No part of this publication may be copied, transmitted, stored in a retrieval system or
translated into any language in any form or by any means without the expressed written
permission of FarStone Technology, Inc.
FarStone gr ants you the right to use one copy of the enclosed softw are program (“SOFTWARE”)
on a single computer . If the SOFTWARE is installed on a network, or more than one user can run
the SOFTWARE at the same time, you must purchase an additional license for each additional
user or computer.
Trademark
FarStone® is a trademark of FarStone Technology, Inc. Microsoft, Windows® and MS-DOS® are
registered trademarks of Microsoft Corporation. Other product names mentioned in this User’ s
Guide may be trademarks or registered trademarks of their respective companies.
FarStone Technology, Inc.
U.S. Headquarters:
6 Morgan, Suite 160
Irvine, CA 92618
Phone: (949) 458-3666
Fax: (949) 458-3633
2000-2008 FarStone Technology, Inc. All rights reserved.
Software License Agreement
FARSTONE TECHNOLOGY, INC. (FARSTONE) END USER LICENSE AGREEMENT FOR
DRIVECLONE NETWORK, HEREAFTER REFERRED TO AS THE “SOFTWARE”
PLEASE READ CAREFULLY: THE USE OF THIS “SOFTWARE” IS SUBJECT TO THE “SOFTWARE”
LICENSE TERMS OF FAR STONE AND O THER LICENSORS WHO’S SOFTWARE MAY BE BUNDLED
WITH THIS PRODUCT.
BY YOUR USE OF THE “SOFTWARE” INCLUDED WITH THIS PRODUCT YOU AGREE TO THE
LICENSE TERMS REQUIRED BY THE LICENSOR OF TH E “SOFTWARE” , AS SET FOR TH BELOW . IF
YOU DO NOT AGREE TO THE LICENSE TERMS APPLICABLE TO THE “SOFTWARE”, YOU MAY
RETURN THE ENTIRE UNUSED PRODUCT FOR A FULL REFUND.
LICENSE AND WARRANTY:
The software that accompanies this license (the “Software”) is the property of FARSTO NE or its
licensors and is protected by copyright law. While FARSTONE continues to own the Software,
you will have certain rights to use the Software after your acceptance of this license. Except as
may be modified by a license addendum which accompanies this license, your rights and
obligations with respect to the use of this Software are as follows:
A. Single User License:
(a) Use the “Software” on a single computer system or network, and only by a single user
at a time. If you wish to use the “Software” for more users, you will need an additional
License for each user.
(b) Make one copy of the “Software” in machine-readable form solely for back-up purposes
provided you reproduce FarStone’s copyright proprietary legends. Notwithstanding the
foregoing, the “Software” may be used on the home, laptop or other secondary computer
of the principal user of the “Software”, and an additional copy of the “Software” may be
made to support such use. As used in this License, the “Software” is “in use” when it is
either loaded into RAM or installed on a hard disk or other permanent memory device. The
“Software” may be “in use” on only one computer at any given time. (Different License
terms and fees are applicable for networked or multiple user applications.) As a specific
condition of this License, you agree to use the “Software” in compliance with all applicable
laws, including copyright laws, and that you will not copy, transmit, perform or distribute
any audio or other content using the “Software” without obtaining all necessary Licenses or
permissions from the owner of the content.
B. Multiple User License:
Make one copy of the “Software” in machine-readable form solely for back-up purposes,
provided you reproduce FarStone’s copyright proprietary legends.
You must acquire and dedicate a License for each separate computer on which any part or
portion of the “Software” is installed or run As used in this License, the “Software” or any part
or portion of the “Software” is “in use” when it is either loaded into RAM or installed on a hard
disk or other permanent memory device including any networke d or shared environment where
either direct or indirect connections are made through software or hardware which pools or
aggregates connections.
As a specific condition of this License, you agree to use the “Software” in compliance with all
applicable laws, including copyright laws, and that you will not copy, transmit, perform or
distribute any audio or other content using the “Software” without obtaining all necessary
Licenses or permissions from the owner of the content.
C. Restrictions:
You may not distribute copies of the “Software” to others or electronically transfer the
“Software” from one computer to another over a network. Y ou may not post or otherwise make
available the “Software”, or any portion thereof, in any form, on the Internet. You may not use
the “Software” in a computer service business, including in time-sharing applications. The
“Software” contains trade secrets and, in order to protect them, you may not decompile,
reverse engineer, disassemble, or otherwise reduce the “Software” to a human-perceivable
form. YOU MAY NOT MODIFY, ADAPT, TRANSLATE, RENT, LEASE, LOAN, RESELL FOR PROFIT,
DISTRIBUTE, NETWORK OR CREATE DERIVATIVE WORKS BASED UPON THE “SOFTWARE” OR
ANY PART TH EREOF.
D. Limited Warranty:
FarStone warrants that the media on which the Software is distributed will be free from defects
for a period of thirty (30) days from the date of delivery of the Software to you. Your sole
remedy in the event of a breach of this warranty will be that FarStone will, at its option, replace
any defective media returned to F arStone within the warr anty period or refund the money you
paid for the Software. FarStone does not warrant that the Software will meet your
requirements or that operation of the Software will be uninterrupted or that the Software will
be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER
EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PAR TICULAR PURPOSE AND NONINFRINGEMENT. THIS WARRANTY GIVES YOU
SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO
STATE.
E. Limitation of Liability:
IN NO EVENT WILL FARSTONE OR ITS LICENSORS BE LIABLE TO YOU FOR ANY INCIDENTAL,
CONSEQUENTIAL OR INDIRECT DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS,
OR LOSS OF DATA, EVEN IF FARSTONE OR A LICENSOR HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. Some states do
not allow the exclusion or limitation of special, inciden tal, or consequential damages, so the
above limitation or exclusion may not apply to you.
F. General:
You acknowledge that you have read this Agreement, understand it, and that by using the
“Software” you agree to be bound by its terms and conditions. You further agree that it is the
complete and exclusive statement of the agreement between FarStone and you, and
supersedes any proposal or prior agreement, oral or written, and any other communication
between FarStone and you relating to the subject matter of this Agreement. No additional or
any different terms will be enforceable against FarStone unless FarStone gives its express
consent, including an express waiver of the terms of this Agreement, in writing sign ed by an
officer of FarStone. Y ou assume full responsibility for the use of the “Software” and agree to use
the “Software” legally and responsibly.
Should any provision of this Agreement be declared unenforceable in any jurisdiction, and then
such provision shall be deemed severable from this Agreement and shall not affect the
remainder hereof. F arStone reserves all rights in the “Software” not specifically granted in this
Agreement.
Should you have any questions concerning this Agreement, you may contact FarStone by
writing to:
FarStone Technology, Inc.
Legal Department
6 Morgan, Suite 160
Irvine, CA 92618
DriveClone Network is a powerful, all-in-one, centrally managed data backup an d hard disk
imaging application that creates ongoing “snapshots” and hard drive images of all systems on
a local area network. DriveClone Network allow s a network administrator to remotely deploy
DriveClone Network Manager and DriveClone Network Client Module; remotely back up
selected files, folders, Windows applications settings, even the entire disks and partitions to an
external location for a single client, one group or domain; remotely restore client module from
any existing image file; or even remotely monitor the whole progress by viewing the real time
status. Unwanted downloads and installations are quickly removed from your client computers.
Deleted system and application files are restored with a f ew mouse clicks.
The Pre-OS manager allows the administrator to restore the client system even if the operating
system does not run.
System Snapshot, the unique technology developed by FarStone, captures the system status
within several seconds and stores the created “snapshots” in the Secure Area. (Secure Area is
a hidden protected space which is created from the free space on the local hard drive.)
With a newly added function, Universal Restore, user does not need to restore the image back
to the original hardware.
1.2 Software Structure
The software includes three components, Network Manager, Remote Manager, and Client
Module
The Network Manager – The interface (GUI) for managing all of the clients on the network.
The Remote Manager – Software that enables remote management of network backup and
recovery.
