Вы находитесь на странице: 1из 20

F4220-Server

Management
TABLE OF CONTENTS

TOPICS CONTETS PAGE

Contents i

1.0 Veritas NetBack-up 1

1.1 Introduction of Veritas NetBack-up 1

1.2 Characteristic 1

1.3 Feature of Veritas NetBack-up 2

1.4 How it Works 3


1.4.1 Diagram of NetBackup Vault manages the entire cycle of

ape duplication and offsite vaulting 5

1.5 Actions Menu 6

1.5.1 Actions Menu 6

1.6 Backup Menu 7

1.6.1Diagram of Backup, Archive, and Restore – NetBackup 7

1.7 NetBackup Window 8

1.7.1 Diagram of NetBackup Window 8

2.0 Acronis True Image 9

2.1 Introduction 9

2.2 Characteristics 9

2.3 Feature of Acronis True Image 9

2.4 Step and Actions Menu 10

2.4.1 Diagram of Acronis True Image Home – main page 11

2.4.2 Diagram of Acronis True Image flow process 13

3.0 Norton Ghost 15.0 14

3.1 Introduction 14

3.2 Characteristic 14

3.3 Feature of Norton Ghost 15.0 15

3.4 How it Works 16

3.4.1 Diagram of Define Backup, Run Backup, Recover Data 17

4.0 Differentiation between Veritas NetBack-up and Acronis True Image 18

References 19

1
F4220-Server
Management
1.0 Veritas Netback-up

1.1 Introduction of Veritas Netback-up

Veritas NetBackup is an enterprise level heterogeneous(pelbagai) backup and recovery suite. It


provides cross-platform backup functionality to a large variety of Windows, UNIX and Linux
operating systems. Users can set up profiles to control what, when and how backups are
duplicated, and when tapes will be shipped to and from the offsite vault to help ensure minimal
data loss in the event of a disaster.

The NetBackup Browser is configured to work with a specific NetBackup client. When a user
starts an operation using the NetBackup Browser, the browser software sends the appropriate
messages to its designated NetBackup client. The software on the NetBackup client then
communicates with the server and handles the client side of the operation. NetBackup client
software enables server directed backup, archive, and restore operations on entire folders
or individual files that reside on an NetBackup client. This software also allows performing user
directed backup, archive, and restoring operations on your NetBackup client, without logging
into the NetBackup master server.

In NetBackup terminology, the system that requires the backup or archive is the NetBackup
client. The system that manages the storage and retrieval of the backup data is called the
NetBackup master server.

1.2 Characteristic

Comprehensive Tape Rotation


To facilitate disaster recovery, NetBackup Vault coordinates the movement of backup media
(tapes) to and from an offsite storage facility, at minimal cost and maximum efficiency.

Fully Automated
Preset vaulting profiles determine which backups are duplicated or sent offsite, and for how long
they are retained. NetBackup Vault also automatically sends a backup of the NetBackup catalog
(database) offsite, along with the regular backup tapes, to aid in the recovery process.

Vault Job Queue


Automate disaster recovery preparations even further by enabling vault jobs to queue up inside
of NetBackup and complete when resources are available.

Low Maintenance
Tapes to be sent offsite are automatically ejected each day for tape-handling personnel to
quickly package and ship.

2
F4220-Server
Management
Offsite Media Tracking
Onsite and offsite tape inventories are meticulously recorded and tracked in the NetBackup
database, so you always know where a tape is supposed to be

Container Vaulting
NetBackup Vault supports the vaulting of closed containers of backup media, providing the
ability to track and report on media, the containers in which they reside, and the return dates of
those media and containers.

Detailed Vault Reporting


Like clockwork, daily pick list reports show which tapes need to be shipped offsite or returned
onsite, making it easy to coordinate with offsite personnel and data storage vendors.

Report Consolidation and Granularity


Generate a single detailed report and assign distribution granularity for reports.

1.3 Feature of Veritas NetBack-up

Full Backup
When the NetBackup master server is configured to perform a full backup, NetBackup backs up
all files in a specified folder or drive to a storage unit. The archive bit is cleared as each file is
backed up. If the full backup fails, NetBackup will attempt another full backup at the same time
each day until successfully completed. A successfully completed backup will include all files.

