SlideShare ist ein Scribd-Unternehmen logo
1 von 420
Downloaden Sie, um offline zu lesen
Front cover


Deployment Guide Series:
Tivoli Continuous Data
Protection for Files V3.1
Deployment best practices


Integration with TSM and Notes


Case studies,
troubleshooting , tips




                                                     Vasfi Gucer
                                                      Greg Bass
                                               Wolfgang Beuttler
                                                    Marcia Kubo



ibm.com/redbooks
International Technical Support Organization

Deployment Guide Series: Tivoli Continuous Data
Protection for Files V3.1

August 2007




                                               SG24-7423-00
Note: Before using this information and the product it supports, read the information in
 “Notices” on page xix.




First Edition (August 2007)
This edition applies to IBM Tivoli Continuous Data Protection for Files Version 3, Release 1.




© Copyright International Business Machines Corporation 2007. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP
Schedule Contract with IBM Corp.
Contents

                     Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii

                     Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

                     Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

                     Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
                     Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx

                     Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
                     The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
                     Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
                     Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii

Part 1. Planning and architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

                     Chapter 1. Introduction to Tivoli Continuous Data Protection for Files. . . 3
                     1.1 General overview of Tivoli Continuous Data Protection for Files . . . . . . . . 5
                        1.1.1 What is Tivoli Continuous Data Protection for Files? . . . . . . . . . . . . . 5
                        1.1.2 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . 6
                        1.1.3 Who should use Tivoli Continuous Data Protection for Files? . . . . . . 9
                     1.2 How Tivoli Continuous Data Protection for Files works. . . . . . . . . . . . . . . 11
                     1.3 Main features of Tivoli Continuous Data Protection for Files . . . . . . . . . . 13
                     1.4 Value proposition of Tivoli Continuous Data Protection for Files . . . . . . . 14
                        1.4.1 Benefits of using Tivoli Continuous Data Protection for Files . . . . . . 17
                        1.4.2 Unique differentiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

                     Chapter 2. Product architecture, planning, and deployment . . . . . . . . . . 19
                     2.1 Product architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
                        2.1.1 Main components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
                        2.1.2 Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
                        2.1.3 Daemon architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
                     2.2 Planning for deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
                        2.2.1 What are my critical files? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
                        2.2.2 Where should I back my files up to? . . . . . . . . . . . . . . . . . . . . . . . . . 26
                        2.2.3 How often do I need to back up different types of files? . . . . . . . . . . 26
                        2.2.4 Do I need e-mail and scheduled backups? . . . . . . . . . . . . . . . . . . . . 27
                        2.2.5 Do I need the Vault feature? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
                        2.2.6 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29



© Copyright IBM Corp. 2007. All rights reserved.                                                                                         iii
2.3 Best practices and sizing considerations . . . . . . . . . . . . . . . . . . . . . . . . . 30
                         2.3.1 Overall summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
                         2.3.2 Corporate scenario- Tivoli Continuous Data Protection for Files with
                                Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
                         2.3.3 Corporate scenario- file server as remote storage target for Tivoli
                                Continuous Data Protection for Files workstations . . . . . . . . . . . . . . 32
                         2.3.4 Corporate scenario- Tivoli Continuous Data Protection for Files loaded
                                on file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
                         2.3.5 Home user scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
                      2.4 Tivoli Continuous Data Protection for Files installation requirements . . . . 34
                         2.4.1 Basic installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
                         2.4.2 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Part 2. Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

                      Chapter 3. Installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 39
                      3.1 Basic installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
                         3.1.1 Installing Tivoli Continuous Data Protection for Files . . . . . . . . . . . . 40
                         3.1.2 Configuration using the Initial Configuration Wizard . . . . . . . . . . . . . 48
                      3.2 Advanced installation options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
                         3.2.1 Installation using command-line parameters. . . . . . . . . . . . . . . . . . . 65
                         3.2.2 Silent installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
                         3.2.3 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
                         3.2.4 Pull installation (upgrade) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
                         3.2.5 Providing a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
                      3.3 Advanced configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
                         3.3.1 Settings Notebook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
                         3.3.2 Central Administration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
                      3.4 Additional considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
                         3.4.1 Installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
                         3.4.2 Interpreting file and folder patterns . . . . . . . . . . . . . . . . . . . . . . . . . 109
                         3.4.3 Including and excluding files from protection . . . . . . . . . . . . . . . . . 111
                         3.4.4 Vault duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
                         3.4.5 Default protection settings (Settings Notebook) . . . . . . . . . . . . . . . 116

                      Chapter 4. Proof of concept scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
                      4.1 Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
                      4.2 Single user environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
                         4.2.1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
                         4.2.2 Single computer with external storage . . . . . . . . . . . . . . . . . . . . . . 126
                         4.2.3 Single computer with ISP connection . . . . . . . . . . . . . . . . . . . . . . . 136
                      4.3 Multiple computers in a home or small business. . . . . . . . . . . . . . . . . . . 145
                         4.3.1 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
                         4.3.2 Small business with Tivoli Storage Manager Express . . . . . . . . . . 151


iv      Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
4.3.3 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
4.4 Tivoli Continuous Data Protection for Files in an enterprise environment180
   4.4.1 Enterprise environment with Tivoli Storage Manager . . . . . . . . . . . 180
   4.4.2 Enterprise with Tivoli Continuous Data Protection for Files loaded on file
          servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
   4.4.3 Enterprise and remote offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
4.5 Restore scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
   4.5.1 Restore from local disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
   4.5.2 Restore from remote storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
   4.5.3 Restore from Tivoli Storage Manager or Tivoli Storage Manager Express
          to a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

Chapter 5. Troubleshooting, hints, and tips . . . . . . . . . . . . . . . . . . . . . . . 255
5.1 Installation issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
   5.1.1 Disk space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
   5.1.2 Non-privileged users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
   5.1.3 Port conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
   5.1.4 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
   5.1.5 Pull installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
5.2 Replication issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
   5.2.1 Removable disk issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
   5.2.2 File server issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
   5.2.3 WebDAV issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
   5.2.4 Tivoli Storage Manager issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
   5.2.5 Transient conditions (remote storage location not reachable) . . . . 343
5.3 System operation and log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
   5.3.1 Tivoli Continuous Data Protection for Files system operation files . 347
   5.3.2 Tivoli Continuous Data Protection for Files logs . . . . . . . . . . . . . . . 348
   5.3.3 Tivoli Storage Manager specific log files . . . . . . . . . . . . . . . . . . . . . 350
5.4 Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
   5.4.1 Before you start. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
   5.4.2 How to run a trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
   5.4.3 Tracing example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353




                                                                                                 Contents        v
Part 3. Planning for a client engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

                    Appendix A. Project planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
                    Required skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
                    Available resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
                    Solution description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
                    Solution deployment tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
                    Strategies for successful implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
                    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

                    Appendix B. Sample Statement of Work for Tivoli Continuous Data
                                   Protection for Files deployment . . . . . . . . . . . . . . . . . . . . . 375
                    Building a protected environment for user workstations. . . . . . . . . . . . . . . . . 376

                    Abbreviations and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

                    Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
                    Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
                    Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
                    How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
                    Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384

                    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385




vi     Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Figures

                 1-1 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . . . . . 8
                 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files . . 11
                 1-3 General overview of Tivoli Continuous Data Protection for Files . . . . . . . 12
                 2-1 Agent-driver interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
                 2-2 Replication threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
                 3-1 Installation Setup Language window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
                 3-2 InstallShield Wizard is being prepared . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
                 3-3 Information window including the build number . . . . . . . . . . . . . . . . . . . . 42
                 3-4 Software License Agreement options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
                 3-5 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
                 3-6 Ready to Install window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
                 3-7 Installation progress window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
                 3-8 Installation completed window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
                 3-9 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
                 3-10 What is Critical page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
                 3-11 Folder and Files Settings dialog box (critical files) . . . . . . . . . . . . . . . . . 51
                 3-12 Select folders dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
                 3-13 Applications and Extensions box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
                 3-14 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
                 3-15 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
                 3-16 Initial Backup page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
                 3-17 Summary page with initial backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
                 3-18 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
                 3-19 Message that a new version is being installed . . . . . . . . . . . . . . . . . . . . 73
                 3-20 Message to reboot system after pull installation . . . . . . . . . . . . . . . . . . . 73
                 3-21 General page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
                 3-22 Files to Protect page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
                 3-23 Folders and Files box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
                 3-24 Folder and Files Settings dialog box (include/exclude). . . . . . . . . . . . . . 81
                 3-25 Select folders box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
                 3-26 Applications box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
                 3-27 Application Settings box (applications viewed by ranking) . . . . . . . . . . . 84
                 3-28 Vault box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
                 3-29 Vault Settings box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
                 3-30 Back up with new settings check box . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
                 3-31 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
                 3-32 E-mail Application: list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
                 3-33 E-mail Application Data Folder: text field . . . . . . . . . . . . . . . . . . . . . . . . 90



© Copyright IBM Corp. 2007. All rights reserved.                                                                                 vii
3-34 Folder and Files Settings box (schedules) . . . . . . . . . . . . . . . . . . . . . . . 91
                 3-35 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
                 3-36 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
                 3-37 Advanced page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
                 3-38 Central Administration Settings window . . . . . . . . . . . . . . . . . . . . . . . . 104
                 3-39 Successfully published fpcommands.xml pop-up window . . . . . . . . . . 105
                 3-40 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
                 3-41 Folder and Files Settings box (example include/exclude settings) . . . . 113
                 4-1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
                 4-2 General Configuration for a single user with local disk configuration . . . 124
                 4-3 Files to protect in a single user with local disk configuration. . . . . . . . . . 125
                 4-4 Continuous protection file directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
                 4-5 Single computer, with external storage . . . . . . . . . . . . . . . . . . . . . . . . . . 127
                 4-6 General configuration for a single user scenario with external disk . . . . 128
                 4-7 Selection of important files to continuously protect in a single user scenario
                     with external disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
                 4-8 Configuring the remote storage for scheduled protection . . . . . . . . . . . . 130
                 4-9 Configuring files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . 131
                 4-10 Configure the frequency and time to start the scheduled protection . . . 132
                 4-11 Start an initial backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
                 4-12 Original directory and files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
                 4-13 Replicated directory and files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
                 4-14 Single computer, with ISP connection. . . . . . . . . . . . . . . . . . . . . . . . . . 136
                 4-15 Continuous protection for a single computer with ISP connection . . . . 138
                 4-16 Important files continuous protection in a single user with an ISP
                     connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
                 4-17 Remote storage with ISP configuration. . . . . . . . . . . . . . . . . . . . . . . . . 140
                 4-18 Username and password to access Web server. . . . . . . . . . . . . . . . . . 141
                 4-19 Configure the frequency and time to start the scheduled protection to an
                     ISP provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
                 4-20 Files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
                 4-21 Activity report for changed files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
                 4-22 Activity report for changed file pres1.ppt. . . . . . . . . . . . . . . . . . . . . . . . 144
                 4-23 Sub-file functionality example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
                 4-24 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
                 4-25 General configuration without continuous protection . . . . . . . . . . . . . . 147
                 4-26 Map network drive in each computer . . . . . . . . . . . . . . . . . . . . . . . . . . 148
                 4-27 Configure user and password to access the file server . . . . . . . . . . . . 148
                 4-28 Configure remote storage for scheduled protection . . . . . . . . . . . . . . . 149
                 4-29 Configure schedule and select application for scheduled protection . . 150
                 4-30 Select files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
                 4-31 Small business without file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
                 4-32 Computers and applications option on Tivoli Storage Manager Express153


viii   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
4-33 Wizard to add computers and optionally deploy the backup client
    software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
4-34 Select option to add a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
4-35 Installation settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
4-36 Confirm settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
4-37 Stop Tivoli Storage Manager Express service . . . . . . . . . . . . . . . . . . . 157
4-38 Start Tivoli Storage Manager Express in foreground mode . . . . . . . . . 158
4-39 Configure node with delete permission . . . . . . . . . . . . . . . . . . . . . . . . . 158
4-40 Shutdown Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . 159
4-41 Start Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . 159
4-42 Reset the password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
4-43 Windows credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
4-44 New password information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
4-45 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
4-46 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 162
4-47 Remote storage configuration for Tivoli Storage Manager Express . . . 163
4-48 Node password on Tivoli Storage Manager Express server . . . . . . . . . 164
4-49 Select applications, files, and frequency to back up to Tivoli Storage
    Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
4-50 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 166
4-51 Filespace on Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . 167
4-52 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
4-53 Map network drive and reconnect at logon . . . . . . . . . . . . . . . . . . . . . . 169
4-54 Configure user name and password to access the file server . . . . . . . 169
4-55 General configuration for this scenario . . . . . . . . . . . . . . . . . . . . . . . . . 170
4-56 Files to protect in continuous backup . . . . . . . . . . . . . . . . . . . . . . . . . . 171
4-57 Configure remote storage for continuous and scheduled protection. . . 172
4-58 Configure directories, files, and frequency for schedule protection . . . 173
4-59 Select files and directories for scheduled protection . . . . . . . . . . . . . . . 174
4-60 Inform password for encrypted files . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
4-61 Replicated files with encryption option on file server . . . . . . . . . . . . . . 175
4-62 Computers and applications on Tivoli Storage Manager Express . . . . 176
4-63 Excluded files on Tivoli Storage Manager Express client . . . . . . . . . . . 177
4-64 Remove directory from dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
4-65 Files to backup on Tivoli Storage Manager Express. . . . . . . . . . . . . . . 179
4-66 Example of enterprise environment with Tivoli Storage Manager
      centric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
4-67 Lab environment (Tivoli Storage Manager centric) . . . . . . . . . . . . . . . . 183
4-68 Add nodes to Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . 185
4-69 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
4-70 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 187
4-71 Remote storage configuration to Tivoli Storage Manager . . . . . . . . . . . 188
4-72 Node password on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . 189


