NetBackup 7.5.0.3 (NetBackup 7.5 Maintenance Release 3) is now available!
(Crossposted from the Netting Out NetBackup blog) I'm very pleased to announce that the next Maintenance Release for NetBackup 7.5 is now available! NetBackup 7.5.0.3, a software only Maintenance Release, is the third maintenance release for NetBackup 7.5. It is a cumulative release containing fixes and content from 7.5.0.1 (software-only) and 7.5.0.2 (appliance-only). In addition, this release contains fixes to over 325 issues including the most commonly downloaded EEBs, several customer escalations, and internal engineering defects. The significant content of this release is: Solaris 11 master server, Bare Metal Restore server and OpsCenter Managed Server support No new features in 7.5.0.3. However, some features that were delivered in previous maintenance releases are included: NetBackup for VMware on SLES – delivered in 7.5.0.2 PureDisk seeding utility – delivered in 7.5.0.2 Client Direct Whole Image Mode – delivered in 7.1.0.4 Multi-process nbostpxy for Client Dedupe – delivered in 7.1.0.4 Selective EEBs/Hotfixes which could not get into 7.5.0.1 or 7.5.0.2 Other miscellaneous fixes across NetBackup To download 7.5.0.3, please visit the following page: 7.5.0.3 Download Links http://symantec.com/docs/TECH189607 This is a MAINTENANCE Release (as opposed to a Release Update) - it can ONLY be applied on top of NetBackup 7.5. (If you are currently running 7.0, 7.0.1, 7.1, or 7.1.0.x, you will need to upgrade to 7.5 before you can apply 7.5.0.1.) Please note that maintenance releases are CUMULATIVE - that means that 7.5.0.3 contains all product fixes included in 7.5.0.1 AND 7.5.0.2. If you are currently running NetBackup 7.5, you may apply the 7.5.0.3 maintenanace release without installing 7.5.0.1. In fact, if you are still running NetBackup 7.5, we would HIGHLY encourage applying 7.5.0.3! To check to see if your particular Etrack is resolved in NetBackup 7.5.0.3, please refer to these Release Notes: NetBackup 7.5.0.3 Release Notes http://symantec.com/docs/DOC55711.2KViews6likes6CommentsBe aware: The NetBackup 6.x End of Support Life is fast approaching!
(crossposted from the Netting Out NetBackup blog) With NetBackup 7.5 now on the horizon, it's time to make sure you're aware of the coming end of support for NetBackup 6.x. It's hard to believe it will have been seven years since the NetBackup 6.0 release! On October 3, 2012, NetBackup 6.x will reach End of Support Life (EOSL). This includes ALL 6.0 maintenance packs and 6.5 Release Updates. The NetBackup 6.x EOSL means that in order to continue receiving NetBackup support, an upgrade to NetBackup 7.x will be necessary. Version 7.1.0.3 is the latest available update today. (The 7.1.0.4 maintenance release is expected to see release in March. It is expected that this will be the final 7.1 update.) In March 2012, NetBackup 7.5 GA will also be available as an upgrade path. There is no cost to upgrade for customers with a current maintenance contract; however, you may find that additional or updated hardware is needed.Use SORT to help shine a light on any hurdles to your upgrade. Did you know we also sell NetBackup Appliances? They can also be an effective strategy to achieve both a software and hardware refresh. Here are some more links which may help: TECH77075: The official EOSL statement for NetBackup 6.x (originally sent 1/19/2009, updated 2/1/2010) TECH76123: Frequently Asked Questions about Symantec Business Products End of Life TECH74584: The NetBackup 7.x upgrade portal More information about NetBackup Appliances can be found at www.netbackupappliance.com More information about NetBackup Release Details can be found at http://www.symantec.com/business/support/index?page=releasedetails&key=15143 FAQs: Q: If I have an open 6.x case on Oct 3, 2012, what happens to it? A: The EOSL is a milestone for opening new cases. Your case will remain open and work will continue until your issue is resolved. Q: Can I still use NetBackup 6.x clients with 7.x servers in a supported configuration? A: You can, but after the NetBackup 6.x EOSL date, no support will be provided for them. Are there other questions? Please ask me here or contact your sales engineer! PLEASE don't get caught in an unsupported configuration in October - if NetBackup 6.x is still in your enterprise, start making your plans NOW!2KViews5likes14CommentsAnnouncing the release of version 3.4 of the Symantec Operations Readiness Tools (SORT)
Version 3.4 of the Symantec Operations Readiness Tools (SORT) has been released. This release keeps pace with the latest NetBackup releases and also adds important new functionality as listed below. General156Views2likes0CommentsIntegrating SAP with VCS 6.2 (on Oracle Linux 6.5)
