Farstone DRIVECLONE 5 User Manual

Copyright Notice
No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without the expressed written permission of FarStone Technology, Inc.
Trademark
FarStone® is a trademark of FarStone Technology, Inc. Microsoft, Windows® and MS-DOS® are registered trademarks of Microsoft Corporation. Other product names mentioned in this User’ s Guide may be trademarks or registered trademarks of their respective companies.
FarStone Technology, Inc.
U.S. Headquarters:
6 Morgan, Suite 160 Irvine, CA 92618 Phone: (949) 458-3666 Fax: (949) 458-3633
www.farstone.com
Asia-Pacific Offices
10F-1B, No. 207, DunHua North Rd., Taipei, 105, Taiwan Phone: 886-2-2546-9898 Fax: 886-2-2546-3838
www.farstone.com.tw
Technical Support
Answers to frequently asked questions are posted on our website at
www.farstone.com/support/faqs
Support at www.farstone.com/support
. For other support issues, please contact FarStone Technical
.
Copyright
©
2000-2008 FarStone Technology, Inc. All rights reserved.
Software License Agreement
FARSTONE TECHNOLOGY, INC. (FARSTONE) END USER LICENSE AGREEMENT FOR DRIVECLONE NETWORK, HEREAFTER REFERRED TO AS THE “SOFTWARE”
PLEASE READ CAREFULLY: THE USE OF THIS “SOFTWARE” IS SUBJECT TO THE “SOFTWARE” LICENSE TERMS OF FAR STONE AND O THER LICENSORS WHO’S SOFTWARE MAY BE BUNDLED WITH THIS PRODUCT.
BY YOUR USE OF THE “SOFTWARE” INCLUDED WITH THIS PRODUCT YOU AGREE TO THE LICENSE TERMS REQUIRED BY THE LICENSOR OF TH E “SOFTWARE” , AS SET FOR TH BELOW . IF YOU DO NOT AGREE TO THE LICENSE TERMS APPLICABLE TO THE “SOFTWARE”, YOU MAY RETURN THE ENTIRE UNUSED PRODUCT FOR A FULL REFUND.
LICENSE AND WARRANTY:
The software that accompanies this license (the “Software”) is the property of FARSTO NE or its licensors and is protected by copyright law. While FARSTONE continues to own the Software, you will have certain rights to use the Software after your acceptance of this license. Except as may be modified by a license addendum which accompanies this license, your rights and obligations with respect to the use of this Software are as follows:
A. Single User License:
(a) Use the “Software” on a single computer system or network, and only by a single user at a time. If you wish to use the “Software” for more users, you will need an additional License for each user.
(b) Make one copy of the “Software” in machine-readable form solely for back-up purposes provided you reproduce FarStone’s copyright proprietary legends. Notwithstanding the foregoing, the “Software” may be used on the home, laptop or other secondary computer of the principal user of the “Software”, and an additional copy of the “Software” may be made to support such use. As used in this License, the “Software” is “in use” when it is either loaded into RAM or installed on a hard disk or other permanent memory device. The “Software” may be “in use” on only one computer at any given time. (Different License terms and fees are applicable for networked or multiple user applications.) As a specific condition of this License, you agree to use the “Software” in compliance with all applicable laws, including copyright laws, and that you will not copy, transmit, perform or distribute any audio or other content using the “Software” without obtaining all necessary Licenses or permissions from the owner of the content.
B. Multiple User License:
Make one copy of the “Software” in machine-readable form solely for back-up purposes, provided you reproduce FarStone’s copyright proprietary legends.
You must acquire and dedicate a License for each separate computer on which any part or portion of the “Software” is installed or run As used in this License, the “Software” or any part or portion of the “Software” is “in use” when it is either loaded into RAM or installed on a hard disk or other permanent memory device including any networke d or shared environment where either direct or indirect connections are made through software or hardware which pools or aggregates connections.
