Air Cleaner User Manual

cfgremrootaccess
Purpose
Adds, removes, or lists commands enables for Remote Command Access.
Syntax
 cfgremrootaccess -h “host”
-d “host”
-l
-c “command”
-r

Description
The cfgremrootaccess command is used to configure a backup client to allow a
server to remotely initiate its backups. This is called a pull backup. For example,
A server contacts a client to start the backup; in response the client initiates the
backup and sends the data to the server. Therefore, the server is actually pulling
the backup operation from the client.
Using pull backups enables you to centrally manage your backups by initiating
and controlling backup operations from a single location. You can further automate
this central management of backups using the SysBack Scheduling and Scripting
functions described in Chapter 20, Scheduled Backups and Scripts, on page 20-1.
Pull backups require not only Remote Services Configuration, but also Remote
Command Access configuration. The Remote Services Configuration enables data
to be sent across the network to the backup server. The Remote Command Access
enables the server to initiate the pull backup.
Also note that the server that initiates the pull backup can be a different server
than where the data is sent. Because of this, Remote Services can be configured
between machine A, the client, and machine B, the backup server receiving the
backup, while Remote Command Access is configured between machine A, the
client, and machine C, the backup initiation server.
Flags
c command
Specifies the fully-qualified path and name of a command to allow for remote
access. Used with the -h and -r flags.
dhost
Specifies the hostname of a machine that is not allowed to contact the client to
initiate a backup. Used only when the -h flag is set to ALL.
h host
Specifies the hostname of a machine that will initiate a backup of this client.
This flag is required and must be used with the -c flag.
l Lists all commands enabled for Remote Command Access.
r Indicates to remove the command specified with the -c flag.
A-2 IBM Tivoli Storage Manager for System Backup and Recovery: Installation and Users Guide