administrators guide
TRANSCRIPT
-
UnitrendsAdministratorsGuideVersion7.3.05
release1.02112014
7 Technology Circle, Suite 100Columbia, SC 29203Phone: 803.454.0300
-
2
-
Contents
About this Guide ................................................................................................................................23Typographical conventions ......................................................................... 23Terminology ................................................................................................ 23Contacting Unitrends Support..................................................................... 25
Case severity levels ............................................................................. 27Customer Portal ................................................................................... 28Unitrends website support information................................................. 31
Chapter 1 Introducing Unitrends ................................................................................................33The Unitrends Administrator Interface ........................................................ 33
Navigation pane options ...................................................................... 36Status icon ........................................................................................... 37Backup icon ......................................................................................... 37Restore icon......................................................................................... 37Archive icon ......................................................................................... 37Replication icon.................................................................................... 37Reports icon......................................................................................... 37Settings icon ........................................................................................ 38About icon ............................................................................................ 38Log out icon ......................................................................................... 39
Chapter 2 Getting Started............................................................................................................41Prerequisites for physical systems.............................................................. 41
Site preparation.................................................................................... 41Physical system preparation ................................................................ 42
Prerequisites for virtual systems................................................................. 43Initial configuration of Unitrends systems ................................................... 43
3
-
4 Con
System setup .............................................................................................. 45Setup Wizard overview ........................................................................ 45Complete the configuration .................................................................. 46
Subsystem configuration settings ............................................................... 47About the welcome screen................................................................... 47About product registration.................................................................... 47About date and time configuration ....................................................... 48About hostname settings ..................................................................... 50About configuring notifications ............................................................. 50About root password configuration ...................................................... 53About user configuration ...................................................................... 54About the installation type.................................................................... 56About expanding storage ..................................................................... 57About adding clients............................................................................. 61About global retention and deduplication............................................. 64Setup complete .................................................................................... 66
Chapter 3 Advanced Configuration Options .............................................................................67About licensing the system ......................................................................... 67About network configuration ....................................................................... 68
Ethernet settings .................................................................................. 68DNS settings ........................................................................................ 70Hosts settings ...................................................................................... 71
About configuring root passwords............................................................... 72Operating system root password configuration.................................... 73Administrator interface root password configuration............................ 73Auto-login feature................................................................................. 73
About working with clients........................................................................... 74About renaming clients ........................................................................ 75Client trust credentials ......................................................................... 77
About system updates ................................................................................ 79Shutting down the Unitrends system .......................................................... 80About remote system management ............................................................ 83
Granting privilege for remote management ......................................... 84About credential management .................................................................... 85About Active Directory authentication......................................................... 87About storage configuration........................................................................ 91
Storage types....................................................................................... 92
tents
-
Adding storage to the system .............................................................. 93Configuring storage.............................................................................. 97Storage allocation and distribution..................................................... 104Balancing backup performance and retention ................................... 105
About retention control.............................................................................. 106About system notifications ........................................................................ 109
About SNMP trap notifications ........................................................... 109SNMP trap conditions ........................................................................ 110SNMP agent....................................................................................... 113
About encryption....................................................................................... 114Archiving with encryption ................................................................... 117Encryption limitations ......................................................................... 117
About security levels ................................................................................. 118Open ports and security levels........................................................... 119
About device configuration........................................................................ 122About the NTFS change journal................................................................ 125
Change journal operation for master backup..................................... 126Change journal operation for incremental backup ............................. 126Configuring the change journal .......................................................... 127Change journal configurable file types............................................... 128Change journal per volume................................................................ 129Change journals and remote mounts................................................. 129
Chapter 4 Backups.....................................................................................................................131File-level backup types ............................................................................. 132
Using selection lists ........................................................................... 133File-level backup strategies ...................................................................... 138About executing backups.......................................................................... 139
Maximum file pathname lengths ........................................................ 139Working with the Computer backup subsystem........................................ 139Working with the Enterprise backup subsystem ....................................... 146
Enterprise backup elements .............................................................. 147About calendars ................................................................................. 147About Enterprise selection lists .......................................................... 152About backup options ........................................................................ 159About Enterprise backup schedules .................................................. 166
Protecting NAS devices ............................................................................ 172Working with client aliases........................................................................ 172
Contents 5
-
6 Con
Viewing backups....................................................................................... 175Monitoring running jobs............................................................................. 182Standard restore procedures .................................................................... 184Working with the Backup Browser ............................................................ 185
Chapter 5 Archiving ...................................................................................................................187Archiving basics ........................................................................................ 187
How does archiving work? ................................................................. 187Types of archives............................................................................... 189Options on the main Archive screen .................................................. 189General archiving steps ..................................................................... 190
About archive media ................................................................................. 190Archive media types........................................................................... 191
Managing archive media........................................................................... 195Archiving backups..................................................................................... 200
Archive considerations....................................................................... 201Archiving replicated backups ............................................................. 202Archive settings.................................................................................. 203Recommended date range strategies................................................ 207Scheduling strategies for tape archive............................................... 210On-demand archive ........................................................................... 211Archive schedules.............................................................................. 213
Viewing and restoring archives ................................................................. 217Archive search options and results .................................................... 217Viewing archives ................................................................................ 221Archive restore................................................................................... 224Restoring from tape ........................................................................... 230
Removing and importing archive sets....................................................... 230Stopping and starting the archive process................................................ 234Archive to tape setup ................................................................................ 234
Tape archive terminology................................................................... 234Tape barcodes ................................................................................... 235Tape archive prerequisites................................................................. 236Connecting the device ....................................................................... 237Configuring the device in the Unitrends system................................. 240Setting up the tape archiving process................................................ 242
tents
-
Chapter 6 Replication ................................................................................................................243About replication ....................................................................................... 243
About secure tunnels for Unitrends systems ..................................... 244Replication Features................................................................................. 245Replication requirements .......................................................................... 246
Supported systems ............................................................................ 246System requirements ......................................................................... 247
Replication limitations ............................................................................... 247Replication and legacy vaulting comparison............................................. 248
Retention............................................................................................ 248Deduplication ..................................................................................... 249Encryption handling ........................................................................... 249Restore .............................................................................................. 250
Installation types and replication............................................................... 250Replication setup ...................................................................................... 251
Standard replication setup ................................................................. 252Cross-replication setup ...................................................................... 260
Configuring replication after the initial setup............................................. 268Configuring connection options and process control ......................... 269Seeding the initial data set ................................................................. 270Configuring backups for replication.................................................... 271Tuning bandwidth and throttling options ............................................ 272Setting replication report options ....................................................... 272Suspending replication....................................................................... 273Moving a source to a different replication target ................................ 273Removing replication ......................................................................... 274
Upgrading from legacy vaulting to replication ........................................... 275Migration limitations ........................................................................... 275
Navigating replicating systems ................................................................. 280From the source system .................................................................... 280From the target system ...................................................................... 280Viewing replicated backups ............................................................... 282
Working with the replication dashboard.................................................... 283Completed Replication Operations pane ........................................... 283Active Replication Operations pane................................................... 287Pending Replication Operations pane ............................................... 291Dashboard controls............................................................................ 295
Archiving replicated backups .................................................................... 295
Contents 7
-
8 Con
Restoring replicated backups.................................................................... 295Bare metal restore from the replication target.................................... 296Restore a Linux or non-x86 client from the replication target............. 299
Deleting replicated backups...................................................................... 300Replication reports .................................................................................... 301
Chapter 7 Legacy Vaulting ........................................................................................................303Vaulting overview...................................................................................... 303Vaulting setup ........................................................................................... 306
Vaulting continuous Exchange protection data.................................. 312Data protection vault restore..................................................................... 314Working with the vaulting dashboard ....................................................... 314
Completed Vaulting Operations pane ................................................ 314Active Vaulting Operations pane........................................................ 315Pending Vaulting Operations pane .................................................... 316Vaulting dashboard controls .............................................................. 317
Vaulting reports......................................................................................... 317Granular restore from vault ....................................................................... 318Export vaulted data to an archive device.................................................. 318
Chapter 8 Restore ......................................................................................................................323Basic steps for restoring backups............................................................. 323Restoring backups from a client with aliases ............................................ 324Restore file exclusion options ................................................................... 325Full restore with exclusions....................................................................... 325Advanced execution options for restore.................................................... 325AIX restore considerations........................................................................ 326Linux restore considerations..................................................................... 327
Chapter 9 Reports, Alerts, and Monitoring..............................................................................329Reports ..................................................................................................... 329
Standard system reports (system generated) .................................... 329User-generated reports...................................................................... 333
Alerts ........................................................................................................ 373Monitoring ................................................................................................. 374
Failures and warnings........................................................................ 374
tents
-
System load ....................................................................................... 374Support toolbox.................................................................................. 375
Chapter 10 Disaster Recovery ....................................................................................................379Archive or replicate ................................................................................... 380Preparation ............................................................................................... 380Restoring the system ................................................................................ 382Scenario 1: Restoring a backup system .................................................. 382
Selecting storage devices during DR................................................. 383Configuring the newly imaged system ............................................... 383System restore from the replication target ......................................... 384System restore from archive .............................................................. 386
Scenario 2: Recovering from a corrupt backup device ............................. 388Scenario 3: Recovering from a corrupt RAID............................................ 389Scenario 4: Recovering a corrupt internal drive ....................................... 390Post-recovery considerations ................................................................... 390Restoring backup data to the clients......................................................... 391
Bare metal basic steps....................................................................... 391File-level and application restore basic steps .................................... 391
Chapter 11 Legacy Disaster Recovery.......................................................................................393Archive or vault ......................................................................................... 394Preparation ............................................................................................... 394Restoring the system ................................................................................ 396Scenario 1: Restoring a backup system .................................................. 396Scenario 2: Recovering from a corrupt backup device ............................. 397Scenario 3: Recovering from a corrupt RAID............................................ 398Scenario 4: Recovering a corrupt internal drive ....................................... 399Additional requirements for restoring to a virtual system.......................... 399Storage setup............................................................................................ 399Disaster recovery from vault .................................................................... 400Automatic disaster recovery from vault..................................................... 401
Create an automatic disaster recovery profile.................................... 402View an automatic disaster recovery profile....................................... 402Remove an automatic disaster recovery profile ................................. 403Change, stop, or suspend an automatic disaster recovery profile ..... 403
Contents 9
-
10 Co
Disaster recovery from archive ................................................................. 403Post-recovery considerations ................................................................... 404Restoring backup data to the clients......................................................... 405
Bare metal basic steps....................................................................... 405File-level and application restore basic steps .................................... 405
Chapter 12 Protecting Windows Environments ........................................................................407Windows agent versions ........................................................................... 407Windows agent requirements ................................................................... 409Push installing the Windows agents ......................................................... 410
Agent push install requirements......................................................... 411Manually installing the Windows agents ................................................... 412
Agent installer for Windows XP, 2003, and up................................... 413Agent installer for Windows 2000 client ............................................. 416Command-line installer for Windows clients ...................................... 417Windows agent installer command-line examples ............................. 418Windows protection software deployment using Group Policy .......... 419
Removing or repairing Windows agents ................................................... 421Maintenance mode for Windows XP, 2003, and up........................... 421Maintenance mode for Windows 2000 client ..................................... 422
Updating the Windows agents .................................................................. 422Push installing agent updates ............................................................ 422Manually updating Windows agents .................................................. 424
