Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell DL1300 Appliance User's Guide

Protecting a machine

This topic describes how to start protecting the data on a machine that you specify.
  • NOTE: The machine must have the AppAssure Agent software installed in order to be protected. You can choose to install the AppAssure Agent software prior to this procedure, or you can deploy the software to the agent as you define protection in the Connection dialog box. To install the AppAssure Agent software during the process of protecting a machine, see Deploying The Agent Software When Protecting An Agent .

When you add protection, you must specify the name or IP address of the machine to protect and the volumes on that machine to protect as well as define the protection schedule for each volume.

To protect multiple machines at the same time, see Protecting Multiple Machines .

To protect a machine:
  1. Reboot the machine on which the AppAssure Agent software is installed, if you haven’t already done so.
  2. From the Core Console on the core machine, click Protect > Protect Machine on the button bar. The Protect Machine Wizard appears.
  3. On the Welcome page, select the appropriate installation options:
    • If you do not need to define a repository or establish encryption, select Typical.
    • If you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the Skip this Welcome page the next time the wizard opens option.
  4. Click Next.
  5. On the Connection page, enter the information about the machine to which you want to connect as described in the following table.
    Text Box Description
    Host The host name or IP address of the machine that you want to protect.
    Port The port number on which the AppAssure Core communicates with the agent on the machine. The default port number is 8006.
    Username The user name used to connect to this machine; for example, administrator.
    Password The password used to connect to this machine.
  6. Click Next. If the Protection page appears next in the Protect Machine Wizard, skip to Step 7.
    • NOTE: If the Install Agent page appears next in the Protect Machine Wizard , this indicates that the Agent software is not yet on installed on the designated machine. Click Next to install the Agent software. The Agent software must be installed on the machine you want to protect, and that be restarted, before it can back up to the Core. To have the installer reboot the agent machine, select the After installation, restart the machine automatically (recommended) option before clicking Next.
  7. The host name or IP address you specified in the Connect dialog box appears in this text field. Optionally, enter a new name for the machine to be displayed in the Core Console.
  8. Select the appropriate protection schedule:
    • To use the default protection schedule, in the Schedule Settings option, select Default protection (3 hour snapshots of all volumes) . With a default protection schedule, the Core will take snapshots of the agent machine once every 3 hours. Snapshots of the agent machine can be taken once every hour (minimum). To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary tab for the specific agent machine.
    • To define a different protection schedule, in the Schedule Settings option, select Custom protection.
  9. Select one of the following:
    • If you selected a Typical configuration from the Protect Machine Wizard and specified default protection, then click Finish to confirm your choices, close the wizard, and protect the machine you specified.
    • The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the AppAssure Core following the schedule you defined, unless you specified to initially pause protection.
    • If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next to set up a custom protection schedule. For details on defining a custom protection schedule, see Creating Custom Protection Schedules.
    • If you selected Advanced configuration for the Protect Machine Wizard , and default protection, then click Next and proceed to Step 12 to see repository and encryption options.
    • If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, then click Next and proceed to Step 10 to choose which volumes to protect.
  10. On the Protection Volumes page, select the volumes on the agent machine that you want to protect. If any volumes are listed that you do not want to include in protection, click in the Check column to clear the selection. Then click Next.
    • NOTE: It is recommended to protect the System Reserved volume and the volume with the operating system (typically the C drive).
  11. On the Protection Schedule page, define a custom protection schedule.
  12. On the Repository page, select Use an existing repository .
  13. Click Next. The Encryption page appears.
  14. Optionally, to enable encryption, on the Encryption page, select Enable Encryption. Encryption key fields appear on the Encryption page.
    • NOTE: If you enable encryption, it will be applied to data for all protected volumes for this agent machine. You can change the settings later from the Configuration tab in the Core Console.
    • CAUTION: AppAssure uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. While using encryption is optional, Dell highly recommends that you establish an encryption key, and that you protect the passphrase you define. Store the passphrase in a secure location as it is critical for data recovery. Without a passphrase, data recovery is not possible.
  15. Enter the information as described in the following table to add an encryption key for the Core.
    Text Box Description
    Name Enter a name for the encryption key.
    Description Enter a description to provide additional details for the encryption key.
    Passphrase Enter the passphrase used to control access.
    Confirm Passphrase Re-enter the passphrase you just entered.
  16. Click Finish to save and apply your settings. The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Core following the schedule you defined, unless you specified to initially pause protection.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\