As a specific condition of this License, you agree to use the “Software” in compliance with all applicable laws, including copyright laws, and that you will not copy, transmit, perform or distribute any audio or other content using the “Software” without obtaining all necessary Licenses or permissions from the owner of the content.
C. Restrictions:
You may not distribute copies of the “Software” to others or electronically transfer the “Software” from one computer to another over a network. Y ou may not post or otherwise make available the “Software”, or any portion thereof, in any form, on the Internet. You may not use the “Software” in a computer service business, including in time-sharing applications. The “Software” contains trade secrets and, in order to protect them, you may not decompile, reverse engineer, disassemble, or otherwise reduce the “Software” to a human-perceivable form. YOU MAY NOT MODIFY, ADAPT, TRANSLATE, RENT, LEASE, LOAN, RESELL FOR PROFIT, DISTRIBUTE, NETWORK OR CREATE DERIVATIVE WORKS BASED UPON THE “SOFTWARE” OR ANY PART TH EREOF.
D. Limited Warranty:
FarStone warrants that the media on which the Software is distributed will be free from defects for a period of thirty (30) days from the date of delivery of the Software to you. Your sole remedy in the event of a breach of this warranty will be that FarStone will, at its option, replace any defective media returned to F arStone within the warr anty period or refund the money you paid for the Software. FarStone does not warrant that the Software will meet your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PAR TICULAR PURPOSE AND NONINFRINGEMENT. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE.
E. Limitation of Liability:
IN NO EVENT WILL FARSTONE OR ITS LICENSORS BE LIABLE TO YOU FOR ANY INCIDENTAL, CONSEQUENTIAL OR INDIRECT DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, OR LOSS OF DATA, EVEN IF FARSTONE OR A LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. Some states do not allow the exclusion or limitation of special, inciden tal, or consequential damages, so the above limitation or exclusion may not apply to you.
F. General:
You acknowledge that you have read this Agreement, understand it, and that by using the “Software” you agree to be bound by its terms and conditions. You further agree that it is the complete and exclusive statement of the agreement between FarStone and you, and supersedes any proposal or prior agreement, oral or written, and any other communication between FarStone and you relating to the subject matter of this Agreement. No additional or any different terms will be enforceable against FarStone unless FarStone gives its express consent, including an express waiver of the terms of this Agreement, in writing sign ed by an officer of FarStone. Y ou assume full responsibility for the use of the “Software” and agree to use the “Software” legally and responsibly.
Should any provision of this Agreement be declared unenforceable in any jurisdiction, and then such provision shall be deemed severable from this Agreement and shall not affect the remainder hereof. F arStone reserves all rights in the “Software” not specifically granted in this Agreement.
Should you have any questions concerning this Agreement, you may contact FarStone by writing to:
FarStone Technology, Inc. Legal Department 6 Morgan, Suite 160 Irvine, CA 92618
Contents
Chapter 1: Introduction............................................................................... 9
1.1 Product Overview .......................................................................................................9
1.2 Software Structure .....................................................................................................9
1.3 Powerful Backup Features.......................................................................................... 10
1.4 Other Features and Benefits....................................................................................... 11
Chapter 2: Installing and Uninstalling DriveClone Network....................... 12
2.1 System Requirements ...............................................................................................12
2.2 Installing DriveClone Network.....................................................................................12
2.2.1 Installing the Network Manager..................................................................13
2.2.2 Installing the Remote Manager...................................................................15
2.2.3 Installing the Client...................................................................................15
2.3 Uninstalling DriveClone Network .................................................................................17
Chapter 3: DriveClone Specific Terminology.............................................. 18
3.1 File Backup.............................................................................................................. 18
3.2 System Snapshot ..................................................................................................... 18
3.3 Hard Drive Imaging .................................................................................................. 18
3.4 Full and Incremental Backups..................................................................................... 18
3.5 DriveClone Universal Restore...................................................................................... 19
3.6 DriveClone Secure Area............................................................................................. 19
3.7 Startup Recovery Manager......................................................................................... 19
3.8 PXE and Network Recover Manager............................................................................. 19
3.9 VSS and Database Support ........................................................................................ 19
3.9.1 VSS Concepts ..........................................................................................20
3.9.2 VSS Limitations........................................................................................21
Chapter 4: The Remote Manager ............................................................... 22
4.1 The Remote Manager Main Console .............................................................................22
