Fujitsu ETERNUS CS800 S5 User Manual page 390

File
Table of Contents

Advertisement

Receive VTL
3. (Optional) Leave the Use Encryption check box selected to enable encryption when
sending the snapshot to the destination. Or clear the Use Encryption check box to
disable encryption when sending the snapshot to the destination.
If encryption is enabled, select an encryption strength (128-bit or 256-bit). Using 256-
bit encryption (default) provides a stronger level of security but may have an impact on
system performance in some situations.
V
I
4. Click Apply.
The snapshot is sent to the source system.
5. On the source system, in the Snapshots List, select the snapshot that was sent during
the failback operation and click Recover.
The Recovered Partition Name page displays (see
6. (Optional) In the Recovered Partition Name box, type a new name for the recovered
partition. (The default name is the original partition name.)
7. Click Apply.
The partition and its cartridges are recovered on the source system. All data stored on the
partition at the time the snapshot was saved is available.
After recovering the partition, you must add tape drives and a robot to the partition, and you
must map the devices before the VTL partition is accessible. If the partition contains media,
you will only be able to select the highest capacity tape drive for that media type. For
example, if the partition contains SDLT600 tape cartridges, you will only be able to select
DLT-S4 tape drives when mapping devices to the recovered partition.
I
I
376
CAUTION!
Select 128-bit encryption if you are sending data to a ETERNUS CS800 running
a system software version prior to ETERNUS CS800 2.1.1 Software.
Encryption is enabled by default. However, for best performance, if your data
network is already secured, you should clear the Use Encryption check box.
When a VTL partition is recovered on a target system, a new serial number is
created for the partition.
If you previously remapped your backup application to a recovered partition on the
target system, after you failback the partition, you must remap your backup
application again to point to the source system.
Figure
226).
U41840-J-Z125-7-76
Replication

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents