administrators guide

856
Unitrends Administrator’s Guide Version 7.3.05 release 1.02112014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300

Upload: e1815339

Post on 19-Oct-2015

157 views

Category:

Documents


0 download

TRANSCRIPT

  • UnitrendsAdministratorsGuideVersion7.3.05

    release1.02112014

    7 Technology Circle, Suite 100Columbia, SC 29203Phone: 803.454.0300

  • 2

  • Contents

    About this Guide ................................................................................................................................23Typographical conventions ......................................................................... 23Terminology ................................................................................................ 23Contacting Unitrends Support..................................................................... 25

    Case severity levels ............................................................................. 27Customer Portal ................................................................................... 28Unitrends website support information................................................. 31

    Chapter 1 Introducing Unitrends ................................................................................................33The Unitrends Administrator Interface ........................................................ 33

    Navigation pane options ...................................................................... 36Status icon ........................................................................................... 37Backup icon ......................................................................................... 37Restore icon......................................................................................... 37Archive icon ......................................................................................... 37Replication icon.................................................................................... 37Reports icon......................................................................................... 37Settings icon ........................................................................................ 38About icon ............................................................................................ 38Log out icon ......................................................................................... 39

    Chapter 2 Getting Started............................................................................................................41Prerequisites for physical systems.............................................................. 41

    Site preparation.................................................................................... 41Physical system preparation ................................................................ 42

    Prerequisites for virtual systems................................................................. 43Initial configuration of Unitrends systems ................................................... 43

    3

  • 4 Con

    System setup .............................................................................................. 45Setup Wizard overview ........................................................................ 45Complete the configuration .................................................................. 46

    Subsystem configuration settings ............................................................... 47About the welcome screen................................................................... 47About product registration.................................................................... 47About date and time configuration ....................................................... 48About hostname settings ..................................................................... 50About configuring notifications ............................................................. 50About root password configuration ...................................................... 53About user configuration ...................................................................... 54About the installation type.................................................................... 56About expanding storage ..................................................................... 57About adding clients............................................................................. 61About global retention and deduplication............................................. 64Setup complete .................................................................................... 66

    Chapter 3 Advanced Configuration Options .............................................................................67About licensing the system ......................................................................... 67About network configuration ....................................................................... 68

    Ethernet settings .................................................................................. 68DNS settings ........................................................................................ 70Hosts settings ...................................................................................... 71

    About configuring root passwords............................................................... 72Operating system root password configuration.................................... 73Administrator interface root password configuration............................ 73Auto-login feature................................................................................. 73

    About working with clients........................................................................... 74About renaming clients ........................................................................ 75Client trust credentials ......................................................................... 77

    About system updates ................................................................................ 79Shutting down the Unitrends system .......................................................... 80About remote system management ............................................................ 83

    Granting privilege for remote management ......................................... 84About credential management .................................................................... 85About Active Directory authentication......................................................... 87About storage configuration........................................................................ 91

    Storage types....................................................................................... 92

    tents

  • Adding storage to the system .............................................................. 93Configuring storage.............................................................................. 97Storage allocation and distribution..................................................... 104Balancing backup performance and retention ................................... 105

    About retention control.............................................................................. 106About system notifications ........................................................................ 109

    About SNMP trap notifications ........................................................... 109SNMP trap conditions ........................................................................ 110SNMP agent....................................................................................... 113

    About encryption....................................................................................... 114Archiving with encryption ................................................................... 117Encryption limitations ......................................................................... 117

    About security levels ................................................................................. 118Open ports and security levels........................................................... 119

    About device configuration........................................................................ 122About the NTFS change journal................................................................ 125

    Change journal operation for master backup..................................... 126Change journal operation for incremental backup ............................. 126Configuring the change journal .......................................................... 127Change journal configurable file types............................................... 128Change journal per volume................................................................ 129Change journals and remote mounts................................................. 129

    Chapter 4 Backups.....................................................................................................................131File-level backup types ............................................................................. 132

    Using selection lists ........................................................................... 133File-level backup strategies ...................................................................... 138About executing backups.......................................................................... 139

    Maximum file pathname lengths ........................................................ 139Working with the Computer backup subsystem........................................ 139Working with the Enterprise backup subsystem ....................................... 146

    Enterprise backup elements .............................................................. 147About calendars ................................................................................. 147About Enterprise selection lists .......................................................... 152About backup options ........................................................................ 159About Enterprise backup schedules .................................................. 166

    Protecting NAS devices ............................................................................ 172Working with client aliases........................................................................ 172

    Contents 5

  • 6 Con

    Viewing backups....................................................................................... 175Monitoring running jobs............................................................................. 182Standard restore procedures .................................................................... 184Working with the Backup Browser ............................................................ 185

    Chapter 5 Archiving ...................................................................................................................187Archiving basics ........................................................................................ 187

    How does archiving work? ................................................................. 187Types of archives............................................................................... 189Options on the main Archive screen .................................................. 189General archiving steps ..................................................................... 190

    About archive media ................................................................................. 190Archive media types........................................................................... 191

    Managing archive media........................................................................... 195Archiving backups..................................................................................... 200

    Archive considerations....................................................................... 201Archiving replicated backups ............................................................. 202Archive settings.................................................................................. 203Recommended date range strategies................................................ 207Scheduling strategies for tape archive............................................... 210On-demand archive ........................................................................... 211Archive schedules.............................................................................. 213

    Viewing and restoring archives ................................................................. 217Archive search options and results .................................................... 217Viewing archives ................................................................................ 221Archive restore................................................................................... 224Restoring from tape ........................................................................... 230

    Removing and importing archive sets....................................................... 230Stopping and starting the archive process................................................ 234Archive to tape setup ................................................................................ 234

    Tape archive terminology................................................................... 234Tape barcodes ................................................................................... 235Tape archive prerequisites................................................................. 236Connecting the device ....................................................................... 237Configuring the device in the Unitrends system................................. 240Setting up the tape archiving process................................................ 242

    tents

  • Chapter 6 Replication ................................................................................................................243About replication ....................................................................................... 243

    About secure tunnels for Unitrends systems ..................................... 244Replication Features................................................................................. 245Replication requirements .......................................................................... 246

    Supported systems ............................................................................ 246System requirements ......................................................................... 247

    Replication limitations ............................................................................... 247Replication and legacy vaulting comparison............................................. 248

    Retention............................................................................................ 248Deduplication ..................................................................................... 249Encryption handling ........................................................................... 249Restore .............................................................................................. 250

    Installation types and replication............................................................... 250Replication setup ...................................................................................... 251

    Standard replication setup ................................................................. 252Cross-replication setup ...................................................................... 260

    Configuring replication after the initial setup............................................. 268Configuring connection options and process control ......................... 269Seeding the initial data set ................................................................. 270Configuring backups for replication.................................................... 271Tuning bandwidth and throttling options ............................................ 272Setting replication report options ....................................................... 272Suspending replication....................................................................... 273Moving a source to a different replication target ................................ 273Removing replication ......................................................................... 274

    Upgrading from legacy vaulting to replication ........................................... 275Migration limitations ........................................................................... 275

    Navigating replicating systems ................................................................. 280From the source system .................................................................... 280From the target system ...................................................................... 280Viewing replicated backups ............................................................... 282

    Working with the replication dashboard.................................................... 283Completed Replication Operations pane ........................................... 283Active Replication Operations pane................................................... 287Pending Replication Operations pane ............................................... 291Dashboard controls............................................................................ 295

    Archiving replicated backups .................................................................... 295

    Contents 7

  • 8 Con

    Restoring replicated backups.................................................................... 295Bare metal restore from the replication target.................................... 296Restore a Linux or non-x86 client from the replication target............. 299

    Deleting replicated backups...................................................................... 300Replication reports .................................................................................... 301

    Chapter 7 Legacy Vaulting ........................................................................................................303Vaulting overview...................................................................................... 303Vaulting setup ........................................................................................... 306

    Vaulting continuous Exchange protection data.................................. 312Data protection vault restore..................................................................... 314Working with the vaulting dashboard ....................................................... 314

    Completed Vaulting Operations pane ................................................ 314Active Vaulting Operations pane........................................................ 315Pending Vaulting Operations pane .................................................... 316Vaulting dashboard controls .............................................................. 317

    Vaulting reports......................................................................................... 317Granular restore from vault ....................................................................... 318Export vaulted data to an archive device.................................................. 318

    Chapter 8 Restore ......................................................................................................................323Basic steps for restoring backups............................................................. 323Restoring backups from a client with aliases ............................................ 324Restore file exclusion options ................................................................... 325Full restore with exclusions....................................................................... 325Advanced execution options for restore.................................................... 325AIX restore considerations........................................................................ 326Linux restore considerations..................................................................... 327

    Chapter 9 Reports, Alerts, and Monitoring..............................................................................329Reports ..................................................................................................... 329

    Standard system reports (system generated) .................................... 329User-generated reports...................................................................... 333

    Alerts ........................................................................................................ 373Monitoring ................................................................................................. 374

    Failures and warnings........................................................................ 374

    tents

  • System load ....................................................................................... 374Support toolbox.................................................................................. 375

    Chapter 10 Disaster Recovery ....................................................................................................379Archive or replicate ................................................................................... 380Preparation ............................................................................................... 380Restoring the system ................................................................................ 382Scenario 1: Restoring a backup system .................................................. 382

    Selecting storage devices during DR................................................. 383Configuring the newly imaged system ............................................... 383System restore from the replication target ......................................... 384System restore from archive .............................................................. 386

    Scenario 2: Recovering from a corrupt backup device ............................. 388Scenario 3: Recovering from a corrupt RAID............................................ 389Scenario 4: Recovering a corrupt internal drive ....................................... 390Post-recovery considerations ................................................................... 390Restoring backup data to the clients......................................................... 391

    Bare metal basic steps....................................................................... 391File-level and application restore basic steps .................................... 391

    Chapter 11 Legacy Disaster Recovery.......................................................................................393Archive or vault ......................................................................................... 394Preparation ............................................................................................... 394Restoring the system ................................................................................ 396Scenario 1: Restoring a backup system .................................................. 396Scenario 2: Recovering from a corrupt backup device ............................. 397Scenario 3: Recovering from a corrupt RAID............................................ 398Scenario 4: Recovering a corrupt internal drive ....................................... 399Additional requirements for restoring to a virtual system.......................... 399Storage setup............................................................................................ 399Disaster recovery from vault .................................................................... 400Automatic disaster recovery from vault..................................................... 401

    Create an automatic disaster recovery profile.................................... 402View an automatic disaster recovery profile....................................... 402Remove an automatic disaster recovery profile ................................. 403Change, stop, or suspend an automatic disaster recovery profile ..... 403

    Contents 9

  • 10 Co

    Disaster recovery from archive ................................................................. 403Post-recovery considerations ................................................................... 404Restoring backup data to the clients......................................................... 405

    Bare metal basic steps....................................................................... 405File-level and application restore basic steps .................................... 405

    Chapter 12 Protecting Windows Environments ........................................................................407Windows agent versions ........................................................................... 407Windows agent requirements ................................................................... 409Push installing the Windows agents ......................................................... 410

    Agent push install requirements......................................................... 411Manually installing the Windows agents ................................................... 412

    Agent installer for Windows XP, 2003, and up................................... 413Agent installer for Windows 2000 client ............................................. 416Command-line installer for Windows clients ...................................... 417Windows agent installer command-line examples ............................. 418Windows protection software deployment using Group Policy .......... 419

    Removing or repairing Windows agents ................................................... 421Maintenance mode for Windows XP, 2003, and up........................... 421Maintenance mode for Windows 2000 client ..................................... 422

    Updating the Windows agents .................................................................. 422Push installing agent updates ............................................................ 422Manually updating Windows agents .................................................. 424

    About Windows protection ........................................................................ 425Volume Shadow Copy Service on Windows Server .......................... 425Backing up a Windows Server ........................................................... 425Backing up Windows applications...................................................... 426Protecting deduplication-enabled Windows 2012 Servers................. 426System state backup and restore on Windows Server ...................... 426Protecting Windows DFS Servers...................................................... 427Active Directory backup and restore on Windows Server .................. 427Bare metal restore of Active Directory Server on Windows Server ... 428Microsoft IIS meta-directory backup and restore ............................... 429Certificate Services database backup and restore ............................ 429Cluster database backup and restore on Windows Server ............... 430Protecting file clusters........................................................................ 430Windows bare metal .......................................................................... 431Features of the Windows agent ......................................................... 431

    Windows Instant Recovery ....................................................................... 436

    ntents

  • Overview ............................................................................................ 436Windows Instant Recovery and bare metal recovery......................... 436How Windows Instant Recovery works.............................................. 437Recommended backup strategy ....................................................... 438Supported configurations ................................................................... 439Windows Instant Recovery tips.......................................................... 442Windows Instant Recovery steps....................................................... 443Modes of operation ............................................................................ 444System resource considerations and prerequisites ........................... 445Storage allocation .............................................................................. 446Virtual network setup ......................................................................... 447Setting up a virtual client .................................................................... 449Modifying a virtual client..................................................................... 453Virtual client restore status................................................................. 454Viewing the status of virtual clients .................................................... 456Changing the mode of operation........................................................ 458Accessing the virtual client while in Audit or Live mode..................... 459When disaster strikes......................................................................... 460Reports and notifications ................................................................... 461Troubleshooting ................................................................................. 462

    Chapter 13 Microsoft SQL Server Protection ............................................................................463About SQL Server protection.................................................................... 463

    Agent prerequisites for Microsoft SQL ............................................... 464System requirements ......................................................................... 464SQL Server agent backups................................................................ 465Display of SQL Server in the backup system..................................... 465

    Executing SQL backups............................................................................ 466SQL Server backups status ...................................................................... 470Restoring SQL backups............................................................................ 471

    Restoring the master database.......................................................... 471Restoring the model and msdb databases ........................................ 472Restoring SQL Full backups .............................................................. 473Restoring SQL differential and transaction backups.......................... 474Restoring a backup when the SQL icon does not display.................. 475

    SQL restore from the replication target..................................................... 476Replicated SQL restore requirements and considerations................. 476

    Chapter 14 Microsoft Exchange Server Protection ..................................................................479About Exchange protection....................................................................... 479

    Contents 11

  • 12 Co

    Requirements for using Exchange Server protection......................... 480Installing Exchange protection ........................................................... 481Recommended configurations for Exchange ..................................... 481Data protection strategies for Exchange............................................ 482Automatic exclusion of Exchange data during file-level backups....... 483About the circular logging setting for Exchange................................. 483Snapshot and streaming backups for Exchange ............................... 483

    Executing Exchange backups................................................................... 484About Exchange 2013 and 2010 backup ........................................... 489About Exchange 2007/2003 backup .................................................. 489About protecting clustered Exchange environments.......................... 489About Exchange 2000 backup ........................................................... 492Exchange archiving............................................................................ 492Exchange replication.......................................................................... 493

    Microsoft Exchange recovery.................................................................... 493Restoring an Exchange database or storage group .......................... 493Restoring Exchange items ................................................................ 499About restoring Exchange 2013 and 2010 from a backup................. 503About restoring Exchange 2007 from a backup................................. 503About restoring Exchange 2003 from a backup................................. 504About restoring Exchange 2000 from a backup................................. 504Restoring Exchange from archives .................................................... 504Restoring Exchange from a legacy vault ........................................... 504Restoring a backup when the Exchange icon does not display......... 504

    Chapter 15 Microsoft SharePoint Protection.............................................................................507About SharePoint protection..................................................................... 507

    SharePoint agent requirements ......................................................... 508SharePoint configuration prerequisites .............................................. 510SharePoint backup considerations .................................................... 511Display of SharePoint agent in the backup system............................ 512

    Executing SharePoint backups................................................................. 512Viewing SharePoint backups .................................................................... 515Restoring SharePoint backups ................................................................. 516

    SharePoint restore considerations..................................................... 516Restoring items with Kroll .................................................................. 520Restoring a backup when the SharePoint icon does not display ....... 521

    Chapter 16 Oracle Protection......................................................................................................523About Oracle protection ............................................................................ 523

    ntents

  • Oracle agent requirements ................................................................ 524Oracle credential considerations........................................................ 524Oracle backup considerations............................................................ 527Display of Oracle agent in the backup system................................... 527

    Executing Oracle backups ........................................................................ 528Viewing Oracle backups ........................................................................... 532Oracle restore from the backup system.................................................... 532

    Oracle restore requirements and considerations ............................... 532Oracle for Windows restore from the replication target............................. 535

    Replicated Oracle restore considerations .......................................... 535

    Chapter 17 Protecting Hyper-V Environments ..........................................................................539About Hyper-V protection.......................................................................... 539

    Hyper-V HOS agent requirements ..................................................... 540Registering the Hyper-V server to the Unitrends system................... 542About Hyper-V backups ..................................................................... 543

    Executing Hyper-V backups...................................................................... 545Viewing the status of Hyper-V backups ............................................. 549

    Restoring Hyper-V virtual machines ......................................................... 549Restoring files from Hyper-V backups................................................ 553

    Protecting Hyper-V virtual machines at the Guest OS level ..................... 559Special consideration for Domain Controllers on Hyper-V........................ 560Converting from VHD to VHDX................................................................. 561

    Chapter 18 Protecting VMware Infrastructure...........................................................................563Best practices for protecting VMware virtual machines ............................ 563About the Virtualization Protector ............................................................. 566Virtualization Protector requirements........................................................ 567

    Raw device mapped disk limitations .................................................. 569Adding vCenter and ESX servers ............................................................. 570Setting VM credentials .............................................................................. 571

    Working with VM credentials.............................................................. 572Deleting vCenter and ESX servers ........................................................... 575About VMware backups............................................................................ 575

    VMware backup strategies................................................................. 577VMware SAN-direct backups ............................................................. 578VMware disk exclusions..................................................................... 581

    Contents 13

  • 14 Co

    Executing VMware backups............................................................... 582Restoring the VMware virtual infrastructure.............................................. 586

    Restoring the entire virtual machine .................................................. 586Restoring files from VMware backups................................................ 588

    Instant recovery for VMware..................................................................... 595Instant recovery in audit mode........................................................... 597Instant recovery mode ....................................................................... 599Recovering peripheral devices........................................................... 600

    Protecting VMware templates................................................................... 600Executing backups of VMware templates .......................................... 601Restoring VMware templates............................................................. 605Troubleshooting ................................................................................. 607

    Chapter 19 Protecting Cisco UCS Environments .....................................................................609Working with UCS blade and rack-mount servers .................................... 609

    Protecting UCS blade and rack-mount servers.................................. 610Restoring UCS client backups ........................................................... 612Disaster recovery of UCS clients ....................................................... 613

    Working with Cisco UCS service profiles.................................................. 616About protecting Cisco UCS service profiles ..................................... 616

    Viewing UCS service profile backups ....................................................... 623Restoring UCS service profile backups .................................................... 626

    UCS service profile restore requirements and considerations........... 626

    Chapter 20 AIX protection ...........................................................................................................633AIX agent versions.................................................................................... 633AIX agent restrictions................................................................................ 634Installing protection software for AIX ........................................................ 634AIX client backup and restore ................................................................... 635Uninstalling protection software on AIX client........................................... 635

    Chapter 21 HP-UX protection......................................................................................................637HP-UX agent versions .............................................................................. 637Installing protection software on an HP-UX client..................................... 638Installation of the HP UNIX agent ............................................................. 638Uninstalling HP UNIX client protection software ...................................... 639

    ntents

  • Chapter 22 iSeries protection ....................................................................................................641Getting started with iSeries protection ...................................................... 641

    Space requirements and maximum file size for successful backup... 642iSeries master backup and restore considerations ................................... 643iSeries backup operation .......................................................................... 644The iSeries backup menu ......................................................................... 645iSeries profile ............................................................................................ 646iSeries backup now option........................................................................ 646Schedule an iSeries backup ..................................................................... 647iSeries restore operation........................................................................... 647iSeries disaster recovery........................................................................... 648iSeries log files.......................................................................................... 648

