ACRONIS Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU Uživatelská příručka Strana 1

Procházejte online nebo si stáhněte Uživatelská příručka pro Software pro obnovení zálohy ACRONIS Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU. Acronis Backup & Recovery 10 Server for Linux, ESD, AAS, 1u, StdSup, FRE Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 182
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Server for Linux

Update 3 Acronis® Backup & Recovery ™ 10 Server for Linux User's Guide

Strany 2

10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac

Strany 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010  Validation (if selected) - events before or after which the validation is performed, and validation sch

Strany 4

101 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following  Click View Details. T

Strany 5

102 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I

Strany 6 - 1.2 Getting started

103 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for

Strany 7

104 Copyright © Acronis, Inc., 2000-2010 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view

Strany 8 - Shortcuts bar

105 Copyright © Acronis, Inc., 2000-2010 The tasks will run under the credentials with which the user who starts the tasks is logged on. If any of

Strany 9 - Actions

106 Copyright © Acronis, Inc., 2000-2010 6.2.4.1 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for th

Strany 10 - How to expand/minimize panes

107 Copyright © Acronis, Inc., 2000-2010 Use the table in the right part of the window to browse and select the nested items. Selecting the check b

Strany 11 - Action pages

108 Copyright © Acronis, Inc., 2000-2010 The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*.t

Strany 12 - Action page - Controls

109 Copyright © Acronis, Inc., 2000-2010  To back up data to a personal vault, expand the Personal group and click the vault.  To back up data

Strany 13 - 1.3.1 Agent for Linux

11 Copyright © Acronis, Inc., 2000-2010 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Strany 14 - 1.4 Supported file systems

110 Copyright © Acronis, Inc., 2000-2010 Backup plans that operate with the same archive should back up the same data items (say, both plans back u

Strany 15 - 1.7 Technical Support

111 Copyright © Acronis, Inc., 2000-2010  You want to store the backup locally in the file MyMachine.tib.  You want each new backup to replace

Strany 16 - 2.1 Basic concepts

112 Copyright © Acronis, Inc., 2000-2010  You want to perform daily full backups of your machine to the file MyMachine.tib on an external hard di

Strany 17

113 Copyright © Acronis, Inc., 2000-2010 a) When creating the first backup plan, specify ServerFiles([DATE]) as the archive name, select the Name

Strany 18 - Backup using bootable media

114 Copyright © Acronis, Inc., 2000-2010 This is because the full backups created at midnight were replaced by new full backups of the same day. 6

Strany 19

115 Copyright © Acronis, Inc., 2000-2010 "fathers") and monthly (referred to as "grandfathers") backups. The expired backups wi

Strany 20 - Full backup

116 Copyright © Acronis, Inc., 2000-2010 6.2.10.4 Grandfather-Father-Son scheme At a glance  Daily incremental, weekly differential, and monthly

Strany 21 - Differential backup

117 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h

Strany 22 - 2.4 Owners and credentials

118 Copyright © Acronis, Inc., 2000-2010 Suppose that you need to:  Perform backups at the end of each working day  Be able to recover an accid

Strany 23 - 2.5 GFS backup scheme

119 Copyright © Acronis, Inc., 2000-2010 No daily backups Consider a more exotic GFS scheme:  Start backup at: 12:00 PM  Back up on: Friday 

Strany 24 - GFS by Acronis

12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Strany 25 - The resulting archive: ideal

120 Copyright © Acronis, Inc., 2000-2010 This is how the first 14 days (or 14 sessions) of this scheme's schedule look. Shaded numbers denote

Strany 26 - The resulting archive: real

121 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 4 1 2 1 3 1 2 1 4 1 2 1 3 This gives us only a four

Strany 27 - Tower of Hanoi overview

122 Copyright © Acronis, Inc., 2000-2010 delete the last full backup with all dependent incremental/differential backups  If there is only one fu

Strany 28 - Tower of Hanoi by Acronis

123 Copyright © Acronis, Inc., 2000-2010 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates th

Strany 29 - 2.7 Retention rules

124 Copyright © Acronis, Inc., 2000-2010  Differential backup, runs manually You can run any of these backup tasks by selecting it from the list

Strany 30 - 1. Delete backups older than

125 Copyright © Acronis, Inc., 2000-2010 What to recover Archive (p. 126) Select the archive to recover data from. Data type (p. 127) Applies to: d

Strany 31 - Combination of rules 1 and 2

126 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Run under the current user The task will run un

Strany 32 - Recovery

127 Copyright © Acronis, Inc., 2000-2010 After entering access credentials, the folders on the server become available. Click the appropriate folde

