The
Cyber Recovery solution uses
DD systems to replicate data from the production system to the
Cyber Recovery vault through a dedicated replication data link.
The following diagram shows the production and
Cyber Recovery vault environments:
NOTE: Unless otherwise specified, this document uses the term
Cyber Recovery vault to describe the vault environment, which includes the
DD system, the management host, and backup and analytics applications.
The
Cyber Recovery vault is a customer-provided secure location of the
DDMTree replication destination. It requires dedicated resources including a network, and though not required but strongly recommended, a name service such as DNS and a clock source. The
Cyber Recovery vault can be at another location (hosted by a service provider, for example).
Production environment
In the production environment, applications such as the
PowerProtect Data Manager application manages backup operations, which store the backup data in
MTrees on
DD systems. The production
DD system is configured to replicate data to a corresponding
DD system in the
Cyber Recovery vault.
Vault environment
The
Cyber Recovery vault environment includes the
Cyber Recovery management host, which runs the
Cyber Recovery software and a
DD system. If required for application recoveries, the
Cyber Recovery vault can also include
PowerProtect Data Manager and other applications.
By installing and licensing the
CyberSense, you can validate and analyze your data.
The
Cyber Recovery software enables and disables the replication Ethernet interface and the replication context on the
DD system in the
Cyber Recovery vault to control the flow of data from the production environment to the vault environment. For short periods of time, the
Cyber Recovery vault is connected to the production system over this dedicated interface to perform replications. Because the management interface is always enabled, other
Cyber Recovery operations are performed while the
Cyber Recovery vault is secured.
NOTE: From the
DD command-line interface (CLI) and the
DD user interface (UI),
MTrees are displayed using the following
Cyber Recovery naming convention:
/data/col1/cr-policy-<policyID>-repo
where
<policyID> is the unique ID that is created when you create a
Cyber Recovery policy. The
Cyber Recovery software adds the
cr- prefix to the name.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\