The ClientModule– An agent installed on the client systems to allow remote management via
the Network Manager,which includes a Secure Area for System Snapshots, and provides a local
Pre-OS recovery interface.
The DriveClone Network Manager will automatically detect the type of operating system
installed on the clients and track your available DriveClone Network PC Client and DriveClone
Network Server Client licenses. DriveClone Network will alert you when you are out of available
licenses.
• DriveClone Network Server Client: Installed on server operating systems, such as
Windows 2000 Server or Windows Server 2003 and various editions of each.
• DriveClone Network PC Client: Installed on workstation operating systems, such as
Windows 2000 Professional, Windows XP or Windows Vista.
1.3 Powerful Backup Features
DriveClone Network’s suite of backup features includes:
•Hard Drive Imaging: Backs up and restores a system with a complete copy of all files,
installed software, partition information, and system settings
•Incremental Backup: Manually or automatically updates save disk images without
ever leaving Windows. Incremental backup points log only the changes that have
occurred since the last Complete Backup.
•System Snapshots: Backs up an entire computer system automatically to the Secure
Area. The system snapshots also provide a fast method to recover from
software-related data disasters
•File Backup: Manually or automatically backs up selected file/folder, file extension,
etc.
•Universal Restore: Restores a complete system image of a particular configuration
to a different hardware configuration system or a Virtual Machine.
1.4 Other Features and Benefits
•Microsoft Volume Shadow Copy Service (VSS) Support (for Windows Server
2003 and higher): Easily backup VSS compatible databases (Exchange, Or acle, SQL
Server) without taking databases offline and ensuring data consistency.
•Preboot Execution Environment (PXE) Support: Boot and recover any system
from PXE server without a need of the Bootable Rescue Disk.
•Complete External Backup: Store a complete system image on a USB hard drive, or
on a network share.
•Easy Disk Image Updates: Incremental Backup lets you quickly update your saved
disk image without ever leaving Windows.
•Flexible Backup: Back up your client’s hard drive to another local hard drive, network
drive, or a USB device.
•Rapid, Controlled Recovery: Rebuild system via Complete Restore or System
Snapshot in minutes, not hours or days.
• Partition Support: Supports FAT,FAT32, NTFS and other unknown partitions.
• Hardware Support: Supports IDE, EIDE, SATA, and SCSI hard drives and hardware
RAID 0/1.
•100% protection: Restore an operating system damaged by corrupt software,
human error, a virus attack, or a software bug.
•Quick and Safe Try: Y ou have choice to return to original state in seconds as long as
a System Snapshot is created before the new application is installed.
•Unlimited System Snapshots: The number of system snapshots you can create is
limited only by the hard drive space you allocated for DriveClone N etwork Client’s
Secure Area.
Chapter 2: Installing and
Uninstalling DriveClone
Network
2.1 System Requirements
Desktop or notebook computer running
• Windows® 2000 Professional (SP4)
• Windows® XP (32-bit & x64)
• Windows® Vista (32-bit & 64-bit)
Server computer running
• Windows® 2000 Server or Advanced Server (SP4)
• Windows® Server 2003 Standard or Enterprise or Data Center (32-bit & x64)SP2
• Windows® Server 2003 R2 SP2
Network Manager
• Intel® Pentium processor at 133 MHz or faster
• 256 MB of RAM (1 GB of RAM or more is recommended if your system is Vista)
• 550 MB or more disk space
• Internet Explorer® 6.0 or higher
Client Module
• Intel® Pentium processor at 133 MHz or faster
• 256 MB of RAM (1 GB of RAM or more is recommended if your system is Vista)
• 1450 MB or more disk space
Remote Manager
• Intel® Pentium processor at 133 MHz or faster
• 256 MB of RAM (1 GB of RAM or more is recommended if your system is Vista)
• 550 MB or more disk space
• Internet Explorer® 6.0 or higher
Optional
• USB 2.0 Device
• CD/DVD ROM
2.2 Installing DriveClone Network
DriveClone Network needs to be installed from an administrator account.