4.1.1 Connect to a Network Manager...................................................................22
4.1.2 Install Components...................................................................................22
4.2 Tools Tab................................................................................................................. 25
4.2.1 Create a Bootable Rescue Disk ...................................................................25
4.2.2 Preview Backup Image..............................................................................26
4.2.3 Check Image Integrity...............................................................................26
4.2.4 Export PXE Image.....................................................................................27
Chapter 5: The Network Manager.............................................................. 28
5.1 The Network Manager Main Console............................................................................ 28
5.1.1 Quick Start..............................................................................................28
5.1.2 Client List................................................................................................29
5.1.3 Group Jobs..............................................................................................32
5.1.4 View Logs................................................................................................33
5.2 Backing up Client Computers...................................................................................... 33
5.2.1 Create a System Snapshot.........................................................................34
5.2.2 Create Complete Backups for Client Computers.............................................35
5.2.3 File Backup..............................................................................................38
5.3 Restoring Client Computers........................................................................................ 40
5.3.1 Return to a System Snapshot.....................................................................41
5.3.2 Restore a Client Computer.........................................................................42
5.3.3 Restore My Computer (Universal Restore)....................................................43
5.3.4 Restore Files............................................................................................44
5.4 Tools Tab................................................................................................................. 45
5.4.1 Create a Bootable Rescue Disk ...................................................................46
5.4.2 Preview Backup Image..............................................................................47
5.4.3 Check Image Integrity...............................................................................47
5.4.4 Export PXE Image.....................................................................................47
Chapter 6: The Client................................................................................. 49
6.1 Enter the DriveClone Network Client Pre-OS Manager ....................................................50
6.1.1 Boot from Bootable Rescue Disk .................................................................51
6.1.2 Boot from PXE Server................................................................................51
6.1.3 Install Driver in Pre-OS .............................................................................54
6.2 DriveClone Network Client Manager in Pre-OS Mode ...................................................... 55
6.2.1 Restore My Computer in Pre-OS..................................................................56
6.2.2 Perform Universal Restore in Pre-OS ...........................................................57
6.2.3 Image Integrity Check...............................................................................57
6.2.4 Return to a System Snapshot in Pre-OS.......................................................58
6.2.5 Uninstall..................................................................................................58
Chapter 7: Glossary................................................................................... 59
Chapter 8: Appendix.................................................................................. 60
8.1 Frequently Asked Questions....................................................................................... 60
Chapter 1: Introduction
1.1 Product Overview
DriveClone Network is a powerful, all-in-one, centrally managed data backup an d hard disk imaging application that creates ongoing “snapshots” and hard drive images of all systems on a local area network. DriveClone Network allow s a network administrator to remotely deploy DriveClone Network Manager and DriveClone Network Client Module; remotely back up selected files, folders, Windows applications settings, even the entire disks and partitions to an external location for a single client, one group or domain; remotely restore client module from any existing image file; or even remotely monitor the whole progress by viewing the real time status. Unwanted downloads and installations are quickly removed from your client computers. Deleted system and application files are restored with a f ew mouse clicks.
The Pre-OS manager allows the administrator to restore the client system even if the operating system does not run.
System Snapshot, the unique technology developed by FarStone, captures the system status within several seconds and stores the created “snapshots” in the Secure Area. (Secure Area is a hidden protected space which is created from the free space on the local hard drive.)
With a newly added function, Universal Restore, user does not need to restore the image back to the original hardware.
1.2 Software Structure
The software includes three components, Network Manager, Remote Manager, and Client Module
The Network Manager – The interface (GUI) for managing all of the clients on the network. The Remote Manager – Software that enables remote management of network backup and
recovery. The Client Module– An agent installed on the client systems to allow remote management via
the Network Manager,which includes a Secure Area for System Snapshots, and provides a local Pre-OS recovery interface.
