BackBox H4.00 User Manual
i BackBox H4.00 User Manual
Table of Contents
Preface ..................................................................................... 6
SUMMARY OF CHANGES ....................................................................................... 7
Product Description .................................................................. 8
BACKBOX COMPONENTS ...................................................................................... 9
PRODUCT REQUIREMENTS ................................................................................... 11
VTCs ....................................................................................................... 11
NonStop Host System ............................................................................... 11
Hardware requirements ...................................................................................................................................... 11
Software requirements ....................................................................................................................................... 11
Operator workstation ................................................................................ 12
Hardware requirements ...................................................................................................................................... 12
Software requirements ....................................................................................................................................... 12
Key Manager for Tape encryption ............................................................... 12
BASIC FUNCTIONS ........................................................................................... 13
Virtual volume creation ............................................................................. 13
Virtual volume mounts .............................................................................. 14
Automatic mount ............................................................................................................................................... 14
Assign a tape device .......................................................................................................................................... 14
Tape drive emulation ................................................................................ 15
Automatic unload ..................................................................................... 15
Virtual volume storage .............................................................................. 16
Compression ............................................................................................ 17
Encryption of virtual volumes ..................................................................... 17
Encryption by BackBox software ...................................................................................................................... 17
Encryption by the storage subsystem ................................................................................................................. 18
Virtualization / materialization of Virtual volumes ......................................... 18
WINDOWS FILES DATA STORE ............................................................................. 19
File access security ................................................................................... 20
Scripting/Background Migration on Tapes .................................................... 20
Disk space management tools .................................................................... 21
Windows disk path reservation ................................................................... 22
Windows advanced pool management ......................................................... 22
TSM DATA STORE ........................................................................................... 24
Tivoli Storage Manager Software ................................................................ 24
TSM features ............................................................................................ 24
TSM Activity Log ....................................................................................... 24
Integrity check when a volume is written ..................................................... 25
ADDITIONAL FUNCTIONALITY ............................................................................... 25
Auto-Scratch Mechanism ........................................................................... 25
Delete Expired Volumes ............................................................................. 27
Control of Access to Virtual Volumes ........................................................... 27
Device reservation .................................................................................... 29
Pre-load .................................................................................................. 29
Restricted Data Stores .............................................................................. 30
Secondary Data Stores and Catalog replication ............................................. 33
Configuration ......................................................................... 35










