Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 Product Guide

PDF

Cyber Recovery architecture

The Cyber Recovery solution uses DD systems to replicate data from the production system to the Cyber Recovery vault through a dedicated replication data link.

The following diagram shows the production and Cyber Recovery vault environments:

Figure 1. Cyber Recovery architecture
This figure shows a PowerProtect DD system in the production environment and a Data Domain system int the CR Vault environment that are connected by an arrow that represents the replication data link.
NOTE: Unless otherwise specified, this document uses the term Cyber Recovery vault to describe the vault environment, which includes the DD system, the management host, and backup and analytics applications.

The Cyber Recovery vault is a customer-provided secure location of the DDMTree replication destination. It requires dedicated resources including a network, and though not required but strongly recommended, a name service such as DNS and a clock source. The Cyber Recovery vault can be at another location (hosted by a service provider, for example).

Production environment

In the production environment, applications such as the Avamar, NetWorker, and PowerProtect Data Manager applications manage backup operations, which store the backup data in MTrees on DD systems. The production DD system is configured to replicate data to a corresponding DD system in the Cyber Recovery vault.

Vault environment

The Cyber Recovery vault environment includes the Cyber Recovery management host, which runs the Cyber Recovery software and a DD system. If required for application recoveries, the Cyber Recovery vault can also include NetWorker, Avamar, PowerProtect Data Manager, and other applications.

By installing and licensing the CyberSense, you can validate and analyze your data.

The Cyber Recovery software enables and disables the replication Ethernet interface and the replication context on the DD system in the Cyber Recovery vault to control the flow of data from the production environment to the vault environment. For short periods of time, the Cyber Recovery vault is connected to the production system over this dedicated interface to perform replications. Because the management interface is always enabled, other Cyber Recovery operations are performed while the Cyber Recovery vault is secured.

NOTE: From the DD command-line interface (CLI) and the DD user interface (UI), MTrees are displayed using the following Cyber Recovery naming convention:
 /data/col1/cr-policy-<policyID>-repo

where <policyID> is the unique ID that is created when you create a Cyber Recovery policy.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\