If you purchased a CD:
Insert the CD into your CD-ROM drive. The setup program should start automatically. If it
doesn’t, browse the CD and double-click on Autorun.exe. Follow the prompts displayed to
finish your installation.
If you purchased an electronic download:
Save the executable file to your hard drive. Double-click on the file to launch the DriveClone
Network installer. Follow the prompts displayed to finish your installation.
Tip
Be sure toinstall the DriveClone Network components according to the order shown in above figure: Please install DriveClone NetworkManager first, thenDriveClone Network Remote Manager. DriveClone Network ClientModule should be installed as the last step.
2.2.1 Installing the Network Manager
1. Select Install/Remove DriveClone Network Manager, and then click Run.
2. Select the language preference of the application, and click Next.
3. Carefully read the software license agreement. If you accept the terms of the agreement,
select I accept the terms in the license agreement, and click Next.
4. Enter your personal information and serial number.
NoteClickingNext withoutentering a serial number will install a time-limited evaluation version of the NetworkManager.
5. Select the Turn On the Broadcast checkbox to broadcast the server location on to the
network to allow the clients to connect with the server automatically.
6. Click Next to install to the default folder, or Change to select another location for your
installation.
7. Click Install to launch the installation process.
8. Click Finish, and then restart your computer to complete the installation.
Note
An administrator will have to log into a domain with administrative privileges to install the NetworkManager on any computer within that domain.
After the installation, the administrator will have to restart the computer to complete the deployment.
2.2.2 Installing the Remote Manager
1. Select Install/Remove DriveClone Network Remote Manager, and then click Run.
2. Select the language preference of the application, and click Next.
3. Carefully read the software license agreement. If you accept the terms of the agreement,
select I accept the terms in the license agreement, and click Next.
4. Click Next to install to the default folder, or Change to select another location.
5. Click Install to launch the installation process.
6. Click Finish, and then restart your computer to complete the installation.
Note
Be sure to install the DriveClone Network Remote Manager and the Network Manager on different computers.
An administrator will need to log into the domain with administrative privileges to install the RemoteManager on any computer within thatdomain. After the installation, the remote manager computer will need torestart to complete the deployment.
2.2.3 Installing the Client
1. Select Install/Remove DriveClone Network Client Module, and then click Run.
2. Select the language preference of the application, and click Next.
3. Carefully read the software license agreement. If you accept the terms of the agreement,
select I accept the terms in the license agreement, and click Next.
4. Enter the Network Manager IP address, and click Next. If the Broadcast function on the
Network Manager is enabled, you do not need to enter an IP address.
5. Click Next to install to the default folder, or Change to select another location.
6. Click Install to launch the installation process.
7. Specify a size for the DriveClone Network Secure Area (1200 MB or more) to store local
backup data.
DriveClone Network will provide a recommend size for the Secure Area on each selected
partition. For best performance, choose to create the Secure Area from one of the
non-operating system partition. Y ou can modify the size of the Secure Area so that it can hol d
more or less data then the space recommended by the application.
Tip
DriveClone Network allocates 200MB for Pseudo Drive (refers to Section 7 for definition) from yourSecure Area automatically.
8. Click Finish to complete the installation. The computer will now restart and create an i nitial
System Snapshot.
2.3 Uninstalling DriveClone Network
1. From the Windows Start menu, select Start Æ Settings Æ Control Panel.
2. Double-click Add/Remove Programs, and select Change or Remove Programs.
3. Select the DriveClone Network Manager , the Remote Manager, or the Client Module, and click
Remove to begin uninstalling the associated component.
Tip
Uninstalling DriveClone NetworkRemote Manager will notremove all of the backup jobs you created.
If the Client Module is running a Complete Backup,System Snapshot, orFile Backup, the uninstall program will terminate.
Chapter 3: DriveClone Specific
Terminology
3.1 File Backup
DriveClone Network Client File Backup monitors files changes. When a change is detected,
DriveClone Network Client will record it and back it up according to your schedule. File backups
can be stored locally or externally.
3.2 System Snapshot
System Snapshot and Hard Drive Imaging are both sector level backup functionalities. System
Snapshot stores only the changed data sectors into the DriveClone Network Client Secure Area.
