Veritas NetBackup™ Administrator's Guide, Volume I
- Section I. About NetBackup
- Section II. Configuring hosts
- Configuring Host Properties
- About the NetBackup Host Properties
- Access Control properties
- Bandwidth properties
- Busy File Settings properties
- Client Attributes properties
- Client Settings properties for UNIX clients
- Client Settings properties for Windows clients
- Data Classification properties
- Default Job Priorities properties
- Encryption properties
- Exchange properties
- Exclude Lists properties
- Fibre Transport properties
- Firewall properties
- General Server properties
- Global Attributes properties
- Logging properties
- Login Banner Configuration properties
- Media properties
- Network Settings properties
- Port Ranges properties
- Preferred Network properties
- Resilient Network properties
- Restore Failover properties
- Retention Periods properties
- Scalable Storage properties
- Servers properties
- SharePoint properties
- SLP Parameters properties
- Throttle Bandwidth properties
- Universal Settings properties
- User Account Settings properties
- Configuration options for NetBackup servers
- ECA_CERT_PATH for NetBackup servers and clients
- PREFERRED_NETWORK option for NetBackup servers
- THROTTLE_BANDWIDTH option for NetBackup servers
- Configuration options for NetBackup clients
- IGNORE_XATTR option for NetBackup clients
- VXSS_NETWORK option for NetBackup clients
- Configuring server groups
- Enabling support for NAT clients and NAT servers in NetBackup
- Configuring host credentials
- Managing media servers
- Configuring Host Properties
- Section III. Configuring storage
- Configuring disk storage
- Configuring robots and tape drives
- About configuring robots and tape drives in NetBackup
- Adding a robot to NetBackup manually
- Managing robots
- Adding a tape drive to NetBackup manually
- Adding a tape drive path
- Correlating tape drives and device files on UNIX hosts
- Managing tape drives
- Performing device diagnostics
- Configuring tape media
- About NetBackup volume pools
- About WORM media
- About adding volumes
- Configuring media settings
- Media settings options
- Media type (new media setting)
- Media settings options
- About barcodes
- Configuring barcode rules
- Configuring media ID generation rules
- Adding volumes by using the Actions menu
- Configuring media type mappings
- Managing volumes
- About exchanging a volume
- About frozen media
- About injecting and ejecting volumes
- About rescanning and updating barcodes
- About labeling NetBackup volumes
- About moving volumes
- About recycling a volume
- Managing volume pools
- Managing volume groups
- Inventorying robots
- About showing a robot's contents
- About updating the NetBackup volume configuration
- About the vmphyinv physical inventory utility
- Configuring storage units
- About the Storage utility
- Creating a storage unit
- About storage unit settings
- Absolute pathname to directory or absolute pathname to volume setting for storage units
- Maximum concurrent jobs storage unit setting
- Staging backups
- Creating a basic disk staging storage unit
- Configuring storage unit groups
- Section IV. Configuring storage lifecycle policies (SLPs)
- Configuring storage lifecycle policies
- Storage operations
- Index From Snapshot operation in an SLP
- Snapshot operation in an SLP
- Retention types for SLP operations
- Capacity managed retention type for SLP operations
- Storage lifecycle policy options
- Using a storage lifecycle policy to create multiple copies
- Storage lifecycle policy versions
- Section V. Configuring backups
- Creating backup policies
- Planning for policies
- Policy Attributes tab
- Policy storage (policy attribute)
- Policy volume pool (policy attribute)
- Take checkpoints every __ minutes (policy attribute)
- Backup Network Drives (policy attribute)
- Cross mount points (policy attribute)
- Encryption (policy attribute)
- Collect true image restore information (policy attribute) with and without move detection
- Use Accelerator (policy attribute)
- Enable optimized backup of Windows deduplicated volumes
- Use Replication Director (policy attributes)
- Schedule Attributes tab
- Type of backup (schedule attribute)
- Frequency (schedule attribute)
- Multiple copies (schedule attribute)
- Retention (schedule attribute)
- Media multiplexing (schedule attribute)
- Start Window tab
- Include Dates tab
- How open schedules affect calendar-based and frequency-based schedules
- About the Clients tab
- Backup Selections tab
- Adding backup selections to a policy
- Verifying the Backup Selections list
- Pathname rules for UNIX client backups
- About the directives on the Backup Selections list
- ALL_LOCAL_DRIVES directive
- Files that are excluded from backups by default
- Disaster Recovery tab
- Active Directory granular backups and recovery
- Synthetic backups
- Using the multiple copy synthetic backups method
- Protecting the NetBackup catalog
- Parts of the NetBackup catalog
- Protecting the NetBackup catalog
- Archiving the catalog and restoring from the catalog archive
- Estimating catalog space requirements
- About the NetBackup relational database
- About the NetBackup relational database (NBDB) installation
- Using the NetBackup Database Administration utility on Windows
- Using the NetBackup Database Administration utility on UNIX
- Post-installation tasks
- About backup and recovery procedures
- Managing backup images
- Configuring immutability and indelibility of data in NetBackup
- Creating backup policies
- Section VI. Deployment Management
- Deployment Management
- Adding or changing schedules in a deployment policy
- Deployment Management
- Section VII. Configuring replication
- About NetBackup replication
- About NetBackup Auto Image Replication
- Viewing the replication topology for Auto Image Replication
- About the storage lifecycle policies required for Auto Image Replication
- Removing or replacing replication relationships in an Auto Image Replication configuration
- About NetBackup replication
- Section VIII. Monitoring and reporting
- Monitoring NetBackup activity
- About the Jobs tab
- About the Daemons tab
- About the Processes tab
- About the Drives tab
- About the jobs database
- About pending requests and actions
- Reporting in NetBackup
- Email notifications
- Monitoring NetBackup activity
- Section IX. Administering NetBackup
- Management topics
- Accessing a remote server
- Using the NetBackup Remote Administration Console
- Run-time configuration options for the NetBackup Administration Console
- About improving NetBackup performance
- About adjusting time zones in the NetBackup Administration console
- Alternate server restores
- About performing alternate server restores
- Managing client backups and restores
- About client-redirected restores
- Powering down and rebooting NetBackup servers
- About Granular Recovery Technology
- About configuring Services for Network File System (NFS)
Source binding evaluation
The prospective source binding list is provided by the operating system and consists of all of the local plumbed interfaces that are not loopback (127.0.0.0/8, ::1) and not link-local (169.254.0.0/16, fe80::/64).
The PREFERRED_NETWORK entries are then evaluated in the sort order by longest subnet first, then position when subnets are equal. Any local interfaces that match a source entry are moved to a second list if still present in the first list. Any local interfaces that match a target PROHIBITED entry are removed from the first list if not already moved to the second list.
If local interfaces were moved to the second list, that list becomes the tentative binding list. If the second list is empty, and interfaces were removed from the first list, then the shortened first list becomes the tentative binding list.
If a destination matches the target of an entry with a source, the tentative binding list is searched for the first match to an entry in source. If a match is found, that interface becomes the source requested by NetBackup for the outbound connection.
Otherwise, if the tentative binding list is the shortened first list, then it becomes the source binding list for the outbound connection.
Otherwise, ANY becomes the source binding list for the outbound connection.
Note:
If the source binding list is not ANY, most operating systems will arbitrarily use the first interface in the list provided by the application. Because of this behavior, it is best to not use PROHIBITED entries for local interfaces and to minimize the use of source entries.