Hi, I was wondering if someone has some additional information regarding how to setup my cluster... I have both VCS (inclusing Storage Foundation) and Linux knowledge. I do however have no background in SAP. And as SAP is a very complex product, I can not see the forest because of the trees... Setup 2 node (active-passive) cluster of Oracle Linux 6.5 nodes. Veritas Storage Foundation HA (= VxVM + DMP + VCS). Oracle 11.2 as database. SAP ECC 6.0 Apart from the Installation & Configuration guide on the SAP NetWeaver Agent, I found little information about implementing SAP in VCS. Source: "Symantec™ High Availability Agent for SAP NetWeaver Installation and Configuration Guide for Linux 6.2". But unfortunately I can not find a howto, guide or whatever from Symantec, nor from the usual Google attempts. My customer is however also not very SAP knowledged. From what I understand it is a very basic SAP setup, if not the simplest. They are using SAP ECC6.0 and an Oracle 11.2 database. So I assume they are just having a Central Instance and the Database. After some Google resource, I found out that SAP ECC 6.0 is technically a SAP NetWeaver 7.0. On Symantec SORT, I found 3 versions of SAP NetWeaver. I downloaded the first one, as the descripton says: SAP NetWeaver SAP NetWeaver 7.1, 7.2, 7.3, 7.4 SAP NetWeaver 7.1, 7.3 Agent: SAPNW04 5.0.16.0 Application version(s): SAP R/3 4.6, R/3 Enterprise 4.7, NW04, NW04s, ERP/ECC 5.0/6.0, SCM/APO 4.1/5.0/5.1/7.0, SRM 4.0/5.0/7.0, CRM 4.0/5.0/7.0 Source: https://sort.symantec.com/agents/detail/1077 SAP ERP 2005 = SAP NetWeaver 2004s (BASIS 7.00) = ECC 6.0 Source: http://itknowledgeexchange.techtarget.com/itanswers/difference-bet-ecc-60-sap-r3-47/ Source: http://www.fasttrackph.com/sap-ecc-6-0/ Source : http://wulibi.blogspot.be/2010/03/what-is-sap-ecc-60-in-brief.html Currently I have this setup unfinshed: Installed & configured Storage Foundation HA on both nodes. Instaled the ACC Libraries on both nodes. see: https://sort.symantec.com/agents/detail/1183 Installed the SAP NetWeaver Agent on both nodes. see: https://sort.symantec.com/agents/detail/1077 Configured next to the CusterServiceGroup, 3 Service Groups: SG_sap the shared storage Resources: DiskGroup + Volumes + Mount. the SAPNW Agent Resource. SG_oracle the shared storage Resources: DiskGroup + Volumes + Mount the Oracle Agent Resurce. SG_nfs still empty. SAPNW Agent. SAP instance type The SAPNW Agent documentation states: The agent supports the following SAP instance types: Central Services Instance Application Server Instance Enqueue Replication Server Instance. Source: "Symantec™ High Availability Agent for SAP NetWeaver Installation and Configuration Guide for Linux 6.2" But I guess the SAP ECC 6.0 has them all in one central instance, right? So I only need one SAPNW Agent. How is the SAP installed: only ABAP only Java add-in (both ABAP and Java). Source: "Symantec™ High Availability Agent for SAP NetWeaver Installation and Configuration Guide for Linux 6.2" I have no idea. How can I find this out? InstName Attribute Another thing is the InstName Attribute. This also does not correspond with the information I have. My SAP intance is T30. So the syntax is correct more or less, but it isn't listed below. Which is important also to decide on the value for the ProcMon Attribute The SAPSID and InstName form a unique identifier that can identify the processes running for a particular instance. Some examples of SAP instances are given as follows: InstName = InstType DVEBMGS00 = SAP Application Server - ABAP (Primary) D01 SAP = Application Server - ABAP (Additional) ASCS02 = SAP Central Services - ABAP J03 = SAP Application Server - Java SCS04 = SAP Central Services - Java ERS05 = SAP Enqueue Replication Server SMDA97 = Solution Manager Diagnostics Agent Source: "Symantec™ High Availability Agent for SAP NetWeaver Installation and Configuration Guide for Linux 6.2" In the listing of the required attributes it is also stated. However, the default value is CENTRAL. I guess this is correct in my case? InstName Attribute: An identifier that classifies and describes the SAP server instance type. Valid values are: APPSERV: SAP Application Server ENQUEUE: SAP Central Services ENQREP: Enqueue Replication Server SMDAGENT: Solution Manager Diagnostics Agent SAPSTARTSRV: SAPSTARTSRV Process Note: The value of this attribute is not case-sensitive. Type and dimension: string-scalar Default: APPSERV Example: ENQUEUE EnqSrvResName Attribute A required attribute is the EnqSrvResName Attribute. The documentation says this should be the Resource