Вы находитесь на странице: 1из 2

Veritas Volume Replicator 5.

0 for Solaris



The Veritas Volume Replicator 5.0 for Solaris course is

designed for system administrators tasked with deploying
and managing a replicated data environment using
Veritas Volume Replicator. This three-day, instructor-led
class covers product components and features, such as
replicated volume groups and data sets, storage
replicator logs, RLINKs, data change maps, and off-host
processing. Hands-on labs illustrate how data replication
is accomplished in a variety of failure situations. Students
also learn the fundamentals of data replication and
become proficient in planning, implementing, and
managing the Veritas Volume Replicator component of
their disaster recovery strategy.

Disaster Recovery Overview

Disaster Recovery
Benefits of a Disaster Recovery Solution
Disaster Recovery Concepts
Overview of Symantec Disaster Recovery Technologies

Delivery Method
Three days
Course Objectives
By the end of this course, you should be able to:

Describe industry-standard replication technology

concepts and components.

Describe Veritas Volume Replicator-specific

concepts and components.

Develop a plan and implement Veritas Volume


Initialize, synchronize, and replicate sample data.

Perform a takeover, a migration, and a failback.

Use a bunker site for disaster recovery.

Perform off-host processing at the secondary

replication site.

Troubleshoot a replicated data environment.

Who Should Attend
This course is for Solaris system administrators, system
engineers, and technical support representatives who
work with Veritas Volume Replicator.
You should have working knowledge of system
administration and configuration on the Solaris platform.
Completion of the Storage Foundation 5.0 course, or
equivalent experience, is required.
This course includes practical exercises, assessment
items, and demonstrations that enable you to test your
new skills and begin to transfer them into your working


Replication Overview
Defining Replication
Replication Options and Technologies
Veritas Volume Replicator Overview
VVR Components
Comparing Volume Replication with Volume Management
Volume Replicator Components
Volume Replicator Data Flow
Replication Control
Replication Mode and SRL Overflow
Latency Protection
Bandwidth Throttling
How VVR Detects Failure of a Secondary RVG
Installation and Tuning
VVR Installation
Tuning VVR
VVR Interfaces
Establishing Replication
Replication Setup
Preparing for an Initial Synchronization of Data
Methods for Synchronizing a Secondary RVG
Assessing the Status of the Replication Environment
VVR Administration
Starting and Stopping Replication
Volume, RVG, and RLINK Administration
Validating Replicated Data
VVR Recovery After Failures
Recovery Overview
Migration, Takeover, and Fast Failback
Recovery from Volume Errors
Bunker Replication
What Is Bunker Replication?
Setting Up Bunker Replication
Administering Bunker Replication
Off-Host Processing
Off-Host Processing with VVR

In-Band Control Messaging

Using Fire Drill Operation for Disaster Recovery
Planning a VVR Environment
Satisfying Business Needs when Planning a VVR
SRL Planning
Network Planning
The VRAdvisor Tool
VVR Troubleshooting
What You Need to Know to Troubleshoot VVR
Common VVR Trouble Areas
Managing VVR Using Storage Foundation Manager
Optional Workshop: VVR Troubleshooting
Restoring the Secondary Site from a Secondary
Restoring the Secondary Site from a Primary Backup
Recovering from an SRL Failure at the Primary Site
Recovering from Data Volume Failure at the Primary

Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and VERITAS are trademarks or registered trademarks of Symantec Corporation or its affiliates
in the U.S. and other countries. Other names may be trademarks of their respective owners. Specifications and product offerings are subject to change without notice.