Additional Resources
................................................................................................................................................................
5
Chapter 1: Introduction
.................................................................................................................
6
Data protection
....................................................................................................................................................................
6
Snapshots
..............................................................................................................................................................................
6
Replication
.............................................................................................................................................................................
7
Protection policies
...............................................................................................................................................................
7
Metro protection
.................................................................................................................................................................
8
Chapter 2: Snapshots
....................................................................................................................
9
Create a snapshot
...............................................................................................................................................................
9
Create a snapshot of a volume
...................................................................................................................................
9
Create a snapshot of a file system
..........................................................................................................................
10
Create a snapshot of a virtual machine
..................................................................................................................
10
Create a thin clone
............................................................................................................................................................
10
Create a thin clone of a volume or volume group
.................................................................................................
11
Create a thin clone of a file system
..........................................................................................................................
11
Create a thin clone of a snapshot
.............................................................................................................................
11
Using clones to access read-only snapshots from hosts
.........................................................................................
12
Refresh a storage resource
.............................................................................................................................................
12
Refresh a volume using a snapshot
.........................................................................................................................
12
Refresh a volume from a related volume
................................................................................................................
13
Refresh a snapshot of a file system
........................................................................................................................
13
Restore a storage resource from a snapshot
..............................................................................................................
13
Restore a volume or volume group from a snapshot
...........................................................................................
13
Restore a file system from a snapshot
...................................................................................................................
14
Chapter 3: Protection Policies
.....................................................................................................
15
Snapshot rules
....................................................................................................................................................................
15
Create a snapshot rule
................................................................................................................................................
15
Replication rules
.................................................................................................................................................................
15
Create a replication rule
.............................................................................................................................................
16
Recovery point objective
............................................................................................................................................
16
Alert threshold
..............................................................................................................................................................
16
Create a protection policy
...............................................................................................................................................
16
Modify a protection policy
...............................................................................................................................................
17
Assign a protection policy
................................................................................................................................................
17
Assign a protection policy to a storage object
......................................................................................................
18
Assign a protection policy to multiple storage objects
.......................................................................................
18
Change the protection policy assigned to a storage object
..............................................................................
18
Unassign a protection policy
...........................................................................................................................................
19
Chapter 4: Replication
.................................................................................................................
20
Remote systems
................................................................................................................................................................
20
Add a remote system connection
.............................................................................................................................
21
Contents
Contents
3