Name for the SAP Central Instance. But I am assuming I only have a SAP Central Instance. So I guess I should use the name of my SAP Agent Resouce from my SAP Service Group? EnqSrvResName Attribute: The name of the VCS resource for SAP Central Services (A)SCS Instance. This attribute is used by Enqueue and Enqueue Replication Server. Using this attribute the Enqueue server queries the Enqueue Replication Server resource state while determining the fail over target and vice a versa. Type and dimension: string-scalar Default: No default value Example: SAP71-PI1SCS_sap Source: "Symantec™ High Availability Agent for SAP NetWeaver Installation and Configuration Guide for Linux 6.2" Is anyone able to help me out? Thanks in advance.Solved2.4KViews2likes9CommentsHELP-HOW TO CONFIGURE VVR to two Servers
The purpose of this message is to request support interest in the configuration of two servers (Primary) HP ProLiant DL385p Gen7 virtualized, and a (Secondary) HP ProLiant DL380p Gen7, both with Platform Windows Server 2008, Standard x64 version, 64bit, to be connected for synchronous replication. Currently have installed on both computers Software Symantec Veritas Storage Foundation VSF, V6.0, in where Volume Replicator is an option that we want to achieve for both to maintain a daily backup replication or synchronously via IP network. I shall be waiting for your comments, Best regards, **************************************************************************************************************** El propósito de este mensaje es el interés de solicitarle apoyo en la configuración en dos Servidores (Primario)HP ProLiantDL385p Gen7 virtualizado, y un (Secundario)HP ProLiantDL380p Gen7, ambos con Plataforma Windows Server 2008, version Standard x64, 64bit, conectados, para replicación sincrónica. Actualmente se tienen instalados en ambos equipos elSoftware Symantec Veritas Storage Foundation VSF, V6.0, en dondeVolume Replicatores una opción con la que queremos lograr que ambos mantengan una replicación diaria o backup de forma sincrónica vía red IP. Quedaré a la espera de sus comentarios, Saludos Cordiales,Solvedbackup Performence
how to improve backup performance(For example I am running a backup operation it is taking 10 hours (consider ) then I need it to finish it within 5 hours or below mean as early as possible is it possible or not if possible means how Give me an example )Solved1.9KViews2likes8CommentsRisks of fraud power increase in business
The risks of fraud in computer security or enterprise networks have grown considerably in Brazil and worldwide. Essas são algumas das conclusões de um estudo realizado pela Deloitte intitulado “Risk Intelligent governance in the age of cyber threats”. These are among the findings of a study conducted by Deloitte titled "Risk Intelligent governance in the age of cyber Threats." The study, which took into account other surveys to be drawn, points out that in 2011, organizations heard suffered an average of more than one successful cyberattack per week, which represents an increase of 44% compared to 2010. "Companies generally, should no longer be questioned about the possibility of such an attack happen. É bem provável que ele já esteja acontecendo”, destaca André Gargaro, sócio da área de Gestão de Riscos Empresariais da Deloitte. It is very likely that it is already happening, "says André Gargaro, a partner in the area of Enterprise Risk Management at Deloitte. The cyber attacks, the study indicates, may harm a business in various ways, from simple vandalizing the site, even to the shutdown of electronic fraud and intellectual property theft. In Brazil, Deloitte indicates, with the exception of the financial industry, preparation companies is still very reactive in relation to protection. Apenas depois da ocorrência de um evento considerável é que as corporações começam a se preocupar com medidas para evitar impactos de outros ataques. Only after the occurrence of an event is significant that corporations begin to worry about measures to avoid impacts to other attacks. "The ideal is to anticipate possible attacks through knowledge of their potential invaders and shapes how they act. As empresas precisam investir de forma mais eficiente em ferramentas, pessoas e processos”, aconselha Gargaro. Companies need to invest more efficiently in tools, people and processes, "advises Gargaro490Views2likes0Commentsvulnerability
