Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.13 Product Guide

PDF

Monitoring the Cyber Recovery vault status

The Cyber Recovery vault status indicates if the vault connection to the production system is open (Unlocked) or closed (Locked). The Cyber Recovery vault is in the Locked state unless the Cyber Recovery software is performing a replication.

After Cyber Recovery software installation and initial configuration, the Cyber Recovery vault might be unlocked. This behavior is as designed. An initialization might be in progress while you are configuring the Cyber Recovery environment, therefore, the port must be open. The Cyber Recovery software creates a job for the initial Sync operation, which you can use to monitor the operation. When the initialization is complete, the port closes automatically.

NOTE:You cannot create another Sync job while the initial Sync job is running.

If necessary, the Security Officer or an Admin user can manually lock the vault and close the connection. For more information, see Manually securing and releasing the Cyber Recovery vault.

To view the Cyber Recovery vault connection status, click Dashboard in the Main Menu. The state is displayed under Status.

The following table describes the connection states:

Table 1. Cyber Recovery connection states
Status Icon Description
Locked This figure shows the Locked icon for the Cyber Recovery vault connection state.All configured replication connections are closed because no replication is being performed. If a replication policy is run, the Cyber Recovery software opens the connection and changes the vault state to Unlocked.
Unlocked This figure shows the Unlocked icon for the Cyber Recovery vault connection state.One or more replication network connections are open because a replication is being performed. The state returns to Locked when the replication completes.
Secured This figure shows the Secured icon for the Cyber Recovery vault connection state. All replication network connections are secured because a security officer or admin user manually locked the connection due to a security breach. You cannot initiate any replication policy actions. When the Cyber Recovery vault is released and returns to the Locked state, you can then run replication policies.
Degraded This figure shows the Degraded icon for the Cyber Recovery vault connection state.If there are multiple DD systems in the Cyber Recovery vault and one DD system is unable to communicate with the Cyber Recovery software, the vault status is Degraded. This scenario can occur if you change either the FQDN or the IP address of the DD system. An alert notifies you about the Cyber Recovery vault status.
Unknown This figure shows the Unknown icon for the Cyber Recovery vault connection state.If there are multiple DD systems in the Cyber Recovery vault and all the DD systems are unable to communicate with the Cyber Recovery software, the vault status is Unknown. This scenario can occur if you do not create policies when you first install the Cyber Recovery software or if you change either the FQDNs or IP addresses of the DD systems. An alert notifies you about the Cyber Recovery vault status.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\