    Chapter 23 Linux protection .......................................................................................................649Linux agent versions................................................................................. 649Installing Linux protection software .......................................................... 651Downloading the Linux agent installation file ........................................... 651File-level backup and restore.................................................................... 652

    Default exclusions.............................................................................. 652Bare metal backup and disaster recovery................................................. 653Uninstalling Linux protection software ..................................................... 653

    Chapter 24 Mac OS X protection ...............................................................................................655MAC OS X agent versions ........................................................................ 655Mac OS X 10.8 ......................................................................................... 656Installing Mac OS X protection software ................................................... 656Additional protection software notes......................................................... 657

    Chapter 25 Novell NetWare protection.......................................................................................659Novell NetWare agent versions ................................................................ 659Installing protection software on a Novell client ........................................ 660Upgrading protection software on a Novell client...................................... 662Uninstalling protection software from a Novell client ................................ 663GroupWise configuration during Novell NetWare agent install ................. 663Using TSA-based client to backup GroupWise......................................... 664

    Contents 15

  • 16 Co

    GroupWise backups without TSA on Novell client.................................... 664Using TSA-based client to restore GroupWise ......................................... 665Out-of-place GroupWise restore using NetWare agent ............................ 665In-place GroupWise restore using NetWare agent ................................... 666ConsoleOne recovery using NetWare agent ............................................ 666eDirectory backup and restore using Novell agent ................................... 667Switching between TSA and non-TSA backups ....................................... 672Novell NetWare agent restrictions and limitations .................................... 672

    Chapter 26 OES on Linux protection .........................................................................................673OES on Linux agent versions ................................................................... 673Installing OES protection software............................................................ 674Fine-tuning SMS performance.................................................................. 675Changing root password on OES agent ................................................... 676Protection software for OES with AppArmor............................................. 676Upgrading OES protection software ......................................................... 677GroupWise configuration for OES agent install ........................................ 678Using TSA-based client to restore GroupWise on OES client .................. 679Out-of-place GroupWise restore on OES agent ....................................... 679In-place GroupWise restore on OES agent .............................................. 680ConsoleOne recovery on OES agent........................................................ 681eDirectory backup and restore using OES agent...................................... 681OES agent restrictions and limitations ...................................................... 685Uninstalling protection software for OES .................................................. 685

    Chapter 27 SCO OpenServer protection ...................................................................................687SCO OpenServer agent versions ............................................................. 687Installing protection software for SCO OpenServer .................................. 688Uninstalling protection software on SCO OpenServer client .................... 689

    Chapter 28 Solaris protection .....................................................................................................691Solaris agent versions............................................................................... 691Installing Solaris protection software ....................................................... 692Uninstalling Solaris protection software ................................................... 693

    ntents

  • Chapter 29 UnixWare protection ................................................................................................695UnixWare agent versions.......................................................................... 695Installing protection software for UnixWare .............................................. 696Master backup of the UnixWare client ...................................................... 697Uninstalling protection software on UnixWare client................................. 697

    Chapter 30 Xen on OES 2 Protection .........................................................................................699Xen virtualization architecture................................................................... 699Domain Management and Control (Xen DM&C)....................................... 700Xen backup scenarios............................................................................... 701

    Scenario 1: Protecting Xen host only (recommended method).......... 702Scenario 2: Protecting Xen virtual machines only.............................. 703Scenario 3: Protecting Xen host and virtual machines together ........ 704

    Chapter 31 Bare Metal Protection Overview..............................................................................707Bare metal test restores..................................................................... 710

    Chapter 32 Windows Hot Bare Metal Protection.......................................................................711Windows bare metal overview .................................................................. 711

    Windows hot bare metal features ...................................................... 711Windows bare metal system requirements ........................................ 712

    Implementing bare metal protection.......................................................... 713Creating the Windows bare metal boot media ................................... 713Testing bare metal media .................................................................. 716

    Bare metal restore procedures ................................................................. 717Physical to Virtual (P2V) restores of Windows clients........................ 717Dissimilar bare metal restore for Windows 2003 and 2003 R2.......... 719Dissimilar bare metal restore for Vista and later environments.......... 721

    Additional considerations for Windows bare metal ................................... 723Windows bare metal Interface ........................................................... 723When a system does not boot following a bare metal restore ........... 726

    Chapter 33 Bare Metal for Linux .................................................................................................729Linux bare metal overview and requirements ........................................... 729

    Linux hot bare metal recovery requirements and limitations.............. 729Implementing Linux bare metal protection ................................................ 730

    Creating Linux hot bare metal boot media ......................................... 731Linux bare metal restore procedure .......................................................... 731

    Contents 17

  • 18 Co

    Linux bare metal menu options.......................................................... 733Initiate Linux client restore from backup system ................................ 734

    Linux cold bare metal protection............................................................... 734Creating the iso for use with cold bare metal backups....................... 735Performing cold bare metal backups and restores............................. 736

    Chapter 34 Bare Metal for x86 Platforms ...................................................................................739Intel platforms bare metal disaster recovery ............................................. 740Specifying bare metal settings for a client ................................................ 742Testing bare metal backups...................................................................... 743Recovering from a crash with the bare metal boot CD ............................. 744Using the bare metal crash recovery boot CD.......................................... 744Bare metal boot CD menu options............................................................ 745

    Bare metal boot CD tasks option ....................................................... 745Bare metal boot CD backup option .................................................... 745Bare metal boot CD restore option .................................................... 746Bare metal boot CD utilities option..................................................... 747

    Manual bare metal backup........................................................................ 748When to perform a cold bare metal backup.............................................. 749Recovering from a crash using cold bare metal........................................ 749Configuration settings for CD only version of bare metal.......................... 751Bare metal optimization ............................................................................ 751Novell agent bare metal optimizer utility .................................................. 752

    Usage................................................................................................. 753

    Chapter 35 Bare Metal for non-x86 Platforms ...........................................................................755Bare metal for AIX..................................................................................... 755

    AIX client hot bare metal restore........................................................ 755Generating bare metal media for an AIX client .................................. 756Starting the bare metal restore for an AIX client ................................ 756Bare metal for AIX menu options ....................................................... 757Initiate AIX client restore from backup system................................... 758Reasons for AIX bare metal restore................................................... 758

    Bare metal for Mac OS X.......................................................................... 759Hot bare metal disaster recovery using Mac OS X ............................ 759Creating a hot bare metal Mac OS X boot DVD ................................ 760Mac OS X hot bare metal restore ...................................................... 760

