ADSM-L

Re: [ADSM-L] Antwort: EMC Celerra CIFS backups

2010-06-08 09:40:22
Subject: Re: [ADSM-L] Antwort: EMC Celerra CIFS backups
From: Zoltan Forray/AC/VCU <zforray AT VCU DOT EDU>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Tue, 8 Jun 2010 09:39:18 -0400
Thanks for the info and guidance.......
Zoltan Forray
TSM Software & Hardware Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
zforray AT vcu DOT edu - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will 
never use email to request that you reply with your password, social 
security number or confidential personal information. For more details 
visit http://infosecurity.vcu.edu/phishing.html



From:
Markus Engelhard <markus.engelhard AT BUNDESBANK DOT DE>
To:
ADSM-L AT VM.MARIST DOT EDU
Date:
06/08/2010 02:39 AM
Subject:
[ADSM-L] Antwort: EMC Celerra CIFS backups
Sent by:
"ADSM: Dist Stor Manager" <ADSM-L AT VM.MARIST DOT EDU>



Dear Zoltan,

there is no need to net use the UNC shares. Just define the share in the
domain statement and in the objects field in the schedule. Don´t forget to
exclude the paths for snapshots! The TSM scheduler must run on an account
with priviledges of backup operator and manage security logs, domain admin
is not appropriate in my opinion. I would also strongly advise to first
agree opon the way the user is implemented with your security division
regarding authentication strength and password handling.
We moved this way a couple of years back, but have now moved on to NDMP
style backups due to throughput limitations and RTO, making tape backup 
the
second line of defense after asynchronous replication. CIFS backups are
easily outgrown by the amount of files to be backed up, we still use them
for "special" requirements with RPOs far out of replication techniques
where RTO is not crucial.
By the way: TSM NDMP backup using virtual filespace mappings REALLY make
life easy as volumes grow!

Kind regards,

Markus


--
Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte
Informationen. Wenn Sie nicht der richtige Adressat sind oder diese E-Mail
irrtümlich erhalten haben, informieren Sie bitte sofort den Absender und
vernichten Sie diese E-Mail. Das unerlaubte Kopieren sowie die unbefugte
Weitergabe dieser Mail oder von Teilen dieser Mail ist nicht gestattet.

Wir haben alle verkehrsüblichen Maßnahmen unternommen, um das Risiko der
Verbreitung virenbefallener Software oder E-Mails zu minimieren, dennoch
raten wir Ihnen, Ihre eigenen Virenkontrollen auf alle Anhänge an dieser
Nachricht durchzuführen. Wir schließen außer für den Fall von Vorsatz oder
grober Fahrlässigkeit die Haftung für jeglichen Verlust oder Schäden durch
virenbefallene Software oder E-Mails aus.

Jede von der Bank versendete E-Mail ist sorgfältig erstellt worden, 
dennoch
schließen wir die rechtliche Verbindlichkeit aus; sie kann nicht zu einer
irgendwie gearteten Verpflichtung zu Lasten der Bank ausgelegt werden.
______________________________________________________________________

This e-mail may contain confidential and/or privileged information. If you
are not the intended recipient (or have received this e-mail in error)
please notify the sender immediately and destroy this e-mail. Any
unauthorised copying, disclosure or distribution of  the material in this
e-mail or of parts hereof is strictly forbidden.

We have taken precautions to minimize the risk of transmitting software
viruses but nevertheless advise you to carry out your own virus checks on
any attachment of this message. We accept no liability for loss or damage
caused by software viruses except in case of gross negligence or willful
behaviour.

Any e-mail messages from the Bank are sent in good faith, but shall not be
binding or construed as constituting any kind of obligation on the part of
the Bank.

<Prev in Thread] Current Thread [Next in Thread>