                                                                                                    Figures       ix
4-73 Select applications, files, and frequency to back up to Tivoli Storage
                    Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
                4-74 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 190
                4-75 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
                4-76 Initial Tivoli Continuous Data Protection for Files panel . . . . . . . . . . . . 192
                4-77 Central administration configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
                4-78 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
                4-79 Rename fpcommands.xml to use push installation . . . . . . . . . . . . . . . . 195
                4-80 Push installation on Bruge, Windows 2003 server . . . . . . . . . . . . . . . . 196
                4-81 Warning message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
                4-82 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
                4-83 Expiration example on Tivoli Storage Manager Server . . . . . . . . . . . . . 199
                4-84 Example of enterprise environment with Tivoli Storage Manager and file
                    server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
                4-85 Lab environment (Tivoli Storage Manager and file server) . . . . . . . . . . 203
                4-86 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
                4-87 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 205
                4-88 Remote storage configuration to file server Florence . . . . . . . . . . . . . . 206
                4-89 Select applications, files, and frequency to back up to a file server . . . 207
                4-90 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 208
                4-91 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
                4-92 Central administration configuration for group A. . . . . . . . . . . . . . . . . . 210
                4-93 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
                4-94 Remote storage configuration to file server Cairo . . . . . . . . . . . . . . . . . 211
                4-95 Select applications, files and frequency to backup to file server Cairo . 212
                4-96 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 213
                4-97 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
                4-98 Central administration configuration for group B. . . . . . . . . . . . . . . . . . 215
                4-99 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
                4-100 Central Management Report for Group B . . . . . . . . . . . . . . . . . . . . . . 218
                4-101 Files to protect on file server Florence . . . . . . . . . . . . . . . . . . . . . . . . 219
                4-102 Protected vaulting settings on file server Florence . . . . . . . . . . . . . . . 219
                4-103 Files to protect on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
                4-104 Protected vaulting settings on file server Cairo. . . . . . . . . . . . . . . . . . 220
                4-105 Message error when trying to delete vaulted files . . . . . . . . . . . . . . . . 221
                4-106 Protect Lotus Notes 7, using scheduled continuous protection . . . . . 222
                4-107 Password for Lotus Notes Database. . . . . . . . . . . . . . . . . . . . . . . . . . 222
                4-108 Notes files on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
                4-109 Backup policy on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . 224
                4-110 Register node on Tivoli Storage Manager server . . . . . . . . . . . . . . . . 225
                4-111 Example of dsm.opt file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
                4-112 Validate password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
                4-113 Schedule backup on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . 226


x   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
4-114 Enterprise and remote offices example. . . . . . . . . . . . . . . . . . . . . . . . 227
4-115 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
4-116 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
4-117 Files to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
4-118 Search BackupMe.txt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
4-119 Search status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
4-120 Select the file to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
4-121 Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
4-122 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
4-123 View report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
4-124 Select remote storage to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
4-125 Tivoli Continuous Data Protection for Files searching files . . . . . . . . . 236
4-126 Select file name and version of file to restore . . . . . . . . . . . . . . . . . . . 236
4-127 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
4-128 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
4-129 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
4-130 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
4-131 Tivoli Continuous Data Protection for Files searching for files . . . . . . 239
4-132 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
4-133 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
4-134 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
4-135 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
4-136 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
4-137 Tivoli Continuous Data Protection for Files Change Search Location
    window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
4-138 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
4-139 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
4-140 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
4-141 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
4-142 Select remote storage to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
4-143 Tivoli Continuous Data Protection for Files searching for files . . . . . . 248
4-144 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
4-145 Versions of notes file log.nsf on file server . . . . . . . . . . . . . . . . . . . . . 249
4-146 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
4-147 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
4-148 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
4-149 The restored notes file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
4-150 Tivoli Storage Manager backup-archive client . . . . . . . . . . . . . . . . . . 251
4-151 Restore Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
4-152 Select destination folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
4-153 Report status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
5-1 Ready to Install the Program window . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
5-2 Out of Disk Space window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257


                                                                                                 Figures        xi
5-3 Custom Setup window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
                5-4 Cancel installation window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
                5-5 InstallShield Wizard Completed window (canceled installation) . . . . . . . 259
                5-6 Setup Type (of installation) window . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
                5-7 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
                5-8 Change Current Destination Folder window . . . . . . . . . . . . . . . . . . . . . . 262
                5-9 Error message during non-privileged user installation . . . . . . . . . . . . . . 263
                5-10 Port 9003 already being used by another program . . . . . . . . . . . . . . . . 265
                5-11 Tivoli Continuous Data Protection for Files reporting a problem . . . . . . 266
                5-12 Tivoli Continuous Data Protection for Files unable to start the Initial
                     Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
                5-13 Tivoli Continuous Data Protection for Files entries in the event log . . . 268
                5-14 Error entry in the Windows system event log . . . . . . . . . . . . . . . . . . . . 269
                5-15 Port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . 270
                5-16 Modifying the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . . . . . 271
                5-17 Changing the port number to 9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
                5-18 New port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . 272
                5-19 Original start.html file with port 9003 . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
                5-20 File start.html after editing (now using port 9005) . . . . . . . . . . . . . . . . . 274
                5-21 Netstat -a output showing the usage of the new port 9005. . . . . . . . . . 276
                5-22 HTML listener now successfully listening on port 9005 (Event Viewer) 277
                5-23 Tivoli Continuous Data Protection for Files user interface using port
                     9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
                5-24 Shortcut in the quick launch area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
                5-25 Push installation failing due to remote computer not being available . . 281
                5-26 Check if remote system is available using the ping command . . . . . . . 282
                5-27 Push installation failing due to wrong user name or wrong password . 283
                5-28 Push installation failing due to wrong command syntax . . . . . . . . . . . . 284
                5-29 Successful push installation of Tivoli Continuous Data Protection for
                     Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
                5-30 Tivoli Continuous Data Protection for Files (pull) installation message 287
                5-31 Event message due to installation of new software version . . . . . . . . . 288
                5-32 FPcommand.bat file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
                5-33 Options file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
                5-34 Message to reboot the computer after the (pull) installation . . . . . . . . . 290
                5-35 External USB disk named USB_Drive mapped as drive F:. . . . . . . . . . 292
                5-36 Drive F: (USB_Drive) as remote backup target (external device) . . . . . 293
                5-37 Disk full informational message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
                5-38 Event log entry due to target backup device being full (Event ID: 6077)294
                5-39 Remote storage location inaccessible due to disk / file system full (Status
                     page) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
                5-40 Tivoli Continuous Data Protection for Files experiencing a problem. . . 295
                5-41 Event log entry due to disk / file system full condition (Event ID: 6000) 296


xii   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
5-42 Modified settings in the Remote Backup page to save space on the remote
    target location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
5-43 Changed drive letter assignments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
5-44 Informational message that the network target cannot be reached . . . 299
5-45 Event entry due to replication problem caused by changed drive letters
    (Event ID: 6069) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
5-46 Remote storage location inaccessible due to changed drive letter
    assignment (Status page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
5-47 Shared network folder e$ on file server Izmir mapped to drive (W:) . . . 303
5-48 Using the UNC name instead of the drive letter for the remote storage
    location (Remote Storage page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
5-49 Using a WebDAV server as the remote storage destination . . . . . . . . . 306
5-50 Tivoli Continuous Data Protection for Files needs a password
    (informational message) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
5-51 Tivoli Continuous Data Protection for Files prompts for a password to
    access the WebDAV server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
5-52 Entering user name and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
5-53 The two passwords do not match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
5-54 WebDAV server not reachable because no Internet connection is
    available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
5-55 WebDAV server can be reached again (Internet connection
    established) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
5-56 Default (minimum) dsm.opt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
5-57 Using a Tivoli Storage Manager server as a remote backup location
    (Helsinki). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
5-58 Window explains target location (Helsinki) is not responding properly . 314
5-59 Tivoli Continuous Data Protection for Files warning message . . . . . . . 314
5-60 Event log entry due to unknown or incorrect ID (node name) entered . 315
5-61 Entries in dsierror.log caused by unknown or incorrect ID (node name)
    entered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
5-62 Tivoli Continuous Data Protection for Files prompting for a password to
    access the Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . . . . 318
5-63 Informational entry in the event log (password information needed) . . 319
5-64 Event log entry due to insufficient permission to delete backed up data320
5-65 Error messages in dsierror.log due to insufficient permissions to delete
    backed up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
5-66 Event log entry when storing more versions of files as defined on remote
    storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
5-67 Tivoli Continuous Data Protection for Files unable to unlink the file (Event
    ID: 6086). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
5-68 FilePath ERROR entry (Event ID: 6000) in event log due to a permission
    problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
5-69 Entry in file purge_failed.log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325


                                                                                                Figures        xiii
5-70 File dsierror.log with error messages ANS1126E . . . . . . . . . . . . . . . . . 325
                5-71 Target location (Helsinki) is not responding properly (window). . . . . . . 331
                5-72 Entry in event log due to session being rejected from Tivoli Storage
                    Manager server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
                5-73 ANS1355E message in dsierror.log file (session rejected) . . . . . . . . . . 332
                5-74 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 333
                5-75 Entry in file replication-failed.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
                5-76 Informational message about the network target being not reachable . 336
                5-77 TCP/IP connection error messages in file dsierror.log . . . . . . . . . . . . . 336
                5-78 Event log entry caused by the network target being not available (Event
                    ID: 6069). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
                5-79 Entry in file replication-active.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
                5-80 Entries in file replication-queue.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
                5-81 Modified dsm.opt file containing an exclude statement for *.txt files . . . 340
                5-82 Entry in event log due to file being excluded from backup (Event ID:
                    6000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
                5-83 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 342
                5-84 ANS1115W warning message in dsierror.log (excluded file) . . . . . . . . 343
                5-85 Remote storage location not reachable (notification message) . . . . . . 344
                5-86 Remote storage location inaccessible (Status page) . . . . . . . . . . . . . . 345
                5-87 Remote storage location reachable again (notification message) . . . . 346
                5-88 Remote storage location accessible again (Status page) . . . . . . . . . . . 346
                5-89 FilePath agent in interactive mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
                5-90 Command to start a Tivoli Continuous Data Protection for Files trace . 354
                5-91 Create file.doc to trigger an activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
                5-92 DebugView capturing the trace output . . . . . . . . . . . . . . . . . . . . . . . . . 355
                5-93 Command to stop the trace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
                5-94 Quitting the interactive mode of the FilePath agent . . . . . . . . . . . . . . . 355
                5-95 Functionality overview of Tivoli Continuous Data Protection for Files. . 377




xiv   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Tables

                 1-1 Comparison between Tivoli Continuous Data Protection for Files and
                      traditional backup solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
                 2-1 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
                 3-1 Default installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . 109
                 3-2 File and folder pattern matches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
                 3-3 Interaction of inclusion and exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
                 3-4 General page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
                 3-5 Files to Protect page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
                 3-6 E-mail Protection page default settings. . . . . . . . . . . . . . . . . . . . . . . . . . 118
                 3-7 Remote Storage page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . 118
                 3-8 Advanced page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
                 4-1 Tivoli Continuous Data Protection V3.1 feature support matrix . . . . . . . 122
                 4-2 Central administration folder configurations for managing clients. . . . . . 192
                 4-3 Lifecycle file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
                 4-4 Characteristics of file on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . 198
                 4-5 Central administration folder configurations for managing clients. . . . . . 216
                 5-1 Description of options used in dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . 311
                 5-2 Some additional useful dsm.opt options . . . . . . . . . . . . . . . . . . . . . . . . . 312
                 5-3 Important system operation files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
                 5-4 Installation log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
                 5-5 Replication logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
                 5-6 Scheduled protection logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
                 5-7 Local pool log file and gendb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
                 5-8 Tivoli Storage Manager API log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
                 5-9 Solution tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
                 5-10 Solution demonstration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
                 5-11 Skill adjustment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
                 5-12 Major solution deployment tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
                 5-13 Technical requirement gathering sample examples . . . . . . . . . . . . . . . 366
                 5-14 Solution planning sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
                 5-15 Solution implement sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
                 5-16 Solution test sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
                 5-17 Solution client training sub-tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
                 5-18 Engagement closing sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370




© Copyright IBM Corp. 2007. All rights reserved.                                                                                 xv
xvi   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Examples

                 5-1 Registering node florence without delete backup permission (register node)
                     316
                 5-2 Details of node florence without delete backup permission (query node) 317
                 5-3 Select command output displaying too much active versions of a file . . 326
                 5-4 Register node florence with backdelete=yes parameter (register node). 326
                 5-5 Update existing node florence with backdelete=yes parameter (update
                     node) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
                 5-6 Details of node florence with delete backup permission (query node) . . 327
                 5-7 Select command output displaying active and inactive versions of a file 328
                 5-8 Running expiration on the Tivoli Storage Manager server (expire inventory)
                     328
                 5-9 Select command output after running expiration (only active versions) . 329
                 5-10 Tivoli Storage Manager client sessions disabled on Tivoli Storage
                     Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
                 5-11 Enable Tivoli Storage Manager client sessions again (enable sessions)334
                 5-12 Tivoli Storage Manager client sessions enabled on IBM Tivoli Storage
                     Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
                 5-13 Tracing example (trace mask=fpl_meta). . . . . . . . . . . . . . . . . . . . . . . . 355




© Copyright IBM Corp. 2007. All rights reserved.                                                                              xvii
xviii   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.

