Dell DL1000 Guia do Utilizador Página 52

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 102
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 51
7. On the Protection page, select the appropriate protection schedule:
To use the default protection schedule, then in the Schedule Settings option, select Default
protection (hourly snapshots of all volumes).
If you want to define a different protection schedule, then in the Schedule Settings option, select
Custom protection and then click Next.
8. Proceed with your configuration as follows:
If you have selected a Typical configuration for the Protect Multiple Machines Wizard, and
default protection, then click Finish to confirm your choices, close the wizard, and protect the
machines you specified.
If you have selected a Typical configuration for the Protect Multiple Machines Wizard and
specified custom protection, click Next and set up a custom schedule.
If you have selected Advanced configuration for the Protect Machine Wizard, click Next and
proceed to Step 9 to see repository and encryption options.
9. On the Repository page select Use an existing repository.
10. Click Next.
The Encryption page appears.
11. To enable encryption, on the Encryption page, select Enable Encryption.
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for the
machines you have specified for protection. You can change the settings later from the
Configuration tab in the Core Console. For more information about encryption, see Managing
Security .
12. Enter the information as described in the following table to add an encryption key for the Core.
Text Box Description
Name Enter a name for the encryption key.
Description Enter a description to provide additional details for the encryption key.
Passphrase Enter the passphrase used to control access.
Confirm
Passphrase
Re-enter the passphrase you just entered.
13. Click Finish to save and apply your settings.
Monitoring The Protection Of Multiple Machines
You can monitor the progress as AppAssure applies the protection polices and schedules to the
machines.
To monitor the protection of multiple machines navigate to the Core Console Home tab and click
Events .
The Events tab displays Tasks, Alerts, and Events. When volumes are transferred, the status, start times,
and end times display in the Tasks pane. You can also filter tasks by status (active, waiting, completed and
failed).
As each protected machine is added, an alert is logged, indicating if the operation was successful or if
errors were logged.
52
Vista de página 51
1 2 ... 47 48 49 50 51 52 53 54 55 56 57 ... 101 102

Comentários a estes Manuais

Sem comentários