BackBox H4.00 User Manual
Configuration
42 BackBox H4.00 User Manual
It is possible to operate concurrently several BackPak Domains on the same
NonStop node; each domain must have its own and separate:
− Domain Manager (distinct TCP/IP port)
− Domain Installation sub-volume (programs, catalog and
configuration)
− EMS Extractors (BBEXT processes)
− Data Stores (Disk for Windows Data Store, Storage pool for TSM Data
Store)
Number of VTCs per domain
For fail-over reasons, two or more VTCs are attached to the NonStop
node(s). The alternate VTCs must be configured in the same domain.
Several BackPak Domains can share a single VT Controller server, using
different ports.
Although it is even possible to share a device between domains, the
load balancing across VTCs and virtual devices may become erratic.
Network Configuration
All the control commands between the BackBox components are carried over TCP/IP
sockets, including between Guardian BackBox components.
When there are several NSK nodes in the same BackPak Domain, the Domain
Manager accesses Guardian services on remote nodes by Guardian IPC over Expand.
TMFSERVE and MEDIASRV processes are started in a remote node to access the tape
catalogues located in this remote node.
Besides the requirement for Expand connectivity, the security setup must allow
remote queries and catalogue update commands to DSM/TC and TMF. Notice the
SUPER group to update DSM/TC or TMF catalogs. More about security is in NonStop
Access Authorizations.
When the DSM/TC or TMF catalog is not on the same node as the Domain Manager,
the security parameter for remote access must be reviewed.
Assign to each VTC a permanent TCP/IP address, in its numeric or symbolic format.
Revise all TCP/IP traffic for local network routing and firewalls. See TCP/IP traffic
port configurations, in the table below, for default port configurations.
SSL can be implemented on the BackBox TCP/IP control paths, through HP NonStop
SSL providing an SSL tunnel through proxy processes on NonStop and Windows
servers. See Appendix A – Encryption of BackBox TCP/IP control paths
.