The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.

This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.

Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.

This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.

COPYRIGHT LICENSE:

This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.




© Copyright IBM Corp. 2007. All rights reserved.                                                         xix
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:

  Redbooks (logo)       ®              Lotus Notes®                          Redbooks®
  AIX®                                 Lotus®                                System p™
  Domino®                              Notes®                                Tivoli®
  IBM®                                 Passport Advantage®

The following terms are trademarks of other companies:

Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation
and/or its affiliates.

NetApp, and the Network Appliance logo are trademarks or registered trademarks of Network Appliance,
Inc. in the U.S. and other countries.

Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other
countries, or both.

Internet Explorer, Microsoft, Outlook, Windows Server, Windows Vista, Windows, Win32, and the Windows
logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Intel, Pentium, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks
of Intel Corporation or its subsidiaries in the United States, other countries, or both.

Other company, product, or service names may be trademarks or service marks of others.




xx     Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Preface

                 Tivoli Continuous Data Protection for Files is specifically targeted at user
                 computers, such as mobile computers and workstations, as well as file servers. It
                 provides continuous data protection of files, providing the highest level of
                 protection possible, yet is simple to use and administer.

                 This book presents a deployment guide for Tivoli Continuous Data Protection for
                 Files Version 3.1. We cover planning, installing, and troubleshooting Tivoli
                 Continuous Data Protection for Files for several use case scenarios. In addition,
                 we provide some case studies, including integration with IBM Tivoli Storage
                 Manager, that can be used as a proof of concept or demonstration of the product
                 at a client environment.

                 This book is geared for IT Specialists who will be working on Tivoli Continuous
                 Data Protection for Files installations and proof of concepts.



The team that wrote this book
                 This book was produced by a team of specialists from around the world working
                 at the International Technical Support Organization, Austin Center.

                 Vasfi Gucer is an IBM® Certified Consultant IT Specialist working at the ITSO
                 Austin Center. He worked with IBM Turkey for 10 years and has been with the
                 ITSO since January 1999. He has more than 12 years of experience in systems
                 management, networking hardware, and distributed platform software. He has
                 worked on various Tivoli® customer projects as a Systems Architect in Turkey
                 and the United States. Vasfi is also a Certified Tivoli Consultant.

                 Greg Bass is a Tivoli storage specialist in the Techline presales support
                 organization based out of Austin, Texas. Greg has been supporting Tivoli storage
                 products since 2000 when he was hired by the Tivoli Sales Infrastructure Group
                 (SIG). Greg originally joined IBM in 1999 when he was brought to Austin to
                 provide technical support for Lotus® Notes® and Domino® servers. Greg has
                 been in the technology realm for over 15 years. Prior to IBM, Greg worked in the
                 San Francisco bay area for PC Computing magazine, Oracle® and an Internet
                 startup called Fabrik.

                 Wolfgang Beuttler is an IBM Tivoli Storage Manager Support Specialist in
                 Mainz, Germany. He works for the Tivoli Storage Manager front- and back-end
                 support team and provides support to clients all over the world, including onsite


© Copyright IBM Corp. 2007. All rights reserved.                                                xxi
support. He has more than 14 years of experience in IT and eight years of
                experience with IBM and the Tivoli Storage Manager product portfolio, starting
                with ADSM Version 3.1. His areas of expertise include defect as well as
                non-defect problem determination of Tivoli Storage Manager products.

                Marcia Kubo is an IT Presales Support Specialist, in Brazil. She has eight years
                of experience in the IT field. She has been working for IBM since 2004. Her areas
                of expertise include IBM System p™ and AIX®, IBM Storage and Data Protection
                solutions. She is an ITIL Certified, Tivoli Productivity Center V3.1 Certified, IBM
                Certified Deployment Professional: Tivoli Storage Manager V5.3, IBM Certified
                Storage Administrator: Tivoli Storage Manager V5, and an IBM Certified
                Advanced Technical Expert for AIX version V4.

                Thanks to the following people for their contributions to this project:

                Arzu Gucer, Bart Jacob
                International Technical Support Organization, Austin Center

                Terry Copeland, William Haselton, Linda Sandmann, Jennifer Shaw, Eric
                Schaefer, Chris Stakutis, Daniel Thompson, Erik Wilkinson
                IBM USA



Become a published author
                Join us for a two- to six-week residency program! Help write a book dealing with
                specific products or solutions, while getting hands-on experience with
                leading-edge technologies. You will have the opportunity to team with IBM
                technical professionals, Business Partners, and Clients.

                Your efforts will help increase product acceptance and customer satisfaction. As
                a bonus, you will develop a network of contacts in IBM development labs, and
                increase your productivity and marketability.

                Find out more about the residency program, browse the residency index, and
                apply online at:
                ibm.com/redbooks/residencies.html




xxii   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Comments welcome
       Your comments are important to us!

       We want our books to be as helpful as possible. Send us your comments about
       this book or other IBM Redbooks® in one of the following ways:
          Use the online Contact us review Redbooks form found at:
          ibm.com/redbooks
          Send your comments in an e-mail to:
          redbooks@us.ibm.com
          Mail your comments to:
          IBM Corporation, International Technical Support Organization
          Dept. HYTD Mail Station P099
          2455 South Road
          Poughkeepsie, NY 12601-5400




                                                                      Preface   xxiii
xxiv   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Part 1


Part       1     Planning and
                 architecture
                 In this part we introduce the planning and architecture considerations for Tivoli
                 Continuous Data Protection for Files V3.1.




© Copyright IBM Corp. 2007. All rights reserved.                                                     1
2   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
1


    Chapter 1.   Introduction to Tivoli
                 Continuous Data Protection
                 for Files
                 The newest phase in the evolution of file backup is real time protection, and IBM
                 Tivoli Continuous Data Protection for Files delivers a compelling solution offering
                 a unique blend of continuous data protection and scheduled data protection in a
                 single product. Tivoli Continuous Data Protection for Files is a solution for both
                 file servers and user endpoints such as notebooks and workstations. Tivoli
                 Continuous Data Protection for Files exploits the increasing availability of
                 affordable disk storage by offering multiple disk-based target options for copies of
                 your data. Instead of waiting for a scheduled interval, Tivoli Continuous Data
                 Protection for Files backs up your files the moment they are saved, in real time.
                 What's more, it does this effortlessly and transparently, in some cases eliminating
                 the backup window.

                 This chapter provides an introduction to Tivoli Continuous Data Protection for
                 Files and discusses the following topics:
                     “Introduction to Tivoli Continuous Data Protection for Files” on page 3
                     “How Tivoli Continuous Data Protection for Files works” on page 11
                     “Main features of Tivoli Continuous Data Protection for Files” on page 13




© Copyright IBM Corp. 2007. All rights reserved.                                                    3
“Value proposition of Tivoli Continuous Data Protection for Files” on page 14




4   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
1.1 General overview of Tivoli Continuous Data
Protection for Files
           It is important to understand the evolution of data protection applications and the
           environments in which they operate in order to fully appreciate the Tivoli
           Continuous Data Protection for Files solution.


1.1.1 What is Tivoli Continuous Data Protection for Files?
           Tivoli Continuous Data Protection for Files is a unique hybrid approach to file
           backup that combines replication with traditional backups. Tivoli Continuous Data
           Protection for Files is a real time, continuous data protection solution for mobile
           computers, workstations, and fileservers. Backups can go to one or more disk
           targets. Files are copied and saved in their native format. Tivoli Continuous Data
           Protection for Files is also highly tolerant of transient network connectivity.
           Easy-to-use wizards allow for simple configuration and file restoration. In
           addition, Tivoli Continuous Data Protection for Files is engineered specifically to
           support Lotus Notes and Microsoft® Outlook® mail clients.

           Tivoli Continuous Data Protection for Files will back up your most important files
           the moment they change instead of waiting for a scheduled backup. Non-critical
           files can be backed up on a scheduled basis. It works in the background, similar
           to a virus scanner, and is therefore completely transparent to the user.

           Since Tivoli Continuous Data Protection for Files has a single end-point
           architecture, there is no need for additional components such as a server
           component. It requires only a single installation on the system where the files to
           be protected are located.

           Tivoli Continuous Data Protection for Files keeps copies of your data in their
           native file format and does not modify or encode them in any way. This
           transparency allows for direct access to the copied files with our without the Tivoli
           Continuous Data Protection for Files GUI.

           In addition to providing multiple recovery points through file versioning, Tivoli
           Continuous Data Protection for Files provides additional redundancy by allowing
           multiple options for target destinations for your copied files:
              On local disk for protection, even when not connected to a network
              To a network file server or NAS device for remote machine protection
              To an IBM Tivoli Storage Manager (Tivoli Storage Manager) or IBM Tivoli
              Storage Manager Express (Tivoli Storage Manager Express) server
              To a Web-based device through http or https




                          Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   5
Table 1-1 demonstrates the differences between Tivoli Continuous Data
                Protection for Files and traditional backup approaches.

                Table 1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional
                backup solutions
                                              Tivoli Continuous Data           Traditional backup
                                              Protection for Files             solutions

                 When to protect              Continuous for highly            Scheduled, full system
                                              important files, scheduled
                                              for others

                 How to detect                Journal-based on all file        Journal-based on some file
                                              systems                          systems

                 Where copies are stored      Disk only, locally or            Typically on tape
                                              remote;
                                              Tivoli Storage Manager

                 Storage format               Left “native”, online as files   Wrapped into a proprietary
                                                                               format

                 Management /                 Simplified per-client            Client-server concept;
                 administration               administration only              server component typically
                 complexity                                                    more expensive/complex


                So overall, Tivoli Continuous Data Protection for Files provides simple, effective,
                and real time file protection for:
                   Accidental file deletion
                   File corruption
                   Unwanted file alteration
                   Disk crashes
                   Other unforeseen losses


1.1.2 Why Tivoli Continuous Data Protection for Files is needed
                Businesses today are increasingly concerned with protecting their data. Losing
                key business information can hamper productivity, delay projects, and divert
                resources and calls to the help desk. It can also harm organizations when they
                face regulatory scrutiny. In fact, many businesses today are legally required to
                use formal data protection.

                Data corruption is a regular concern, and companies need better recovery point
                capabilities. Often the most valuable files are those that the users are working
                with right now. In addition, companies need sophisticated policy-based data
                management that enables them to focus on data with the most business value.



6   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
Although most companies have implemented solutions for protecting enterprise
data, data residing on workstations and notebooks is often under
protected—even though it amounts to 60 percent of all corporate data, according
to some industry experts. This is particularly true where lost data can
significantly impact productivity and viability. Additional facts to consider:
   In many companies, about 60-70% of corporate data resides on notebooks
   and workstations which are rarely, if ever, backed up.
   Almost half of small to medium sized businesses admit to having no formal
   data protection procedure.
   The loss of productivity due to data loss on user computers is a growing
   concern.
   Virus and data corruption on file servers is an increasing problem.
   – Companies need better recovery point capabilities.
   Today’s backup and recovery solutions are usually scheduled and tend to
   miss the most valuable data- what the user is working on right now.
   Mobile computer/desktop data protection is a growing problem:
   – Corporate data centers are reluctant to take on mobile computer
     management.
   – The business impact of lost data on mobile computers/desktops is
     increasing:
      •   Specific segments, such as law firms, medical practices, consulting,
          and so on, can have a very significant impact to productivity and
          liability.
      •   The aggregate impact to large corporations is significant.

With this in mind, Tivoli Continuous Data Protection for Files is designed to help
alleviate clients' concerns and provide simple, effective, and efficient data
protection and integrity. Key client issues driving the requirements for continuous
data protection are:
   Critical information assets are being stored across the organization; they are
   no longer consolidated on just a few key servers.
   The complexity and expense associated with the replication of information
   assets across an organization.
   A shortage of skilled people resources, which demands that highly automated
   tools be deployed to help allow consistent practices across platforms,
   minimize human error, and improve the amount of storage a single storage
   administrator can handle.
   Meeting service-level objectives by providing continuous availability of data.



              Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   7
The integrity of data for governance and security requirements.
                   Backups taken “only” on a scheduled basis allow too much productivity loss.

                For several years a major market trend has been the steady decline in the cost of
                disk storage (local hard drives, SAN disks, removable disks, NAS devices, and so
                on). This trend makes file protection using disk replication technologies more
                cost effective compared to traditional backup/recovery solutions, which primarily
                use tape as their storage repository.

                Tivoli Continuous Data Protection for Files leverages this development by utilizing
                a traditional backup and recovery solution while also employing data replication
                techniques. In the long term, this approach will lead to maximized efficiency and
                productivity in terms of both human and financial resources. For more
                information about the value proposition and the benefits of using Tivoli
                Continuous Data Protection for Files, refer to section 1.4, “Value proposition of
                Tivoli Continuous Data Protection for Files” on page 14.



                   Why is Tivoli Continuous Data Protection for Files needed?

                  1.   Employee productivity declines
                       when data assets are lost or difficult
                       to recover.                                     Recovery from a           Recovery from tape
                                                                         disk image                    copy

                  2.   Business and regulatory
                       requirements for data continuity are
                       increasing.
                                                                Cost




                  3.   Disk costs are declining, making
                       replication technologies more cost
                       effective.

                  4.   Critical data assets found in remote
                                                                                  Recovery Time Objective
                       offices, mobile computers, and
                       desktops are often not protected.
                                                                  Tivoli Continuous Data Protection for Files
                  5.   Employee productivity declines with           delivers faster recovery of file assets
                       difficult recovery of data and
                       recreation of lost assets.