    Bare metal for UnixWare........................................................................... 761

    ntents

  • UnixWare bare metal disaster recovery ............................................ 762Bare metal rapid recovery CD for UnixWare 7.13/7.14...................... 764Bare metal for UnixWare features...................................................... 765UnixWare bare metal Jump Start booting .......................................... 765UnixWare bare metal AIR-BAG main menu system .......................... 766UnixWare bare metal diagnostic/confidence test ............................... 766UnixWare bare metal single filesystem restore ................................. 766UnixWare bare metal fully automated restore.................................... 767UnixWare bare metal restore to same hard disk................................ 767UnixWare bare metal restoring to a new partition or hard disk .......... 767UnixWare bare metal filesystem status report ................................... 767UnixWare bare metal adjusting filesystem sizes................................ 768UnixWare bare metal hard disk parameter information...................... 768UnixWare bare metal view controllers................................................ 768UnixWare bare metal load BTLD modules......................................... 769UnixWare bare metal view PCI, ISA, PCM/CIA cards........................ 769UnixWare bare metal modify resource manager database................ 769UnixWare bare metal hard disk single user mode ............................. 769UnixWare bare metal deleting filesystems from master list ............... 769UnixWare bare metal slice manager.................................................. 769UnixWare bare metal restore from the backup system...................... 772

    Bare metal for Solaris SPARC.................................................................. 774Solaris SPARC bare metal restore .................................................... 774Generate and boot from the bare metal media .................................. 775Bare metal recovery from a Jump Start boot server .......................... 778

    Bare metal for Xen virtual machines ......................................................... 780

    Chapter 36 PSA Integration with ConnectWise.........................................................................783Introduction ............................................................................................... 783Configuring the PSA tool........................................................................... 784

    Configuring settings in ConnectWise ................................................. 784Configuring the Unitrends PSA Integration feature............................ 786Modifying or deleting a PSA configuration ......................................... 788

    Viewing ticket history ................................................................................ 788Invoking the billing script........................................................................... 789

    Chapter 37 Troubleshooting .......................................................................................................791Archive troubleshooting ............................................................................ 791Troubleshooting backups and schedules.................................................. 792

    Contents 19

  • 20 Co

    Troubleshooting bare metal restore .......................................................... 793Troubleshooting encryption....................................................................... 794Troubleshooting file restore ...................................................................... 794Troubleshooting iSeries ........................................................................... 795Troubleshooting license management ...................................................... 795Troubleshooting Novell NetWare agent .................................................... 796Troubleshooting backup system messages.............................................. 797Troubleshooting tape devices................................................................... 798Troubleshooting VMware ESX ................................................................. 799Troubleshooting Windows event IDs ........................................................ 800

    Starting event ..................................................................................... 800VSS events leading up to execution of a volume snapshot ............... 801

    Troubleshooting Windows legacy Exchange agent .................................. 804Troubleshooting Windows legacy SQL Server agent ............................... 805Troubleshooting Xen bare metal backup and restore ............................... 806

    Appendix A Windows Legacy Operations ..................................................................................809Working with the Windows agent.............................................................. 809

    Launching the Windows agent ........................................................... 809Windows agent preferences .............................................................. 809Windows agent profiles...................................................................... 811Performing backups with the Windows agent .................................... 812Performing restores with the Windows agent .................................... 814Verifying or comparing a backup ...................................................... 816Options and other functions .............................................................. 817

    Legacy SQL Server agent......................................................................... 821Launching the legacy SQL Server agent ........................................... 822Log in to legacy SQL Server agent ................................................... 822Features of the SQL Server agent ..................................................... 823Creating or modifying a legacy SQL backup schedule ...................... 823Legacy SQL backup plan optimization .............................................. 824Legacy SQL backup types and schedules......................................... 824Assigning or removing a legacy SQL backup schedule..................... 825Legacy SQL on-demand backups...................................................... 826Legacy SQL restore options .............................................................. 826Legacy SQL Server point in time restore ........................................... 828Viewing legacy SQL backup and restore history ............................... 829Legacy SQL Server audit and error logs............................................ 829

    ntents

  • Testing Legacy SQL Server database restore................................... 829Legacy Exchange agent ........................................................................... 830

    Legacy Exchange information store setup ........................................ 831Legacy Exchange agent setup........................................................... 831Legacy Exchange client registration .................................................. 831Legacy Exchange and Active Directory ............................................. 832Legacy Exchange and the Samba share ........................................... 832Working with Legacy Exchange information stores ........................... 832Legacy Exchange store level log in ................................................... 833Legacy Exchange Quantum Recovery setup .................................... 833Legacy Exchange EQR system requirements ................................... 833Installing Ontrack PowerControls on legacy Exchange ..................... 835Licensing Ontrack PowerControls for legacy Exchange .................... 836About the Ontrack PowerControls license ......................................... 836Legacy Exchange store level functionality ......................................... 838Legacy Exchange information store level security ............................. 838Legacy Exchange backup and purge options .................................... 839Legacy Exchange define information store level items...................... 839Legacy Exchange launch information store level master .................. 839Legacy Exchange launch information store level differential ............ 840Legacy Exchange store level history ................................................. 840Legacy Exchange store level purge................................................... 841EIR and EQR backup schedules ....................................................... 841Legacy Exchange information store scheduling ................................ 842Legacy Exchange master or differential schedule ............................ 843Legacy Exchange recovery options ................................................... 844Legacy Exchange Quantum Recovery .............................................. 845Legacy Exchange directories for Ontrack PowerControls.................. 845Using the Ontrack PowerControls ExtractWizard .............................. 846Setting up Ontrack PowerControls for legacy Exchange ................... 848Restoring Legacy Exchange data via Ontrack PowerControls .......... 851Restoring Exchange messages via Ontrack PowerControls.......... 851Testing the legacy Exchange agent setup ......................................... 854Testing Exchange information store backups .................................... 854

    Appendix B Unitrends Open Source Compliance ......................................................................855

    Contents 21

  • 22 Co

    ntents

  • AboutthisGuide

    TheUnitrendsAdministratorsGuideprovidesdetailedinstructionsoninstallation,configuration,andadministrationoftheUnitrendsbackupsolution.ThetargetaudienceforUnitrendsproductsaresystemadministratorsforsmall,medium,andlargecompanies.

    AllproceduresarerunfromtheUnitrendsAdministratorInterface(AI),unlessotherwisespecified.Seethefollowingtopicsfordetails:

    Typographicalconventionsonpage 23 Terminologyonpage 23 ContactingUnitrendsSupportonpage 25

    TypographicalconventionsMenucommandsareinbold,andasequenceofcommandsisdesignatedusingthefollowingstyle,Settings>Notifications.