Strany 33 - 2.8.2 Backing up MD devices

128 Copyright © Acronis, Inc., 2000-2010  The disk geometry is different to that stored in the backup. There are probably other times when you ma

Strany 34

129 Copyright © Acronis, Inc., 2000-2010 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Phys

Strany 35 - 2.10 Tape support

13 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron

Strany 36

130 Copyright © Acronis, Inc., 2000-2010  Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk. I

Strany 37 - 2.11 Support for SNMP

131 Copyright © Acronis, Inc., 2000-2010 When using bootable media Disk letters seen under Windows-style bootable media might differ from the way W

Strany 38 - 2.12.1 Acronis Secure Zone

132 Copyright © Acronis, Inc., 2000-2010 Older operating systems (MS-DOS, Windows 95 and Windows NT 3.x, 4.x) do not support FAT32 and will not be

Strany 39 - Limitation

133 Copyright © Acronis, Inc., 2000-2010 By mask (?) F???.log Excludes all .log files with names consisting of four symbols and starting with &qu

Strany 40 - 3 Options

134 Copyright © Acronis, Inc., 2000-2010 6.3.8 When to recover Select when to start the recovery task:  Recover now - the recovery task will be

Strany 41 - 3.1.5 Fonts

135 Copyright © Acronis, Inc., 2000-2010  The system was recovered on dissimilar hardware and the new hardware is incompatible with the most crit

Strany 42 - 3.2 Machine options

136 Copyright © Acronis, Inc., 2000-2010 Solution: Change the loader configuration and /etc/fstab so that the LVM is not used and reactivate the bo

Strany 43 - 3.2.2 Log cleanup rules

137 Copyright © Acronis, Inc., 2000-2010 chroot /mnt/system/ /usr/sbin/grub 9. Specify the disk on which GRUB is located—typically, the boot or ro

Strany 44

138 Copyright © Acronis, Inc., 2000-2010 To create a validation task, perform the following steps. General Task name [Optional] Enter a unique name

Strany 45

139 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma

Strany 46 - 3.3.1.1 Archive protection

14 Copyright © Acronis, Inc., 2000-2010 1.3.2 Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool for

Strany 47 - 3.3.1.3 Pre/Post commands

140 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Strany 48 - Pre-backup command

141 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun

Strany 49 - Post-backup command

142 Copyright © Acronis, Inc., 2000-2010  Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med

Strany 50 - Post-data capture command

143 Copyright © Acronis, Inc., 2000-2010 ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port

Strany 51 - 3.3.1.6 Compression level

144 Copyright © Acronis, Inc., 2000-2010 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers

Strany 52 - HDD writing speed

145 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient

Strany 53 - 3.3.1.8 Notifications

146 Copyright © Acronis, Inc., 2000-2010 The resulting archive's options The exported archive inherits the options of the original archive, in

Strany 54 - Messenger service (WinPopup)

147 Copyright © Acronis, Inc., 2000-2010 Task credentials (p. 147) [Optional] The export task will run on behalf of the user who is creating the ta

Strany 55 - SNMP notifications

148 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma

Strany 56 - 3.3.1.11 Backup splitting

149 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Strany 57 - 3.3.1.13 Error handling

15 Copyright © Acronis, Inc., 2000-2010 pam.i386 libselinux.i386 libsepol.i386 These packages should be available in the repository of your Linux d

Strany 58 - 3.3.1.14 Dual destination

150 Copyright © Acronis, Inc., 2000-2010  To export data to a personal vault, expand the Personal vaults group and click the vault.  To export

Strany 59 - Skip the task execution

151 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Use the task credentials The program will acces

Strany 60

152 Copyright © Acronis, Inc., 2000-2010 6.8.1.1 Acronis Secure Zone Disk The Acronis Secure Zone can be located on any fixed hard drive. Acronis

Strany 61 - Reset archive bit

153 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi

Strany 62 - Use FTP in Active mode

154 Copyright © Acronis, Inc., 2000-2010 3. Specify the new size of the zone by:  dragging the slider and selecting any size between the current

Strany 63 - 3.3.2.1 Pre/Post commands

155 Copyright © Acronis, Inc., 2000-2010 (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by

Strany 64 - Pre-recovery command

156 Copyright © Acronis, Inc., 2000-2010 PE-based bootable media PE-based bootable media contains a minimal Windows system called Windows Preinstal