                Figure 1-1 Why Tivoli Continuous Data Protection for Files is needed




8   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
1.1.3 Who should use Tivoli Continuous Data Protection for Files?
           The concept and design of Tivoli Continuous Data Protection for Files makes it
           ideal to protect both home computing environments and workstations or large file
           servers in business critical environments. Generally speaking, Tivoli Continuous
           Data Protection for Files should be used by everyone who has the need to
           continuously protect files in real time.

           Ideal candidates for Tivoli Continuous Data Protection for Files are organizations
           with valuable data spread across multiple locations, departments, and file
           servers, or those whose IT infrastructure includes desktops and mobile
           computers which are not protected adequately or frequently.

           Tivoli Continuous Data Protection for Files might also be of interest for enterprise
           clients with large file servers already using traditional backup solutions like Tivoli
           Storage Manager or Veritas NetBackup. Due to the amount of data needed to be
           backed up, large file servers are often unable to meet their backup window. Data
           loss can also occur after the point of the last scheduled backup. Tivoli
           Continuous Data Protection for Files with its continuous backup methodology is
           therefore a perfect complement to traditional backup solutions.

           Overall, Tivoli Continuous Data Protection for Files could be the answer when:
              Clients are considering buying disks as an alternative to tape for simpler
              administration and configuration and faster recovery service levels.
              Clients view data as a major corporate asset.
              Clients are considering snapshot technologies. With Tivoli Continuous Data
              Protection for Files, there is no need to understand advanced IT concepts
              such as snapshots, mirrors, synchronous versus asynchronous and how to
              configure, maintain, and manage such elements.
              Clients are concerned about their ability to meet service and availability levels
              with a minimal to zero backup window.
              Skilled storage administrators are difficult to find and retain.
              Employee productivity suffers due to accidental data loss and recreating files
              from scratch.
              Organizations are considering a backup solution for remote offices
              Tivoli Continuous Data Protection for Files is ideal for remote office servers,
              because it will maintain a local backup of files and replicate data to centrally
              based servers while tolerating issues with network connectivity.
              System administrators need their computer systems to be online 24x7 with
              minimum CPU or network impact during data protection operations.




                          Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   9
The organization is considering how to easily protect information assets found
                   on individual desktops and mobile computers with minimum administration.
                   The organization needs to protect critical files from alteration, deletion,
                   viruses, and corruption.




10   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
1.2 How Tivoli Continuous Data Protection for Files
works
         Tivoli Continuous Data Protection for Files is a new backup paradigm using a
         unique hybrid approach by combining modern replication technologies with
         traditional backup methods. It does so by taking all the benefits from each
         technology and uniting them together into a completely new product: Tivoli
         Continuous Data Protection for Files.



                                                                                 Tivoli
                                               Traditional                    Continuous
             Replication                                                         Data
                                                backups
                                                                              Protection
                                                                               for Files
            • To-disk duplication             • Versioning of files
            • Lightning fast                  • Central administration
            • Real time for important files   • Archiving (vaulting)
            • Tolerant of transient           • Retention
              networks
                                              • Highly scalable
            • Multiple targets




         Figure 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files

         But how does it work? Figure 1-3 on page 12 gives a general overview on how
         Tivoli Continuous Data Protection for Files works.




                         Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   11
Figure 1-3 General overview of Tivoli Continuous Data Protection for Files

               Tivoli Continuous Data Protection for Files tracks the creation of new files or
               changes to existing files. If the file is included in your list of protected files or file
               types an immediate copy is made into a backup area (a separate directory tree)
               on the local disk. Tivoli Continuous Data Protection for Files can store multiple
               versions of each file subject to the local “pool size” which can be configured by
               the user. When the pool is full, the oldest copies (versions) are removed to make
               room for newer ones.

               The same file can also be sent to a remote storage area, such as a removable
               disk, file server, NAS device, and WebDAV server for remote protection.

               Another copy of the file can be sent to a Tivoli Storage Manager server or Tivoli
               Storage Manager Express server. Traditionally, Tivoli Storage Manager is a data
               protection product often used in larger business environments. Those clients
               might find Tivoli Continuous Data Protection for Files useful as a real time client
               solution for mobile computers and workstations, but they still want most of the
               protected data to be managed by a Tivoli Storage Manager server.

                 Note: The Tivoli Continuous Data Protection for Filescode installs the Tivoli
                 Storage Manager API automatically, so there is no need to install a separate
                 API package.

               If scheduled protection is enabled, then files associated with scheduled
               protection will be queued for transmission to the remote target based on the


12   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
interval that has been selected within Tivoli Continuous Data Protection for Files
         (Hourly, Daily, Weekly, Monthly). When the interval expires, Tivoli Continuous
         Data Protection for Files will copy changed files to the remote target storage
         location.

         The types of protection offered by Tivoli Continuous Data Protection for Files
         (continuous or scheduled, local or remote) can be easily configured by the user
         in multiple combinations. This allows the user to protect their assets in a highly
         flexible manner.

         To summarize how Tivoli Continuous Data Protection for Files works, we have to
         differentiate between continuous and scheduled backup concepts:
            Files protected continuously:
            – Specify multiple storage locations for continuously protected files.
            – The target area(s) will capture a copy of the file each time it is saved.
            – The local target area is auto-managed as a pool with a configurable size.
            – There is an option to specify a remote file server for off-machine
              protection; it is still real time, but tolerant of transient networks.
            – There is an option to specify a Tivoli Storage Manager server or Tivoli
              Storage Manager Express server for off-machine protection; it is still real
              time, but tolerant of transient networks.
            Files protected by scheduled backups (primarily mail files):
            – Mail files are protected on a scheduled basis by being sent to the remote
              file server or Tivoli Storage Manager server.
            – Change-journal eliminates having to take processor resources to scan the
              file system.
            – Files are “versioned” on a remote file server, allowing for point-in-time
              restore.
            – Remote versions are automatically managed to a configurable pool size.



1.3 Main features of Tivoli Continuous Data Protection
for Files
         At the time of this publication, the latest version of Tivoli Continuous Data
         Protection for Files was version 3.1. The main features of this version are:
            Completely automated continuous protection of important files
            When a file is saved:
            – A copy is stored in a pool on local disk.


                      Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   13
– Another copy can be sent to a file server, NAS device, or WebDAV server,
                     Tivoli Storage Manager, or Tivoli Storage Manager Express server
                   Real time data protection
                   High/low priority files options
                   Tivoli Continuous Data Protection for Files allows user designated files to be
                   backed up continuously as soon as they change. The user can also designate
                   less important or constantly changing files to be saved on a scheduled basis
                   (Hourly, Daily, Weekly, Monthly).
                   File include/exclude options
                   Tivoli Continuous Data Protection for Files offers the usage of include/exclude
                   lists. By using them, the client can define precisely what type of files will be
                   included for protection. They can also specify a list of files or directories that
                   will be excluded by Tivoli Continuous Data Protection for Files and not backed
                   up or vaulted.
                   Tolerant of transient networks
                   Versioning of files
                   Archive retention
                   Scalable
                   Small foot print
                   Tivoli Continuous Data Protection for Files can be installed in a few minutes
                   on a system and will only use about 21 MB of disk space.
                   Simplified management and central administration
                   Due to its simplified management concept, Tivoli Continuous Data Protection
                   for Files provides a central administration interface that allows the user to
                   restore his own files quickly and easily.
                   No server component required
                   Maintains native file format
                   Tivoli Continuous Data Protection for Files maintains files in their natural
                   format and does not encode them in a proprietary format or modify them in
                   any other way.



1.4 Value proposition of Tivoli Continuous Data
Protection for Files
               For business units dependent on data availability and rapid data recovery, Tivoli
               Continuous Data Protection for Files provides uniquely efficient and effective



14   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
data protection to ensure business continuity, employee productivity, and integrity
of information assets.

For storage managers and administrators responsible for protecting data while
containing cost, Tivoli Continuous Data Protection for Files simplifies
heterogeneous storage management and provides real options for an integrated
data protection solution across all information assets.

Tivoli Continuous Data Protection for Files:
   Provides easy to use data protection and integrity, requires little or no training
   to use
   Improves employee productivity by providing real time backups of data, so
   when a failure occurs, the recovery can be the latest version, not the last time
   a scheduled backup ran
   Improves IT productivity and labor resource utilization, because users can
   more easily recover files without IT involvement
   Improves network and bandwidth usage, because it is optimized to send data
   through network only when it is connected with no user or IT manual
   intervention required for optimizing the bandwidth usage

The value proposition using Tivoli Continuous Data Protection for Files can be
summarized as follows:
   Reduced or eliminated backup window
   – Improved backup resource utilization
   – Better return on investment (ROI) and total cost of ownership (TCO)

    Note: In finance, the return on investment (ROI)a is a calculation used to
    determine whether a proposed investment is wise, and how well it will
    repay the investor. It is calculated as the ratio of the amount gained (taken
    as positive), or lost (taken as negative), relative to the basis.

    Total cost of ownership (TCO)b is a financial estimate designed to help
    consumers and enterprise managers assess direct and indirect costs
    related to the purchase of any capital investment, such as (but not limited
    to) computer software or hardware.
       a. Definition taken from article “Return on investment”, found at:
       http://en.wikipedia.org/wiki/Return_on_investment
       b. Definition taken from article “Total cost of ownership”, found at:
       http://en.wikipedia.org/wiki/Total_cost_of_ownership

   Improved recovery point objective (RPO)



             Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   15
– Reduced loss of data
                   – Improved productivity

                    Note: The RPO is the degree of difference between the active online data
                    and the disaster recovery copy of that data. An RPO of zero would mean
                    that the primary copy and the disaster recovery copy are in exact
                    synchronization. A failure would result in zero loss of data.

                   Improved recovery time objective (RTO)
                   – User initiated restore, zero administration intervention
                   – Optional recovery from disk (local or remote)

                    Note: The RTO is the amount of time after a failure that someone is willing
                    to spend before a given application or group of data is back up and
                    available. An RTO of zero means that failures should cause zero
                    disruption.




16   Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
1.4.1 Benefits of using Tivoli Continuous Data Protection for Files
           Using Tivoli Continuous Data Protection for Files provides the following benefits:
              Simplified storage management can save IT staff and computer user time and
              labor
              Continuous data protection provides data integrity when viruses attack and
              corrupt systems
              Reduces or eliminates backup windows
              Optimizes integration to network and enterprise data protection solutions
              Optimizes bandwidth and network transfer of data
              Continuously protects multiple versions of files to allow clients a choice of
              recovery points
              Ability to write-protect data locally to prevent unwanted modification
              This has a variety of uses such as allowing a user to store final versions of
              documents to prevent unintentional changes.
              Ability to send data to heterogeneous backup devices: local file system (on
              local or SAN disk), file server, NAS, USB disk, HTTP server, or Tivoli Storage
              Manager server


1.4.2 Unique differentiators
           The following unique differentiators of Tivoli Continuous Data Protection for Files
           have been identified:
              Fast time to deployment
              Tivoli Continuous Data Protection for Files can be installed, configured, and
              running in a few minutes.
              Ease of daily use
              No need to understand more IT-savvy concepts such as "snapshots" and how
              to maintain, configure, and manage such elements.
              Elimination or reduction of backup windows
              Backup target flexibility
              Tivoli Continuous Data Protection for Files allows the target of the backup to
              be any type of modern disk-based storage device such as: a local file system
              on local or Storage Area Network (SAN) disk, a USB (Universal Serial Bus)
              device, a File Server, a Network Attached Storage (NAS) device or a WebDAV
              enabled web server. If Tivoli Storage Manager is used as the remote storage
              destination, both disk and tape storage pools can be used.
              Easily integrates into traditional backup solutions


                        Chapter 1. Introduction to Tivoli Continuous Data Protection for Files   17
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423
Deployment guide series tivoli continuous data protection for files v3.1 sg247423

Weitere ähnliche Inhalte

Was ist angesagt?

Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...
Banking at Ho Chi Minh city
 
Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...
Banking at Ho Chi Minh city
 
End to-end planning for availability and performance monitoring redp4371
End to-end planning for availability and performance monitoring redp4371End to-end planning for availability and performance monitoring redp4371
End to-end planning for availability and performance monitoring redp4371
Banking at Ho Chi Minh city
 
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Banking at Ho Chi Minh city
 
Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116
Banking at Ho Chi Minh city
 
An introduction to storage provisioning with tivoli provisioning manager and ...
An introduction to storage provisioning with tivoli provisioning manager and ...An introduction to storage provisioning with tivoli provisioning manager and ...
An introduction to storage provisioning with tivoli provisioning manager and ...
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
Banking at Ho Chi Minh city
 
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Banking at Ho Chi Minh city
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343
Banking at Ho Chi Minh city
 
Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415
Banking at Ho Chi Minh city
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...
Banking at Ho Chi Minh city
 
Ibm system storage ds8700 disk encryption redp4500
Ibm system storage ds8700 disk encryption redp4500Ibm system storage ds8700 disk encryption redp4500
Ibm system storage ds8700 disk encryption redp4500
Banking at Ho Chi Minh city
 
Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679
Banking at Ho Chi Minh city
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247
Banking at Ho Chi Minh city
 
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Banking at Ho Chi Minh city
 

Was ist angesagt? (19)

Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...
 
Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...
 
End to-end planning for availability and performance monitoring redp4371
End to-end planning for availability and performance monitoring redp4371End to-end planning for availability and performance monitoring redp4371
End to-end planning for availability and performance monitoring redp4371
 
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
 
Netfinity tape solutions sg245218
Netfinity tape solutions sg245218Netfinity tape solutions sg245218
Netfinity tape solutions sg245218
 
Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116
 
A practical guide to tivoli sa nergy sg246146
A practical guide to tivoli sa nergy sg246146A practical guide to tivoli sa nergy sg246146
A practical guide to tivoli sa nergy sg246146
 
An introduction to storage provisioning with tivoli provisioning manager and ...
An introduction to storage provisioning with tivoli provisioning manager and ...An introduction to storage provisioning with tivoli provisioning manager and ...
An introduction to storage provisioning with tivoli provisioning manager and ...
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
 
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343
 
Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...
 