Cumulative-Incremental Backup
When the NetBackup master server is configured to perform a cumulativeincremental
backup, NetBackup backs up all files that have changed since the last successful full backup.
Cumulative incremental backups can be configured to use either the datetime stamp or the
archive bit. If the datetime stamp is used, the cumulativeincremental backup includes all files
with a datetime stamp that are more recent than the last full backup. If the archive bit is used,
the cumulative-incremental backup includes all files that have their archive bit set. Archive bits
are not cleared on cumulative-incrementals.

Differential-Incremental Backup
When the NetBackup master server is configured to perform a differentialincremental backup,
NetBackup backs up all files that have changed since the last successful backup. Differential
incremental backups can be configured to use either the datetime stamp or the archive bit. If the
datetime stamp is used, the differentialincremental backup includes all files with a datetime
stamp that are more recent than the last backup, full or incremental. If the archive bit is used,
the differential-incremental backup includes all files that have their archive bit set. Archive bits
are cleared on differential-incrementals if the file is successfully backed up.

3
F4220-Server
Management

True Image Backup


A True Image Backup takes place when the True Image Restore Information attribute has been
set on the NetBackup master server. When this attribute is set, NetBackup collects additional
information necessary to restore a folder to exactly what it was at the time of the full backup or
incremental backup. Only those backups, performed with the True Image Recovery Information
attribute set on the NetBackup master server, can be used for the true image
restore.

1.3.1 VERITAS
NetBackupTM 6.0
Vault Option

1.4 How it Works

AUTOMATIC TAPE EJECTION


SIMPLIFIES MEDIA MANAGEMENT
One of the more challenging tasks involved with vault management is collecting the tapes to be
sent offsite every day. Manually ejecting the correct tapes from a large robotic tape library is
more difficult than it sounds when there are dozens or even hundreds of tapes to choose from.
Too often, operations managers are forced to add this mundane and time-consuming activity to
the large list of tasks their overworked staff is already responsible for, simply because they are
usually the only people who can access the backup application and determine the right tapes to
eject and send offsite. There’s a more efficient way with NetBackup Vault. Tape ejection is
handled automatically based on preset profiles that determine which tapes should be sent
offsite each day. NetBackup Vault takes full advantage of a robotic tape library’s cartridge
access port (CAP), or media access port (MAP), and places the tapes to be vaulted in this

4
F4220-Server
Management
holding area so tape-handling personnel can simply empty the tapes from the CAP or MAP and
box them up for shipment. There is no need to first determine which tapes should be vaulted or
to involve the operations staff.

TRACKING MEDIA OFFSITE


Backup tapes are often one of the most overlooked security holes in any organization. When
sent offsite, backup tapes become vulnerable and could fall into the wrong hands. It is crucial to
know at all times which tapes have been sent offsite and where they are stored. Unfortunately,
manually tracking dozens or even hundreds of tapes stored at multiple locations is cumbersome
and virtually impossible to do with 100 percent accuracy, requiring endless bookkeeping and
manual data entry. NetBackup Vault meticulously(dengan cermat) tracks the location of every
tape by vault and slot number or container ID in the NetBackup database, as well as when each
tape is set to expire, eliminating the need for clumsy spreadsheets and time-consuming data
entry. NetBackup Vault can support any number of vaults for businesses that require multiple
offsite storage locations.

VAULT REPORTING
NetBackup Vault includes a series of essential reports such as picking list for robot, return list
from vault, various inventory lists, and the recovery report for use in recovery situations. These
reports help communicate status between onsite and offsite locations, and provide an important
way to coordinate directives with offsite data storage vendors.

For example, one of the most important reports, the pick list report, documents all the tapes that
are transferred offsite for a particular day. NetBackup Vault automatically assigns offsite slot
identifiers for use by the offsite vendor according to a numerical slot range allocation. Reports
are generated manually or automatically, and results can be output in print, e-mail, or file
formats, as well as electronic report formats supported by Iron Mountain’s SecureBase
application.

5
F4220-Server
Management

1.4.1 NetBackup Vault manages the entire cycle of ape duplication

and offsite vaulting.

#1-NetBackup Vault duplicates backups according the preset policies.

#2-NetBackup Vault automatically ejects tapes from the robotic tape library to be sent offsite.

#3-Tape are packaged and shipped to the offsite vault.

