HP Data Protector A.06.11 Integration Manual page 448

Zero downtime backup for oracle, sap r/3, microsoft sql server, microsoft exchange server, and microsoft volume shadow copy service
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

DMZ
DNS server
domain controller
DR image
DR OS
drive
drive-based
encryption
drive index
448
Glossary
The Demilitarized Zone (DMZ) is a network inserted as a "neutral
zone" between a company's private network (intranet) and the
outside public network (Internet). It prevents outside users from
getting direct access to company servers in the intranet.
In the DNS client-server model, this is the server containing
information about a portion of the DNS database that makes
computer names available to client resolvers querying for name
resolution across the Internet.
A server in a network that is responsible for user security and
verifying passwords within a group of other servers.
Data required for temporary disaster recovery operating system
(DR OS) installation and configuration.
An operating system environment in which disaster recovery
runs. It provides Data Protector with a basic runtime environment
(disk, network, tape, and filesystem access). It has to be installed
on disk or loaded into memory and configured before the Data
Protector disaster recovery can be performed. DR OS can be
either temporary or active. A temporary DR OS is used
exclusively as a host environment for some other operating
system restore along with the target operating system
configuration data. It is deleted after the target system is restored
to the original system configuration. An active DR OS not only
hosts the Data Protector disaster recovery process but can also
be a part of the restored system because it replaces its own
configuration data with the original configuration data.
A physical unit that receives data from a computer system and
can write it onto a magnetic medium (typically a tape drive). It
can also read the data from the medium and send it to the
computer system.
Data Protector drive-based encryption uses the encryption
functionality of the drive. While performing the backup, the
drive encrypts both the data and the meta-data that is written
to the medium.
A number that identifies the mechanical position of a drive inside
a library device. This number is used by the robotic control to
access a drive.

Advertisement

Table of Contents
loading

Table of Contents