Ibm system storage ds8700 disk encryption redp4500
Ibm system storage ds8700 disk encryption redp4500Ibm system storage ds8700 disk encryption redp4500
Ibm system storage ds8700 disk encryption redp4500
 
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
 
Tec implementation examples sg245216
Tec implementation examples sg245216Tec implementation examples sg245216
Tec implementation examples sg245216
 
Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247
 
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
 

Andere mochten auch (8)

Ibm tivoli storage manager mail extension jan 2002
Ibm tivoli storage manager mail extension jan   2002Ibm tivoli storage manager mail extension jan   2002
Ibm tivoli storage manager mail extension jan 2002
 
Ibm tivoli storage resource manager a practical introduction sg246886
Ibm tivoli storage resource manager a practical introduction sg246886Ibm tivoli storage resource manager a practical introduction sg246886
Ibm tivoli storage resource manager a practical introduction sg246886
 
5 maneras de gastar menos en tus mudanzas
5 maneras de gastar menos en tus mudanzas5 maneras de gastar menos en tus mudanzas
5 maneras de gastar menos en tus mudanzas
 
Embracing the power of the notes client
Embracing the power of the notes clientEmbracing the power of the notes client
Embracing the power of the notes client
 
Ibm tivoli storage manager mail extension jan 2002
Ibm tivoli storage manager mail extension jan   2002Ibm tivoli storage manager mail extension jan   2002
Ibm tivoli storage manager mail extension jan 2002
 
Eureka moment
Eureka momentEureka moment
Eureka moment
 
Xpages–viewicons
Xpages–viewiconsXpages–viewicons
Xpages–viewicons
 
Dd13.2013.milano.open ntf
Dd13.2013.milano.open ntfDd13.2013.milano.open ntf
Dd13.2013.milano.open ntf
 

Ähnlich wie Deployment guide series tivoli continuous data protection for files v3.1 sg247423

Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...
Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...
Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...
Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli provisioning manager v5.1 sg247262
Certification guide series ibm tivoli provisioning manager v5.1 sg247262Certification guide series ibm tivoli provisioning manager v5.1 sg247262
Certification guide series ibm tivoli provisioning manager v5.1 sg247262
Banking at Ho Chi Minh city
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...
Banking at Ho Chi Minh city
 
Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430
Banking at Ho Chi Minh city
 
Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780
Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780
Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569
Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569
Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569
Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
Banking at Ho Chi Minh city
 
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Banking at Ho Chi Minh city
 
Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935
Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935
Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935
Banking at Ho Chi Minh city
 
Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...
Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...
Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...
Banking at Ho Chi Minh city
 
Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...
Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
Banking at Ho Chi Minh city
 
Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376
Banking at Ho Chi Minh city
 
Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100
Banking at Ho Chi Minh city
 

Ähnlich wie Deployment guide series tivoli continuous data protection for files v3.1 sg247423 (20)

Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...
Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...
Deployment guide series tivoli provisioning manager for os deployment v5.1 sg...
 
Certification guide series ibm tivoli provisioning manager v5.1 sg247262
Certification guide series ibm tivoli provisioning manager v5.1 sg247262Certification guide series ibm tivoli provisioning manager v5.1 sg247262
Certification guide series ibm tivoli provisioning manager v5.1 sg247262
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...
 
Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430
 
Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780
Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780
Ibm tivoli monitoring v5.1.1 implementation certification study guide sg246780
 
Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188
 
Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188Deployment guide series ibm tivoli monitoring 6.1 sg247188
Deployment guide series ibm tivoli monitoring 6.1 sg247188
 
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
 
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
Deployment guide series ibm tivoli provisioning manager express v4.1 for soft...
 
Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569
Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569
Deployment guide series ibm tivoli usage and accounting manager v7.1 sg247569
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
 
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
 
Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935
Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935
Ibm tivoli monitoring v5.1.1 implementation certification study guide redp3935
 
Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...
Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...
Getting started with ibm tivoli monitoring 6.1 on distributed environments sg...
 
Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...
 
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
 
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
 
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
 
Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376
 
Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100
 

Mehr von Banking at Ho Chi Minh city

Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867
Banking at Ho Chi Minh city
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343
Banking at Ho Chi Minh city
 
Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894
Banking at Ho Chi Minh city
 
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Banking at Ho Chi Minh city
 
Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888
Banking at Ho Chi Minh city
 
Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...
Banking at Ho Chi Minh city
 
Slr to tivoli performance reporter for os 390 migration cookbook sg245128
Slr to tivoli performance reporter for os 390 migration cookbook sg245128Slr to tivoli performance reporter for os 390 migration cookbook sg245128
Slr to tivoli performance reporter for os 390 migration cookbook sg245128
Banking at Ho Chi Minh city
 
Setup and configuration for ibm tivoli access manager for enterprise single s...
Setup and configuration for ibm tivoli access manager for enterprise single s...Setup and configuration for ibm tivoli access manager for enterprise single s...
Setup and configuration for ibm tivoli access manager for enterprise single s...
Banking at Ho Chi Minh city
 

Mehr von Banking at Ho Chi Minh city (20)

Postgresql v15.1
Postgresql v15.1Postgresql v15.1
Postgresql v15.1
 
Postgresql v14.6 Document Guide
Postgresql v14.6 Document GuidePostgresql v14.6 Document Guide
Postgresql v14.6 Document Guide
 
IBM MobileFirst Platform v7.0 Pot Intro v0.1
IBM MobileFirst Platform v7.0 Pot Intro v0.1IBM MobileFirst Platform v7.0 Pot Intro v0.1
IBM MobileFirst Platform v7.0 Pot Intro v0.1
 
IBM MobileFirst Platform v7 Tech Overview
IBM MobileFirst Platform v7 Tech OverviewIBM MobileFirst Platform v7 Tech Overview
IBM MobileFirst Platform v7 Tech Overview
 
IBM MobileFirst Foundation Version Flyer v1.0
IBM MobileFirst Foundation Version Flyer v1.0IBM MobileFirst Foundation Version Flyer v1.0
IBM MobileFirst Foundation Version Flyer v1.0
 
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
 
IBM MobileFirst Platform v7.0 pot intro v0.1
IBM MobileFirst Platform v7.0 pot intro v0.1IBM MobileFirst Platform v7.0 pot intro v0.1
IBM MobileFirst Platform v7.0 pot intro v0.1
 
IBM MobileFirst Platform v7.0 POT App Mgmt Lab v1.1
IBM MobileFirst Platform  v7.0 POT App Mgmt Lab v1.1IBM MobileFirst Platform  v7.0 POT App Mgmt Lab v1.1
IBM MobileFirst Platform v7.0 POT App Mgmt Lab v1.1
 
IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1
 
IBM MobileFirst Platform Pot Sentiment Analysis v3
IBM MobileFirst Platform Pot Sentiment Analysis v3IBM MobileFirst Platform Pot Sentiment Analysis v3
IBM MobileFirst Platform Pot Sentiment Analysis v3
 
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867
 
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343
 
Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894
 
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
 
Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888
 
Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...
 
Slr to tivoli performance reporter for os 390 migration cookbook sg245128
Slr to tivoli performance reporter for os 390 migration cookbook sg245128Slr to tivoli performance reporter for os 390 migration cookbook sg245128
Slr to tivoli performance reporter for os 390 migration cookbook sg245128
 
Setup and configuration for ibm tivoli access manager for enterprise single s...
Setup and configuration for ibm tivoli access manager for enterprise single s...Setup and configuration for ibm tivoli access manager for enterprise single s...
Setup and configuration for ibm tivoli access manager for enterprise single s...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Deployment guide series tivoli continuous data protection for files v3.1 sg247423