The DriveClone Network Manager will automatically detect the type of operating system installed on the clients and track your available DriveClone Network PC Client and DriveClone Network Server Client licenses. DriveClone Network will alert you when you are out of available licenses.
DriveClone Network Server Client: Installed on server operating systems, such as Windows 2000 Server or Windows Server 2003 and various editions of each.
DriveClone Network PC Client: Installed on workstation operating systems, such as Windows 2000 Professional, Windows XP or Windows Vista.
1.3 Powerful Backup Features
DriveClone Network’s suite of backup features includes:
Hard Drive Imaging: Backs up and restores a system with a complete copy of all files, installed software, partition information, and system settings
Incremental Backup: Manually or automatically updates save disk images without ever leaving Windows. Incremental backup points log only the changes that have occurred since the last Complete Backup.
System Snapshots: Backs up an entire computer system automatically to the Secure Area. The system snapshots also provide a fast method to recover from software-related data disasters
File Backup: Manually or automatically backs up selected file/folder, file extension, etc.
Universal Restore: Restores a complete system image of a particular configuration to a different hardware configuration system or a Virtual Machine.
1.4 Other Features and Benefits
Microsoft Volume Shadow Copy Service (VSS) Support (for Windows Server 2003 and higher): Easily backup VSS compatible databases (Exchange, Or acle, SQL
Server) without taking databases offline and ensuring data consistency.
Preboot Execution Environment (PXE) Support: Boot and recover any system from PXE server without a need of the Bootable Rescue Disk.
Complete External Backup: Store a complete system image on a USB hard drive, or on a network share.
Easy Disk Image Updates: Incremental Backup lets you quickly update your saved disk image without ever leaving Windows.
Flexible Backup: Back up your client’s hard drive to another local hard drive, network drive, or a USB device.
Rapid, Controlled Recovery: Rebuild system via Complete Restore or System Snapshot in minutes, not hours or days.
Partition Support: Supports FATFAT32, NTFS and other unknown partitions.
Hardware Support: Supports IDE, EIDE, SATA, and SCSI hard drives and hardware
RAID 0/1.
100% protection: Restore an operating system damaged by corrupt software, human error, a virus attack, or a software bug.
Quick and Safe Try: Y ou have choice to return to original state in seconds as long as a System Snapshot is created before the new application is installed.
Unlimited System Snapshots: The number of system snapshots you can create is limited only by the hard drive space you allocated for DriveClone N etwork Client’s Secure Area.
Chapter 2: Installing and Uninstalling DriveClone Network
2.1 System Requirements
Desktop or notebook computer running
Windows® 2000 Professional (SP4)
Windows® XP (32-bit & x64)
Windows® Vista (32-bit & 64-bit)
Server computer running
Windows® 2000 Server or Advanced Server (SP4)
Windows® Server 2003 Standard or Enterprise or Data Center (32-bit & x64)SP2
Windows® Server 2003 R2 SP2
Network Manager
Intel® Pentium processor at 133 MHz or faster
256 MB of RAM (1 GB of RAM or more is recommended if your system is Vista)
550 MB or more disk space
Internet Explorer® 6.0 or higher
Client Module
Intel® Pentium processor at 133 MHz or faster
256 MB of RAM (1 GB of RAM or more is recommended if your system is Vista)
1450 MB or more disk space
Remote Manager
Intel® Pentium processor at 133 MHz or faster
256 MB of RAM (1 GB of RAM or more is recommended if your system is Vista)
550 MB or more disk space
Internet Explorer® 6.0 or higher
Optional
USB 2.0 Device
CD/DVD ROM
2.2 Installing DriveClone Network
DriveClone Network needs to be installed from an administrator account.
If you purchased a CD:
Insert the CD into your CD-ROM drive. The setup program should start automatically. If it doesn’t, browse the CD and double-click on Autorun.exe. Follow the prompts displayed to finish your installation.
