Known limitations and workarounds

Access limitations

Tape device locking limitations

Backup limitations