6 Copyright © Acronis International GmbH, 2002-2015
7.4.1 What is a tape device? ................................................................................................................................ 194
7.4.2 Overview of tape support ........................................................................................................................... 194
7.4.3 Getting started with a tape device ............................................................................................................. 200
7.4.4 Tape management ...................................................................................................................................... 204
7.4.5 Vaults on tapes ............................................................................................................................................ 212
7.4.6 Usage examples ........................................................................................................................................... 212
7.5 Storage nodes ........................................................................................................................216
7.5.1 What is a storage node? ............................................................................................................................. 216
7.5.2 Supported types of storage ........................................................................................................................ 216
7.5.3 Operations performed by storage nodes .................................................................................................. 216
7.5.4 Getting started with a storage node .......................................................................................................... 217
7.5.5 User privileges on a storage node .............................................................................................................. 218
7.5.6 Operations with storage nodes .................................................................................................................. 219
7.5.7 Deduplication .............................................................................................................................................. 229
8 Operations with archives and backups.......................................................................... 236
8.1 Validating archives and backups ............................................................................................236
8.1.1 Archive selection ......................................................................................................................................... 237
8.1.2 Backup selection .......................................................................................................................................... 237
8.1.3 Vault selection ............................................................................................................................................. 237
8.1.4 Access credentials for source ..................................................................................................................... 238
8.1.5 When to validate ......................................................................................................................................... 239
8.1.6 Task credentials ........................................................................................................................................... 239
8.2 Exporting archives and backups ............................................................................................240
8.2.1 Archive selection ......................................................................................................................................... 242
8.2.2 Backup selection .......................................................................................................................................... 242
8.2.3 Access credentials for source ..................................................................................................................... 243
8.2.4 Destination selection .................................................................................................................................. 243
8.2.5 Access credentials for destination ............................................................................................................. 244
8.3 Mounting an image ................................................................................................................245
8.3.1 Archive selection ......................................................................................................................................... 246
8.3.2 Backup selection .......................................................................................................................................... 246
8.3.3 Access credentials ....................................................................................................................................... 246
8.3.4 Volume selection ......................................................................................................................................... 247
8.3.5 Managing mounted images........................................................................................................................ 247
8.4 Operations available in vaults ................................................................................................248
8.4.1 Operations with archives ............................................................................................................................ 248
8.4.2 Operations with backups ............................................................................................................................ 249
8.4.3 Converting a backup to full ......................................................................................................................... 250
8.4.4 Deleting archives and backups ................................................................................................................... 250
9 Bootable media ........................................................................................................... 252
9.1 How to create bootable media ..............................................................................................253
9.1.1 Linux-based bootable media ...................................................................................................................... 253
9.1.2 WinPE-based bootable media .................................................................................................................... 257
9.2 Connecting to a machine booted from media .......................................................................260
9.3 Working under bootable media.............................................................................................261
9.3.1 Setting up a display mode .......................................................................................................................... 262
9.3.2 Configuring iSCSI and NDAS devices .......................................................................................................... 262
9.4 List of commands and utilities available in Linux-based bootable media .............................263
9.5 Acronis Startup Recovery Manager .......................................................................................264
9.6 Acronis PXE Server .................................................................................................................264