If you purchased an electronic download:
Save the executable file to your hard drive. Double-click on the file to launch the DriveClone Network installer. Follow the prompts displayed to finish your installation.
Tip
Be sure to install the DriveClone Network components according to the order shown in above figure: Please install DriveClone Network Manager first, then DriveClone Network Remote Manager . DriveClone Network Client Module should be installed as the last step.
2.2.1 Installing the Network Manager
1. Select Install/Remove DriveClone Network Manager, and then click Run.
2. Select the language preference of the application, and click Next.
3. Carefully read the software license agreement. If you accept the terms of the agreement, select I accept the terms in the license agreement, and click Next.
4. Enter your personal information and serial number.
Note Clicking Next without entering a serial number will install a time-limited evaluation version of the Network Manager.
5. Select the Turn On the Broadcast checkbox to broadcast the server location on to the network to allow the clients to connect with the server automatically.
6. Click Next to install to the default folder, or Change to select another location for your installation.
7. Click Install to launch the installation process.
8. Click Finish, and then restart your computer to complete the installation.
Note
An administrator will have to log into a domain with administrative privileges to install the Network Manager on any computer within that domain.
After the installation, the administrator will hav e to restart the computer to complete the deployment.
2.2.2 Installing the Remote Manager
1. Select Install/Remove DriveClone Network Remote Manager, and then click Run.
2. Select the language preference of the application, and click Next.
3. Carefully read the software license agreement. If you accept the terms of the agreement, select I accept the terms in the license agreement, and click Next.
4. Click Next to install to the default folder, or Change to select another location.
5. Click Install to launch the installation process.
6. Click Finish, and then restart your computer to complete the installation.
Note
Be sure to install the DriveClone Network Remote Manager and the Network Manager on different computers.
An administrator will need to log into the domain with administrative privileges to install the Remote Manager on any computer within that domain. After the installation, the remote manager computer will n eed to restart to complete the deployment.
2.2.3 Installing the Client
1. Select Install/Remove DriveClone Network Client Module, and then click Run.
2. Select the language preference of the application, and click Next.
3. Carefully read the software license agreement. If you accept the terms of the agreement, select I accept the terms in the license agreement, and click Next.
4. Enter the Network Manager IP address, and click Next. If the Broadcast function on the Network Manager is enabled, you do not need to enter an IP address.
5. Click Next to install to the default folder, or Change to select another location.
6. Click Install to launch the installation process.
7. Specify a size for the DriveClone Network Secure Area (1200 MB or more) to store local backup data.
DriveClone Network will provide a recommend size for the Secure Area on each selected
partition. For best performance, choose to create the Secure Area from one of the non-operating system partition. Y ou can modify the size of the Secure Area so that it can hol d more or less data then the space recommended by the application.
Tip
DriveClone Network allocates 200MB for Pseudo Drive (refers to Section 7 for definition) from your Secure Area automatically.
8. Click Finish to complete the installation. The computer will now restart and create an i nitial System Snapshot.
2.3 Uninstalling DriveClone Network
1. From the Windows Start menu, select Start Æ Settings Æ Control Panel.
2. Double-click Add/Remove Programs, and select Change or Remove Programs.
3. Select the DriveClone Network Manager , the Remote Manager, or the Client Module, and click
Remove to begin uninstalling the associated component.
Tip
Uninstalling DriveClone Network Remote Manager will not remove all of the backup jobs you created.
If the Client Module is running a Complete Backup, System Snapshot, or File Backup, the uninstall program will terminate.
Chapter 3: DriveClone Specific Terminology
3.1 File Backup
DriveClone Network Client File Backup monitors files changes. When a change is detected, DriveClone Network Client will record it and back it up according to your schedule. File backups can be stored locally or externally.
