Overview

Data Protector 10 is the first major release for 3 years, and marks a huge moment in the Data Protector history with the introduction of the first phase of the new web user interface, along with huge changes to the underlying security model and many more improvements detailed in the product announcements and release notes.


Data Protector 10.x course provides the essential knowledge to enable storage administrators to configure and manage Data Protector software. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations.

Prerequisites

To be successful in this course, you should have the following prerequisites or knowledge:

  • System and Network Administration or equivalent experience

Delegates will learn how to

Upon successful completion of this course, you should be able to:

  • Install and distribute Data Protector Software in your environment
  • Configure the Data Protector Software product
  • Configure your tape and disk-based backup solutions for use with Data Protector Software
  • Use Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command line
  • Manage the Data Protector software Internal Database (IDB)
  • Create custom reports and notification procedures
  • Secure your installation with secure communication
  • Prepare your client to recover from a disaster situation
  • Prepare your backup environment for disaster situation
  • Understand the Data Protector processes and perform basic troubleshooting of your installation

Outline

Modules

Objectives

Module 1: Course Overview

  • Identify the contents and objectives of the course
  • Define the class schedule and class logistics
  • Identify the related courses
  • Discuss the lab environment details

Module 2: Adaptive Backup and Recovery Solutions

  • Understand and explain Adaptive Backup and Recovery strategy

Module 3: Data Protector Architecture

  • Explain the Data Protector architecture
  • Explain the Data Protector cell concept
  • Explain the Data Protector client server architecture
  • Plan the layout for a Data Protector installation

Module 4: Data Protector Installation

  • Plan for the installation of Data Protector
  • Explain the installation sequence
  • Install the Data Protector Cell Manager
  • Explain the client installation concept
  • Distribute Data Protector agent components to client systems
  • Export and import Data Protector clients
  • Discuss the Data Protector upgrade process

Module 5: Licensing and Product Structure

  • Explain the two Data Protector licensing models
  • Describe the Data Protector Product structure
  • Configure and use the Data Protector license reporting

Module 6: Backup Devices

  • Name and describe the configurable backup devices
  • Describe the concepts of logical devices
  • Configure and manage disk-based backup devices
  • Configure and manage tape-based backup devices
  • Use the Data Protector CLI to check the devices

Module 7: Media Management

  • Describe the concepts of Media Management in Data Protector
  • Configure Media Pools and assign media to it
  • Exchange media with different Data Protector cells using Media Export/Import
  • Implement Vaulting using multiple Media Pools

Module 8: Backup Specification

  • Create and generate backup specifications
  • Adjust all the options that control the execution of a backup job
  • Explore advanced backup capabilities, such as Load Balancing or Device Mirroring
  • Schedule backup specification using the new web-based scheduler
  • Explain the backup processing flow

Module 9: Restoring Capabilities

  • Use the restore capabilities in Data Protector
  • Perform the session and object restores
  • Perform the single or parallel restores
  • Use the restore context in Data Protector GUI

Module 10: Sessions, Reports, and Notifications

  • Monitor the running sessions through DP GUI or CLI
  • Browse for sessions that are performed in the past
  • Explain the Data Protectors Reporting features
  • Configure the reports within a report group and execute it
  • Configure and modify the Data Protector notifications

Module 11: Copying and Verifying Media and Objects

  • Create copies of the backup media through Media Copy
  • Create copies of the selected objects through Object Copy
  • Verify your data using the Media and Object Verification sessions

Module 12: Internal Database

  • Explain the concept of an Internal Database (IDB)
  • Describe the architecture of an IDB
  • Perform maintenance and administration tasks on the IDB
  • Backup and restore the IDB
  • Configure IDB-related reports and notifications
  • Run a disaster recovery (DR) of IDB

Module 13: Deduplication

  • Explain the deduplication technology
  • Describe the different Data Protector deduplication configurations
  • Configure a B2D device for hardware and software deduplication in Data Protector
  • Configure a backup specification with deduplication
  • Configure an Object Replication between the deduplication devices

Module 14: Access Control and Security

  • Control user access to the cell
  • Manage user groups in the cell
  • Configure user restrictions
  • Manage network access to the cell
  • Secure the Data Protector cell

Module 15: Disaster Recovery

  • List the Data Protector methods to perform a Disaster Recovery
  • Explain the four phases to recover a system from a disaster
  • Perform a Disaster Recovery using Enhanced Automated Disaster Recovery (EADR)

Module 16: Auto Replication Sync

  • Explain the concept of Auto Replication Sync
  • Explain the foreign Cell Manager import method
  • Describe the Automated Replication Synchronization (ARS) device and the replication job configuration

Module 17: Data Protector Patch Installation

  • Explain the Data Protector strategies to address the product issues and limitations
  • Download and install the Data Protector General Release (GR) patches
  • Query the Data Protector clients to view a list of installed Data Protector fixes

Module 18: Troubleshooting

  • Identify various Data Protector log files
  • Enable the debug option
  • Explain the process to collect and pack the debug files
  • Configure and run the Data Protector health check
  • Perform a basic troubleshooting