Veritas Access Appliance Initial Configuration Guide
- Getting to know the Access Appliance
- Preparing to configure the appliance
- Configuring the appliance for the first time
- Getting started with the Veritas Access GUI
- Network connection management
- Monitoring the appliance
- Resetting the appliance to factory settings
- Appliance security
- About Access Appliance security
- About Access appliance user account privileges
- About forced password changes
- Changing the Maintenance user account password
- About the Access Appliance intrusion detection system
- About the Access Appliance intrusion prevention system
- About Access appliance operating system security
- About data security on the Access appliance
- About data integrity on the Access appliance
- Recommended IPMI settings on the Access appliance
About data integrity on the Access appliance
The VPFS storage on the appliance provides the following data integrity checks to ensure successful access to copy data:
Continuous end-to-end verification of copy data in the Access storage pool
Any inadvertent data modifications that can cause data corruption are automatically detected and rectified if possible.
Continuous cyclic redundancy check (CRC) verification of copy data in the Access storage pool
A CRC value is computed for each object created for copy data in Access storage. A background process continuously verifies the CRC signatures to ensure that backup data is not tampered with and can be restored successfully when needed. The Access storage design naturally isolates any data corruption from uncorrupted portions of the storage pool, preventing corruption from spreading throughout the entire pool.