10 Triple Contingency...................................................................................................271
Overview.............................................................................................................................................271
Requirements......................................................................................................................................271
Hardware Requirements.....................................................................................................................272
Software Requirements.......................................................................................................................272
The COPYAUDIT Command..............................................................................................................274
COPYAUDIT Restartability................................................................................................................275
Summary.............................................................................................................................................277
INCLUDE Clauses..............................................................................................................................279
EXCLUDE Clauses..............................................................................................................................279
Wildcard Character (*)........................................................................................................................280
Within Subvolume Names.............................................................................................................280
Within Filenames...........................................................................................................................280
Error Checking....................................................................................................................................282
Performance Ramifications.................................................................................................................282
Summary Examples............................................................................................................................282
Auxiliary Extractor..............................................................................................................................291
Auxiliary Receiver...............................................................................................................................291
Error conditions.............................................................................................................................291
Configuring Image Trails....................................................................................................................292
Configuring Updaters.........................................................................................................................292
Error Conditions............................................................................................................................292
Takeover Ramifications.......................................................................................................................293
14 Network Transactions..............................................................................................295
Configuration Changes.......................................................................................................................295
NETWORK Attribute.....................................................................................................................295
Table of Contents
15