3.2 System Snapshot
System Snapshot and Hard Drive Imaging are both sector level backup functionalities. System Snapshot stores only the changed data sectors into the DriveClone Network Client Secure Area. The amount of storage capacity required for each snapshot is substantially less than the enti re amount of data on the hard drive. As a result, snapshots offer a significant savings of hard drive space and an increased restoration speed when compared with hard drive imaging or complete disk cloning methods.
3.3 Hard Drive Imaging
Hard Drive Imaging can be used for bare-metal, disaster recovery when hard drive failure is encountered.
3.4 Full and Incremental Backups
A full and incremental backup solution aim to make storing several copies of the source data more feasible. To accomplish this, a complete backup is taken initially and then increment a l backups can be scheduled or run manually (Inc remental backup only stores the files or sectors that have changed since the previous full or incremental backup). Restoring a system to a certain point in time requires locating the complete backup and all the incremental backups taken between that complete backup and the particular point in time to which the system is to be restored to.
3.5 DriveClone Universal Restore
With DriveClone Universal Restore, there is no need to reinstall the operating system, applications, configuration files, individual files, and folders into the new system with different hardware configuration, or to a virtual machine. With Universal Restore, you can now restore your system on a similar or a different (than original) hardware configuration within a few mouse- clicks.
3.6 DriveClone Secure Area
DriveClone’s Secure Area is a virtual partition which is created from the free space on the hard drive. This location is hidden, protected, and accessible only by DriveClone.
3.7 Startup Recovery Manager
The Startup Recovery Manager (called DriveClone Pre-OS) is stored in DriveClone’s Secure Area. The DriveClone Pre-OS starts DriveClone on a local computer prior to Window s being loaded. With this capability, even if Windows won't start for some reason, you can run DriveClone and restore damaged partitions. As opposed to when booting from DriveClone’s Bootable Rescue Disk or from a PXE server, you will not need separate media or a network connection to launch DriveClone.
3.8 PXE and Network Recovery Manager
PXE stands for Preboot Execution Environment. It is an open industry standard developed by a number of participating software and hardware vendors. Initially designed by Intel, with input from 3Com, HP, Dell, Compaq, and Phoenix Technologies, PXE works with a network interface card (NIC) as a boot device for a client PC. When the operating system on a client PC cannot be accessed after a system crash, the System Administrator can use DriveClone’s Pre-OS mode (from the Client PC) to restore the system to a working state by using the PXE restore feature.
To do this, your Server PC and Client PC must have network cards that support PXE Boot. You will also have to configure a DHCP Server and a TFTP Server to support the function of PXE restore feature.
For more detail on how to configure the PXE Server, please refers to Section 6.1.2.2 for more
detail
3.9 VSS and Database Support
The large volume and dynamic nature of the data stored on the server platform make an
accurate and reliable backup difficult to perform. DriveClone Network Client introduces VSS support to solve the problems mentioned above.
VSS (Volume Shadow Copy Service, also referred to as Volume Snapshot Service) is a storage technology introduced on the Windows 2003 Server operating system. VSS allows manual or automatic backup copies or snapshots of a file or folder at a specific point in time. It is useful for creating backups or to access and recover copies of files that have been locked by applications for editing. VSS is also included in Windows Vista.
3.9.1 VSS Concepts
As shown in the above figure, VSS consists of four parts:
1. Requestor - its main task is to initiate the creation of the shadow copy.
2. Writer - its main task is to ensure the consistency of the data. If utilit ies keep writing data to the hard disk during the creation of a shadow copy, the data will be inconsistent. VSS can ensure the consistency of data by controlling the Application Writer Module. It can then achieve a higher efficiency and increased data integrity when creating the shadow copy. Usually, the writer may be a different service module in the operating system, like COM+, DHCP Service, Active Directory Service, etc. A database is a common writer type.
3. Provider - its main task is to create the shadow copy. Provider receives the command from the writer and starts to create the shadow copy. Different providers are required for different hardware and software configuration.
4. Core module of Volume Shadow Copy Service - its main task is to organize different modules to work together. The core module also provides the method to create the V olume Shadow Copy.
Loading...
+ 45 hidden pages