About Windows protection ........................................................................ 425Volume Shadow Copy Service on Windows Server .......................... 425Backing up a Windows Server ........................................................... 425Backing up Windows applications...................................................... 426Protecting deduplication-enabled Windows 2012 Servers................. 426System state backup and restore on Windows Server ...................... 426Protecting Windows DFS Servers...................................................... 427Active Directory backup and restore on Windows Server .................. 427Bare metal restore of Active Directory Server on Windows Server ... 428Microsoft IIS meta-directory backup and restore ............................... 429Certificate Services database backup and restore ............................ 429Cluster database backup and restore on Windows Server ............... 430Protecting file clusters........................................................................ 430Windows bare metal .......................................................................... 431Features of the Windows agent ......................................................... 431
Windows Instant Recovery ....................................................................... 436
ntents
-
Overview ............................................................................................ 436Windows Instant Recovery and bare metal recovery......................... 436How Windows Instant Recovery works.............................................. 437Recommended backup strategy ....................................................... 438Supported configurations ................................................................... 439Windows Instant Recovery tips.......................................................... 442Windows Instant Recovery steps....................................................... 443Modes of operation ............................................................................ 444System resource considerations and prerequisites ........................... 445Storage allocation .............................................................................. 446Virtual network setup ......................................................................... 447Setting up a virtual client .................................................................... 449Modifying a virtual client..................................................................... 453Virtual client restore status................................................................. 454Viewing the status of virtual clients .................................................... 456Changing the mode of operation........................................................ 458Accessing the virtual client while in Audit or Live mode..................... 459When disaster strikes......................................................................... 460Reports and notifications ................................................................... 461Troubleshooting ................................................................................. 462
Chapter 13 Microsoft SQL Server Protection ............................................................................463About SQL Server protection.................................................................... 463
Agent prerequisites for Microsoft SQL ............................................... 464System requirements ......................................................................... 464SQL Server agent backups................................................................ 465Display of SQL Server in the backup system..................................... 465
Executing SQL backups............................................................................ 466SQL Server backups status ...................................................................... 470Restoring SQL backups............................................................................ 471
Restoring the master database.......................................................... 471Restoring the model and msdb databases ........................................ 472Restoring SQL Full backups .............................................................. 473Restoring SQL differential and transaction backups.......................... 474Restoring a backup when the SQL icon does not display.................. 475
SQL restore from the replication target..................................................... 476Replicated SQL restore requirements and considerations................. 476
Chapter 14 Microsoft Exchange Server Protection ..................................................................479About Exchange protection....................................................................... 479
Contents 11
-
12 Co
Requirements for using Exchange Server protection......................... 480Installing Exchange protection ........................................................... 481Recommended configurations for Exchange ..................................... 481Data protection strategies for Exchange............................................ 482Automatic exclusion of Exchange data during file-level backups....... 483About the circular logging setting for Exchange................................. 483Snapshot and streaming backups for Exchange ............................... 483
Executing Exchange backups................................................................... 484About Exchange 2013 and 2010 backup ........................................... 489About Exchange 2007/2003 backup .................................................. 489About protecting clustered Exchange environments.......................... 489About Exchange 2000 backup ........................................................... 492Exchange archiving............................................................................ 492Exchange replication.......................................................................... 493
Microsoft Exchange recovery.................................................................... 493Restoring an Exchange database or storage group .......................... 493Restoring Exchange items ................................................................ 499About restoring Exchange 2013 and 2010 from a backup................. 503About restoring Exchange 2007 from a backup................................. 503About restoring Exchange 2003 from a backup................................. 504About restoring Exchange 2000 from a backup................................. 504Restoring Exchange from archives .................................................... 504Restoring Exchange from a legacy vault ........................................... 504Restoring a backup when the Exchange icon does not display......... 504
Chapter 15 Microsoft SharePoint Protection.............................................................................507About SharePoint protection..................................................................... 507
SharePoint agent requirements ......................................................... 508SharePoint configuration prerequisites .............................................. 510SharePoint backup considerations .................................................... 511Display of SharePoint agent in the backup system............................ 512
Executing SharePoint backups................................................................. 512Viewing SharePoint backups .................................................................... 515Restoring SharePoint backups ................................................................. 516
SharePoint restore considerations..................................................... 516Restoring items with Kroll .................................................................. 520Restoring a backup when the SharePoint icon does not display ....... 521
Chapter 16 Oracle Protection......................................................................................................523About Oracle protection ............................................................................ 523
ntents
-
Oracle agent requirements ................................................................ 524Oracle credential considerations........................................................ 524Oracle backup considerations............................................................ 527Display of Oracle agent in the backup system................................... 527
Executing Oracle backups ........................................................................ 528Viewing Oracle backups ........................................................................... 532Oracle restore from the backup system.................................................... 532
Oracle restore requirements and considerations ............................... 532Oracle for Windows restore from the replication target............................. 535
Replicated Oracle restore considerations .......................................... 535
Chapter 17 Protecting Hyper-V Environments ..........................................................................539About Hyper-V protection.......................................................................... 539
Hyper-V HOS agent requirements ..................................................... 540Registering the Hyper-V server to the Unitrends system................... 542About Hyper-V backups ..................................................................... 543
Executing Hyper-V backups...................................................................... 545Viewing the status of Hyper-V backups ............................................. 549
Restoring Hyper-V virtual machines ......................................................... 549Restoring files from Hyper-V backups................................................ 553
Protecting Hyper-V virtual machines at the Guest OS level ..................... 559Special consideration for Domain Controllers on Hyper-V........................ 560Converting from VHD to VHDX................................................................. 561
Chapter 18 Protecting VMware Infrastructure...........................................................................563Best practices for protecting VMware virtual machines ............................ 563About the Virtualization Protector ............................................................. 566Virtualization Protector requirements........................................................ 567
Raw device mapped disk limitations .................................................. 569Adding vCenter and ESX servers ............................................................. 570Setting VM credentials .............................................................................. 571
Working with VM credentials.............................................................. 572Deleting vCenter and ESX servers ........................................................... 575About VMware backups............................................................................ 575
VMware backup strategies................................................................. 577VMware SAN-direct backups ............................................................. 578VMware disk exclusions..................................................................... 581
Contents 13
-
14 Co
Executing VMware backups............................................................... 582Restoring the VMware virtual infrastructure.............................................. 586
Restoring the entire virtual machine .................................................. 586Restoring files from VMware backups................................................ 588
Instant recovery for VMware..................................................................... 595Instant recovery in audit mode........................................................... 597Instant recovery mode ....................................................................... 599Recovering peripheral devices........................................................... 600
Protecting VMware templates................................................................... 600Executing backups of VMware templates .......................................... 601Restoring VMware templates............................................................. 605Troubleshooting ................................................................................. 607
Chapter 19 Protecting Cisco UCS Environments .....................................................................609Working with UCS blade and rack-mount servers .................................... 609
Protecting UCS blade and rack-mount servers.................................. 610Restoring UCS client backups ........................................................... 612Disaster recovery of UCS clients ....................................................... 613
Working with Cisco UCS service profiles.................................................. 616About protecting Cisco UCS service profiles ..................................... 616
Viewing UCS service profile backups ....................................................... 623Restoring UCS service profile backups .................................................... 626