Strany 65 - 3.3.2.3 File-level security

157 Copyright © Acronis, Inc., 2000-2010  build an ISO image of a bootable disc to burn it later on a blank disc  upload the selected component

Strany 66 - 3.3.2.4 Notifications

158 Copyright © Acronis, Inc., 2000-2010 nousb2 Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you

Strany 67 - 3.3.2.5 Event tracing

159 Copyright © Acronis, Inc., 2000-2010 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i

Strany 68 - 3.3.2.7 Additional settings

16 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Strany 69

160 Copyright © Acronis, Inc., 2000-2010 Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable med

Strany 70 - 4 Vaults

161 Copyright © Acronis, Inc., 2000-2010 6.10.3.2 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Comput

Strany 71 - 4.1 Personal vaults

162 Copyright © Acronis, Inc., 2000-2010 Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp c

Strany 72 - Vault content

163 Copyright © Acronis, Inc., 2000-2010 You can create the volume structure in either of the following ways:  Automatically in Linux-based boota

Strany 73 - How can I merge two vaults?

164 Copyright © Acronis, Inc., 2000-2010 6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD d

Strany 74 - 4.2 Common operations

165 Copyright © Acronis, Inc., 2000-2010 The following picture illustrates this configuration. Do the following to recover data from this archive.

Strany 75

166 Copyright © Acronis, Inc., 2000-2010 2. In Archive, click Change and then specify the name of the archive. 3. In Backup, click Change and the

Strany 76 - To show or hide columns

167 Copyright © Acronis, Inc., 2000-2010 To collect system information 1. In the management console, select from the top menu Help > Collect sy

Strany 77 - 5 Scheduling

168 Copyright © Acronis, Inc., 2000-2010 7 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi

Strany 78 - 5.1 Daily schedule

169 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup

Strany 79 -  fifth at 7 PM

17 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Strany 80 - 5.2 Weekly schedule

170 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 169), such as pre/post backup commands,

Strany 81

171 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 169) installed on the machine finds data items using the selection rule

Strany 82 - 5.3 Monthly schedule

172 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre

Strany 83

173 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 169) from a backup archive (p. 169) in order to get rid of outdated backups o

Strany 84 - 5.4 Conditions

174 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 177) using the direc

Strany 85 - 5.4.2 Fits time interval

175 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/

Strany 86 - Example:

176 Copyright © Acronis, Inc., 2000-2010  the administrator changes the criteria so that the machine does not meet them anymore. There is no way

Strany 87 - 6 Direct management

177 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 169) containing all data chosen for backup. You do not need acc

Strany 88 - System view

178 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 172) managed by a storage node (p. 179). Archives (p. 169) in a mana

Strany 89 - Backup plan execution states

179 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 170). Policy See Backup policy (p. 170). R Recovery point Date and time to whic

Strany 90 - Backup plan statuses

18 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Strany 91 - Task states

180 Copyright © Acronis, Inc., 2000-2010  prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Strany 92 - Task statuses

181 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog

Strany 93 -  Validation task (p. 137)

182 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 177) is considered vi

Strany 94

19 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Strany 95

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Strany 96

20 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Strany 97 - Task details

21 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Strany 98 - Settings

22 Copyright © Acronis, Inc., 2000-2010 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Crea

Strany 99 - Backup plan details

23 Copyright © Acronis, Inc., 2000-2010 Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When c

Strany 100 - 6.1.3 Log

24 Copyright © Acronis, Inc., 2000-2010 GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regular

Strany 101

25 Copyright © Acronis, Inc., 2000-2010 Assume you select Friday for Weekly/Monthly backup. Here is the real schedule of the backup tasks that will

Strany 102 - 6.2 Creating a backup plan

26 Copyright © Acronis, Inc., 2000-2010 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Strany 103 - Where to back up

27 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at

Strany 104 - Archive validation

28 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Strany 105 - 6.2.4 Items to back up

29 Copyright © Acronis, Inc., 2000-2010  the pattern starts with a full backup since the very first backup cannot be incremental  the scheme fo

Strany 106

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...6 1.1 A

Strany 107 - 6.2.6 Exclusions

30 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules

Strany 108 - 6.2.7 Archive

31 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Strany 109

32 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Strany 110 - 6.2.8.1 Usage examples

33 Copyright © Acronis, Inc., 2000-2010  When recovering a logical volume over a basic (MBR) disk or volume. You can resize the resulting volume

Strany 111

34 Copyright © Acronis, Inc., 2000-2010 Either operation saves the machine’s logical volume structure to the /etc/Acronis directory. Make sure that