  • 1. Front cover Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Deployment best practices Integration with TSM and Notes Case studies, troubleshooting , tips Vasfi Gucer Greg Bass Wolfgang Beuttler Marcia Kubo ibm.com/redbooks
  • 2.
  • 3. International Technical Support Organization Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 August 2007 SG24-7423-00
  • 4. Note: Before using this information and the product it supports, read the information in “Notices” on page xix. First Edition (August 2007) This edition applies to IBM Tivoli Continuous Data Protection for Files Version 3, Release 1. © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
  • 5. Contents Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Part 1. Planning and architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1. Introduction to Tivoli Continuous Data Protection for Files. . . 3 1.1 General overview of Tivoli Continuous Data Protection for Files . . . . . . . . 5 1.1.1 What is Tivoli Continuous Data Protection for Files? . . . . . . . . . . . . . 5 1.1.2 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . 6 1.1.3 Who should use Tivoli Continuous Data Protection for Files? . . . . . . 9 1.2 How Tivoli Continuous Data Protection for Files works. . . . . . . . . . . . . . . 11 1.3 Main features of Tivoli Continuous Data Protection for Files . . . . . . . . . . 13 1.4 Value proposition of Tivoli Continuous Data Protection for Files . . . . . . . 14 1.4.1 Benefits of using Tivoli Continuous Data Protection for Files . . . . . . 17 1.4.2 Unique differentiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Chapter 2. Product architecture, planning, and deployment . . . . . . . . . . 19 2.1 Product architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.1.1 Main components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.1.2 Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.1.3 Daemon architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.2 Planning for deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.2.1 What are my critical files? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.2.2 Where should I back my files up to? . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.2.3 How often do I need to back up different types of files? . . . . . . . . . . 26 2.2.4 Do I need e-mail and scheduled backups? . . . . . . . . . . . . . . . . . . . . 27 2.2.5 Do I need the Vault feature? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.2.6 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 © Copyright IBM Corp. 2007. All rights reserved. iii
  • 6. 2.3 Best practices and sizing considerations . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.3.1 Overall summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.3.2 Corporate scenario- Tivoli Continuous Data Protection for Files with Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.3.3 Corporate scenario- file server as remote storage target for Tivoli Continuous Data Protection for Files workstations . . . . . . . . . . . . . . 32 2.3.4 Corporate scenario- Tivoli Continuous Data Protection for Files loaded on file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.3.5 Home user scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.4 Tivoli Continuous Data Protection for Files installation requirements . . . . 34 2.4.1 Basic installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.4.2 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Part 2. Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Chapter 3. Installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 39 3.1 Basic installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.1.1 Installing Tivoli Continuous Data Protection for Files . . . . . . . . . . . . 40 3.1.2 Configuration using the Initial Configuration Wizard . . . . . . . . . . . . . 48 3.2 Advanced installation options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 3.2.1 Installation using command-line parameters. . . . . . . . . . . . . . . . . . . 65 3.2.2 Silent installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3.2.3 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 3.2.4 Pull installation (upgrade) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 3.2.5 Providing a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 3.3 Advanced configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 3.3.1 Settings Notebook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 3.3.2 Central Administration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 3.4 Additional considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 3.4.1 Installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 3.4.2 Interpreting file and folder patterns . . . . . . . . . . . . . . . . . . . . . . . . . 109 3.4.3 Including and excluding files from protection . . . . . . . . . . . . . . . . . 111 3.4.4 Vault duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 3.4.5 Default protection settings (Settings Notebook) . . . . . . . . . . . . . . . 116 Chapter 4. Proof of concept scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 4.1 Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 4.2 Single user environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4.2.1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4.2.2 Single computer with external storage . . . . . . . . . . . . . . . . . . . . . . 126 4.2.3 Single computer with ISP connection . . . . . . . . . . . . . . . . . . . . . . . 136 4.3 Multiple computers in a home or small business. . . . . . . . . . . . . . . . . . . 145 4.3.1 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4.3.2 Small business with Tivoli Storage Manager Express . . . . . . . . . . 151 iv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 7. 4.3.3 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 4.4 Tivoli Continuous Data Protection for Files in an enterprise environment180 4.4.1 Enterprise environment with Tivoli Storage Manager . . . . . . . . . . . 180 4.4.2 Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 4.4.3 Enterprise and remote offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 4.5 Restore scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 4.5.1 Restore from local disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 4.5.2 Restore from remote storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 4.5.3 Restore from Tivoli Storage Manager or Tivoli Storage Manager Express to a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Chapter 5. Troubleshooting, hints, and tips . . . . . . . . . . . . . . . . . . . . . . . 255 5.1 Installation issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 5.1.1 Disk space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 5.1.2 Non-privileged users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 5.1.3 Port conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 5.1.4 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 5.1.5 Pull installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 5.2 Replication issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 5.2.1 Removable disk issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 5.2.2 File server issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 5.2.3 WebDAV issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 5.2.4 Tivoli Storage Manager issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 5.2.5 Transient conditions (remote storage location not reachable) . . . . 343 5.3 System operation and log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 5.3.1 Tivoli Continuous Data Protection for Files system operation files . 347 5.3.2 Tivoli Continuous Data Protection for Files logs . . . . . . . . . . . . . . . 348 5.3.3 Tivoli Storage Manager specific log files . . . . . . . . . . . . . . . . . . . . . 350 5.4 Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 5.4.1 Before you start. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 5.4.2 How to run a trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 5.4.3 Tracing example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Contents v
  • 8. Part 3. Planning for a client engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Appendix A. Project planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Required skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Available resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Solution description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Solution deployment tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Strategies for successful implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Appendix B. Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment . . . . . . . . . . . . . . . . . . . . . 375 Building a protected environment for user workstations. . . . . . . . . . . . . . . . . 376 Abbreviations and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 vi Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 9. Figures 1-1 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . . . . . 8 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files . . 11 1-3 General overview of Tivoli Continuous Data Protection for Files . . . . . . . 12 2-1 Agent-driver interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2-2 Replication threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3-1 Installation Setup Language window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3-2 InstallShield Wizard is being prepared . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 3-3 Information window including the build number . . . . . . . . . . . . . . . . . . . . 42 3-4 Software License Agreement options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3-5 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 3-6 Ready to Install window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 3-7 Installation progress window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 3-8 Installation completed window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3-9 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3-10 What is Critical page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3-11 Folder and Files Settings dialog box (critical files) . . . . . . . . . . . . . . . . . 51 3-12 Select folders dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 3-13 Applications and Extensions box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 3-14 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 3-15 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 3-16 Initial Backup page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 3-17 Summary page with initial backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 3-18 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 3-19 Message that a new version is being installed . . . . . . . . . . . . . . . . . . . . 73 3-20 Message to reboot system after pull installation . . . . . . . . . . . . . . . . . . . 73 3-21 General page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 3-22 Files to Protect page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 3-23 Folders and Files box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 3-24 Folder and Files Settings dialog box (include/exclude). . . . . . . . . . . . . . 81 3-25 Select folders box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 3-26 Applications box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 3-27 Application Settings box (applications viewed by ranking) . . . . . . . . . . . 84 3-28 Vault box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 3-29 Vault Settings box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 3-30 Back up with new settings check box . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 3-31 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 3-32 E-mail Application: list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 3-33 E-mail Application Data Folder: text field . . . . . . . . . . . . . . . . . . . . . . . . 90 © Copyright IBM Corp. 2007. All rights reserved. vii
  • 10. 3-34 Folder and Files Settings box (schedules) . . . . . . . . . . . . . . . . . . . . . . . 91 3-35 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 3-36 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 3-37 Advanced page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 3-38 Central Administration Settings window . . . . . . . . . . . . . . . . . . . . . . . . 104 3-39 Successfully published fpcommands.xml pop-up window . . . . . . . . . . 105 3-40 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 3-41 Folder and Files Settings box (example include/exclude settings) . . . . 113 4-1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4-2 General Configuration for a single user with local disk configuration . . . 124 4-3 Files to protect in a single user with local disk configuration. . . . . . . . . . 125 4-4 Continuous protection file directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 4-5 Single computer, with external storage . . . . . . . . . . . . . . . . . . . . . . . . . . 127 4-6 General configuration for a single user scenario with external disk . . . . 128 4-7 Selection of important files to continuously protect in a single user scenario with external disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 4-8 Configuring the remote storage for scheduled protection . . . . . . . . . . . . 130 4-9 Configuring files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . 131 4-10 Configure the frequency and time to start the scheduled protection . . . 132 4-11 Start an initial backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 4-12 Original directory and files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 4-13 Replicated directory and files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 4-14 Single computer, with ISP connection. . . . . . . . . . . . . . . . . . . . . . . . . . 136 4-15 Continuous protection for a single computer with ISP connection . . . . 138 4-16 Important files continuous protection in a single user with an ISP connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 4-17 Remote storage with ISP configuration. . . . . . . . . . . . . . . . . . . . . . . . . 140 4-18 Username and password to access Web server. . . . . . . . . . . . . . . . . . 141 4-19 Configure the frequency and time to start the scheduled protection to an ISP provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 4-20 Files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4-21 Activity report for changed files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4-22 Activity report for changed file pres1.ppt. . . . . . . . . . . . . . . . . . . . . . . . 144 4-23 Sub-file functionality example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 4-24 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4-25 General configuration without continuous protection . . . . . . . . . . . . . . 147 4-26 Map network drive in each computer . . . . . . . . . . . . . . . . . . . . . . . . . . 148 4-27 Configure user and password to access the file server . . . . . . . . . . . . 148 4-28 Configure remote storage for scheduled protection . . . . . . . . . . . . . . . 149 4-29 Configure schedule and select application for scheduled protection . . 150 4-30 Select files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 4-31 Small business without file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 4-32 Computers and applications option on Tivoli Storage Manager Express153 viii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 11. 4-33 Wizard to add computers and optionally deploy the backup client software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4-34 Select option to add a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 4-35 Installation settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 4-36 Confirm settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 4-37 Stop Tivoli Storage Manager Express service . . . . . . . . . . . . . . . . . . . 157 4-38 Start Tivoli Storage Manager Express in foreground mode . . . . . . . . . 158 4-39 Configure node with delete permission . . . . . . . . . . . . . . . . . . . . . . . . . 158 4-40 Shutdown Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . 159 4-41 Start Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . 159 4-42 Reset the password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 4-43 Windows credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 4-44 New password information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 4-45 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 4-46 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 162 4-47 Remote storage configuration for Tivoli Storage Manager Express . . . 163 4-48 Node password on Tivoli Storage Manager Express server . . . . . . . . . 164 4-49 Select applications, files, and frequency to back up to Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 4-50 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 166 4-51 Filespace on Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . 167 4-52 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4-53 Map network drive and reconnect at logon . . . . . . . . . . . . . . . . . . . . . . 169 4-54 Configure user name and password to access the file server . . . . . . . 169 4-55 General configuration for this scenario . . . . . . . . . . . . . . . . . . . . . . . . . 170 4-56 Files to protect in continuous backup . . . . . . . . . . . . . . . . . . . . . . . . . . 171 4-57 Configure remote storage for continuous and scheduled protection. . . 172 4-58 Configure directories, files, and frequency for schedule protection . . . 173 4-59 Select files and directories for scheduled protection . . . . . . . . . . . . . . . 174 4-60 Inform password for encrypted files . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 4-61 Replicated files with encryption option on file server . . . . . . . . . . . . . . 175 4-62 Computers and applications on Tivoli Storage Manager Express . . . . 176 4-63 Excluded files on Tivoli Storage Manager Express client . . . . . . . . . . . 177 4-64 Remove directory from dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 4-65 Files to backup on Tivoli Storage Manager Express. . . . . . . . . . . . . . . 179 4-66 Example of enterprise environment with Tivoli Storage Manager centric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 4-67 Lab environment (Tivoli Storage Manager centric) . . . . . . . . . . . . . . . . 183 4-68 Add nodes to Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . 185 4-69 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 4-70 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 187 4-71 Remote storage configuration to Tivoli Storage Manager . . . . . . . . . . . 188 4-72 Node password on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . 189 Figures ix
  • 12. 4-73 Select applications, files, and frequency to back up to Tivoli Storage Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 4-74 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 190 4-75 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 4-76 Initial Tivoli Continuous Data Protection for Files panel . . . . . . . . . . . . 192 4-77 Central administration configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 4-78 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 4-79 Rename fpcommands.xml to use push installation . . . . . . . . . . . . . . . . 195 4-80 Push installation on Bruge, Windows 2003 server . . . . . . . . . . . . . . . . 196 4-81 Warning message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 4-82 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 4-83 Expiration example on Tivoli Storage Manager Server . . . . . . . . . . . . . 199 4-84 Example of enterprise environment with Tivoli Storage Manager and file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 4-85 Lab environment (Tivoli Storage Manager and file server) . . . . . . . . . . 203 4-86 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 4-87 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 205 4-88 Remote storage configuration to file server Florence . . . . . . . . . . . . . . 206 4-89 Select applications, files, and frequency to back up to a file server . . . 207 4-90 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 208 4-91 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 4-92 Central administration configuration for group A. . . . . . . . . . . . . . . . . . 210 4-93 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 4-94 Remote storage configuration to file server Cairo . . . . . . . . . . . . . . . . . 211 4-95 Select applications, files and frequency to backup to file server Cairo . 212 4-96 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 213 4-97 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 4-98 Central administration configuration for group B. . . . . . . . . . . . . . . . . . 215 4-99 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 4-100 Central Management Report for Group B . . . . . . . . . . . . . . . . . . . . . . 218 4-101 Files to protect on file server Florence . . . . . . . . . . . . . . . . . . . . . . . . 219 4-102 Protected vaulting settings on file server Florence . . . . . . . . . . . . . . . 219 4-103 Files to protect on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 4-104 Protected vaulting settings on file server Cairo. . . . . . . . . . . . . . . . . . 220 4-105 Message error when trying to delete vaulted files . . . . . . . . . . . . . . . . 221 4-106 Protect Lotus Notes 7, using scheduled continuous protection . . . . . 222 4-107 Password for Lotus Notes Database. . . . . . . . . . . . . . . . . . . . . . . . . . 222 4-108 Notes files on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 4-109 Backup policy on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . 224 4-110 Register node on Tivoli Storage Manager server . . . . . . . . . . . . . . . . 225 4-111 Example of dsm.opt file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 4-112 Validate password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 4-113 Schedule backup on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . 226 x Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 13. 4-114 Enterprise and remote offices example. . . . . . . . . . . . . . . . . . . . . . . . 227 4-115 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 4-116 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 4-117 Files to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 4-118 Search BackupMe.txt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 4-119 Search status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 4-120 Select the file to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 4-121 Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 4-122 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 4-123 View report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 4-124 Select remote storage to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 4-125 Tivoli Continuous Data Protection for Files searching files . . . . . . . . . 236 4-126 Select file name and version of file to restore . . . . . . . . . . . . . . . . . . . 236 4-127 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 4-128 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 4-129 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 4-130 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 4-131 Tivoli Continuous Data Protection for Files searching for files . . . . . . 239 4-132 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 4-133 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 4-134 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 4-135 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 4-136 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 4-137 Tivoli Continuous Data Protection for Files Change Search Location window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 4-138 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 4-139 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 4-140 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 4-141 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 4-142 Select remote storage to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 4-143 Tivoli Continuous Data Protection for Files searching for files . . . . . . 248 4-144 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 4-145 Versions of notes file log.nsf on file server . . . . . . . . . . . . . . . . . . . . . 249 4-146 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 4-147 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 4-148 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 4-149 The restored notes file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 4-150 Tivoli Storage Manager backup-archive client . . . . . . . . . . . . . . . . . . 251 4-151 Restore Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 4-152 Select destination folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 4-153 Report status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 5-1 Ready to Install the Program window . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 5-2 Out of Disk Space window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Figures xi