    Textyoutypeinisincourierbold,forexample,root.Linksandcrossreferencesareinblue,forexample,http://www.unitrends.com/support/customercarecenter.html

    TerminologyThefollowingtabledescribesthetermsusedinthisdocument.Lookoutfordinosaurslurking!Termshavechangedandyoumayrunintoinstanceswheredeprecatednamesarestillused.

    23

    http://www.unitrends.com/support/customer-care-center.html
  • 24

    Term Definition

    backup system Unitrends backup system, administered through the Unitrends AI. Equivalent to legacy terms DPU, appliance, Rapid Recovery Console (RRC), and BP.

    managed system A Unitrends backup system that is managed by another Unitrends backup system. You can administer multiple managed systems from the AI through a single pane of glass. Equivalent to legacy term MDPU.

    target system A Unitrends backup system located off-site to which backups are replicated from other Unitrends systems. This can be another system owned by your company, or the Unitrends Cloud service.

    vault Replication is not supported on systems running versions older than 7.0.0. Instead, legacy vaulting is used. A vault is the target system to which backup data is replicated. This can be another system owned by your company, or the Unitrends Cloud service. Equivalent to legacy term DPV.

    installation type For systems running version 7.0.0 or later, the installation type determines whether the system functions as a backup system, replication target, or both a backup system and replication target.

    For systems running older versions, legacy vaulting is used. Installation types include backup system, vault, or cross-vault if performing both roles.

    Equivalent to legacy terms system personality or system identity.

  • ContactingUnitrendsSupportYoucancontacttheUnitrendsSupportCenterbytelephone,email,orthroughtheCustomerPortal.AnyregisteredTechnicalContactfromanorganizationwithacurrentSupportAgreementmaycontacttheUnitrendsSupportCenterusinganyofthesemethods.

    YoucanalsosubmitaticketthroughtheKnowledgeBaseorinitiatealivechatwithSupport.(YoucansearchforadditionalinformationontheUnitrendswebsite.SeeUnitrendswebsitesupportinformationonpage 31formoreinformation.)

    Herearedetailsaboutthesupportoptions:

    Support Options Description

    Telephone Support Contact Unitrends Support by telephone:

    At 1.888.374.6124 for North America At 1.855.593.2861 for International UK (toll-free) 0808 101 7687 France (toll-free) 0805 080 429 Germany (toll-free) 0800 723 8445You can call at any time during the hours specified in your Unitrends support service level contract. This is the recommended method for logging high priority support issues.

    Email Support Contact Unitrends Support via email at: [email protected]

    You can email support twenty-four hours a day, seven days a week. Emails are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Emails received during non-business hours are addressed the next business day. (Your support contract determines your support contract hours.)

    You can also email a question through the Support Chat option on the Unitrends website. See AccessSupportChatonpage 27 for more information.

    About this Guide 25

    mailto:[email protected]
  • 26

    Access the Customer Portal

    Contact Unitrends Support through the Customer Portal on the Unitrends website at www.unitrends.com.

    You can access the Customer Portal 24 hours a day to view current or past cases for currently deployed or disposed assets. You can also log new cases or add notes to open cases. Cases logged through the Customer Portal fall under the same guidelines as contact via telephone. Priority issues should be logged via the telephone in order to assure prompt attention.

    See CustomerPortalonpage 28 for additional information, including access and login procedures.

    Submit a ticket through the KnowledgeBase

    You can submit a Support ticket through the KnowledgeBase on the Unitrends website. See Unitrendswebsitesupportinformationonpage 31 for more information.

    Support Options Description

    http://www.unitrends.com
  • CaseseveritylevelsAcaseisadocumentedtrackingofaspecificproblemorquestioninitiatedbyaTechnicalContact.Thereareseveralseveritylevelsassociatedwithcases.Theyare:

    Access Support Chat

    You can initiate an online, live chat with Unitrends Support through the Unitrends website. Live chat is available Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Your chat request will be answered within 60 seconds. You also have the option to email your question through the Support Chat.

    Notes: For sales questions, click the Sales Chat button. There is also a Support Chat option on the Customer Portal.

    Access the Unitrends website at www.unitrends.com. Click the Support Chat icon on the right side of the home

    page. The Live Chat window displays.Note: The Support Chat icon displays on the home page and also on all main pages (such as the Support page).

    Enter your name, email address, and your question, then click Email us or Chat with us.

    Email - You can email support twenty-four hours a day, seven days a week. Emails are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Emails received during non-business hours are addressed the next business day. (Your support contract determines your support contract hours.)

    Chat - If you select to chat, you see a chat box with your question. A Unitrends Support Engineer responds to your question, and you can chat back and forth until your question is answered. If your device supports telephone operations, you can click Call Me to initiate a phone call to Unitrends Support.

    If you are a registered user and your question cannot be answered via chat, Support opens and assigns a case for you.

    Support Options Description

    About this Guide 27

    http://www.unitrends.com
  • 28

    1Criticalissue.Forexample,yourproductionserveroranothermissioncriticalsystemisdown.

    2Seriousissue.Forexample,aproblemorissueisadverselyimpactingproductionoperationsbuttheproductionsystemisnotdown.

    3Issue.Forexample,aproblemhasoccurredwithalimitedadverseeffectonyourbusinessoperations.

    4Minorissueorquestion.Forexample,thereisaminorissuethatdoesnotaffecttheproductfunction.Theseareoftenfeatureordocumentationrequests.

    CustomerPortalYoucanaccesstheCustomerPortal24hoursadaytoviewcurrentorpastcasesforcurrentlydeployedordisposedassets.Youcanalsolognewcases,oraddnotesorattachmentstocasesthatarealreadyopen.

    Note:Youshouldlogpriorityissuesviathetelephoneinordertoassurepromptattention.

    Seethefollowingtopicsformoreinformation:

    TorequestaccesstotheCustomerPortalonpage 28 TonavigatetheCustomerPortalonpage 29 TologacaseintheCustomerPortalonpage 30 TovieworupdateacaseintheCustomerPortalonpage 30 TheSupportChatbuttonintheCustomerPortalonpage 31 AdditionalCustomerPortalinformationonpage 31

    TorequestaccesstotheCustomerPortalAccesstotheCustomerPortalrequiresregistration.Followtheseinstructions.

    1 Gotowww.unitrends.com.2 ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer

    CareCenterwindow.3 ClickRequestAccessinthebottomrightoftheCustomerCareCenterwindow.You

    seetheRequestPortalAccesswindow.4 EntertherequiredinformationandclickSave.

    Aconfirmationmessagedisplaysthankingyouforyourrequest.TheUnitrendsSupportCenterwillsendyourcredentials(usernameandtemporarypassword)viaemailwithin24hours.

    http://www.unitrends.com
  • 5 Onceyouhaveyourcredentials,gobacktowww.unitrends.comandclickCustomerinLogin:Customer.

