Technical data

11.15.7 Backing Up Your Workstation Disk ........................... 11–39
11.15.7.1 Using a Command Procedure for Nightly Image Backups ....... 11–39
11.15.7.2 Using a Command Procedure for Nightly Incremental Backups. . 11–41
11.15.7.3 Using an Interactive Command Procedure for Backups ......... 11–42
11.15.8 Backing Up Volume Shadow Sets. ............................ 11–43
11.15.8.1 Mounting a Disk in a Host-Based Shadow Set ................ 11–45
11.15.8.2 Assisted Merging in Mixed-Architecture Clusters . . ........... 11–45
11.16 Restoring User Disks ......................................... 11–45
11.16.1 Restoring Image Backups................................... 11–45
11.16.2 Restoring Incremental Backups . . ............................ 11–47
11.16.2.1 Restoring to Target Disk Structures ....................... 11–49
11.16.3 Restoring Volume Shadow Sets . . ............................ 11–50
11.17 Backing Up and Restoring the System Disk ....................... 11–51
11.17.1 Starting the Menu System .................................. 11–51
11.17.1.1 Example . ............................................ 11–52
11.17.2 Understanding Standalone BACKUP (VAX Only) ................ 11–53
11.17.2.1 Building Standalone BACKUP on a Disk (VAX Only) .......... 11–54
11.17.2.2 Booting Standalone BACKUP from a Disk (VAX Only) ......... 11–56
11.17.2.3 Building Standalone BACKUP on a Tape Cartridge (VAX
Only) . . . ............................................ 11–57
11.17.2.4 Booting Standalone BACKUP from a Tape Cartridge (VAX
Only) . . . ............................................ 11–58
11.17.3 Backing Up the System Disk to Tape .......................... 11–59
11.17.4 Restoring the System Disk from Tape ......................... 11–61
11.17.5 Backing Up the System Disk to a Disk ........................ 11–62
11.17.6 Using InfoServer Tapes to Back Up and Restore System Disks . . . . . . 11–64
11.18 Ensuring Data Integrity. . . .................................... 11–65
11.18.1 /CRC Qualifier ........................................... 11–66
11.18.2 /GROUP_SIZE Qualifier.................................... 11–66
11.18.3 /IGNORE Qualifier........................................ 11–66
11.18.4 /LOG Qualifier ........................................... 11–67
11.18.5 /VERIFY Qualifier ........................................ 11–67
11.19 Troubleshooting . ............................................ 11–68
11.19.1 BACKUP Fatal Error Options . . . ............................ 11–68
11.19.2 Tape Label Errors ........................................ 11–69
12 Security Considerations
12.1 Understanding Security Management ............................ 12–1
12.2 Managing Passwords ......................................... 12–2
12.2.1 Initial Passwords ......................................... 12–2
12.2.2 System Passwords ........................................ 12–3
12.2.3 Primary and Secondary Passwords ........................... 12–4
12.2.4 Enforcing Minimum Password Standards . . . ................... 12–4
12.2.5 Guidelines for Protecting Passwords .......................... 12–5
12.2.6 Password History ......................................... 12–6
12.3 Using Intrusion Detection Mechanisms ........................... 12–6
12.4 Understanding Ways to Protect Objects ........................... 12–7
12.4.1 Interpreting a User Identification Code ........................ 12–7
12.4.2 Understanding Protection Codes . ............................ 12–7
12.5 Creating Intra-Cluster Communications Security Objects . . ........... 12–9
12.6 Creating Access Control Lists .................................. 12–9
12.6.1 Kinds of Entries in an ACL ................................. 12–9
12.6.2 Types of Identifiers . . . .................................... 12–11
xiv