#4-NetBackup Vault records and tracks location and expiration of each tape.

#5-NetBackup Vault automatically e-mails report to offsite facility requesting tapes to be


returned.

#6-Expired tapes are shipped back onsite.

#7-Tapes are loaded back

6
F4220-Server
Management
1.5 Actions Menu

1.5.1 Actions menu


The commands on the Actions menu provide overall control of your NetBackup session.
Backup Files and Folders
Opens the NetBackup Backup window. From this window, select files, folders, or registry keys
to back up and then start a backup or archive operation.

Restore...
Opens the submenu and provides access to the following commands.

Restore from Backup


Opens a NetBackup Restore window. From this window, select files, folders, or registry keys
saved during previous backups and start a restore operation.

Restore from Archived Backup


Opens a NetBackup Restore (Archive) window. From this window, can select files, folders, or
registry keys saved during previous archives and start a restore operation.

Restore from Raw Partition Backup


Opens a NetBackup Restore (Raw Partition) window. From this window, can select raw
partitions saved during previous raw
partitian backups and start a raw partition restore operation.

Restore From True Image Backup


Opens a NetBackup Restore (True Image) window. From this window, can select files, folders,
or registry keys saved during
previous true image backups and start a true image restore operation.

Proxy Restore from Backup


This feature allows a user on a Windows NT machine to browse the backups of the local
Windows NT machine. The remote user can select files, folders, or registry keys from the
backup and restore to the remote machine. NetBackup will see all the requests as if they were
coming from the remote Windows NT machine.

Proxy Restore from Archived Backup


This feature allows a user on a Windows NT machine to browse the archive backup of the local
Windows NT machine. The remote user can select files, folders, or registry keys from the
backup and restore to the remote machine. NetBackup will see all the requests as if they were
coming from the remote machine.

7
F4220-Server
Management

Proxy Restore from Raw Partition Backup


This feature allows a user on a Windows NT machine to browse the Raw Partitian backup of the
local Windows NT machine. The remote user can select files, folders, or registry keys from the
backup and restore to the remote machine. NetBackup will see all the requests as if they were
coming from the remote machine.

Proxy Restore from True Image Backup


This feature allows a user on a Windows NT machine to browse the True Image backup of the
local Windows NT machine. The remote user can select files, folders, or registry keys from the
backup and restore to the local machine. NetBackup will see all the
requests as if they were coming from the remote machine.

1.6 Backup Menu


The Backup menu appears when the NetBackup Backup window is active. The
commands on the Backup menu control backup operations.

1.6.1 Backup, Archive, and Restore - NetBackup


Backup Marked Files...
Opens the Backup Marked Files dialog box. User can also execute this command by clicking
Backup on the NetBackup Backup window toolbar.

Specify NetBackup Machines...


Opens the NetBackup Backup Options dialog box to the Servers property sheet.

Options...
Opens the Options dialog box to the Backups property sheet.

Add to Exclude List


Adds the selected files, folders, or registry keys to the Exclude File List.

Add to Include List Adds the selected files, folders, or registry keys to the Include File List.

8
F4220-Server
Management

1.7 NetBackup Window

1.7.1 NetBackup Window

This window shows the files, folders, or registry keys you can mark for back up.
Access this window:
• From the Actions menu, click Backup Files and Folders
• From the toolbar, click Browse Backup
User can position this window separately. User can also cascade, tile or minimize the window
by using commands from the Window menu.

9
F4220-Server
Management

2.0 Acronis True Image

2.1 Introduction

Acronis True Image Home solves all backup problems, ensuring the safety of all information on
PC. Using it, user can back up selected files and folders, or entire disks and partitions.
If failures occur that block access to information or affect system operation, or if accidentally
delete necessary files, it easily to restore the system and lost data.
The unique technology developed by Acronis and implemented in Acronis True Image Home
allows to create exact, sector-by-sector disk backups, including all operating systems,
applications and configuration files, software updates, personal settings and all of the data.
If want to install a new hard disk drive, Acronis True Image Home will help to transfer
information from the old one in minutes, including operating systems, applications, documents
and personal settings.

