beautypg.com
6
Copyright © Acronis International GmbH, 2002-2014
7.3
Removable devices ................................................................................................................193
7.4
Tape devices ..........................................................................................................................194
7.4.1
What is a tape device? ................................................................................................................................ 194
7.4.2
Overview of tape support ........................................................................................................................... 194
7.4.3
Getting started with a tape device ............................................................................................................. 198
7.4.4
Tape management ...................................................................................................................................... 202
7.4.5
Vaults on tapes ............................................................................................................................................ 210
7.4.6
Usage examples ........................................................................................................................................... 211
7.5
Storage nodes ........................................................................................................................214
7.5.1
What is a storage node? ............................................................................................................................. 214
7.5.2
Supported types of storage ........................................................................................................................ 215
7.5.3
Operations performed by storage nodes .................................................................................................. 215
7.5.4
Getting started with a storage node .......................................................................................................... 216
7.5.5
User privileges on a storage node .............................................................................................................. 217
7.5.6
Operations with storage nodes .................................................................................................................. 218
7.5.7
Deduplication .............................................................................................................................................. 226
8
Operations with archives and backups.......................................................................... 233
8.1
Validating archives and backups ............................................................................................233
8.1.1
Archive selection ......................................................................................................................................... 234
8.1.2
Backup selection .......................................................................................................................................... 234
8.1.3
Vault selection ............................................................................................................................................. 234
8.1.4
Access credentials for source ..................................................................................................................... 235
8.1.5
When to validate ......................................................................................................................................... 236
8.1.6
Task credentials ........................................................................................................................................... 236
8.2
Exporting archives and backups ............................................................................................237
8.2.1
Archive selection ......................................................................................................................................... 239
8.2.2
Backup selection .......................................................................................................................................... 239
8.2.3
Access credentials for source ..................................................................................................................... 240
8.2.4
Destination selection .................................................................................................................................. 240
8.2.5
Access credentials for destination ............................................................................................................. 241
8.3
Mounting an image ................................................................................................................242
8.3.1
Archive selection ......................................................................................................................................... 243
8.3.2
Backup selection .......................................................................................................................................... 243
8.3.3
Access credentials ....................................................................................................................................... 243
8.3.4
Volume selection ......................................................................................................................................... 244
8.3.5
Managing mounted images........................................................................................................................ 244
8.4
Operations available in vaults ................................................................................................245
8.4.1
Operations with archives ............................................................................................................................ 245
8.4.2
Operations with backups ............................................................................................................................ 246
8.4.3
Converting a backup to full ......................................................................................................................... 247
8.4.4
Deleting archives and backups ................................................................................................................... 247
9
Bootable media ........................................................................................................... 249
9.1
How to create bootable media ..............................................................................................250
9.1.1
Linux-based bootable media ...................................................................................................................... 250
9.1.2
WinPE-based bootable media .................................................................................................................... 254
9.2
Connecting to a machine booted from media .......................................................................256
9.3
Working under bootable media.............................................................................................257
9.3.1
Setting up a display mode .......................................................................................................................... 258
9.3.2
Configuring iSCSI and NDAS devices .......................................................................................................... 258
9.4
List of commands and utilities available in Linux-based bootable media .............................259