UCS service profile restore requirements and considerations........... 626
Chapter 20 AIX protection ...........................................................................................................633AIX agent versions.................................................................................... 633AIX agent restrictions................................................................................ 634Installing protection software for AIX ........................................................ 634AIX client backup and restore ................................................................... 635Uninstalling protection software on AIX client........................................... 635
Chapter 21 HP-UX protection......................................................................................................637HP-UX agent versions .............................................................................. 637Installing protection software on an HP-UX client..................................... 638Installation of the HP UNIX agent ............................................................. 638Uninstalling HP UNIX client protection software ...................................... 639
ntents
-
Chapter 22 iSeries protection ....................................................................................................641Getting started with iSeries protection ...................................................... 641
Space requirements and maximum file size for successful backup... 642iSeries master backup and restore considerations ................................... 643iSeries backup operation .......................................................................... 644The iSeries backup menu ......................................................................... 645iSeries profile ............................................................................................ 646iSeries backup now option........................................................................ 646Schedule an iSeries backup ..................................................................... 647iSeries restore operation........................................................................... 647iSeries disaster recovery........................................................................... 648iSeries log files.......................................................................................... 648
Chapter 23 Linux protection .......................................................................................................649Linux agent versions................................................................................. 649Installing Linux protection software .......................................................... 651Downloading the Linux agent installation file ........................................... 651File-level backup and restore.................................................................... 652
Default exclusions.............................................................................. 652Bare metal backup and disaster recovery................................................. 653Uninstalling Linux protection software ..................................................... 653
Chapter 24 Mac OS X protection ...............................................................................................655MAC OS X agent versions ........................................................................ 655Mac OS X 10.8 ......................................................................................... 656Installing Mac OS X protection software ................................................... 656Additional protection software notes......................................................... 657
Chapter 25 Novell NetWare protection.......................................................................................659Novell NetWare agent versions ................................................................ 659Installing protection software on a Novell client ........................................ 660Upgrading protection software on a Novell client...................................... 662Uninstalling protection software from a Novell client ................................ 663GroupWise configuration during Novell NetWare agent install ................. 663Using TSA-based client to backup GroupWise......................................... 664
Contents 15
-
16 Co
GroupWise backups without TSA on Novell client.................................... 664Using TSA-based client to restore GroupWise ......................................... 665Out-of-place GroupWise restore using NetWare agent ............................ 665In-place GroupWise restore using NetWare agent ................................... 666ConsoleOne recovery using NetWare agent ............................................ 666eDirectory backup and restore using Novell agent ................................... 667Switching between TSA and non-TSA backups ....................................... 672Novell NetWare agent restrictions and limitations .................................... 672
Chapter 26 OES on Linux protection .........................................................................................673OES on Linux agent versions ................................................................... 673Installing OES protection software............................................................ 674Fine-tuning SMS performance.................................................................. 675Changing root password on OES agent ................................................... 676Protection software for OES with AppArmor............................................. 676Upgrading OES protection software ......................................................... 677GroupWise configuration for OES agent install ........................................ 678Using TSA-based client to restore GroupWise on OES client .................. 679Out-of-place GroupWise restore on OES agent ....................................... 679In-place GroupWise restore on OES agent .............................................. 680ConsoleOne recovery on OES agent........................................................ 681eDirectory backup and restore using OES agent...................................... 681OES agent restrictions and limitations ...................................................... 685Uninstalling protection software for OES .................................................. 685
Chapter 27 SCO OpenServer protection ...................................................................................687SCO OpenServer agent versions ............................................................. 687Installing protection software for SCO OpenServer .................................. 688Uninstalling protection software on SCO OpenServer client .................... 689
Chapter 28 Solaris protection .....................................................................................................691Solaris agent versions............................................................................... 691Installing Solaris protection software ....................................................... 692Uninstalling Solaris protection software ................................................... 693
ntents
-
Chapter 29 UnixWare protection ................................................................................................695UnixWare agent versions.......................................................................... 695Installing protection software for UnixWare .............................................. 696Master backup of the UnixWare client ...................................................... 697Uninstalling protection software on UnixWare client................................. 697
Chapter 30 Xen on OES 2 Protection .........................................................................................699Xen virtualization architecture................................................................... 699Domain Management and Control (Xen DM&C)....................................... 700Xen backup scenarios............................................................................... 701
Scenario 1: Protecting Xen host only (recommended method).......... 702Scenario 2: Protecting Xen virtual machines only.............................. 703Scenario 3: Protecting Xen host and virtual machines together ........ 704
Chapter 31 Bare Metal Protection Overview..............................................................................707Bare metal test restores..................................................................... 710
Chapter 32 Windows Hot Bare Metal Protection.......................................................................711Windows bare metal overview .................................................................. 711
Windows hot bare metal features ...................................................... 711Windows bare metal system requirements ........................................ 712
Implementing bare metal protection.......................................................... 713Creating the Windows bare metal boot media ................................... 713Testing bare metal media .................................................................. 716
Bare metal restore procedures ................................................................. 717Physical to Virtual (P2V) restores of Windows clients........................ 717Dissimilar bare metal restore for Windows 2003 and 2003 R2.......... 719Dissimilar bare metal restore for Vista and later environments.......... 721
Additional considerations for Windows bare metal ................................... 723Windows bare metal Interface ........................................................... 723When a system does not boot following a bare metal restore ........... 726
Chapter 33 Bare Metal for Linux .................................................................................................729Linux bare metal overview and requirements ........................................... 729
Linux hot bare metal recovery requirements and limitations.............. 729Implementing Linux bare metal protection ................................................ 730
Creating Linux hot bare metal boot media ......................................... 731Linux bare metal restore procedure .......................................................... 731
Contents 17
-
18 Co
Linux bare metal menu options.......................................................... 733Initiate Linux client restore from backup system ................................ 734
Linux cold bare metal protection............................................................... 734Creating the iso for use with cold bare metal backups....................... 735Performing cold bare metal backups and restores............................. 736
Chapter 34 Bare Metal for x86 Platforms ...................................................................................739Intel platforms bare metal disaster recovery ............................................. 740Specifying bare metal settings for a client ................................................ 742Testing bare metal backups...................................................................... 743Recovering from a crash with the bare metal boot CD ............................. 744Using the bare metal crash recovery boot CD.......................................... 744Bare metal boot CD menu options............................................................ 745
Bare metal boot CD tasks option ....................................................... 745Bare metal boot CD backup option .................................................... 745Bare metal boot CD restore option .................................................... 746Bare metal boot CD utilities option..................................................... 747
Manual bare metal backup........................................................................ 748When to perform a cold bare metal backup.............................................. 749Recovering from a crash using cold bare metal........................................ 749Configuration settings for CD only version of bare metal.......................... 751Bare metal optimization ............................................................................ 751Novell agent bare metal optimizer utility .................................................. 752
Usage................................................................................................. 753
Chapter 35 Bare Metal for non-x86 Platforms ...........................................................................755Bare metal for AIX..................................................................................... 755
