メイン コンテンツに進む
  • すばやく簡単にご注文が可能
  • 注文内容の表示、配送状況をトラック
  • 会員限定の特典や割引のご利用
  • 製品リストの作成とアクセスが可能
  • 「Company Administration(会社情報の管理)」では、お使いのDell EMCのサイトや製品、製品レベルでのコンタクト先に関する情報を管理できます。

Dell PowerProtect Cyber Recovery 19.15 Product Guide

PDF

Cyber Recovery architecture

The Cyber Recovery solution uses DD systems to replicate data from the production system to the Cyber Recovery vault through a dedicated replication data link.

The following diagram shows the production and Cyber Recovery vault environments:

Figure 1. Cyber Recovery architecture
This figure shows a PowerProtect DD system in the production environment and a Data Domain system int the CR Vault environment that are connected by an arrow that represents the replication data link.
NOTE: Unless otherwise specified, this document uses the term Cyber Recovery vault to describe the vault environment, which includes the DD system, the management host, and backup and analytics applications.

The Cyber Recovery vault is a customer-provided secure location of the DDMTree replication destination. It requires dedicated resources including a network, and though not required but strongly recommended, a name service such as DNS and a clock source. The Cyber Recovery vault can be at another location (hosted by a service provider, for example).

Production environment

In the production environment, applications such as the Avamar, NetWorker, and PowerProtect Data Manager applications manage backup operations, which store the backup data in MTrees on DD systems. The production DD system is configured to replicate data to a corresponding DD system in the Cyber Recovery vault.

Vault environment

The Cyber Recovery vault environment includes the Cyber Recovery management host, which runs the Cyber Recovery software and a DD system. If required for application recoveries, the Cyber Recovery vault can also include NetWorker, Avamar, PowerProtect Data Manager, and other applications.

By installing and licensing the CyberSense, you can validate and analyze your data.

By enabling the Sheltered Harbor feature, you can protect financial data against catastrophic events in accordance with financial sector Sheltered Harbor initiative's standards.

The Cyber Recovery software enables and disables the replication Ethernet interface and the replication context on the DD system in the Cyber Recovery vault to control the flow of data from the production environment to the vault environment. For short periods of time, the Cyber Recovery vault is connected to the production system over this dedicated interface to perform replications. Because the management interface is always enabled, other Cyber Recovery operations are performed while the Cyber Recovery vault is secured.

NOTE: From the DD command-line interface (CLI) and the DD user interface (UI), MTrees are displayed using the following Cyber Recovery naming convention:
 /data/col1/cr-policy-<policyID>-repo

where <policyID> is the unique ID that is created when you create a Cyber Recovery policy.


このコンテンツを評価する

正確
有益
分かりやすい
この記事は役に立ちましたか?
0/3000 characters
  1~5個の星の数で評価してください。
  1~5個の星の数で評価してください。
  1~5個の星の数で評価してください。
  この記事は役に立ちましたか?
  コメントでは、以下の特殊文字は利用できません: <>()\