    6 EntertheusernameandtemporarypasswordthattheUnitrendsSupportCenteremailedtoyou,thenclickLogin.

    7 Enteryournewpasswordtwice(fornewpasswordandtoverifynewpassword),thenclickChangePassword.

    8 YounowhaveaccesstotheCustomerPortal.

    TonavigatetheCustomerPortalTheCustomerPortalcontainsthreedistinctareas.

    Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTorequestaccesstotheCustomerPortalonpage 28.

    Area Description

    News A News area in the top left area provides a subject with a link to the full article and a brief description of the content. Links to the KnowledgeBase, Video Tutorials, and support levels are in the bottom of the column.

    You can select the items per page and click through the pages. This information is updated on a regular basis.

    Assets An Assets area in the top right column displays information about your registered assets, such as name, asset tag, and account. You can collapse this section to remove it from view. You can select to view the type of asset (active, expired, or suspended). You can also select the items per page and click through the pages. You see a New Case button in the right column after you select an asset.

    For VAR/partners, there is an Asset Heading that displays information such as VAR account and purchase date. There is also an Account column which displays the asset account name for assets that they support (as listed on the asset record in the VAR account field in the Asset Heading area).

    About this Guide 29

    http://www.unitrends.com
  • 30

    TologacaseintheCustomerPortalFollowtheseinstructionstologanewcase.

    1 GototheCustomerCareCentertologintotheCustomerPortal.2 ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer

    CareCenterwindow.3 Enteryourusernameandpassword,thenclickLogin.

    Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTorequestaccesstotheCustomerPortalonpage 28.

    4 SelectanassetintheAssetsareatoseethecasesforthatasset.Note:IfyoucreateacaseonanExpiredorSuspendedasset,thecaseiscreatedaspendinguntilthereisanactivecontract.(UsethedropdownboxintheAssetsareatoselectanexpiredorsuspendedasset.ThedefaultisActive.)

    5 ClickNewCaseintherightcolumn.Youseeawindowwhereyoucanenterinformationaboutthenewcase.

    6 Enterthesubject,description,andseveritylevelofthecase.

    TovieworupdateacaseintheCustomerPortalFollowtheseinstructionstovieworupdateacase.Youcanmakeacommentoruploadanattachment.

    1 Gotowww.unitrends.comtologintotheCustomerPortal.

    Cases A Cases area in the bottom right area displays information about your cases. When you select an asset in the Assets area, you see the cases for that specific asset. You see information such as case number, subject, asset, description, and opened date. You can collapse this section to remove it from view. You can also enter the asset number and click Go to see the cases associated with that asset number. When you click on a case, you see a Case Details section that provides additional details about the case.

    You can select to view the type of case (all, open, or closed) or enter search information and press Go. (Click Clear Filters to start the search from scratch.) You can also select the items per page and click through the pages.

    Area Description

    http://www.unitrends.com/support/customer-care-center.htmlhttp://www.unitrends.com
  • 2 ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomerCareCenterwindow.

    3 Enteryourusernameandpassword,thenclickLogin.Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTorequestaccesstotheCustomerPortalonpage 28.

    4 UsethedropdownboxintheAssetsareatoselectanexpiredorsuspendedasset,ifnecessary.ThedefaultisActive.

    5 SelectanassetintheAssetsareatoseethecasesforthatasset.Note:YoucanalsoentertheassetnumberintheCasesareaandclickGo.

    6 ClickontheappropriatecasetoopenaCaseDetailssection.Thisincludesinformationaboutthecase.Youmayneedtoscrolldowntoviewallofthecommentsassociatedwiththiscase.Note:ClickClearFilterstoseeallcases.

    7 Toenteracomment,clickMakeacomment,enteryourcomment,andclickCommit.

    8 Touploadanattachment,clickUploadAttachmentandbrowseforthecorrectfiletoattach.

    TheSupportChatbuttonintheCustomerPortalThereisaSupportChatbuttonontheCustomerPortal.Clickthisbuttontoinitiateanonline,livechatwithUnitrendsSupport.SeeAccessSupportChatonpage 27formoreinformation.

    AdditionalCustomerPortalinformationFormoreinformation,seethefollowingKnowledgeBasearticles:

    HowdoIrequestaccesstotheCustomerPortal?

    HowdoInavigatethroughtheCustomerPortal?

    HowdoIloganewcaseorupdateanexistingcaseintheCustomerPortal?

    UnitrendswebsitesupportinformationAccesstheUnitrendsWebsitetolocatehelpfultoolsandinformation.

    About this Guide 31

    http://support.unitrends.com/ikm/questions.php?questionid=1206http://support.unitrends.com/ikm/questions.php?questionid=1257http://support.unitrends.com/ikm/questions.php?questionid=1254
  • 32

    1 Gotowww.unitrends.com.2 HoverovertheSupportoptionorclickSupporttoseethefollowingoptions.

    Tools and Information Description

    Overview Lists Support and Sales contact information, support levels, and other helpful information.

    Coverage Plans Provides details of the hardware and software coverage plans.

    Forum Provides links to forums discussions.

    KnowledgeBase Contains helpful articles about the Unitrends system and provides a Google type search option.

    You can also submit a ticket through the KnowledgeBase home page. Tickets are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Tickets received during non-business hours are addressed the next business day. Your support contract determines your support contract hours.

    Technical Documents Lists technical documents such as data sheets, partner tools, best practices, technical resources, user guides, release notes, and support agreements.

    Video Tutorials Provides informative video tutorials listed by topic.

    Latest Agent Releases Provides the latest agent releases so you can update your Unitrends product.

    Customer Beta Program Information about the Unitrends beta program and the option to sign up.

    Customer Portal Provides the option to log in to the Customer Portal. (See CustomerPortalonpage 28 for more information.)

    http://www.unitrends.com
  • Chapter1

    IntroducingUnitrends

    Unitrendsproductscomeinawidevarietyofphysicalandvirtualconfigurations,supportingmanyhardwareandsoftwareversionsandfeatures.

    Unitrendsbackupandreplicationsystemsareintegrated,turnkey,disktodiskbackup,restore,anddisasterrecoverysolutions.

    Thesystemsupportsamultitudeofoperatingsystemplatformsandprovidesclientsideagentsforcommondatabaseapplications.Allofthedatathatisprotectedonthebackupsystemcanbesynchronizedacrosswideareanetwork(WAN)connectionstoareplicationsystemfortotalsiteprotection.

    Seethefollowingtopicsfordetails:

    TheUnitrendsAdministratorInterfaceonpage 33 Navigationpaneoptionsonpage 36

    TheUnitrendsAdministratorInterfaceAfteryoulogin,youseetheAdministratorInterface(AI).(Seethefollowingfigure.)AllproceduresareexecutedfromtheAI,unlessotherwiseindicated.