AIX client hot bare metal restore........................................................ 755Generating bare metal media for an AIX client .................................. 756Starting the bare metal restore for an AIX client ................................ 756Bare metal for AIX menu options ....................................................... 757Initiate AIX client restore from backup system................................... 758Reasons for AIX bare metal restore................................................... 758
Bare metal for Mac OS X.......................................................................... 759Hot bare metal disaster recovery using Mac OS X ............................ 759Creating a hot bare metal Mac OS X boot DVD ................................ 760Mac OS X hot bare metal restore ...................................................... 760
Bare metal for UnixWare........................................................................... 761
ntents
-
UnixWare bare metal disaster recovery ............................................ 762Bare metal rapid recovery CD for UnixWare 7.13/7.14...................... 764Bare metal for UnixWare features...................................................... 765UnixWare bare metal Jump Start booting .......................................... 765UnixWare bare metal AIR-BAG main menu system .......................... 766UnixWare bare metal diagnostic/confidence test ............................... 766UnixWare bare metal single filesystem restore ................................. 766UnixWare bare metal fully automated restore.................................... 767UnixWare bare metal restore to same hard disk................................ 767UnixWare bare metal restoring to a new partition or hard disk .......... 767UnixWare bare metal filesystem status report ................................... 767UnixWare bare metal adjusting filesystem sizes................................ 768UnixWare bare metal hard disk parameter information...................... 768UnixWare bare metal view controllers................................................ 768UnixWare bare metal load BTLD modules......................................... 769UnixWare bare metal view PCI, ISA, PCM/CIA cards........................ 769UnixWare bare metal modify resource manager database................ 769UnixWare bare metal hard disk single user mode ............................. 769UnixWare bare metal deleting filesystems from master list ............... 769UnixWare bare metal slice manager.................................................. 769UnixWare bare metal restore from the backup system...................... 772
Bare metal for Solaris SPARC.................................................................. 774Solaris SPARC bare metal restore .................................................... 774Generate and boot from the bare metal media .................................. 775Bare metal recovery from a Jump Start boot server .......................... 778
Bare metal for Xen virtual machines ......................................................... 780
Chapter 36 PSA Integration with ConnectWise.........................................................................783Introduction ............................................................................................... 783Configuring the PSA tool........................................................................... 784
Configuring settings in ConnectWise ................................................. 784Configuring the Unitrends PSA Integration feature............................ 786Modifying or deleting a PSA configuration ......................................... 788
Viewing ticket history ................................................................................ 788Invoking the billing script........................................................................... 789
Chapter 37 Troubleshooting .......................................................................................................791Archive troubleshooting ............................................................................ 791Troubleshooting backups and schedules.................................................. 792
Contents 19
-
20 Co
Troubleshooting bare metal restore .......................................................... 793Troubleshooting encryption....................................................................... 794Troubleshooting file restore ...................................................................... 794Troubleshooting iSeries ........................................................................... 795Troubleshooting license management ...................................................... 795Troubleshooting Novell NetWare agent .................................................... 796Troubleshooting backup system messages.............................................. 797Troubleshooting tape devices................................................................... 798Troubleshooting VMware ESX ................................................................. 799Troubleshooting Windows event IDs ........................................................ 800
Starting event ..................................................................................... 800VSS events leading up to execution of a volume snapshot ............... 801
Troubleshooting Windows legacy Exchange agent .................................. 804Troubleshooting Windows legacy SQL Server agent ............................... 805Troubleshooting Xen bare metal backup and restore ............................... 806
Appendix A Windows Legacy Operations ..................................................................................809Working with the Windows agent.............................................................. 809
Launching the Windows agent ........................................................... 809Windows agent preferences .............................................................. 809Windows agent profiles...................................................................... 811Performing backups with the Windows agent .................................... 812Performing restores with the Windows agent .................................... 814Verifying or comparing a backup ...................................................... 816Options and other functions .............................................................. 817
Legacy SQL Server agent......................................................................... 821Launching the legacy SQL Server agent ........................................... 822Log in to legacy SQL Server agent ................................................... 822Features of the SQL Server agent ..................................................... 823Creating or modifying a legacy SQL backup schedule ...................... 823Legacy SQL backup plan optimization .............................................. 824Legacy SQL backup types and schedules......................................... 824Assigning or removing a legacy SQL backup schedule..................... 825Legacy SQL on-demand backups...................................................... 826Legacy SQL restore options .............................................................. 826Legacy SQL Server point in time restore ........................................... 828Viewing legacy SQL backup and restore history ............................... 829Legacy SQL Server audit and error logs............................................ 829
ntents
-
Testing Legacy SQL Server database restore................................... 829Legacy Exchange agent ........................................................................... 830
Legacy Exchange information store setup ........................................ 831Legacy Exchange agent setup........................................................... 831Legacy Exchange client registration .................................................. 831Legacy Exchange and Active Directory ............................................. 832Legacy Exchange and the Samba share ........................................... 832Working with Legacy Exchange information stores ........................... 832Legacy Exchange store level log in ................................................... 833Legacy Exchange Quantum Recovery setup .................................... 833Legacy Exchange EQR system requirements ................................... 833Installing Ontrack PowerControls on legacy Exchange ..................... 835Licensing Ontrack PowerControls for legacy Exchange .................... 836About the Ontrack PowerControls license ......................................... 836Legacy Exchange store level functionality ......................................... 838Legacy Exchange information store level security ............................. 838Legacy Exchange backup and purge options .................................... 839Legacy Exchange define information store level items...................... 839Legacy Exchange launch information store level master .................. 839Legacy Exchange launch information store level differential ............ 840Legacy Exchange store level history ................................................. 840Legacy Exchange store level purge................................................... 841EIR and EQR backup schedules ....................................................... 841Legacy Exchange information store scheduling ................................ 842Legacy Exchange master or differential schedule ............................ 843Legacy Exchange recovery options ................................................... 844Legacy Exchange Quantum Recovery .............................................. 845Legacy Exchange directories for Ontrack PowerControls.................. 845Using the Ontrack PowerControls ExtractWizard .............................. 846Setting up Ontrack PowerControls for legacy Exchange ................... 848Restoring Legacy Exchange data via Ontrack PowerControls .......... 851Restoring Exchange messages via Ontrack PowerControls.......... 851Testing the legacy Exchange agent setup ......................................... 854Testing Exchange information store backups .................................... 854
Appendix B Unitrends Open Source Compliance ......................................................................855
Contents 21
-
22 Co
ntents
-
AboutthisGuide
TheUnitrendsAdministratorsGuideprovidesdetailedinstructionsoninstallation,configuration,andadministrationoftheUnitrendsbackupsolution.ThetargetaudienceforUnitrendsproductsaresystemadministratorsforsmall,medium,andlargecompanies.
AllproceduresarerunfromtheUnitrendsAdministratorInterface(AI),unlessotherwisespecified.Seethefollowingtopicsfordetails:
Typographicalconventionsonpage 23 Terminologyonpage 23 ContactingUnitrendsSupportonpage 25
TypographicalconventionsMenucommandsareinbold,andasequenceofcommandsisdesignatedusingthefollowingstyle,Settings>Notifications.
Textyoutypeinisincourierbold,forexample,root.Linksandcrossreferencesareinblue,forexample,http://www.unitrends.com/support/customercarecenter.html
TerminologyThefollowingtabledescribesthetermsusedinthisdocument.Lookoutfordinosaurslurking!Termshavechangedandyoumayrunintoinstanceswheredeprecatednamesarestillused.
23
http://www.unitrends.com/support/customer-care-center.html -
24
Term Definition
backup system Unitrends backup system, administered through the Unitrends AI. Equivalent to legacy terms DPU, appliance, Rapid Recovery Console (RRC), and BP.
managed system A Unitrends backup system that is managed by another Unitrends backup system. You can administer multiple managed systems from the AI through a single pane of glass. Equivalent to legacy term MDPU.
target system A Unitrends backup system located off-site to which backups are replicated from other Unitrends systems. This can be another system owned by your company, or the Unitrends Cloud service.
vault Replication is not supported on systems running versions older than 7.0.0. Instead, legacy vaulting is used. A vault is the target system to which backup data is replicated. This can be another system owned by your company, or the Unitrends Cloud service. Equivalent to legacy term DPV.
installation type For systems running version 7.0.0 or later, the installation type determines whether the system functions as a backup system, replication target, or both a backup system and replication target.
For systems running older versions, legacy vaulting is used. Installation types include backup system, vault, or cross-vault if performing both roles.
Equivalent to legacy terms system personality or system identity.
-
ContactingUnitrendsSupportYoucancontacttheUnitrendsSupportCenterbytelephone,email,orthroughtheCustomerPortal.AnyregisteredTechnicalContactfromanorganizationwithacurrentSupportAgreementmaycontacttheUnitrendsSupportCenterusinganyofthesemethods.
YoucanalsosubmitaticketthroughtheKnowledgeBaseorinitiatealivechatwithSupport.(YoucansearchforadditionalinformationontheUnitrendswebsite.SeeUnitrendswebsitesupportinformationonpage 31formoreinformation.)
