User Guide Manual

6 Copyright © Acronis International GmbH, 2002-2014
7.3 Removable devices ................................................................................................................193
7.4 Tape devices ..........................................................................................................................194
7.4.1 What is a tape device? ................................................................................................................................ 194
7.4.2 Overview of tape support ........................................................................................................................... 194
7.4.3 Getting started with a tape device ............................................................................................................. 198
7.4.4 Tape management ...................................................................................................................................... 202
7.4.5 Vaults on tapes ............................................................................................................................................ 210
7.4.6 Usage examples ........................................................................................................................................... 211
7.5 Storage nodes ........................................................................................................................214
7.5.1 What is a storage node? ............................................................................................................................. 214
7.5.2 Supported types of storage ........................................................................................................................ 215
7.5.3 Operations performed by storage nodes .................................................................................................. 215
7.5.4 Getting started with a storage node .......................................................................................................... 216
7.5.5 User privileges on a storage node .............................................................................................................. 217
7.5.6 Operations with storage nodes .................................................................................................................. 218
7.5.7 Deduplication .............................................................................................................................................. 226
8 Operations with archives and backups.......................................................................... 233
8.1 Validating archives and backups ............................................................................................233
8.1.1 Archive selection ......................................................................................................................................... 234
8.1.2 Backup selection .......................................................................................................................................... 234
8.1.3 Vault selection ............................................................................................................................................. 234
8.1.4 Access credentials for source ..................................................................................................................... 235
8.1.5 When to validate ......................................................................................................................................... 236
8.1.6 Task credentials ........................................................................................................................................... 236
8.2 Exporting archives and backups ............................................................................................237
8.2.1 Archive selection ......................................................................................................................................... 239
8.2.2 Backup selection .......................................................................................................................................... 239
8.2.3 Access credentials for source ..................................................................................................................... 240
8.2.4 Destination selection .................................................................................................................................. 240
8.2.5 Access credentials for destination ............................................................................................................. 241
8.3 Mounting an image ................................................................................................................242
8.3.1 Archive selection ......................................................................................................................................... 243
8.3.2 Backup selection .......................................................................................................................................... 243
8.3.3 Access credentials ....................................................................................................................................... 243
8.3.4 Volume selection ......................................................................................................................................... 244
8.3.5 Managing mounted images........................................................................................................................ 244
8.4 Operations available in vaults ................................................................................................245
8.4.1 Operations with archives ............................................................................................................................ 245
8.4.2 Operations with backups ............................................................................................................................ 246
8.4.3 Converting a backup to full ......................................................................................................................... 247
8.4.4 Deleting archives and backups ................................................................................................................... 247
9 Bootable media ........................................................................................................... 249
9.1 How to create bootable media ..............................................................................................250
9.1.1 Linux-based bootable media ...................................................................................................................... 250
9.1.2 WinPE-based bootable media .................................................................................................................... 254
9.2 Connecting to a machine booted from media .......................................................................256
9.3 Working under bootable media.............................................................................................257
9.3.1 Setting up a display mode .......................................................................................................................... 258
9.3.2 Configuring iSCSI and NDAS devices .......................................................................................................... 258
9.4 List of commands and utilities available in Linux-based bootable media .............................259