2.2 Characteristics

Acronis True Image Home stores only those hard disk parts that contain data (for supported
file systems). Further, it does not back up swap file information (win386.swp under Windows
98/Me and pagefile.sys under Windows NT/2000/XP) and hiberfil.sys (a file that keeps RAM
contents when the computer goes into hibernation). This reduces image size and speeds up
image creation and restoration.
A partition image includes all files and folders independent of their attributes (including
hidden and system files), boot record, FAT (file allocation table), root and the zero track of
the hard disk with master boot record (MBR).
A disk image includes images of all disk partitions as well as the zero track with master boot
record (MBR).

2.3 Feature of Acronis True Image


Acronis True Image Home can create full, incremental and differential backups.
1. A full backup contains all data at the moment of backup creation. It forms a base for
further incremental or differential backup or is used as a standalone archive. A full
backup has the shortest restore time as compared to incremental or differential ones.

2. An incremental backup file only contains data changed since the last full or incremental
backup creation. Therefore, it is smaller and takes less time to create. But as it doesn’t
contain all data, all the previous incremental backups and the initial full backup are
required for restoration.

10
F4220-Server
Management
3. A differential backup creates an independent file, containing all changes against the
initial full archive. Generally, a differential backup will be restored faster than an
incremental one, as it does not have to process through a long chain of previous
backups.

A standalone full backup may be an optimal solution if the user often roll back the system to
the initial state (like in a gaming club or Internet café, to undo changes made by the guests).
Alternatively, if user are interested in saving only the last data state to be able to restore it in
case of system failure, consider the differential backup. It is particularly effective if data changes
tend to be little as compared to the full data volume.
The same is true for incremental backup. In addition, it is most useful when need frequent
backups and possibility to roll back to any of stored states.

Acronis Secure Zone


The Acronis Secure Zone is a special hidden partition for storing archives on the computer
system itself. For archive security purposes, ordinary applications cannot access it.
Acronis Secure Zone is always available for archive creation as long as there is space for the
backup file.

2.5 Step and Actions Menu

1. Acronis Startup Recovery Manager

How it works
The Acronis Startup Recovery Manager enables starting Acronis True Image Home without
loading the operating system. With this feature, if the operating system won't load for some
reason, it can run Acronis True Image Home by itself to restore damaged partitions. As opposed
to booting from Acronis removable media, it will not need a separate media or network
connection to start Acronis True Image Home.

2. Acronis Snap Restore


With this feature it can boot the OS on a crashed computer before the system is completely
restored from an image, and start work seconds after the restoration is launched. The
restoration will be continued in the background.
This feature is currently available for images being restored from the Acronis Secure Zone (see
above). Naturally, Acronis Snap Restore cannot be used if the image contains no operating
system (a logical partition or disk image) or when restoring file archives. Also, Snap Restore of
Windows 98/Me systems is not supported.

How it works
When the restoration procedure is started, Acronis True Image Home:

11
F4220-Server
Management
1. Finds the sectors in the image which contain system files, and restores these sectors first.
Thus, the OS is restored and can be started in a very short timeframe.
2. Writes on the hard disk its own drivers, which intercept system queries to the
files. When the user opens files or launches applications, the drivers receive the
system queries and restore the sectors that are necessary for the current operation.
3. At the same time, Acronis True Image Home proceeds with the complete sector-
by-sector image restoration in the background. However, the system requested
sectors have the highest priority.

The main program window contains the menu, the toolbar, the sidebar, the Active Tasks pane
and the main area. The main area contains operation icons, while the sidebar features Tools
and Help panels.

2.5.1 Acronis True Image Home- main page

The Operations or Tools menu.


The main window contains operation icons divided into two groups.
The Task group contains the following operations:
Backup - create a backup archive
Recovery - restore data from a previously created archive
Clone Disk - transfer the OS, applications and data from the old disk to the

12
F4220-Server
Management
new one.
Add New Disk - add a new disk for data storage leaving the OS and applications
on the old one.

The Tools group contains the following items:


Mount Image - connect a disk/partition image as a virtual drive
Unmount Image - disconnect the connected virtual drive
Validate Backup Archive - run the archive integrity checking procedure
Show Log - open the Log Viewer window
Manage Acronis Secure Zone - create, delete and resize a special hidden partition for
storing archives (Acronis Secure Zone)
Activate Acronis Startup
Recovery Manager - activate the boot restoration manager (F11 key).

