Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.15 AWS Deployment Guide

PDF

Deploying the Cyber Recovery software to AWS

Use the CloudFormation template to create a stack, which then silently installs the Cyber Recovery software.

Prerequisites

About this task

Performing the following steps takes approximately 15 minutes.

Steps

  1. Log in to the AWS Management Console and go to the CloudFormation service.
    As a best practice, Dell Technologies recommends using multifactor authentication on your AWS account. For more information, see https://aws.amazon.com/iam/features/mfa/.
  2. Click Stacks > Create stack. Then click With new resources (standard).
    The Create stack pane opens.
  3. Under Prepare template, enable the Template is ready option.
  4. Under Specify template > Template source, do the following:
    • If the CloudFormation template has been shared with you over S3, enable Amazon S3 URL. Then, enter the S3 URL for CloudFormation template and click Next.
    • If the CloudFormation template has not been shared with you over S3, enable Upload a template file. Then, click Choose file and click Next.
    The Specify stack details pane is displayed.
  5. Enter a stack name, complete the parameter fields that are described in the following table, and then click Next:
    Table 1. Parameter fields for creating a stackThe table lists the fields in the CloudFormation template that are used to create the stack.
    Field Description
    Prefix Configuration Enter a prefix for the AWS name tag of the resources that this stack creates. The limit is 200 characters.
    VPC Configuration Enter the Classless Inter-Domain Routing (CIDR) range for creation of the AWS virtual private cloud (VPC).
    Subnets Configuration
    • Enter the CIDR range for the private subnet for the Cyber Recovery jump host. The jump host is deployed on this subnet. The subnet acts as the gateway between the production workstation and the Cyber Recovery and DD subnet in AWS.
    • Enter the CIDR range for the private subnet for the Cyber Recovery management host and DDVE.
    Key Pair Configuration From the drop-down list, select a key pair from your AWS account to access:
    • The jump host EC2 instance created in this stack
    • The Cyber Recovery management host EC2 instance created in this stack
    • The DDVE EC2 instance created in this stack
    Vault PowerProtect DD Configuration
    • From the drop-down list, select the DDVE model.
    • From the drop-down list, select the number of DDVE metadata disks.
    Production Network Information Enter the CIDR range of the clients in the production deployment that require access to the jump host in the VPC. This value can also be single IP address, that is, it uses a single netmask of /32.
  6. Provide tags.
    Tags typically include key value pairs such as Name:CR-AWS.
    NOTE:Do not use tags that start with cr because the Cyber Recovery software uses customs tags to define resources.
  7. Leave the Permissions and Advanced options at the default values and then click Next.
  8. Review your input and click the checkbox to provide an acknowledgment.
  9. When you are satisfied with your input, click Create a stack.
    You can monitor the progress of the stack creation, which takes a few minutes. After the stack is created, view details in CloudFormation by clicking the Resources, Events, and Output tabs.
  10. Go to the created resources in the AWS UI to validate that they were created properly.
  11. Connect your site-to-site VPN gateway to the jump host private subnet.
  12. When the VPN is in place, connect to the jump host by using the Remote Desktop Connection.
  13. Obtain the Windows password from the AWS UI:
    1. Select the jump host instance.
    2. Click Actions > Security > Get Windows Password.
    3. Follow the prompt to upload the key provided during the CloudFormation deployment.
      This substep decrypts the password.
    4. Copy the decrypted password.
    5. To follow AWS best practices, change this password when you are logged in to the jump host.
  14. Connect to the private IP address that is assigned to the jump host instance using the username administrator and the password that you copied in the previous step.
    You can find the IP address in the Output tab in the CloudFormation UI or in the EC2 UI for that instance.
  15. Copy the private key for the Cyber Recovery host to the jump host:
    NOTE:The private key is the key pair you specified during the CloudFormation deployment.
    1. In a text editor, open the key pair on your production workstation.
    2. Copy the entire contents in the text editor.
    3. On the jump host, create a file and paste the contents from the text editor.
    4. Save the file using the same file name and extension as the key pair on the production host.

Next steps

Log in to the Cyber Recovery host to complete the deployment. See Resetting the Cyber Recovery passwords.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\