Receive VTL
Replication
376
U41840-J-Z125-7-76
3. (Optional) Leave the
Use Encryption
check box selected to enable encryption when
sending the snapshot to the destination. Or clear the
Use Encryption
check box to
disable encryption when sending the snapshot to the destination.
If encryption is enabled, select an encryption strength (
128-bit
or
256-bit
). Using 256-
bit encryption (default) provides a stronger level of security but may have an impact on
system performance in some situations.
V
CAUTION!
Select 128-bit encryption if you are sending data to a ETERNUS CS800 running
a system software version prior to ETERNUS CS800 2.1.1 Software.
I
Encryption is enabled by default. However, for best performance, if your data
network is already secured, you should clear the
Use Encryption
check box.
4. Click
Apply
.
The snapshot is sent to the source system.
5. On the source system, in the
Snapshots List
, select the snapshot that was sent during
the failback operation and click
Recover
.
The
Recovered Partition Name
page displays (see
).
6. (Optional) In the
Recovered Partition Name
box, type a new name for the recovered
partition. (The default name is the original partition name.)
7. Click
Apply
.
The partition and its cartridges are recovered on the source system. All data stored on the
partition at the time the snapshot was saved is available.
After recovering the partition, you must add tape drives and a robot to the partition, and you
must map the devices before the VTL partition is accessible. If the partition contains media,
you will only be able to select the highest capacity tape drive for that media type. For
example, if the partition contains SDLT600 tape cartridges, you will only be able to select
DLT-S4 tape drives when mapping devices to the recovered partition.
I
When a VTL partition is recovered on a target system, a new serial number is
created for the partition.
I
If you previously remapped your backup application to a recovered partition on the
target system, after you failback the partition, you must remap your backup
application again to point to the source system.
Summary of Contents for ETERNUS CS800 S5
Page 1: ...Edition June 2014 English ETERNUS CS800 S5 V2 3 1 User Guide ...
Page 14: ...Contents U41840 J Z125 7 76 ...
Page 30: ...Environmental Protection Important Information 28 U41840 J Z125 7 76 ...
Page 48: ...Network Configuration System Description 46 U41840 J Z125 7 76 ...
Page 80: ...Locating the Serial Number Hardware Description and Basic Operations 78 U41840 J Z125 7 76 ...
Page 116: ...Further Configurations Installing the ETERNUS CS800 S5 Modules 102 U41840 J Z125 7 76 ...
Page 150: ...The Remote Management Console Remote Management 136 U41840 J Z125 7 76 ...
Page 190: ...AIS Connect Configuration Wizards 176 U41840 J Z125 7 76 ...
Page 200: ...Current Activity Overview Home Page 186 U41840 J Z125 7 76 ...
Page 301: ...Configuration System U41840 J Z125 7 76 287 Figure 177 Network Configuration ...
Page 353: ...Configuration Contacts U41840 J Z125 7 76 339 Figure 211 Primary and Secondary Pages ...
Page 402: ...Reports Replication 388 U41840 J Z125 7 76 ...
Page 406: ...Hardware Status 392 U41840 J Z125 7 76 Figure 236 System Board Page ...
Page 432: ...Activity Log Status 418 U41840 J Z125 7 76 ...
Page 442: ...Service Tickets Alerts 428 U41840 J Z125 7 76 ...
Page 462: ...Reboot Shutdown Utilities 448 U41840 J Z125 7 76 ...
Page 470: ...Common Problems and Solutions Troubleshooting 456 U41840 J Z125 7 76 ...
Page 496: ...Additional Specifications for Scale Mode System Specifications S5 626 U41840 J Z125 7 76 ...
Page 634: ...Index 634 U41840 J Z125 7 76 ...