Manage System Restore - turn on/off Microsoft Windows System Restore tool and
set its options directly from Acronis True Image Home.

Program menu
The program menu bar features the Operations, View, Tools and Help items.
The Operations menu contains a list of the available operations, including scheduling tasks.
The View menu contains items for managing the program window look:
Toolbars - contains commands that control toolbar icons
Common Task Bar - enables/disables the sidebar
Status Bar - enables/disables the status bar
Active tasks - enables/disables the Active Tasks pane at the bottom of the main area.

13
F4220-Server
Management

2.5.2 Acronis True Image flow process.

14
F4220-Server
Management
3.0 Norton Ghost 15.0

3.1 Introduction

Protect any kind of data to keep on computer by making a backup of data entire of the hard
disk. Or, limit the backup to include only those files and folders that mean the most to user. The
schedule backups to capture the changes automatically as a work from day to day. Or start a
backup manually at any time. It easily to configure Norton Ghost to run a backup in response to
specific events. For example, a backup can run when a particular application is started. Or, a
backup can run when a specified amount of new data is added to the drive. Restore a file,
folder, or an entire drive also can be done. This recovery process returns computer to a
previous, functional state with the operating system, applications, and data files intact. Or
accidentally delete a personal file get it back with a few steps.

Schedule the backups to run after hours when a computer is idle. When disaster strikes, Norton
Ghost helps to recover a computer from the effects of many common problems, including

1. Virus attacks: Damage might be done before a virus is quarantined.


2. Faulty software installations: Some software can negatively affect the computer’s
performance, and slow it down to the point that programs or documents require too much time
to open. But when installed, removing a program might not recover unintentional damage by the
installation.
3. Hard drive failure: Data can become corrupted on a system drive (typically C), making it
impossible to start an operating system
4. Files accidentally deleted or overwritten: Accidental deletion of files is common, but often
costly.
5. Corrupted files: Individual files and folders can become corrupted by viruses, or when a
program used to modify them encounters an error.

3.2Characteristics

1. Cold Imaging lets back-up computer files without installing Ghost.


2. Blu-ray Disc allows to back up large amounts of data to high-capacity Blu-ray Disc - up
to 25 GB per disc (50 GB dual-layer).
3. Windows® 7 support including support for Bitlocker™ provides enhanced data
protection through drive encryption and integrity checking.
4. Symantec ThreatCon integration leverages intelligence from Symantec’s industry-
leading security research organization to automatically backup files whenever ThreatCon
reaches a specified threat level.

15
F4220-Server
Management

3.3 Feature of Norton Ghost 15.0

Upgrade your hard drive


Use Norton Ghost to create a copy of hard disk before upgrading to another one. Create an
image file on removable media, or clone directly to another computer using a network, USB, or
parallel connection. For even greater flexibility, Norton Ghost supports Linux EXT2, as well as
Microsoft FAT and NTFS file systems. Norton Ghost determines the partition sizes for the
destination drive automatically. Once the hard disk is installed, restore saved files by cloning the
old hard disk onto the new hard disk, or restoring a saved image file.

Back up and recover your computer


Use Norton Ghost to create an image file of your computer on removable media, such as CD-
R/RW, ZIP disks, and JAZ disks, and back up an entire hard disk or selected partitions. Use it
for weekly backups or specific events, such as the installation of a new operating system. If it
run out of space when backing up to a removable disk, Norton Ghost prompts to insert another
disk or save to an alternate location. Once an image is created, use Norton Ghost to restore the
hard disk or any of the partitions saved.

Clone disks at optimum speed


Norton Ghost saves you time when:
-Copying one hard drive onto another
-Loading an image file from one hard drive to another when both drives are installed in the same
computer.

1. Full system (disk image) computer backup easily backup everything on a hard drive
or partition.

2. File and folder backup let’s back-up only the files and folders chosen, rather than
backing up and entire disk.

3. File backup search finds and backs up only the types of files chosen, such as photos,
MP3 files, and documents.

4. Incremental backup copies only files that have changed for fewer, faster backups.

5. Customizable, event-based backup triggers backups based on key events, such as


when install a new program or when there are sudden increases in data storage.