The amount of storage capacity required for each snapshot is substantially less than the enti re
amount of data on the hard drive. As a result, snapshots offer a significant savings of hard drive
space and an increased restoration speed when compared with hard drive imaging or complete
disk cloning methods.
3.3 Hard Drive Imaging
Hard Drive Imaging can be used for bare-metal, disaster recovery when hard drive failure is
encountered.
3.4 Full and Incremental Backups
A full and incremental backup solution aim to make storing several copies of the source data
more feasible. To accomplish this, a complete backup is taken initially and then increment a l
backups can be scheduled or run manually (Inc remental backup only stores the files or sectors
that have changed since the previous full or incremental backup). Restoring a system to a
certain point in time requires locating the complete backup and all the incremental backups
taken between that complete backup and the particular point in time to which the system is to
be restored to.
3.5 DriveClone Universal Restore
With DriveClone Universal Restore, there is no need to reinstall the operating system,
applications, configuration files, individual files, and folders into the new system with different
hardware configuration, or to a virtual machine. With Universal Restore, you can now restore
your system on a similar or a different (than original) hardware configuration within a few
mouse- clicks.
3.6 DriveClone Secure Area
DriveClone’s Secure Area is a virtual partition which is created from the free space on the hard
drive. This location is hidden, protected, and accessible only by DriveClone.
3.7 Startup Recovery Manager
The Startup Recovery Manager (called DriveClone Pre-OS) is stored in DriveClone’s Secure
Area. The DriveClone Pre-OS starts DriveClone on a local computer prior to Window s being
loaded. With this capability, even if Windows won't start for some reason, you can run
DriveClone and restore damaged partitions. As opposed to when booting from DriveClone’s
Bootable Rescue Disk or from a PXE server, you will not need separate media or a network
connection to launch DriveClone.
3.8 PXE and Network Recovery Manager
PXE stands for Preboot Execution Environment. It is an open industry standard developed by a
number of participating software and hardware vendors. Initially designed by Intel, with input
from 3Com, HP, Dell, Compaq, and Phoenix Technologies, PXE works with a network interface
card (NIC) as a boot device for a client PC. When the operating system on a client PC cannot be
accessed after a system crash, the System Administrator can use DriveClone’s Pre-OS mode
(from the Client PC) to restore the system to a working state by using the PXE restore feature.
To do this, your Server PC and Client PC must have network cards that support PXE Boot. You
will also have to configure a DHCP Server and a TFTP Server to support the function of PXE
restore feature.
For more detail on how to configure the PXE Server, please refers to Section 6.1.2.2 for more
detail
3.9 VSS and Database Support
The large volume and dynamic nature of the data stored on the server platform make an
accurate and reliable backup difficult to perform. DriveClone Network Client introduces VSS
support to solve the problems mentioned above.
VSS (Volume Shadow Copy Service, also referred to as Volume Snapshot Service) is a storage
technology introduced on the Windows 2003 Server operating system. VSS allows manual or
automatic backup copies or snapshots of a file or folder at a specific point in time. It is useful
for creating backups or to access and recover copies of files that have been locked by
applications for editing. VSS is also included in Windows Vista.
3.9.1 VSS Concepts
As shown in the above figure, VSS consists of four parts:
1. Requestor - its main task is to initiate the creation of the shadow copy.
2. Writer - its main task is to ensure the consistency of the data. If utilit ies keep writing
data to the hard disk during the creation of a shadow copy, the data will be inconsistent.
VSS can ensure the consistency of data by controlling the Application Writer Module. It can
then achieve a higher efficiency and increased data integrity when creating the shadow
copy. Usually, the writer may be a different service module in the operating system, like
COM+, DHCP Service, Active Directory Service, etc. A database is a common writer type.
3. Provider - its main task is to create the shadow copy. Provider receives the command
from the writer and starts to create the shadow copy. Different providers are required for
different hardware and software configuration.
4. Core module of Volume Shadow Copy Service - its main task is to organize different
modules to work together. The core module also provides the method to create the V olume
Shadow Copy.
Loading...
+ 45 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.