  • 14. 5-3 Custom Setup window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 5-4 Cancel installation window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 5-5 InstallShield Wizard Completed window (canceled installation) . . . . . . . 259 5-6 Setup Type (of installation) window . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 5-7 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 5-8 Change Current Destination Folder window . . . . . . . . . . . . . . . . . . . . . . 262 5-9 Error message during non-privileged user installation . . . . . . . . . . . . . . 263 5-10 Port 9003 already being used by another program . . . . . . . . . . . . . . . . 265 5-11 Tivoli Continuous Data Protection for Files reporting a problem . . . . . . 266 5-12 Tivoli Continuous Data Protection for Files unable to start the Initial Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 5-13 Tivoli Continuous Data Protection for Files entries in the event log . . . 268 5-14 Error entry in the Windows system event log . . . . . . . . . . . . . . . . . . . . 269 5-15 Port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . 270 5-16 Modifying the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . . . . . 271 5-17 Changing the port number to 9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 5-18 New port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . 272 5-19 Original start.html file with port 9003 . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 5-20 File start.html after editing (now using port 9005) . . . . . . . . . . . . . . . . . 274 5-21 Netstat -a output showing the usage of the new port 9005. . . . . . . . . . 276 5-22 HTML listener now successfully listening on port 9005 (Event Viewer) 277 5-23 Tivoli Continuous Data Protection for Files user interface using port 9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 5-24 Shortcut in the quick launch area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 5-25 Push installation failing due to remote computer not being available . . 281 5-26 Check if remote system is available using the ping command . . . . . . . 282 5-27 Push installation failing due to wrong user name or wrong password . 283 5-28 Push installation failing due to wrong command syntax . . . . . . . . . . . . 284 5-29 Successful push installation of Tivoli Continuous Data Protection for Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 5-30 Tivoli Continuous Data Protection for Files (pull) installation message 287 5-31 Event message due to installation of new software version . . . . . . . . . 288 5-32 FPcommand.bat file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 5-33 Options file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 5-34 Message to reboot the computer after the (pull) installation . . . . . . . . . 290 5-35 External USB disk named USB_Drive mapped as drive F:. . . . . . . . . . 292 5-36 Drive F: (USB_Drive) as remote backup target (external device) . . . . . 293 5-37 Disk full informational message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 5-38 Event log entry due to target backup device being full (Event ID: 6077)294 5-39 Remote storage location inaccessible due to disk / file system full (Status page) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 5-40 Tivoli Continuous Data Protection for Files experiencing a problem. . . 295 5-41 Event log entry due to disk / file system full condition (Event ID: 6000) 296 xii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 15. 5-42 Modified settings in the Remote Backup page to save space on the remote target location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 5-43 Changed drive letter assignments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 5-44 Informational message that the network target cannot be reached . . . 299 5-45 Event entry due to replication problem caused by changed drive letters (Event ID: 6069) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 5-46 Remote storage location inaccessible due to changed drive letter assignment (Status page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 5-47 Shared network folder e$ on file server Izmir mapped to drive (W:) . . . 303 5-48 Using the UNC name instead of the drive letter for the remote storage location (Remote Storage page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 5-49 Using a WebDAV server as the remote storage destination . . . . . . . . . 306 5-50 Tivoli Continuous Data Protection for Files needs a password (informational message) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 5-51 Tivoli Continuous Data Protection for Files prompts for a password to access the WebDAV server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 5-52 Entering user name and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 5-53 The two passwords do not match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 5-54 WebDAV server not reachable because no Internet connection is available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 5-55 WebDAV server can be reached again (Internet connection established) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 5-56 Default (minimum) dsm.opt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 5-57 Using a Tivoli Storage Manager server as a remote backup location (Helsinki). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 5-58 Window explains target location (Helsinki) is not responding properly . 314 5-59 Tivoli Continuous Data Protection for Files warning message . . . . . . . 314 5-60 Event log entry due to unknown or incorrect ID (node name) entered . 315 5-61 Entries in dsierror.log caused by unknown or incorrect ID (node name) entered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 5-62 Tivoli Continuous Data Protection for Files prompting for a password to access the Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . . . . 318 5-63 Informational entry in the event log (password information needed) . . 319 5-64 Event log entry due to insufficient permission to delete backed up data320 5-65 Error messages in dsierror.log due to insufficient permissions to delete backed up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 5-66 Event log entry when storing more versions of files as defined on remote storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 5-67 Tivoli Continuous Data Protection for Files unable to unlink the file (Event ID: 6086). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 5-68 FilePath ERROR entry (Event ID: 6000) in event log due to a permission problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 5-69 Entry in file purge_failed.log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Figures xiii
  • 16. 5-70 File dsierror.log with error messages ANS1126E . . . . . . . . . . . . . . . . . 325 5-71 Target location (Helsinki) is not responding properly (window). . . . . . . 331 5-72 Entry in event log due to session being rejected from Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 5-73 ANS1355E message in dsierror.log file (session rejected) . . . . . . . . . . 332 5-74 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 333 5-75 Entry in file replication-failed.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 5-76 Informational message about the network target being not reachable . 336 5-77 TCP/IP connection error messages in file dsierror.log . . . . . . . . . . . . . 336 5-78 Event log entry caused by the network target being not available (Event ID: 6069). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 5-79 Entry in file replication-active.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 5-80 Entries in file replication-queue.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 5-81 Modified dsm.opt file containing an exclude statement for *.txt files . . . 340 5-82 Entry in event log due to file being excluded from backup (Event ID: 6000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 5-83 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 342 5-84 ANS1115W warning message in dsierror.log (excluded file) . . . . . . . . 343 5-85 Remote storage location not reachable (notification message) . . . . . . 344 5-86 Remote storage location inaccessible (Status page) . . . . . . . . . . . . . . 345 5-87 Remote storage location reachable again (notification message) . . . . 346 5-88 Remote storage location accessible again (Status page) . . . . . . . . . . . 346 5-89 FilePath agent in interactive mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 5-90 Command to start a Tivoli Continuous Data Protection for Files trace . 354 5-91 Create file.doc to trigger an activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 5-92 DebugView capturing the trace output . . . . . . . . . . . . . . . . . . . . . . . . . 355 5-93 Command to stop the trace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 5-94 Quitting the interactive mode of the FilePath agent . . . . . . . . . . . . . . . 355 5-95 Functionality overview of Tivoli Continuous Data Protection for Files. . 377 xiv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 17. Tables 1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional backup solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2-1 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3-1 Default installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . 109 3-2 File and folder pattern matches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 3-3 Interaction of inclusion and exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 3-4 General page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 3-5 Files to Protect page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 3-6 E-mail Protection page default settings. . . . . . . . . . . . . . . . . . . . . . . . . . 118 3-7 Remote Storage page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . 118 3-8 Advanced page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 4-1 Tivoli Continuous Data Protection V3.1 feature support matrix . . . . . . . 122 4-2 Central administration folder configurations for managing clients. . . . . . 192 4-3 Lifecycle file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 4-4 Characteristics of file on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . 198 4-5 Central administration folder configurations for managing clients. . . . . . 216 5-1 Description of options used in dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . 311 5-2 Some additional useful dsm.opt options . . . . . . . . . . . . . . . . . . . . . . . . . 312 5-3 Important system operation files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 5-4 Installation log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 5-5 Replication logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 5-6 Scheduled protection logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 5-7 Local pool log file and gendb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 5-8 Tivoli Storage Manager API log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 5-9 Solution tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 5-10 Solution demonstration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 5-11 Skill adjustment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 5-12 Major solution deployment tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 5-13 Technical requirement gathering sample examples . . . . . . . . . . . . . . . 366 5-14 Solution planning sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 5-15 Solution implement sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 5-16 Solution test sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 5-17 Solution client training sub-tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 5-18 Engagement closing sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 © Copyright IBM Corp. 2007. All rights reserved. xv
  • 18. xvi Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 19. Examples 5-1 Registering node florence without delete backup permission (register node) 316 5-2 Details of node florence without delete backup permission (query node) 317 5-3 Select command output displaying too much active versions of a file . . 326 5-4 Register node florence with backdelete=yes parameter (register node). 326 5-5 Update existing node florence with backdelete=yes parameter (update node) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 5-6 Details of node florence with delete backup permission (query node) . . 327 5-7 Select command output displaying active and inactive versions of a file 328 5-8 Running expiration on the Tivoli Storage Manager server (expire inventory) 328 5-9 Select command output after running expiration (only active versions) . 329 5-10 Tivoli Storage Manager client sessions disabled on Tivoli Storage Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 5-11 Enable Tivoli Storage Manager client sessions again (enable sessions)334 5-12 Tivoli Storage Manager client sessions enabled on IBM Tivoli Storage Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 5-13 Tracing example (trace mask=fpl_meta). . . . . . . . . . . . . . . . . . . . . . . . 355 © Copyright IBM Corp. 2007. All rights reserved. xvii
  • 20. xviii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 21. Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. © Copyright IBM Corp. 2007. All rights reserved. xix
  • 22. Trademarks The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: Redbooks (logo) ® Lotus Notes® Redbooks® AIX® Lotus® System p™ Domino® Notes® Tivoli® IBM® Passport Advantage® The following terms are trademarks of other companies: Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation and/or its affiliates. NetApp, and the Network Appliance logo are trademarks or registered trademarks of Network Appliance, Inc. in the U.S. and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Internet Explorer, Microsoft, Outlook, Windows Server, Windows Vista, Windows, Win32, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Pentium, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. xx Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 23. Preface Tivoli Continuous Data Protection for Files is specifically targeted at user computers, such as mobile computers and workstations, as well as file servers. It provides continuous data protection of files, providing the highest level of protection possible, yet is simple to use and administer. This book presents a deployment guide for Tivoli Continuous Data Protection for Files Version 3.1. We cover planning, installing, and troubleshooting Tivoli Continuous Data Protection for Files for several use case scenarios. In addition, we provide some case studies, including integration with IBM Tivoli Storage Manager, that can be used as a proof of concept or demonstration of the product at a client environment. This book is geared for IT Specialists who will be working on Tivoli Continuous Data Protection for Files installations and proof of concepts. The team that wrote this book This book was produced by a team of specialists from around the world working at the International Technical Support Organization, Austin Center. Vasfi Gucer is an IBM® Certified Consultant IT Specialist working at the ITSO Austin Center. He worked with IBM Turkey for 10 years and has been with the ITSO since January 1999. He has more than 12 years of experience in systems management, networking hardware, and distributed platform software. He has worked on various Tivoli® customer projects as a Systems Architect in Turkey and the United States. Vasfi is also a Certified Tivoli Consultant. Greg Bass is a Tivoli storage specialist in the Techline presales support organization based out of Austin, Texas. Greg has been supporting Tivoli storage products since 2000 when he was hired by the Tivoli Sales Infrastructure Group (SIG). Greg originally joined IBM in 1999 when he was brought to Austin to provide technical support for Lotus® Notes® and Domino® servers. Greg has been in the technology realm for over 15 years. Prior to IBM, Greg worked in the San Francisco bay area for PC Computing magazine, Oracle® and an Internet startup called Fabrik. Wolfgang Beuttler is an IBM Tivoli Storage Manager Support Specialist in Mainz, Germany. He works for the Tivoli Storage Manager front- and back-end support team and provides support to clients all over the world, including onsite © Copyright IBM Corp. 2007. All rights reserved. xxi
  • 24. support. He has more than 14 years of experience in IT and eight years of experience with IBM and the Tivoli Storage Manager product portfolio, starting with ADSM Version 3.1. His areas of expertise include defect as well as non-defect problem determination of Tivoli Storage Manager products. Marcia Kubo is an IT Presales Support Specialist, in Brazil. She has eight years of experience in the IT field. She has been working for IBM since 2004. Her areas of expertise include IBM System p™ and AIX®, IBM Storage and Data Protection solutions. She is an ITIL Certified, Tivoli Productivity Center V3.1 Certified, IBM Certified Deployment Professional: Tivoli Storage Manager V5.3, IBM Certified Storage Administrator: Tivoli Storage Manager V5, and an IBM Certified Advanced Technical Expert for AIX version V4. Thanks to the following people for their contributions to this project: Arzu Gucer, Bart Jacob International Technical Support Organization, Austin Center Terry Copeland, William Haselton, Linda Sandmann, Jennifer Shaw, Eric Schaefer, Chris Stakutis, Daniel Thompson, Erik Wilkinson IBM USA Become a published author Join us for a two- to six-week residency program! Help write a book dealing with specific products or solutions, while getting hands-on experience with leading-edge technologies. You will have the opportunity to team with IBM technical professionals, Business Partners, and Clients. Your efforts will help increase product acceptance and customer satisfaction. As a bonus, you will develop a network of contacts in IBM development labs, and increase your productivity and marketability. Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.html xxii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 25. Comments welcome Your comments are important to us! We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks® in one of the following ways: Use the online Contact us review Redbooks form found at: ibm.com/redbooks Send your comments in an e-mail to: redbooks@us.ibm.com Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400 Preface xxiii
  • 26. xxiv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 27. Part 1 Part 1 Planning and architecture In this part we introduce the planning and architecture considerations for Tivoli Continuous Data Protection for Files V3.1. © Copyright IBM Corp. 2007. All rights reserved. 1
  • 28. 2 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 29. 1 Chapter 1. Introduction to Tivoli Continuous Data Protection for Files The newest phase in the evolution of file backup is real time protection, and IBM Tivoli Continuous Data Protection for Files delivers a compelling solution offering a unique blend of continuous data protection and scheduled data protection in a single product. Tivoli Continuous Data Protection for Files is a solution for both file servers and user endpoints such as notebooks and workstations. Tivoli Continuous Data Protection for Files exploits the increasing availability of affordable disk storage by offering multiple disk-based target options for copies of your data. Instead of waiting for a scheduled interval, Tivoli Continuous Data Protection for Files backs up your files the moment they are saved, in real time. What's more, it does this effortlessly and transparently, in some cases eliminating the backup window. This chapter provides an introduction to Tivoli Continuous Data Protection for Files and discusses the following topics: “Introduction to Tivoli Continuous Data Protection for Files” on page 3 “How Tivoli Continuous Data Protection for Files works” on page 11 “Main features of Tivoli Continuous Data Protection for Files” on page 13 © Copyright IBM Corp. 2007. All rights reserved. 3