Herearedetailsaboutthesupportoptions:
Support Options Description
Telephone Support Contact Unitrends Support by telephone:
At 1.888.374.6124 for North America At 1.855.593.2861 for International UK (toll-free) 0808 101 7687 France (toll-free) 0805 080 429 Germany (toll-free) 0800 723 8445You can call at any time during the hours specified in your Unitrends support service level contract. This is the recommended method for logging high priority support issues.
Email Support Contact Unitrends Support via email at: [email protected]
You can email support twenty-four hours a day, seven days a week. Emails are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Emails received during non-business hours are addressed the next business day. (Your support contract determines your support contract hours.)
You can also email a question through the Support Chat option on the Unitrends website. See AccessSupportChatonpage 27 for more information.
About this Guide 25
mailto:[email protected] -
26
Access the Customer Portal
Contact Unitrends Support through the Customer Portal on the Unitrends website at www.unitrends.com.
You can access the Customer Portal 24 hours a day to view current or past cases for currently deployed or disposed assets. You can also log new cases or add notes to open cases. Cases logged through the Customer Portal fall under the same guidelines as contact via telephone. Priority issues should be logged via the telephone in order to assure prompt attention.
See CustomerPortalonpage 28 for additional information, including access and login procedures.
Submit a ticket through the KnowledgeBase
You can submit a Support ticket through the KnowledgeBase on the Unitrends website. See Unitrendswebsitesupportinformationonpage 31 for more information.
Support Options Description
http://www.unitrends.com -
CaseseveritylevelsAcaseisadocumentedtrackingofaspecificproblemorquestioninitiatedbyaTechnicalContact.Thereareseveralseveritylevelsassociatedwithcases.Theyare:
Access Support Chat
You can initiate an online, live chat with Unitrends Support through the Unitrends website. Live chat is available Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Your chat request will be answered within 60 seconds. You also have the option to email your question through the Support Chat.
Notes: For sales questions, click the Sales Chat button. There is also a Support Chat option on the Customer Portal.
Access the Unitrends website at www.unitrends.com. Click the Support Chat icon on the right side of the home
page. The Live Chat window displays.Note: The Support Chat icon displays on the home page and also on all main pages (such as the Support page).
Enter your name, email address, and your question, then click Email us or Chat with us.
Email - You can email support twenty-four hours a day, seven days a week. Emails are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Emails received during non-business hours are addressed the next business day. (Your support contract determines your support contract hours.)
Chat - If you select to chat, you see a chat box with your question. A Unitrends Support Engineer responds to your question, and you can chat back and forth until your question is answered. If your device supports telephone operations, you can click Call Me to initiate a phone call to Unitrends Support.
If you are a registered user and your question cannot be answered via chat, Support opens and assigns a case for you.
Support Options Description
About this Guide 27
http://www.unitrends.com -
28
1Criticalissue.Forexample,yourproductionserveroranothermissioncriticalsystemisdown.
2Seriousissue.Forexample,aproblemorissueisadverselyimpactingproductionoperationsbuttheproductionsystemisnotdown.
3Issue.Forexample,aproblemhasoccurredwithalimitedadverseeffectonyourbusinessoperations.
4Minorissueorquestion.Forexample,thereisaminorissuethatdoesnotaffecttheproductfunction.Theseareoftenfeatureordocumentationrequests.
CustomerPortalYoucanaccesstheCustomerPortal24hoursadaytoviewcurrentorpastcasesforcurrentlydeployedordisposedassets.Youcanalsolognewcases,oraddnotesorattachmentstocasesthatarealreadyopen.
Note:Youshouldlogpriorityissuesviathetelephoneinordertoassurepromptattention.
Seethefollowingtopicsformoreinformation:
TorequestaccesstotheCustomerPortalonpage 28 TonavigatetheCustomerPortalonpage 29 TologacaseintheCustomerPortalonpage 30 TovieworupdateacaseintheCustomerPortalonpage 30 TheSupportChatbuttonintheCustomerPortalonpage 31 AdditionalCustomerPortalinformationonpage 31
TorequestaccesstotheCustomerPortalAccesstotheCustomerPortalrequiresregistration.Followtheseinstructions.
1 Gotowww.unitrends.com.2 ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer
CareCenterwindow.3 ClickRequestAccessinthebottomrightoftheCustomerCareCenterwindow.You
seetheRequestPortalAccesswindow.4 EntertherequiredinformationandclickSave.
Aconfirmationmessagedisplaysthankingyouforyourrequest.TheUnitrendsSupportCenterwillsendyourcredentials(usernameandtemporarypassword)viaemailwithin24hours.
http://www.unitrends.com -
5 Onceyouhaveyourcredentials,gobacktowww.unitrends.comandclickCustomerinLogin:Customer.
6 EntertheusernameandtemporarypasswordthattheUnitrendsSupportCenteremailedtoyou,thenclickLogin.
7 Enteryournewpasswordtwice(fornewpasswordandtoverifynewpassword),thenclickChangePassword.
8 YounowhaveaccesstotheCustomerPortal.
TonavigatetheCustomerPortalTheCustomerPortalcontainsthreedistinctareas.
Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTorequestaccesstotheCustomerPortalonpage 28.
Area Description
News A News area in the top left area provides a subject with a link to the full article and a brief description of the content. Links to the KnowledgeBase, Video Tutorials, and support levels are in the bottom of the column.
You can select the items per page and click through the pages. This information is updated on a regular basis.
Assets An Assets area in the top right column displays information about your registered assets, such as name, asset tag, and account. You can collapse this section to remove it from view. You can select to view the type of asset (active, expired, or suspended). You can also select the items per page and click through the pages. You see a New Case button in the right column after you select an asset.
For VAR/partners, there is an Asset Heading that displays information such as VAR account and purchase date. There is also an Account column which displays the asset account name for assets that they support (as listed on the asset record in the VAR account field in the Asset Heading area).
About this Guide 29
http://www.unitrends.com -
30
TologacaseintheCustomerPortalFollowtheseinstructionstologanewcase.
1 GototheCustomerCareCentertologintotheCustomerPortal.2 ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer
CareCenterwindow.3 Enteryourusernameandpassword,thenclickLogin.
Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTorequestaccesstotheCustomerPortalonpage 28.
4 SelectanassetintheAssetsareatoseethecasesforthatasset.Note:IfyoucreateacaseonanExpiredorSuspendedasset,thecaseiscreatedaspendinguntilthereisanactivecontract.(UsethedropdownboxintheAssetsareatoselectanexpiredorsuspendedasset.ThedefaultisActive.)
5 ClickNewCaseintherightcolumn.Youseeawindowwhereyoucanenterinformationaboutthenewcase.
6 Enterthesubject,description,andseveritylevelofthecase.
TovieworupdateacaseintheCustomerPortalFollowtheseinstructionstovieworupdateacase.Youcanmakeacommentoruploadanattachment.
1 Gotowww.unitrends.comtologintotheCustomerPortal.
Cases A Cases area in the bottom right area displays information about your cases. When you select an asset in the Assets area, you see the cases for that specific asset. You see information such as case number, subject, asset, description, and opened date. You can collapse this section to remove it from view. You can also enter the asset number and click Go to see the cases associated with that asset number. When you click on a case, you see a Case Details section that provides additional details about the case.
