Veritas Access Appliance 8.2 Solutions Guide for NetBackup
- Access Appliance integration with NetBackup
- System requirements
- Configuring Veritas Data Deduplication with Access Appliance- About Veritas Data Deduplication
- Benefits of using Veritas Data Deduplication with Access Appliance
- Supported features with different versions of Veritas Data Deduplication
- Configuring Veritas Data Deduplication without WORM
- Configuring Veritas Data Deduplication with WORM
- Managing Veritas Data Deduplication using the Access CLISH
- Managing Veritas Data Deduplication using GUI- Viewing information about Veritas Data Deduplication
- Starting or stopping the Veritas Data Deduplication service
- Increasing storage for Veritas Data Deduplication
- Unconfiguring Veritas Data Deduplication
- Adding secondary IP for Veritas Data Deduplication
- Deleting secondary IP for Veritas Data Deduplication
- Changing the primary IP for Veritas Data Deduplication
- Upgrade the deduplication version for Veritas Data Deduplication
- Setting affinity node for Veritas Data Deduplication
 
- Accessing Access Appliance storage shell for management tasks
- Support for multiple domains across networks for Veritas Data Deduplication
- Veritas Data Deduplication storage layout
- Configuring a Veritas Data Deduplication storage unit on NetBackup
- Configuring global deduplication using the Veritas Data Deduplication storage server across the domain
- Enabling Veritas Data Deduplication encryption
- Support for bandwidth throttling during duplication
- Setting up secure communication between Veritas Data Deduplication on Access Appliance and the NetBackup primary server
- About MSDP encryption using NetBackup KMS service
- Support for NetBackup Auto Image Replication
- Setting up Auto Image Replication (AIR) between two Access Appliances which have secure communication enabled
 
- NetBackup Dedupe Direct for Oracle
- Configuring MSDP-C with Access Appliance
- Migrating the NetBackup images from existing storage to Veritas Access storage
- Configuring Access Appliance with the NetBackup client- Configuring Access Appliance for NetBackup client
- Installing the NetBackup client add-on packages
- Prerequisites for configuring the NetBackup client
- Configuring the NetBackup client
- Adding an optional media server
- Adding multiple primary servers
- Adding file systems to the backup configuration
- Removing file systems from backup configuration
- Changing the virtual IP address used by the NetBackup client
- Upgrade the NetBackup client
- Unconfiguring the NetBackup client
- Enabling Veritas Data Deduplication catalog backup with NetBackup client
- Disabling Veritas Data Deduplication catalog backup from NetBackup client
- Displaying the status of NetBackup services
- Configuring backup operations using NetBackup or other third-party backup applications
- Restoring filesystems backed up with NetBackup client
 
- Configuring isolated recovery environment (IRE)- Requirements
- Configuring the network isolation
- Configuring an isolated recovery environment using the command line
- Configuring an isolated recovery environment on a storage server
- Managing an isolated recovery environment on a storage server
- Configuring data transmission between a production environment and an IRE storage server
 
- Troubleshooting
- Index
Supported features with different versions of Veritas Data Deduplication
Access Appliance supports multiple versions of Veritas Data Deduplication. The Table: Supported features for different Veritas Data Deduplication versions lists the features that are supported with a particular version of Veritas Data Deduplication.
Table: Supported features for different Veritas Data Deduplication versions
| Feature | Veritas Data Deduplication 16.0 | Veritas Data Deduplication 17.1 | Veritas Data Deduplication 19.0.1 | 
|---|---|---|---|
| WORM configuration | Yes | Yes | Yes | 
| Non-WORM configuration | No | Yes | Yes | 
| Multifactor authentication | No | No | Yes | 
| Changing the primary IP | Yes | Yes | Yes | 
| Removing user | Yes | Yes | Yes | 
| KMS | No | Yes | Yes | 
| Secure communication | No | Yes | Yes | 
| Encryption | Yes | Yes | Yes | 
| Encryption crawler | Yes | Yes | Yes | 
| Conversion from non-WORM to WORM | No | Yes | Yes | 
| Shrink operation | Yes | Yes | Yes | 
| Affinity | Yes | Yes | Yes | 
| IRE | No | No | Yes |