HP Data Protector Software Cell Manager Planning and Sizing

Table Of Contents
Cluster support for Data Protector software Cell Manager
As a part of its high-availability, Data Protector provides integration with a number of cluster
technologies. For details on supported operating system versions, level of cluster support and for
supported configurations, refer to the HP Data Protector Product Announcements, Software Notes, and
References and the HP Data Protector Platform and Integration Support Matrices at:
http://www.hp.com/go/dataprotector
.
Note:
Complementary information how to configure and maintain HP Data
Protector software in a Microsoft cluster environment can be found in the
white paper “ OpenView Storage Data Protector 5.5 in Microsoft Windows
Server 2003 Cluster Server” at:
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00669
082/c00669082.pdf
Security
Cell Manager security
The Cell Manager security is important because the Cell Manager has access to all clients and all
data in the cell.
Security of the Cell Manager can be enhanced through the Strict IP Checking functionality. However,
it is important that the Cell Manager is also secured as a client and that Data Protector users are
configured carefully.
While it may not always be necessary to secure each and every client in the cell, it is important that
the computers that other clients will trust are secured themselves. These are besides the Cell Manager
also the Installation Server and Media Agent clients.
Client security
After you have installed the HP Data Protector clients and imported them into a cell, it is highly
recommended to secure them.
HP Data Protector agents installed on the clients in the cell provide numerous powerful capabilities,
like access to all the data on the system. It is important that these capabilities are available only to the
processes running on cell authorities (Cell Manager and Installation Servers), and that all other
requests are rejected.
HP Data Protector allows you to specify from which cell authorities a client will accept requests on the
HP Data Protector port (default 5555). For activities such as backing up and restoring, starting pre-
and post-exec commands, or importing and exporting clients, the client checks if the computer, which
triggers one of these tasks through the HP Data Protector port, is allowed to do so. Other computers
are not able to access such a client.
31