You can select to view the type of case (all, open, or closed) or enter search information and press Go. (Click Clear Filters to start the search from scratch.) You can also select the items per page and click through the pages.
Area Description
http://www.unitrends.com/support/customer-care-center.htmlhttp://www.unitrends.com -
2 ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomerCareCenterwindow.
3 Enteryourusernameandpassword,thenclickLogin.Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTorequestaccesstotheCustomerPortalonpage 28.
4 UsethedropdownboxintheAssetsareatoselectanexpiredorsuspendedasset,ifnecessary.ThedefaultisActive.
5 SelectanassetintheAssetsareatoseethecasesforthatasset.Note:YoucanalsoentertheassetnumberintheCasesareaandclickGo.
6 ClickontheappropriatecasetoopenaCaseDetailssection.Thisincludesinformationaboutthecase.Youmayneedtoscrolldowntoviewallofthecommentsassociatedwiththiscase.Note:ClickClearFilterstoseeallcases.
7 Toenteracomment,clickMakeacomment,enteryourcomment,andclickCommit.
8 Touploadanattachment,clickUploadAttachmentandbrowseforthecorrectfiletoattach.
TheSupportChatbuttonintheCustomerPortalThereisaSupportChatbuttonontheCustomerPortal.Clickthisbuttontoinitiateanonline,livechatwithUnitrendsSupport.SeeAccessSupportChatonpage 27formoreinformation.
AdditionalCustomerPortalinformationFormoreinformation,seethefollowingKnowledgeBasearticles:
HowdoIrequestaccesstotheCustomerPortal?
HowdoInavigatethroughtheCustomerPortal?
HowdoIloganewcaseorupdateanexistingcaseintheCustomerPortal?
UnitrendswebsitesupportinformationAccesstheUnitrendsWebsitetolocatehelpfultoolsandinformation.
About this Guide 31
http://support.unitrends.com/ikm/questions.php?questionid=1206http://support.unitrends.com/ikm/questions.php?questionid=1257http://support.unitrends.com/ikm/questions.php?questionid=1254 -
32
1 Gotowww.unitrends.com.2 HoverovertheSupportoptionorclickSupporttoseethefollowingoptions.
Tools and Information Description
Overview Lists Support and Sales contact information, support levels, and other helpful information.
Coverage Plans Provides details of the hardware and software coverage plans.
Forum Provides links to forums discussions.
KnowledgeBase Contains helpful articles about the Unitrends system and provides a Google type search option.
You can also submit a ticket through the KnowledgeBase home page. Tickets are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Tickets received during non-business hours are addressed the next business day. Your support contract determines your support contract hours.
Technical Documents Lists technical documents such as data sheets, partner tools, best practices, technical resources, user guides, release notes, and support agreements.
Video Tutorials Provides informative video tutorials listed by topic.
Latest Agent Releases Provides the latest agent releases so you can update your Unitrends product.
Customer Beta Program Information about the Unitrends beta program and the option to sign up.
Customer Portal Provides the option to log in to the Customer Portal. (See CustomerPortalonpage 28 for more information.)
http://www.unitrends.com -
Chapter1
IntroducingUnitrends
Unitrendsproductscomeinawidevarietyofphysicalandvirtualconfigurations,supportingmanyhardwareandsoftwareversionsandfeatures.
Unitrendsbackupandreplicationsystemsareintegrated,turnkey,disktodiskbackup,restore,anddisasterrecoverysolutions.
Thesystemsupportsamultitudeofoperatingsystemplatformsandprovidesclientsideagentsforcommondatabaseapplications.Allofthedatathatisprotectedonthebackupsystemcanbesynchronizedacrosswideareanetwork(WAN)connectionstoareplicationsystemfortotalsiteprotection.
Seethefollowingtopicsfordetails:
TheUnitrendsAdministratorInterfaceonpage 33 Navigationpaneoptionsonpage 36
TheUnitrendsAdministratorInterfaceAfteryoulogin,youseetheAdministratorInterface(AI).(Seethefollowingfigure.)AllproceduresareexecutedfromtheAI,unlessotherwiseindicated.
33
-
34 C
CENTERSTAGENAVIGATIONPANE
MAINMENU
hapter 1
-
ThehighlevelstructureoftheAIconsistsofathreepanewindowwiththefollowingcomponents:
SeethefollowingfordetailsabouttheNavigationoptionsandMainmenufunctions:
Navigationpaneoptions Statusicon Backupicon Restoreicon Archiveicon Replicationicon Reportsicon Settingsicon Abouticon Logouticon
AI Components Description
Main menu A series of icons used to access the systems primary functions.
You can select to view a drop-down list of options when you click on these icons. You can also choose to see the drop-down list in horizontal or vertical order. See Navigationpaneoptionsonpage 36 for more information.
Note: The drop-down list does not necessarily show every option on the second level screen and may also include related options that are not on the second level screen.
Navigation pane The left-most pane of the AI contains a tree of customers, locations, backup systems, replication systems, and clients (a client is typically a customer's server).
Center Stage The area to the right of the Navigation pane is called the Center Stage. Information displayed here is determined by the elements you have selected from both the Main menu and Navigation pane. The Center Stage may be presented as a single area or a subdivided area based on your selections.
Introducing Unitrends 35
-
36 C
NavigationpaneoptionsUsetheiconsatthebottomoftheNavigationpanetochangehowinformationdisplays.
Clickthedoublecirculararrowicontorefresh/reloadthesystem.
ClickthegearicontoseetheSystemPreferenceswindowandchecktheoptionsyouprefer.
System Preference Window Options
Description
Show system Client Check to display the Unitrends system as a client in the navigation pane.
Show Customer/Locations
Check to display customers and locations in the navigation tree.
Show Menu Items in Single Column
Check to display items on the Center Stage pane in a single column.
Show Virtual Machines in Navigation Tree
Check to display virtual machines under the Hyper-V client or ESX server in the Navigation tree. You can then select a given VM to filter information shown on various pages (backup status, reports, etc.). To refresh the VM list, select the Hyper-V client or ESX server, click Backup, then click the reload arrows below the VM list on the Backup page.
Show Drop Menu? Check to show the drop-down menu when you click the icons in the Main Menu.
Horizontal Menu? Check to see the drop-down menu when clicking the icons in the Main Menu in a horizontal list. Uncheck to see the drop-down menu in a vertical list.
Show Replication View
For replicating systems, check to switch to Replication View and see replicated backups stored on the target system. See Viewingreplicatedbackupsonpage 282 for details.
hapter 1
-
StatusiconThefrontstatuspageallowsyoutoquicklychangeviewstoseethepast,present,andfuturestatusofbackupjobs.Changethestatusviewbyclickingontheperpendicularlabels,orblinds,oneithersideofthestatuspane.JobsthatarecurrentlyrunningareviewedonthePresentscreen.ScheduledjobsaredisplayedontheFuturescreen,andtheweeklybackupstatusisdisplayedonthePastscreen.