Strany 112

35 Copyright © Acronis, Inc., 2000-2010 trueimagecmd --partition:1-1,1-2,1-3,dyn1,dyn2 --filename:/home/backup.tib --create If you select Disk 3, v

Strany 113 - 6.2.8.2 The [DATE] variable

36 Copyright © Acronis, Inc., 2000-2010 ABR10 + + + + Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 -

Strany 114 - 6.2.10 Backup schemes

37 Copyright © Acronis, Inc., 2000-2010 select the backup. After recovery is started, you will be prompted for other tapes if the tapes are needed

Strany 115 - 6.2.10.3 Simple scheme

38 Copyright © Acronis, Inc., 2000-2010 Value: "?00000000" 2.12 Proprietary Acronis technologies This section describes the proprietary

Strany 116 - Parameters

39 Copyright © Acronis, Inc., 2000-2010 For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 71) sec

Strany 117 - Examples

3.3 Default backup and recovery options ...44 3.3.1 Default bac

Strany 118

40 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Strany 119 - Example

41 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Strany 120 - Roll-back period

42 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Strany 121

43 Copyright © Acronis, Inc., 2000-2010 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appr

Strany 122

44 Copyright © Acronis, Inc., 2000-2010 When the option is enabled, the program compares the actual log size with the maximum size after every 100

Strany 123 - Resulting tasks

45 Copyright © Acronis, Inc., 2000-2010 Backup performance: Backup priority (p. 52) + + - - HDD writing speed (p. 52) Dest: HDD Dest: HDD Dest

Strany 124 - 6.3 Recovering data

46 Copyright © Acronis, Inc., 2000-2010 3.3.1.1 Archive protection This option is effective for Windows and Linux operating systems and bootable m

Strany 125 - 6.3.1 Task credentials

47 Copyright © Acronis, Inc., 2000-2010 You can view file or folder attributes in the file/folder properties or by using the attrib command. For mo

Strany 126 - 6.3.2 Archive selection

48 Copyright © Acronis, Inc., 2000-2010 The option enables you to define the commands to be automatically executed before and after the backup proc

Strany 127 - 6.3.4 Content selection

49 Copyright © Acronis, Inc., 2000-2010 successfully executed. Fail the task if the command execution fails. execution failure or success. irrespec

Strany 128 - 6.3.6 Destination selection

6.4.2 Archive selection ...

Strany 129 - NT signature

50 Copyright © Acronis, Inc., 2000-2010  Click Edit to specify a new command or a batch file  Select the existing command or the batch file fro

Strany 130 - Volume destination

51 Copyright © Acronis, Inc., 2000-2010 command execution is complete Result Preset Continue the backup only after the command is successfully ex

Strany 131 - Volume properties

52 Copyright © Acronis, Inc., 2000-2010 To specify the compression level Select one of the following:  None – the data will be copied as is, with

Strany 132 - Recovery exclusions

53 Copyright © Acronis, Inc., 2000-2010 The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the following:  Click W

Strany 133 - Overwriting

54 Copyright © Acronis, Inc., 2000-2010 3. Under Send notifications, select the appropriate check boxes as follows:  When backup completes succe

Strany 134 - 6.3.8 When to recover

55 Copyright © Acronis, Inc., 2000-2010 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple

Strany 135

56 Copyright © Acronis, Inc., 2000-2010 3.3.1.10 Fast incremental/differential backup The option is effective in Windows and Linux operating syste

Strany 136

57 Copyright © Acronis, Inc., 2000-2010 3.3.1.12 Media components This option is effective for both Windows and Linux operating systems, when the

Strany 137

58 Copyright © Acronis, Inc., 2000-2010 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will display a pop-up

Strany 138 - 6.4.1 Task credentials

59 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior in case a backup task is about to start (the scheduled time com

Strany 139 - 6.4.2 Archive selection

6 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Strany 140 - 6.4.4 Location selection

60 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior when any of the backup plan's tasks fails. The preset is n

Strany 141 - 6.5 Mounting an image

61 Copyright © Acronis, Inc., 2000-2010 The option defines whether to display the Insert First Media prompt when backing up to removable media. The

Strany 142 - 6.5.1 Archive selection

62 Copyright © Acronis, Inc., 2000-2010 Turning off deduplication at source may lead to faster backup processes but greater network traffic and hea

Strany 143 - 6.5.3 Access credentials

63 Copyright © Acronis, Inc., 2000-2010 Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery File recovery (also from a disk b

Strany 144 - 6.6 Managing mounted images

64 Copyright © Acronis, Inc., 2000-2010 Example of how you can use the pre/post commands:  launch the Checkdisk command in order to find and fix

