{"id":474,"date":"2011-04-13T18:46:26","date_gmt":"2011-04-13T16:46:26","guid":{"rendered":"http:\/\/www.data-protector.org\/wordpress\/?p=474"},"modified":"2015-12-10T19:51:17","modified_gmt":"2015-12-10T18:51:17","slug":"data-protector-6-2-installation","status":"publish","type":"post","link":"https:\/\/www.data-protector.org\/wordpress\/de\/2011\/04\/data-protector-6-2-installation\/","title":{"rendered":"Data Protector 6.2 Installation"},"content":{"rendered":"<p>F\u00fcr alle die nicht l\u00e4nger warten k\u00f6nnen&#8230; die neue Version von HP Data Protector (6.2) wird auf einem Windows Server 2008 so installiert&#8230; Die Bilder sind teilweise modifiziert um alle Details erkennen zu k\u00f6nnen.<br \/>\nVor dem Start wird je nach Konfiguration des Servers noch die UAC eingeblendet.<br \/>\n<img loading=\"lazy\" src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_01.png\" alt=\"DP62_Install\" width=\"511\" height=\"440\" \/><br \/>\nWillkommen Bildschirm<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_02.png\" alt=\"DP62_Install\" \/><br \/>\nUnter Advanced k\u00f6nnen Optionen f\u00fcr die Installation festgelegt werden<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_03.png\" alt=\"DP62_Install\" \/><br \/>\nLizenz Vereinbarung<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_04.png\" alt=\"DP62_Install\" \/><br \/>\nAuswahl was installiert werden soll, in diesem Fall nat\u00fcrlich der Cell Manager<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_05.png\" alt=\"DP62_Install\" \/><br \/>\nAccount Information unter der ein Teil der Dienste laufen werden, hier kann auch alternativ ein lokaler Account verwendet werden (nicht empfohlen)<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_06.png\" alt=\"DP62_Install\" \/><br \/>\nFehlermeldung wenn das Passwort nicht korrekt ist<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_07.png\" alt=\"DP62_Install\" \/><br \/>\nZielverzeichnis f\u00fcr die Installation<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_08.png\" alt=\"DP62_Install\" \/><br \/>\n\u00c4ndern des Zielverzeichnisses, wenn der Server \u00fcber SAN Storage verf\u00fcgt sollten beide Verzeichnisse im SAN liegen<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_09.png\" alt=\"DP62_Install\" \/><br \/>\nder ge\u00e4nderte Pfad&#8230;<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_10.png\" alt=\"DP62_Install\" \/><br \/>\nAuswahl der Komponenten, VSS, AutoDR, DA, UI, Docu sollten immer auf dem Cell Server installiert sein, IS und MA k\u00f6nnen auch auf einen Client installiert werden<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_11.png\" alt=\"DP62_Install\" \/><br \/>\nFirewall Konfiguration<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_12.png\" alt=\"DP62_Install\" \/><br \/>\nSummary bevor die Installation startet<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_13.png\" alt=\"DP62_Install\" \/><br \/>\nDie Installation wird gepr\u00fcft<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_14.png\" alt=\"DP62_Install\" \/><br \/>\nDie ausgew\u00e4hlten Komponenten werden installiert<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_15.png\" alt=\"DP62_Install\" \/><br \/>\nFortsetzung<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_16.png\" alt=\"DP62_Install\" \/><br \/>\nWenn ein lokaler Account f\u00fcr die Installation angegeben wurde erscheint am Ende diese Warnmeldung.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_17.png\" alt=\"DP62_Install\" \/><br \/>\n&#8230;andernfalls sieht die Installation so aus.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_18.png\" alt=\"DP62_Install\" \/><br \/>\nSetup beendet, es erscheint jetzt noch eine Textdatei mit dem Status.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_19.png\" alt=\"DP62_Install\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>F\u00fcr alle die nicht l\u00e4nger warten k\u00f6nnen&#8230; die neue Version von HP Data Protector (6.2) wird auf einem Windows Server 2008 so installiert&#8230; Die Bilder sind teilweise modifiziert um alle Details erkennen zu k\u00f6nnen. Vor dem Start wird je nach Konfiguration des Servers noch die UAC eingeblendet. Willkommen Bildschirm Unter Advanced k\u00f6nnen Optionen f\u00fcr die [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"spay_email":""},"categories":[11],"tags":[102,103],"translation":{"provider":"WPGlobus","version":"2.8.8","language":"de","enabled_languages":["en","de"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"de":{"title":false,"content":true,"excerpt":false}}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p28cjj-7E","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":683,"url":"https:\/\/www.data-protector.org\/wordpress\/de\/2011\/07\/advisory-c02928162\/","url_meta":{"origin":474,"position":0},"title":"Advisory c02928162","date":"26. Juli 2011","format":false,"excerpt":"{:en}With document ID c02928162 on 2010\/07\/22 an advisory for HP Data Protector 6.11 and Data Protector 6.2 was released, describing a problem when restoring files. There will be more files restored than selected, this may overwrite files not selected for the restore. There is a solution, installing current patches, for\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":834,"url":"https:\/\/www.data-protector.org\/wordpress\/de\/2011\/12\/data-protector-6-21\/","url_meta":{"origin":474,"position":1},"title":"Data Protector 6 &#8211; Patch Bundle 6.21","date":"23. Dezember 2011","format":false,"excerpt":"{:en}For coming christmas days HP delivers the next Data Protector version. Version 6.2 becomes 6.21 The new version 6.21 is a patch bundle you need to install on your existing DP 6.2 installation. Most important feature is deduplication, which might be known from the HP D2D systems or the StoreOnce\u2026","rel":"","context":"In &quot;DP A.06.00&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":671,"url":"https:\/\/www.data-protector.org\/wordpress\/de\/2011\/07\/security-bulletin-c02872182\/","url_meta":{"origin":474,"position":2},"title":"Security Bulletin c02872182","date":"15. Juli 2011","format":false,"excerpt":"{:en}With document ID c02872182 on 2011\/06\/29 an advisory for HP Data Protector (6.0, 6.10, 6.11 and 6.20) was released, which describes a potential security problem when using Data Protector and in some circumstances a remote execution of arbitrary code may possible. There is a solution, installation of Data Protector 6.2\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":842,"url":"https:\/\/www.data-protector.org\/wordpress\/de\/2012\/01\/advisory-data-protector-org\/","url_meta":{"origin":474,"position":3},"title":"Advisory Data-Protector.org","date":"11. Januar 2012","format":false,"excerpt":"{:en}Different customers reported about problems with multipath devices in DP 6.21. The configuration of the multipath devices is no longer possible. The problem is with the GUI only, as backups run as expected. Following workarounds are possible: - Open a call and request hotfix QCCR2A35525. - Downgrade to DP 6.2\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":766,"url":"https:\/\/www.data-protector.org\/wordpress\/de\/2012\/04\/data-protector-whitepaper\/","url_meta":{"origin":474,"position":4},"title":"Data Protector Whitepaper","date":"22. April 2012","format":false,"excerpt":"{:de}Mit freundlicher Genehmigung von HP wurden unter https:\/\/www.data-protector.org\/wordpress\/whitepaper alle Whitepapers f\u00fcr Data Protector 6.11, 6.2 und 7.0 aufgelistet. Sollte ein Link nicht mehr funktionieren oder die Liste nicht vollst\u00e4ndig sein, bitte eine Mail an daniel-braun@data-protector.org senden; der Link wird dann umgehend aktualisiert oder vervollst\u00e4ndigt. F\u00fcr einige Whitepaper ist unter Umst\u00e4nden\u2026","rel":"","context":"In &quot;Common&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":513,"url":"https:\/\/www.data-protector.org\/wordpress\/de\/2011\/05\/security-bulletin-c02810240\/","url_meta":{"origin":474,"position":5},"title":"Security Bulletin c02810240","date":"13. Mai 2011","format":false,"excerpt":"{:en}With document ID c02810240 on 2011\/04\/28 an advisory for HP Data Protector 6.11 (6.10 and 6.00) was released, which describes a potential security problem when using Data Protector and in some circumstances a remote execution of arbitrary code may possible. There is a solution, upgrade to Data Protector 6.2. Only\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/posts\/474"}],"collection":[{"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":9,"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"predecessor-version":[{"id":2850,"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/posts\/474\/revisions\/2850"}],"wp:attachment":[{"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/de\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}