Veritas Access Appliance 8.4 Initial Configuration Guide
- Getting to know the Access Appliance
- Preparing to configure the appliance
- Configuring the appliance for the first time
- Getting started with the Veritas Access GUI
- Network connection management
- Resetting the appliance to factory settings
- Appliance security
- About Access appliance user account privileges
- About the Access Appliance intrusion detection system
- About Access appliance operating system security
- Recommended IPMI settings on the Access appliance
About data integrity on the Access appliance
The VPFS storage on the appliance provides the following data integrity checks to ensure successful access to copy data:
Continuous end-to-end verification of copy data in the Access storage pool
Any inadvertent data modifications that can cause data corruption are automatically detected and rectified if possible.
Continuous cyclic redundancy check (CRC) verification of copy data in the Access storage pool
A CRC value is computed for each object created for copy data in Access storage. A background process continuously verifies the CRC signatures to ensure that backup data is not tampered with and can be restored successfully when needed. The Access storage design naturally isolates any data corruption from uncorrupted portions of the storage pool, preventing corruption from spreading throughout the entire pool.