server restores
- Managing client backups and restores
- About client-redirected restores
- Powering down and rebooting NetBackup servers
- About Granular Recovery Technology
- About configuring Services for Network File System (NFS) on Windows 2012, 2012 R2, or 2016
- About configuring Services for Network File System (NFS) on Windows 2008 and 2008 R2
About trusted master servers for Auto Image Replication
NetBackup provides the ability to establish a trust relationship between replication domains. A trust relationship is optional. The following items describe how a trust relationship affects Auto Image Replication:
With Targeted A.I.R., when establishing trust between the source and the remote target server, you need to establish trust in both the domains.
In the source master server, add the target master server as a trusted server.
In the target master server, add the source master server as a trusted server.
The following diagram illustrates the different tasks for adding trusted master servers.
Table: Tasks to establish a trust relationship between master servers for Targeted A.I.R.
Step | Task | Procedure |
---|---|---|
Step 1 | Administrators of both the source and target master servers must obtain each other's CA certificate fingerprint and authorization tokens or the user credentials. This activity must be performed offline. Note: Veritas recommends using an authentication token to connect to the remote master server. An authentication token provides restricted access and allows secure communication between both the hosts. The use of user credentials (user name and password) may present a possible security breach. | To obtain the authorization tokens, use the bpnbat command to login and nbcertcmd to get the authorization tokens. To obtain the SHA1 fingerprint of root certificate, use the nbcertcmd -displayCACertDetail command. To perform this task, see the NetBackup Commands Reference Guide. Note: When you run the commands, keep the target as the remote server. |
Step 2 | Establish trust between the source and the target domains.
| To perform this task in the Veritas Administration Console, see the following topic: See Adding a trusted master server. To perform this task using the nbseccmd, see the NetBackup Commands Reference Guide. |
Step 3 | After you have added the source and target trusted servers, they have each other's host ID-based certificates. The certificates are used during each communication. Master Server A has a certificate issued by Master Server B and vice versa. Before communication can occur, Master Server A presents the certificate issued by Master Server B and vice versa. The communication between the source and target master servers is now secured. | To understand the use of host ID-based certificates, see the Veritas Security and Encryption Guide. |
Step 4 | Create an import storage lifecycle policy in the target domain. | |
Step 5 | Create a replication storage lifecycle policy in the source domain using the specific target master server and storage lifecycle policy. The backups that are generated in one NetBackup domain can be replicated to storage in one or more target NetBackup domains. | |
Step 6 | The backups that are generated in one NetBackup domain can be replicated to storage in one or more target NetBackup domains. This process is referred to as Auto Image Replication. |
If your source and target trusted servers use different NetBackup versions, consider the following.
Note:
When you upgrade both the source and the target master server to version 8.1 or later, you need to update the trust relationship. Run the following command:
nbseccmd -setuptrustedmaster -update
See the NetBackup Commands Reference Guide.
Table: Trust setup methods for different NetBackup versions
Source server version | Target server version | Trust setup method |
---|---|---|
8.1 and later | 8.1 and later | Add a trusted master server using authorization token. Complete action on both the servers. |
8.1 and later | 8.0 or earlier | On the source server, add the target as the trusted master server using the remote (target) server's credentials. |
8.0 or earlier | 8.1 and later | On the source server, add the target as the trusted master server using the remote (target) server's credentials. |