Dell PowerStore 1200T EMC PowerStore Protecting Your Data - Page 3

Contents, Additional Resources

Page 3 highlights

Contents Additional Resources...5 Chapter 1: Introduction...6 Data protection...6 Snapshots...6 Replication...7 Protection policies...7 Metro protection...8 Chapter 2: Snapshots...9 Create a snapshot...9 Create a snapshot of a volume...9 Create a snapshot of a file system...10 Create a snapshot of a virtual machine...10 Create a thin clone...10 Create a thin clone of a volume or volume group 11 Create a thin clone of a file system...11 Create a thin clone of a snapshot...11 Using clones to access read-only snapshots from hosts 12 Refresh a storage resource...12 Refresh a volume using a snapshot...12 Refresh a volume from a related volume...13 Refresh a snapshot of a file system...13 Restore a storage resource from a snapshot...13 Restore a volume or volume group from a snapshot 13 Restore a file system from a snapshot...14 Chapter 3: Protection Policies...15 Snapshot rules...15 Create a snapshot rule...15 Replication rules...15 Create a replication rule...16 Recovery point objective...16 Alert threshold...16 Create a protection policy...16 Modify a protection policy...17 Assign a protection policy...17 Assign a protection policy to a storage object...18 Assign a protection policy to multiple storage objects 18 Change the protection policy assigned to a storage object 18 Unassign a protection policy...19 Chapter 4: Replication...20 Remote systems...20 Add a remote system connection...21 Contents 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

Additional Resources
................................................................................................................................................................
5
Chapter 1: Introduction
.................................................................................................................
6
Data protection
....................................................................................................................................................................
6
Snapshots
..............................................................................................................................................................................
6
Replication
.............................................................................................................................................................................
7
Protection policies
...............................................................................................................................................................
7
Metro protection
.................................................................................................................................................................
8
Chapter 2: Snapshots
....................................................................................................................
9
Create a snapshot
...............................................................................................................................................................
9
Create a snapshot of a volume
...................................................................................................................................
9
Create a snapshot of a file system
..........................................................................................................................
10
Create a snapshot of a virtual machine
..................................................................................................................
10
Create a thin clone
............................................................................................................................................................
10
Create a thin clone of a volume or volume group
.................................................................................................
11
Create a thin clone of a file system
..........................................................................................................................
11
Create a thin clone of a snapshot
.............................................................................................................................
11
Using clones to access read-only snapshots from hosts
.........................................................................................
12
Refresh a storage resource
.............................................................................................................................................
12
Refresh a volume using a snapshot
.........................................................................................................................
12
Refresh a volume from a related volume
................................................................................................................
13
Refresh a snapshot of a file system
........................................................................................................................
13
Restore a storage resource from a snapshot
..............................................................................................................
13
Restore a volume or volume group from a snapshot
...........................................................................................
13
Restore a file system from a snapshot
...................................................................................................................
14
Chapter 3: Protection Policies
.....................................................................................................
15
Snapshot rules
....................................................................................................................................................................
15
Create a snapshot rule
................................................................................................................................................
15
Replication rules
.................................................................................................................................................................
15
Create a replication rule
.............................................................................................................................................
16
Recovery point objective
............................................................................................................................................
16
Alert threshold
..............................................................................................................................................................
16
Create a protection policy
...............................................................................................................................................
16
Modify a protection policy
...............................................................................................................................................
17
Assign a protection policy
................................................................................................................................................
17
Assign a protection policy to a storage object
......................................................................................................
18
Assign a protection policy to multiple storage objects
.......................................................................................
18
Change the protection policy assigned to a storage object
..............................................................................
18
Unassign a protection policy
...........................................................................................................................................
19
Chapter 4: Replication
.................................................................................................................
20
Remote systems
................................................................................................................................................................
20
Add a remote system connection
.............................................................................................................................
21
Contents
Contents
3