The Microso ft Windows users warned about possible attacks "man-in-the-middle" capable of stealing passwords from some wireless networks and VPNs (Virtual Private Networks). However, the company will not release an update to resolve the problem. This is not a security vulnerability that requires Microsoft to issue a security update, according to some security experts. "This issue is due to deficiencies cryptographic protocol MS-CHAP v2 and is driven by configuration changes." Rather than release a security patch, Microsoft recommends IT administrators to add PEAP (Protected Extensible Authentication Protocol) to protect passwords on VPN sessions. A support document describes how to configure servers and clients for PEAP. The MS-CHAP v2 is used to authenticate users based VPNs PPTP (Point-to-Point Tunneling Protocol). Windows includes an implementation of PPTP. The threat has been identified by researcher Moxie Marlinspike safely during hacker conference Defcon. The specialist even showed a tool that could be used in this type of invasion, Chapcrack. To use Chapcrack an attacker must first capture data packets to be transmitted via a VPN or Wi-Fi. The most likely scenario: a forgery of a legitimate point wireless, as in an airport, to find a VPN or other traffic and then attack him. Microsoft is not aware of any attacks that have used this feature, but acknowledged that the threat is real. "An attacker who successfully exploited these weaknesses could obtain cryptographic user credentials," said the company's advisory on Monday (20/8). "These credentials could be reused to authenticate the cracker on network resources, allowing the execution of any action you take on this network." As noted Marlinspike, MS-CHAP v2, which refers to the Windows NT SP4 and Windows 98, has been denounced as unsafe for years.477Views2likes0CommentsPhrases that scare security professionals
Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A child with chocolate smeared shirt says, categorically: "It was not me." Or the phone rings and mother assures you, "There's nothing to worry about." Or a systems administrator who carries a box of tapes back up guarantees: "Within minutes, all information will be retrieved." In some cases, the first words you hear - despite the distance between them and the truth - are enough to tell you everything you need to know. In some cases, the first words you hear - despite the distance between Them and the truth - are enough to tell you everything you need to know. The same applies to the world of information security. The same applies to the world of information security. Some words sound reassuring, but we know they often point out problems of internal security, technical resources or the people and processes involved in the protection systems. Get to know some of the phrases "revealing secrets" that signal the imminence of problems in security. One. One We have a culture of safety We have a culture of safety "No, you do not have" is the immediate response of the professionals. "No, you have not's" is the immediate response of the professionals. Even if only mentally. Even if only mentally. This is the kind of phrase that comes from companies that started with five people - in the traditional family business model - and, as they grew, a snap themselves operating with thousands of people without governance or policies. This is the kind of phrase That comes from companies That started with five people - in the traditional family business model - and, As They grew to snap Themselves Thousands of people operating with or without governance policies. Some exchanged and its "safety culture" are enough to buy a good espresso in a quiet corner allowing look to the horizon and find out how much work lies ahead. Some Exchanged and its "safety culture" are enough to buy a good espresso in a quiet corner Allowing look to the horizon and find out how much work lies ahead. The simple fact is that without support guidelines or feedback mechanisms (feedback), security is defined differently by each and is not verified by anyone. The simple fact is without support guidelines That common mechanisms or feedback (feedback), security is defined differently by each and is not verified by anyone. There are no metrics for compliance with the "culture" and a "safety culture" is hidden by a practice of "do your job". If there are rules, write them down. If there are rules, write down Them. If technology is put into action to implement or monitor the rules, write that down too. If technology is put into action to Implement or monitor the rules, write down That too. If people break the rules, comply with what was agreed. If the rules undermine the legitimacy of the business when completed, change them. 2nd. 2nd. IT security is information security IT security is the security of information Information security is not the same thing in the information technology security. If