Dell DL1000 Spezifikationen Seite 37

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 54
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 36
8. Select the appropriate protection schedule:
To use the default protection schedule, in the Schedule Settings option, select Default
protection (hourly snapshots of all volumes). With a default protection schedule, the Core will
take snapshots of the agent machine once every 3 hours. Snapshots of the agent machine can be
taken once every hour (minimum). To change the protection settings at any time after you close
the wizard, including choosing which volumes to protect, go to the Summary tab for the specific
agent machine.
To define a different protection schedule, in the Schedule Settings option, select Custom
protection.
9. Select one of the following:
If you selected a Typical configuration from the Protect Machine Wizard and specified default
protection, then click Finish to confirm your choices, close the wizard, and protect the machine
you specified.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in
the protected volumes) will transfer to the repository on the Core following the schedule you
defined, unless you specified to initially pause protection.
If you selected a Typical configuration for the Protect Machine Wizard and specified custom
protection, then click Next to set up a custom protection schedule. For details on defining a
custom protection schedule, see Creating Custom Protection Schedules.
If you selected Advanced configuration for the Protect Machine Wizard, and default protection,
then click Next and proceed to Step 12 to see repository and encryption options.
If you selected Advanced configuration for the Protect Machine Wizard and specified custom
protection, then click Next and proceed to Step 10 to choose which volumes to protect.
10. On the Protection Volumes page, select the volumes on the agent machine that you want to
protect. If any volumes are listed that you do not want to include in protection, click in the Check
column to clear the selection. Then click Next.
NOTE: It is recommended to protect the System Reserved volume and the volume with the
operating system (typically the C drive).
11. On the Protection Schedule page, define a custom protection schedule.
12. On the Repository page, select Use an existing repository .
13. Click Next.
The Encryption page is displayed.
14. Optionally, to enable encryption, select Enable Encryption.
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for this
agent machine. You can change the settings later from the Configuration tab in the
AppAssure 5 Core Console.
CAUTION: AppAssure 5 uses AES 256-bit encryption in the Cipher Block Chaining (CBC)
mode with 256-bit keys. While using encryption is optional, Dell highly recommends that you
establish an encryption key, and that you protect the passphrase you define. Store the
passphrase in a secure location as it is critical for data recovery. Without a passphrase, data
recovery is not possible.
37
Seitenansicht 36
1 2 ... 32 33 34 35 36 37 38 39 40 41 42 ... 53 54

Kommentare zu diesen Handbüchern

Keine Kommentare