6. Offsite backup copies recovery points to a FTP site for easier offsite backup
management.

7. NAS backup gives the option of backing up files to network-attached storage devices.

8. Advanced compression automatically compresses files can store more files in less
space.

9. Advanced encryption helps keep sensitive documents safe from prying eyes.

16
F4220-Server
Management
10. System protection lets easily restore system, applications and files even when pc
can’t restart the operating system.

11. Google Desktop™ integration makes data recovery even faster with searchable
backup indexes.

12. LightsOut Restore lets you quickly restore the system without needing a bootable
CD.

13. Remote management lets remotely control other Norton Ghost installations (12.0
and higher) on the local area network.

14. Scheduled P2V allows to automatically create a virtual disk from most recent
backup.

15. Version support lets restore older disk images made with Ghost 10, 12 and 14.

16. Multiple storage options let back up to almost any media, including Blu-ray Disc®,
CDR/RW and DVD+-R/RW drives, USB and FireWire® (IEEE 1394) devices, network
drives, and Iomega® Zip® and Jaz® drives.

3.4 How it Works

While Norton Ghost does the work of backing up your files, folders, or entire
drives, user need to tell Norton Ghost what to backup, when to back it up, and
where to put the backed up data.

Refer to diagram 3.4.1 Define Backup, Run Backup, and Recover Data for information how
Norton Ghost process.

17
F4220-Server
Management

3.4.1 Define Backup, Run Backup, Recover Data

4.0 Differentiation between Veritas NetBack-up and Acronis True Image

18
F4220-Server
Management
Different between
Veritas NetBack-Up Acronis True Image
1 Full Backup
-Is configured to perform a full backup, NetBackup backs up -A full backup contains all data at the
all files in a specified folder or drive to a storage unit. moment of backup creation.
-It forms a base for further incremental or
-The archive bit is cleared as each file is backed up.
differential backup or is used as a
standalone archive.
-A full backup has the shortest restore
time as compared to incremental or
differential ones.

2 Cumulative-Incremental Backup -An incremental backup file only


-Is configured to perform a cumulative incremental contains data changed since the last full
backup, NetBackup backs up all files that have or incremental backup creation.
changed since the last successful full backup.
-It is smaller and takes less time to
-Cumulative incremental backups can be configured to create.
use either the datetime stamp or the archive bit.

- If the archive bit is used, the cumulative-incremental


backup includes all files that have their archive bit set.
Archive bits are not cleared on cumulative-
incrementals.

3 Differential-Incremental Backup -A differential backup creates an


-Is configured to perform a differential incremental independent file, containing all changes
backup, NetBackup backs up all files that have against the initial full archive.
changed since the last successful backup.
-A differential backup will be restored
-Differential incremental backups can be configured to faster than an incremental one, as it does
use either the datetime stamp or the archive bit. not have to process through a long chain
of previous backups.
-Archive bits are cleared on differential-incrementals if
the file is successfully backed up.

4 True Image Backup The Acronis Secure Zone


-A True Image Backup takes place when the True -Is a special hidden partition for
Image Restore Information attribute has been set on storing archives on the computer
the NetBackup master server. system itself.
-Only those backups, performed with the True Image
Recovery Information attribute set on the NetBackup -Acronis Secure Zone is
master server, can be used for the true image necessary for using Acronis
restore. Startup Recovery Manager and
Acronis Snap Restore features

19
F4220-Server
Management

References

Web reference for Veritas NetBackup:


1. http://en.wikipedia.org/wiki/NetBackup

2. http://seer.support.veritas.com/docs/278434.htm

Web reference for Acronis True Image:


1. http://kb.acronis.com/content/3290

2. http://en.wikipedia.org/wiki/Acronis_True_Image

3. http://download.microsoft.com/download/2/b/9/2b99fd0d-5437-40d7-a430-
23e31cac7ece/Deployment_Cookbook.VS_Acronis_FINAL.doc

Web reference for Norton Ghost User Guide / Norton Ghost 15.0:
1. http://servi.icis.pcz.pl/files/Ghost_guide.pdf

2. ftp://ftp.symantec.com/public/english_us_canada/products/ghost/10/manuals/Ghost_10_
User_Guide.pdf

3. http://www.symantec.com/norton/support/top_ts_issues.jsp?
pvid=nghost_15&id=tech_issues&selected_nav=5

20

Вам также может понравиться