the term "information security" is used in the same way that "IT security", it invariably means that nobody has taken decisions not primarily security techniques that affect departments - IT, human resources, legal, audit and perhaps others in the organization. Join those who have influence in the departments listed above and decide whether information (not paper documents or equipment) is an asset of the company, such as computers and desks. Decide whether the company authorizes people to do jobs, logical and physical access to information as individuals. Decides Whether the company authorizes people to the jobs, logical and physical access to the information Individuals. Take these policies in group decisions. Take these policies in group decisions. Then maybe there will be more time to decide "how to" manage security - rather than trying to guess ... 3rd. 3rd. This does not apply to the chief This does not apply to the chief Although this is becoming less of an issue in public, occasionally an executive simply refuses to follow security guidelines that he himself approved. Although this is less of an issue Becoming in public, occasionally an executive simply Refuses to follow security guidelines That he himself approved. Unless you are prepared to meticulously document all "escapades" following the model of forensics and then deliver them to the directors or the police (or just quit), be prepared to work around the situation. Most bad apples can be managed by applying the Machiavellian sense of having influence the relationship of the other: they must at least pretend to lead by example, while continuing to do whatever they do behind closed doors. Few will admit it, but many Organizations simply put in the budget and install a DSL line access to "guests" in the halls of top executives and Their Eyes close to anything that is plugged into That line. This is not a desirable solution, but if you still solve these executives sign the documents required by Sarbanes-Oxley, the rest comes from the ability to deny knowledge of security professionals. 4th. 4th. Our department gets information security IT staff Our department gets information security IT staff Titles do not matter. Titles of not matter. A report by a security expert at the IT director is always a security administrator, even if that person has the job of information security officer. The problem is that in the corporate world the word "officer" usually means that professional has the authority to verify and monitor whether all the techniques and processes that control proprietary information are efficient. An IT security administrator is usually involved in designing technical control and therefore can not be "self-audit" and make sure that IT is doing the right thing, particularly if it relates to someone within IT. The security professional with the position of "officer" should always report the same level or higher as the IT director. The security professional with the position of "officer" should always report the same level or higher to the IT director. 5th. 5th. We have a password policy We have a password policy Speaking directly, a document that specifies the size, shape and complexity of a password is a technical standard or procedure, not a policy. Speaking directly, the document that specifies the size, shape and complexity of the password is a technical standard or procedure, not a policy. Politics is a directory for directing business, something like "individuals must be identified uniquely and authenticated priority to have the condition to access the company's assets." Politics is a business directory for directing, something like "Individuals must be authenticated and uniquely Identified priority to have the condition to access the company's assets." Note that this example policy involves "what" to do about people and access, not "how" to construct a sequence of character types. 6th. 6th. Our executives have copies of all passwords Our executives have copies of all passwords Although the idea to make a young student faint, ex ist indeed managers who demand that their direct employees to disclose their individual passwords. Although the idea to make the faint young student, ex ist indeed managers who demand That Their direct employees to Disclose Their individual passwords. The explanation for this is always: "What if someone is fired or sick? How could we find your documents?." When this happens, the only effective strategy is to tell anyone who asks such a thing: "If you do, then you are a suspect in any negative situation that arises. When this happens, the only effective strategy is to tell anyone who ASKs such a thing: " You'll never be Able to fire anybody because you will Also be a suspect. "Or you can always summarize it all in a simple:" Grow friend. " 7th. 7th. The brand is our standard I have nothing against the major hardware vendors in the market, but when the personal shopping company says: "Our standard is Dell" (or any other brand), what they are really saying is: "We play our standards security out the window in exchange for discounts and now we buy whatever the vendor offers. " I have nothing against the major hardware vendors in the market, but When the personal shopping company says: "Our standard is Dell" (or any other brand), What They are really saying is: "We play our security standards out the window in exchange for discounts and now we buy whatever the vendor offers. "It's the equivalent of shopping that her great-aunt in a store with inflated prices, getting happy because" a product is discounted 75%. " It's the equivalent of shopping That her great-aunt in the store with inflated prices, getting happy because "the product is discounted 75%." The point is, that both her great-aunt when IT people in the real world have other decisions to make and are commodity PCs. The point is, that her great-aunt ambos When IT people in the real world have other Decisions to make and are commodity PCs are all sure to choose the product from a vendor and maintain applications with it for a while. It's all right to choose the product from the vendor and Maintain applications with it for a while. But a manufacturer is not a technical standard and there is a problem in that mix if anyone does their homework. But the manufacturer is not a technical standard and there is a problem in That mix if anyone does Their homework. When a manufacturer makes changes in line or software product - especially when that part of an equipment manufacturer and network security such as Cisco Systems - it is important to have clearly defined functional requirements to assess whether the products still work as desired. When the customers not know what They want, any bargain Seems to be what you need. 8th. 8th. Hey, where did that come from? It is conceivable that those highly technical users should organize their own equipment as well as support them. On the other hand, this means that the area of IT and support personnel were knocked out by hardware manufacturers that provide only an 0800 number that never works. Security policies must be present everywhere, including the bathrooms attached to the wall behind the toilet paper of an organization. Security policy in the company can be exposed Also next to the bathroom towels. The important thing is to be clear and known to all. Solving this problem is a fundamental respect. Solving this problem is a fundamental respect. Start with the basic governance and making it clear that there are rules, with much effort and communication, this will at least make the "safety culture" a settled matter. 9th. 9th. We ship to the firewall rules ... Most network administrators cowers with the words mentioned above. Still, many will still send free email with a copy of the firewall rules. Worse, they have an OEM or a freelance consultant who set up the firewall for them and retain the single copy of the rules. These rules, if they present complexity, provide a detailed map of the security scheme of the company, with important information about the identity of internal networks and services and how to make them a target. No serious security professional would date a copy of the firewall rules of someone without a specific requirement to do so. A competent auditor of information systems certificate or other auditor will review firewall rules directly into the system administrator and can not take. The Competent auditor of information systems certificate or other auditor will review firewall rules Directly into the system administrator and can not take. If you see a copy of your corporate firewall rules put in an audit report, especially an audience, get ready to redo the design of IP ... and call their lawyers. Their lawyers and call.Solved1.3KViews2likes6CommentsDoes More than one Techn work at Symantec?????
1. NO ONE IS ANSWERING THE PHONE ANYWHERE AT SYMANTEC 2. YOUR PHONE SYSTEM IS REPORTING 1 MIN THEN OVER AN HOUR 3. I WAS ON HOLD OVER TWO HOURS 4. I HAVE ANOTHER ISSUE WITH BACKUP EXEC 5. EVEN YOUR SYMANTEC OPERATORS CANT GET THROUGH TO SUPPORT 6. MY ONLINE SUPPORT IS IN AN ORIENTAL LANGUAGE 7. YOUR ONLINE CHAT SUPPORT DOESNT WORK. NOONE IS THERE EITHER I've been on hold all morning. Don't listen to "The Customer Hold the Longest. is X min. It goes up and down and noone ever answers.2KViews2likes7Comments