  • 30. “Value proposition of Tivoli Continuous Data Protection for Files” on page 14 4 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 31. 1.1 General overview of Tivoli Continuous Data Protection for Files It is important to understand the evolution of data protection applications and the environments in which they operate in order to fully appreciate the Tivoli Continuous Data Protection for Files solution. 1.1.1 What is Tivoli Continuous Data Protection for Files? Tivoli Continuous Data Protection for Files is a unique hybrid approach to file backup that combines replication with traditional backups. Tivoli Continuous Data Protection for Files is a real time, continuous data protection solution for mobile computers, workstations, and fileservers. Backups can go to one or more disk targets. Files are copied and saved in their native format. Tivoli Continuous Data Protection for Files is also highly tolerant of transient network connectivity. Easy-to-use wizards allow for simple configuration and file restoration. In addition, Tivoli Continuous Data Protection for Files is engineered specifically to support Lotus Notes and Microsoft® Outlook® mail clients. Tivoli Continuous Data Protection for Files will back up your most important files the moment they change instead of waiting for a scheduled backup. Non-critical files can be backed up on a scheduled basis. It works in the background, similar to a virus scanner, and is therefore completely transparent to the user. Since Tivoli Continuous Data Protection for Files has a single end-point architecture, there is no need for additional components such as a server component. It requires only a single installation on the system where the files to be protected are located. Tivoli Continuous Data Protection for Files keeps copies of your data in their native file format and does not modify or encode them in any way. This transparency allows for direct access to the copied files with our without the Tivoli Continuous Data Protection for Files GUI. In addition to providing multiple recovery points through file versioning, Tivoli Continuous Data Protection for Files provides additional redundancy by allowing multiple options for target destinations for your copied files: On local disk for protection, even when not connected to a network To a network file server or NAS device for remote machine protection To an IBM Tivoli Storage Manager (Tivoli Storage Manager) or IBM Tivoli Storage Manager Express (Tivoli Storage Manager Express) server To a Web-based device through http or https Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 5
  • 32. Table 1-1 demonstrates the differences between Tivoli Continuous Data Protection for Files and traditional backup approaches. Table 1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional backup solutions Tivoli Continuous Data Traditional backup Protection for Files solutions When to protect Continuous for highly Scheduled, full system important files, scheduled for others How to detect Journal-based on all file Journal-based on some file systems systems Where copies are stored Disk only, locally or Typically on tape remote; Tivoli Storage Manager Storage format Left “native”, online as files Wrapped into a proprietary format Management / Simplified per-client Client-server concept; administration administration only server component typically complexity more expensive/complex So overall, Tivoli Continuous Data Protection for Files provides simple, effective, and real time file protection for: Accidental file deletion File corruption Unwanted file alteration Disk crashes Other unforeseen losses 1.1.2 Why Tivoli Continuous Data Protection for Files is needed Businesses today are increasingly concerned with protecting their data. Losing key business information can hamper productivity, delay projects, and divert resources and calls to the help desk. It can also harm organizations when they face regulatory scrutiny. In fact, many businesses today are legally required to use formal data protection. Data corruption is a regular concern, and companies need better recovery point capabilities. Often the most valuable files are those that the users are working with right now. In addition, companies need sophisticated policy-based data management that enables them to focus on data with the most business value. 6 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 33. Although most companies have implemented solutions for protecting enterprise data, data residing on workstations and notebooks is often under protected—even though it amounts to 60 percent of all corporate data, according to some industry experts. This is particularly true where lost data can significantly impact productivity and viability. Additional facts to consider: In many companies, about 60-70% of corporate data resides on notebooks and workstations which are rarely, if ever, backed up. Almost half of small to medium sized businesses admit to having no formal data protection procedure. The loss of productivity due to data loss on user computers is a growing concern. Virus and data corruption on file servers is an increasing problem. – Companies need better recovery point capabilities. Today’s backup and recovery solutions are usually scheduled and tend to miss the most valuable data- what the user is working on right now. Mobile computer/desktop data protection is a growing problem: – Corporate data centers are reluctant to take on mobile computer management. – The business impact of lost data on mobile computers/desktops is increasing: • Specific segments, such as law firms, medical practices, consulting, and so on, can have a very significant impact to productivity and liability. • The aggregate impact to large corporations is significant. With this in mind, Tivoli Continuous Data Protection for Files is designed to help alleviate clients' concerns and provide simple, effective, and efficient data protection and integrity. Key client issues driving the requirements for continuous data protection are: Critical information assets are being stored across the organization; they are no longer consolidated on just a few key servers. The complexity and expense associated with the replication of information assets across an organization. A shortage of skilled people resources, which demands that highly automated tools be deployed to help allow consistent practices across platforms, minimize human error, and improve the amount of storage a single storage administrator can handle. Meeting service-level objectives by providing continuous availability of data. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 7
  • 34. The integrity of data for governance and security requirements. Backups taken “only” on a scheduled basis allow too much productivity loss. For several years a major market trend has been the steady decline in the cost of disk storage (local hard drives, SAN disks, removable disks, NAS devices, and so on). This trend makes file protection using disk replication technologies more cost effective compared to traditional backup/recovery solutions, which primarily use tape as their storage repository. Tivoli Continuous Data Protection for Files leverages this development by utilizing a traditional backup and recovery solution while also employing data replication techniques. In the long term, this approach will lead to maximized efficiency and productivity in terms of both human and financial resources. For more information about the value proposition and the benefits of using Tivoli Continuous Data Protection for Files, refer to section 1.4, “Value proposition of Tivoli Continuous Data Protection for Files” on page 14. Why is Tivoli Continuous Data Protection for Files needed? 1. Employee productivity declines when data assets are lost or difficult to recover. Recovery from a Recovery from tape disk image copy 2. Business and regulatory requirements for data continuity are increasing. Cost 3. Disk costs are declining, making replication technologies more cost effective. 4. Critical data assets found in remote Recovery Time Objective offices, mobile computers, and desktops are often not protected. Tivoli Continuous Data Protection for Files 5. Employee productivity declines with delivers faster recovery of file assets difficult recovery of data and recreation of lost assets. Figure 1-1 Why Tivoli Continuous Data Protection for Files is needed 8 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 35. 1.1.3 Who should use Tivoli Continuous Data Protection for Files? The concept and design of Tivoli Continuous Data Protection for Files makes it ideal to protect both home computing environments and workstations or large file servers in business critical environments. Generally speaking, Tivoli Continuous Data Protection for Files should be used by everyone who has the need to continuously protect files in real time. Ideal candidates for Tivoli Continuous Data Protection for Files are organizations with valuable data spread across multiple locations, departments, and file servers, or those whose IT infrastructure includes desktops and mobile computers which are not protected adequately or frequently. Tivoli Continuous Data Protection for Files might also be of interest for enterprise clients with large file servers already using traditional backup solutions like Tivoli Storage Manager or Veritas NetBackup. Due to the amount of data needed to be backed up, large file servers are often unable to meet their backup window. Data loss can also occur after the point of the last scheduled backup. Tivoli Continuous Data Protection for Files with its continuous backup methodology is therefore a perfect complement to traditional backup solutions. Overall, Tivoli Continuous Data Protection for Files could be the answer when: Clients are considering buying disks as an alternative to tape for simpler administration and configuration and faster recovery service levels. Clients view data as a major corporate asset. Clients are considering snapshot technologies. With Tivoli Continuous Data Protection for Files, there is no need to understand advanced IT concepts such as snapshots, mirrors, synchronous versus asynchronous and how to configure, maintain, and manage such elements. Clients are concerned about their ability to meet service and availability levels with a minimal to zero backup window. Skilled storage administrators are difficult to find and retain. Employee productivity suffers due to accidental data loss and recreating files from scratch. Organizations are considering a backup solution for remote offices Tivoli Continuous Data Protection for Files is ideal for remote office servers, because it will maintain a local backup of files and replicate data to centrally based servers while tolerating issues with network connectivity. System administrators need their computer systems to be online 24x7 with minimum CPU or network impact during data protection operations. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 9
  • 36. The organization is considering how to easily protect information assets found on individual desktops and mobile computers with minimum administration. The organization needs to protect critical files from alteration, deletion, viruses, and corruption. 10 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 37. 1.2 How Tivoli Continuous Data Protection for Files works Tivoli Continuous Data Protection for Files is a new backup paradigm using a unique hybrid approach by combining modern replication technologies with traditional backup methods. It does so by taking all the benefits from each technology and uniting them together into a completely new product: Tivoli Continuous Data Protection for Files. Tivoli Traditional Continuous Replication Data backups Protection for Files • To-disk duplication • Versioning of files • Lightning fast • Central administration • Real time for important files • Archiving (vaulting) • Tolerant of transient • Retention networks • Highly scalable • Multiple targets Figure 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files But how does it work? Figure 1-3 on page 12 gives a general overview on how Tivoli Continuous Data Protection for Files works. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 11
  • 38. Figure 1-3 General overview of Tivoli Continuous Data Protection for Files Tivoli Continuous Data Protection for Files tracks the creation of new files or changes to existing files. If the file is included in your list of protected files or file types an immediate copy is made into a backup area (a separate directory tree) on the local disk. Tivoli Continuous Data Protection for Files can store multiple versions of each file subject to the local “pool size” which can be configured by the user. When the pool is full, the oldest copies (versions) are removed to make room for newer ones. The same file can also be sent to a remote storage area, such as a removable disk, file server, NAS device, and WebDAV server for remote protection. Another copy of the file can be sent to a Tivoli Storage Manager server or Tivoli Storage Manager Express server. Traditionally, Tivoli Storage Manager is a data protection product often used in larger business environments. Those clients might find Tivoli Continuous Data Protection for Files useful as a real time client solution for mobile computers and workstations, but they still want most of the protected data to be managed by a Tivoli Storage Manager server. Note: The Tivoli Continuous Data Protection for Filescode installs the Tivoli Storage Manager API automatically, so there is no need to install a separate API package. If scheduled protection is enabled, then files associated with scheduled protection will be queued for transmission to the remote target based on the 12 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 39. interval that has been selected within Tivoli Continuous Data Protection for Files (Hourly, Daily, Weekly, Monthly). When the interval expires, Tivoli Continuous Data Protection for Files will copy changed files to the remote target storage location. The types of protection offered by Tivoli Continuous Data Protection for Files (continuous or scheduled, local or remote) can be easily configured by the user in multiple combinations. This allows the user to protect their assets in a highly flexible manner. To summarize how Tivoli Continuous Data Protection for Files works, we have to differentiate between continuous and scheduled backup concepts: Files protected continuously: – Specify multiple storage locations for continuously protected files. – The target area(s) will capture a copy of the file each time it is saved. – The local target area is auto-managed as a pool with a configurable size. – There is an option to specify a remote file server for off-machine protection; it is still real time, but tolerant of transient networks. – There is an option to specify a Tivoli Storage Manager server or Tivoli Storage Manager Express server for off-machine protection; it is still real time, but tolerant of transient networks. Files protected by scheduled backups (primarily mail files): – Mail files are protected on a scheduled basis by being sent to the remote file server or Tivoli Storage Manager server. – Change-journal eliminates having to take processor resources to scan the file system. – Files are “versioned” on a remote file server, allowing for point-in-time restore. – Remote versions are automatically managed to a configurable pool size. 1.3 Main features of Tivoli Continuous Data Protection for Files At the time of this publication, the latest version of Tivoli Continuous Data Protection for Files was version 3.1. The main features of this version are: Completely automated continuous protection of important files When a file is saved: – A copy is stored in a pool on local disk. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 13
  • 40. – Another copy can be sent to a file server, NAS device, or WebDAV server, Tivoli Storage Manager, or Tivoli Storage Manager Express server Real time data protection High/low priority files options Tivoli Continuous Data Protection for Files allows user designated files to be backed up continuously as soon as they change. The user can also designate less important or constantly changing files to be saved on a scheduled basis (Hourly, Daily, Weekly, Monthly). File include/exclude options Tivoli Continuous Data Protection for Files offers the usage of include/exclude lists. By using them, the client can define precisely what type of files will be included for protection. They can also specify a list of files or directories that will be excluded by Tivoli Continuous Data Protection for Files and not backed up or vaulted. Tolerant of transient networks Versioning of files Archive retention Scalable Small foot print Tivoli Continuous Data Protection for Files can be installed in a few minutes on a system and will only use about 21 MB of disk space. Simplified management and central administration Due to its simplified management concept, Tivoli Continuous Data Protection for Files provides a central administration interface that allows the user to restore his own files quickly and easily. No server component required Maintains native file format Tivoli Continuous Data Protection for Files maintains files in their natural format and does not encode them in a proprietary format or modify them in any other way. 1.4 Value proposition of Tivoli Continuous Data Protection for Files For business units dependent on data availability and rapid data recovery, Tivoli Continuous Data Protection for Files provides uniquely efficient and effective 14 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 41. data protection to ensure business continuity, employee productivity, and integrity of information assets. For storage managers and administrators responsible for protecting data while containing cost, Tivoli Continuous Data Protection for Files simplifies heterogeneous storage management and provides real options for an integrated data protection solution across all information assets. Tivoli Continuous Data Protection for Files: Provides easy to use data protection and integrity, requires little or no training to use Improves employee productivity by providing real time backups of data, so when a failure occurs, the recovery can be the latest version, not the last time a scheduled backup ran Improves IT productivity and labor resource utilization, because users can more easily recover files without IT involvement Improves network and bandwidth usage, because it is optimized to send data through network only when it is connected with no user or IT manual intervention required for optimizing the bandwidth usage The value proposition using Tivoli Continuous Data Protection for Files can be summarized as follows: Reduced or eliminated backup window – Improved backup resource utilization – Better return on investment (ROI) and total cost of ownership (TCO) Note: In finance, the return on investment (ROI)a is a calculation used to determine whether a proposed investment is wise, and how well it will repay the investor. It is calculated as the ratio of the amount gained (taken as positive), or lost (taken as negative), relative to the basis. Total cost of ownership (TCO)b is a financial estimate designed to help consumers and enterprise managers assess direct and indirect costs related to the purchase of any capital investment, such as (but not limited to) computer software or hardware. a. Definition taken from article “Return on investment”, found at: http://en.wikipedia.org/wiki/Return_on_investment b. Definition taken from article “Total cost of ownership”, found at: http://en.wikipedia.org/wiki/Total_cost_of_ownership Improved recovery point objective (RPO) Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 15
  • 42. – Reduced loss of data – Improved productivity Note: The RPO is the degree of difference between the active online data and the disaster recovery copy of that data. An RPO of zero would mean that the primary copy and the disaster recovery copy are in exact synchronization. A failure would result in zero loss of data. Improved recovery time objective (RTO) – User initiated restore, zero administration intervention – Optional recovery from disk (local or remote) Note: The RTO is the amount of time after a failure that someone is willing to spend before a given application or group of data is back up and available. An RTO of zero means that failures should cause zero disruption. 16 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • 43. 1.4.1 Benefits of using Tivoli Continuous Data Protection for Files Using Tivoli Continuous Data Protection for Files provides the following benefits: Simplified storage management can save IT staff and computer user time and labor Continuous data protection provides data integrity when viruses attack and corrupt systems Reduces or eliminates backup windows Optimizes integration to network and enterprise data protection solutions Optimizes bandwidth and network transfer of data Continuously protects multiple versions of files to allow clients a choice of recovery points Ability to write-protect data locally to prevent unwanted modification This has a variety of uses such as allowing a user to store final versions of documents to prevent unintentional changes. Ability to send data to heterogeneous backup devices: local file system (on local or SAN disk), file server, NAS, USB disk, HTTP server, or Tivoli Storage Manager server 1.4.2 Unique differentiators The following unique differentiators of Tivoli Continuous Data Protection for Files have been identified: Fast time to deployment Tivoli Continuous Data Protection for Files can be installed, configured, and running in a few minutes. Ease of daily use No need to understand more IT-savvy concepts such as "snapshots" and how to maintain, configure, and manage such elements. Elimination or reduction of backup windows Backup target flexibility Tivoli Continuous Data Protection for Files allows the target of the backup to be any type of modern disk-based storage device such as: a local file system on local or Storage Area Network (SAN) disk, a USB (Universal Serial Bus) device, a File Server, a Network Attached Storage (NAS) device or a WebDAV enabled web server. If Tivoli Storage Manager is used as the remote storage destination, both disk and tape storage pools can be used. Easily integrates into traditional backup solutions Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 17