BackupiconUsethisfeaturetoscheduleandrunbackupsforclientsregisteredtothebackupsystem.Fordetails,seetheBackupschapter.Foradditionalinformationabouttheclientsyouwishtoprotect,seethechapterfortheapplicableOS.Forexample,ProtectingWindowsEnvironments,ProtectingVMwareInfrastructure,andLinuxprotectionchapters.
RestoreiconUsethisfeaturetorestorebackupstoagivenclientortorecoverthebackupsystemitself.Fordetailsonrestoringclientdata,seetheRestorechapter.Fordetailsonrecoveringthebackupsystemitself,seetheDisasterRecoveryandLegacyDisasterRecoverychapters.
ArchiveiconUsethisfeaturetoarchivebackups.Archivingtoexternalmediaenablesyoutoretainolderbackupsaswellasprovidingthesafetyofoffsitestorage.Fordetails,seetheArchivingchapter.
ReplicationiconUsethisfeaturetoreplicatebackupdatafromoneUnitrendssystemtoanother.Storereplicateddatainanotherlocationforprotectionintheeventofatotalsitedisaster.FordetailsseetheReplicationchapter.
ReportsiconUsethisfeaturetorunreportsonbackups,archives,failures,replicationorvaulting,storage,andmore.Fordetails,seetheReports,Alerts,andMonitoringchapter.
Introducing Unitrends 37
-
38 C
SettingsiconUsethisfeaturetoviewandmodifyconfigurationofeachsubsystem,suchascustomers,clients,andstorage,aswellastomonitorthesesubsystemsusingvarioustools.Fordetails,seeSubsystemconfigurationsettingsonpage 47andtheAdvancedConfigurationOptionschapter.Foraquicklookattheitemscontainedineachsubsystem,hoveroverthesubsystemicon.
FavoritepagesPagesintheSettingssubsystemscanbebookmarkedforquicknavigation.TheBookmarksfeatureislocatedintheupperrightcorneroftheSettingspage.
Toviewalistbookmarkedpages,clickthedownarrow. Togotoabookmarkedpage,selectitinthelist. Toaddapagetothelist,navigatetothedesiredpage,thenclickthestaricon. Toremoveabookmark,navigatetothebookmarkedpage,thenclickthestar
icon.
AbouticonUsethisfeatureto:
OpentheSystemAdministratorsGuide. Viewalistofvideotutorials. AccesstheKnowledgeBasearticles. Viewreleasenotes. Seesysteminformation(suchasthesystemversionandassetinformation). SendfeedbacktoUnitrends. CreateorcloseasupporttunnelwithaUnitrendsCustomerEngineer.(See
Supporttunnelsformoreinformation.) Accesscontextsensitivehelp.(SeeContextsensitivehelpformore
information.)
SupporttunnelsSelectAbout>SupportTunneltoopenasupporttunnel.SupporttunnelsareoneofthepreferredmethodsforSupportEngineerstoassistwithtroubleshootingissuesonthesystem.Supporttunnelsprovideasecuremethodofaccessingasystemremotely.
hapter 1
-
Inadditiontoencryptingthetransmission(whichhelpstoprotectdata),aportisassignedrandomlytodiscourageunwantedaccessattempts(knownasportknocking).Onlyonetunnelcanbeopenatatime.Ifanexistingtunnelisopen,clickSupportTunneltoforcethetunneltoclose.TheSupportTunnelconnectionautomaticallyclosesifitisinactiveforseveralminutes,orifthereisnoattachmentwithinafewminutesofbeingopened.
Note:YoucanalsoaccessthesupporttunnelinSettings>System,Updates,andLicensing>SupportToolbox(Advanced)>SupportTunnel.
ContextsensitivehelpToaccesshelpforanysubsystemwithintheAI,selectAbout>Help,clickthe?icon,orrightclickanareainthesubsystem.Thecontextsensitivehelpprovidesageneraldescriptionofthesystemsfunctionality.TheUnitrendsAdministratorsGuideisalsoaccessibleviathecontextsensitivehelpinterface.
LogouticonUsethisicontologoutofthesystem.
Note:Youmustchangetherootuserpasswordtodisabletheautologinfeature.Ifyouhavenotyetchangedthispassword,youareimmediatelyloggedbackinuponloggingout.Tochangethepassword,seeAdministratorinterfacerootpasswordconfigurationonpage 73.
Introducing Unitrends 39
-
40 C
hapter 1
-
Chapter2
GettingStarted
ThischaptercontainsthefollowingsectionstoguideyouthroughsetupofanewUnitrendssystem:
Important!Unitrendsshouldbeyourprimaryandonlysolutionforbackingupyourdata.Usingmultiplebackupsolutionsforthesamesetofdatacanresultinperformanceissues,VSSrelatedsystemissues,andbrokenlogchainsfordatabases.
Prerequisitesforphysicalsystems(seebelow) Prerequisitesforvirtualsystems InitialconfigurationofUnitrendssystems Systemsetup Subsystemconfigurationsettings
PrerequisitesforphysicalsystemsAdditionalrequirementsmustbemetwheninstallingphysicalsystems.CompletetheproceduresinthissectionbeforeproceedingtoInitialconfigurationofUnitrendssystemsonpage 43.
Sitepreparation Physicalsystempreparation
SitepreparationItisimportanttoensurethatthephysicalenvironmentmeetstherequirementsofthesystem.ProperpreparationofthesitehelpstoensureconsistentandstableoperationoftheUnitrendssolution.
41
-
42 C
Thesitepreparationrequirementsthatmustbeconsideredpriortoinstallationare:
Spaceandclearancerequirements Loadbearing(weight)requirements Powerrequirements Coolingandenvironmentalrequirements ConfigurationrequirementsTheUnitrendsSitePreparationGuidecontainsdetailedrequirementsforallUnitrendsphysicalsystems.Clicktodownload:SitePreparationGuide.
PhysicalsystempreparationThefollowingitemsarerequiredtoperformtheinitialconfigurationofaUnitrendsphysicalsystem:
UnitrendssystemsetupinaccordancewiththeSitePreparationGuide. Peripheralsthesystemmustbeconnectedtoadirectattachedmouse,
keyboard,andmonitororhaveaccesstotheperipheraldevicesviaaKVM(Keyboard,video,mouse)switch.
EthernetConnection1GbEEthernetcableconnectedtotheswitchingnetworkbackbone.
Unitrendssystemsareconfiguredwiththefollowingdefaultsettings.
Item Description
Default operating system credentials Default user: rootDefault password: unitrends1
Default administrator interface (AI) credentials
Default user: rootDefault password: unitrends1
Network configuration The first Ethernet port (eth0) is configured with an IP address of 10.10.10.1 and a subnet mask of 255.255.255.0
hapter 2
http://www.unitrends.com/docs/user-guides/site-preparation-guide.pdf -
PrerequisitesforvirtualsystemsUnitrendsvirtualappliances,knownasUnitrendsEnterpriseBackup(