Dell DL1000 Betriebsanweisung Seite 34

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 102
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 33
7. The host name or IP address you specified in the Connect dialog box appears in this text field.
Optionally, enter a new name for the machine to be displayed in the Core Console.
8. Select the appropriate protection schedule:
To use the default protection schedule, in the Schedule Settings option, select Default
protection (hourly snapshots of all volumes). With a default protection schedule, the Core will
take snapshots of the agent machine once every 3 hours. Snapshots of the agent machine can be
taken once every hour (minimum). To change the protection settings at any time after you close
the wizard, including choosing which volumes to protect, go to the Summary tab for the specific
agent machine.
To define a different protection schedule, in the Schedule Settings option, select Custom
protection.
9. Select one of the following:
If you selected a Typical configuration from the Protect Machine Wizard and specified default
protection, then click Finish to confirm your choices, close the wizard, and protect the machine
you specified.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in
the protected volumes) will transfer to the repository on the AppAssure Core following the
schedule you defined, unless you specified to initially pause protection.
If you selected a Typical configuration for the Protect Machine Wizard and specified custom
protection, then click Next to set up a custom protection schedule. For details on defining a
custom protection schedule, see Creating Custom Protection Schedules.
If you selected Advanced configuration for the Protect Machine Wizard, and default protection,
then click
Next and proceed to Step 12 to see repository and encryption options.
If you selected Advanced configuration for the Protect Machine Wizard and specified custom
protection, then click Next and proceed to Step 10 to choose which volumes to protect.
10. On the Protection Volumes page, select the volumes on the agent machine that you want to
protect. If any volumes are listed that you do not want to include in protection, click in the Check
column to clear the selection. Then click
Next.
NOTE: It is recommended to protect the System Reserved volume and the volume with the
operating system (typically the C drive).
11. On the Protection Schedule page, define a custom protection schedule.
12. On the Repository page, select Use an existing repository .
13. Click Next.
The Encryption page appears.
14. Optionally, to enable encryption, on the Encryption page, select Enable Encryption.
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for this
agent machine. You can change the settings later from the Configuration tab in the Core
Console.
CAUTION: AppAssure uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode
with 256-bit keys. While using encryption is optional, Dell highly recommends that you
establish an encryption key, and that you protect the passphrase you define. Store the
passphrase in a secure location as it is critical for data recovery. Without a passphrase, data
recovery is not possible.
34
Seitenansicht 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 101 102

Kommentare zu diesen Handbüchern

Keine Kommentare