Strany 145

65 Copyright © Acronis, Inc., 2000-2010 Post-recovery command To specify a command/executable file to be executed after the recovery is completed 1

Strany 146

66 Copyright © Acronis, Inc., 2000-2010 3.3.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recov

Strany 147 - 6.7.1 Task credentials

67 Copyright © Acronis, Inc., 2000-2010 Messenger service (WinPopup) This option is effective for Windows and Linux operating systems. This option

Strany 148 - 6.7.2 Archive selection

68 Copyright © Acronis, Inc., 2000-2010  Send SNMP notifications individually for recovery operation events – to send the events of the recovery

Strany 149 - 6.7.5 Location selection

69 Copyright © Acronis, Inc., 2000-2010 Validate backup before recovery The preset is Disabled. This option defines whether to validate a backup to

Strany 150 - 3. Naming the new archive

7 Copyright © Acronis, Inc., 2000-2010 Where to go from here For what to do next see "Basic concepts (p. 16)". For understanding of the G

Strany 151 - 6.8 Acronis Secure Zone

70 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is

Strany 152 - To disable password

71 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to

Strany 153 - 6.8.1.4 Result confirmation

72 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display

Strany 154 - Activate

73 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault

Strany 155 - 6.10 Bootable media

74 Copyright © Acronis, Inc., 2000-2010 2. Move the archives to vault B manually by means of a third-party file manager. 3. Edit the backup plans

Strany 156 - PE-based bootable media

75 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes

Strany 157 - 6.10.1.1 Kernel parameters

76 Copyright © Acronis, Inc., 2000-2010 What happens if I delete a backup that is a base of an incremental or differential backup? To preserve arch

Strany 158 - 6.10.1.2 Network settings

77 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a

Strany 159 - 6.10.1.3 Network port

78 Copyright © Acronis, Inc., 2000-2010 5.1 Daily schedule Daily schedule is effective in Windows and Linux operating systems. To specify a daily

Strany 160

79 Copyright © Acronis, Inc., 2000-2010 2. Every: 3 hours From: 12:00:00 AM (midnight) Until: 09:00:00 PM - thus, the task will be performed 8 tim

Strany 161

8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o

Strany 162 - Linux commands and utilities

80 Copyright © Acronis, Inc., 2000-2010 5.2 Weekly schedule Weekly schedule is effective in Windows and Linux operating systems. To specify a week

Strany 163

81 Copyright © Acronis, Inc., 2000-2010 Run the task every week on workdays: from Monday through Friday. During a workday, the task starts only onc

Strany 164

82 Copyright © Acronis, Inc., 2000-2010 From: not set. To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3.

Strany 165

83 Copyright © Acronis, Inc., 2000-2010 2. Days: Last. The task will run on the last day of every month despite its actual date. 3. Once at: 10:0

Strany 166 - Mounting backup volumes

84 Copyright © Acronis, Inc., 2000-2010 Second schedule 1. Months: March, April, May, September, October, November. 2. On: <All> <All wo

Strany 167 - 'machine name'

85 Copyright © Acronis, Inc., 2000-2010 Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location&apo

Strany 168 - 7 Glossary

86 Copyright © Acronis, Inc., 2000-2010  Condition: Fits time interval, from 06:00:00 PM until 11:59:59 PM. In this case, whether and when the ta

Strany 169

87 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by

Strany 170 - Backup policy (Policy)

88 Copyright © Acronis, Inc., 2000-2010 Create now will launch the Bootable Media Builder (p. 178). No backups have been created for X days Back u

Strany 171 - Built-in group

89 Copyright © Acronis, Inc., 2000-2010 Alternatively, you can review the task execution states in the Backup plans and tasks (p. 89) view and spec

Strany 172 - Centralized vault

9 Copyright © Acronis, Inc., 2000-2010 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel

Strany 173

90 Copyright © Acronis, Inc., 2000-2010 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one

Strany 174 - Disk group

91 Copyright © Acronis, Inc., 2000-2010 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK i

Strany 175 - Dynamic group

92 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A tas

Strany 176 - Encrypted vault

93 Copyright © Acronis, Inc., 2000-2010 6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline

Strany 177

94 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all t

Strany 178 - Media builder

95 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Strany 179

96 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan's

Strany 180 - Tower of Hanoi

97 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, othe

Strany 181 - Validation rules

98 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery

Strany 182 - Virtual machine

99 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The

Komentáře k této Příručce

Žádné komentáře