This section describes guidelines for using Dynamic Storage Technology (DST) shadow volume pairs and policies on Open Enterprise Server (OES) servers. Use this section to understand the expected behavior of shadow volume pairs and policies with commonly used services and storage features.
For installation requirements, see Section 3.0, Planning Your Dynamic Storage Technology Server Environment.
Section 9.2, Data Access Requirements for a DST Shadow Volume Pair
Section 9.3, Guidelines for Working with DST Shadow Volume Pairs
Section 9.5, Using Trustees, Trustee Rights, and File System Attributes on DST Shadow Volume Pairs
Section 9.6, Using NSS Encrypted Volumes in a DST Shadow Volume Pair
Section 9.8, Using Opportunistic File Locking on DST Shadow Volume Pairs
Section 9.9, Using OES Cluster Services with DST Shadow Volume Pairs
Section 9.10, Using Novell Distributed File Services with DST Shadow Volume Pairs
Section 9.12, Using Virus Checking Utilities with DST Shadow Volume Pairs
Section 9.13, Using Backup Utilities with DST Shadow Volume Pairs