    33

  • 34 C

    CENTERSTAGENAVIGATIONPANE

    MAINMENU

    hapter 1

  • ThehighlevelstructureoftheAIconsistsofathreepanewindowwiththefollowingcomponents:

    SeethefollowingfordetailsabouttheNavigationoptionsandMainmenufunctions:

    Navigationpaneoptions Statusicon Backupicon Restoreicon Archiveicon Replicationicon Reportsicon Settingsicon Abouticon Logouticon

    AI Components Description

    Main menu A series of icons used to access the systems primary functions.

    You can select to view a drop-down list of options when you click on these icons. You can also choose to see the drop-down list in horizontal or vertical order. See Navigationpaneoptionsonpage 36 for more information.

    Note: The drop-down list does not necessarily show every option on the second level screen and may also include related options that are not on the second level screen.

    Navigation pane The left-most pane of the AI contains a tree of customers, locations, backup systems, replication systems, and clients (a client is typically a customer's server).

    Center Stage The area to the right of the Navigation pane is called the Center Stage. Information displayed here is determined by the elements you have selected from both the Main menu and Navigation pane. The Center Stage may be presented as a single area or a subdivided area based on your selections.

    Introducing Unitrends 35

  • 36 C

    NavigationpaneoptionsUsetheiconsatthebottomoftheNavigationpanetochangehowinformationdisplays.

    Clickthedoublecirculararrowicontorefresh/reloadthesystem.

    ClickthegearicontoseetheSystemPreferenceswindowandchecktheoptionsyouprefer.

    System Preference Window Options

    Description

    Show system Client Check to display the Unitrends system as a client in the navigation pane.

    Show Customer/Locations

    Check to display customers and locations in the navigation tree.

    Show Menu Items in Single Column

    Check to display items on the Center Stage pane in a single column.

    Show Virtual Machines in Navigation Tree

    Check to display virtual machines under the Hyper-V client or ESX server in the Navigation tree. You can then select a given VM to filter information shown on various pages (backup status, reports, etc.). To refresh the VM list, select the Hyper-V client or ESX server, click Backup, then click the reload arrows below the VM list on the Backup page.

    Show Drop Menu? Check to show the drop-down menu when you click the icons in the Main Menu.

    Horizontal Menu? Check to see the drop-down menu when clicking the icons in the Main Menu in a horizontal list. Uncheck to see the drop-down menu in a vertical list.

    Show Replication View

    For replicating systems, check to switch to Replication View and see replicated backups stored on the target system. See Viewingreplicatedbackupsonpage 282 for details.

    hapter 1

  • StatusiconThefrontstatuspageallowsyoutoquicklychangeviewstoseethepast,present,andfuturestatusofbackupjobs.Changethestatusviewbyclickingontheperpendicularlabels,orblinds,oneithersideofthestatuspane.JobsthatarecurrentlyrunningareviewedonthePresentscreen.ScheduledjobsaredisplayedontheFuturescreen,andtheweeklybackupstatusisdisplayedonthePastscreen.

    BackupiconUsethisfeaturetoscheduleandrunbackupsforclientsregisteredtothebackupsystem.Fordetails,seetheBackupschapter.Foradditionalinformationabouttheclientsyouwishtoprotect,seethechapterfortheapplicableOS.Forexample,ProtectingWindowsEnvironments,ProtectingVMwareInfrastructure,andLinuxprotectionchapters.

    RestoreiconUsethisfeaturetorestorebackupstoagivenclientortorecoverthebackupsystemitself.Fordetailsonrestoringclientdata,seetheRestorechapter.Fordetailsonrecoveringthebackupsystemitself,seetheDisasterRecoveryandLegacyDisasterRecoverychapters.

    ArchiveiconUsethisfeaturetoarchivebackups.Archivingtoexternalmediaenablesyoutoretainolderbackupsaswellasprovidingthesafetyofoffsitestorage.Fordetails,seetheArchivingchapter.

    ReplicationiconUsethisfeaturetoreplicatebackupdatafromoneUnitrendssystemtoanother.Storereplicateddatainanotherlocationforprotectionintheeventofatotalsitedisaster.FordetailsseetheReplicationchapter.

    ReportsiconUsethisfeaturetorunreportsonbackups,archives,failures,replicationorvaulting,storage,andmore.Fordetails,seetheReports,Alerts,andMonitoringchapter.

    Introducing Unitrends 37

  • 38 C

    SettingsiconUsethisfeaturetoviewandmodifyconfigurationofeachsubsystem,suchascustomers,clients,andstorage,aswellastomonitorthesesubsystemsusingvarioustools.Fordetails,seeSubsystemconfigurationsettingsonpage 47andtheAdvancedConfigurationOptionschapter.Foraquicklookattheitemscontainedineachsubsystem,hoveroverthesubsystemicon.

    FavoritepagesPagesintheSettingssubsystemscanbebookmarkedforquicknavigation.TheBookmarksfeatureislocatedintheupperrightcorneroftheSettingspage.

    Toviewalistbookmarkedpages,clickthedownarrow. Togotoabookmarkedpage,selectitinthelist. Toaddapagetothelist,navigatetothedesiredpage,thenclickthestaricon. Toremoveabookmark,navigatetothebookmarkedpage,thenclickthestar

    icon.

    AbouticonUsethisfeatureto:

    OpentheSystemAdministratorsGuide. Viewalistofvideotutorials. AccesstheKnowledgeBasearticles. Viewreleasenotes. Seesysteminformation(suchasthesystemversionandassetinformation). SendfeedbacktoUnitrends. CreateorcloseasupporttunnelwithaUnitrendsCustomerEngineer.(See

    Supporttunnelsformoreinformation.) Accesscontextsensitivehelp.(SeeContextsensitivehelpformore

    information.)

    SupporttunnelsSelectAbout>SupportTunneltoopenasupporttunnel.SupporttunnelsareoneofthepreferredmethodsforSupportEngineerstoassistwithtroubleshootingissuesonthesystem.Supporttunnelsprovideasecuremethodofaccessingasystemremotely.

    hapter 1

  • Inadditiontoencryptingthetransmission(whichhelpstoprotectdata),aportisassignedrandomlytodiscourageunwantedaccessattempts(knownasportknocking).Onlyonetunnelcanbeopenatatime.Ifanexistingtunnelisopen,clickSupportTunneltoforcethetunneltoclose.TheSupportTunnelconnectionautomaticallyclosesifitisinactiveforseveralminutes,orifthereisnoattachmentwithinafewminutesofbeingopened.

    Note:YoucanalsoaccessthesupporttunnelinSettings>System,Updates,andLicensing>SupportToolbox(Advanced)>SupportTunnel.

    ContextsensitivehelpToaccesshelpforanysubsystemwithintheAI,selectAbout>Help,clickthe?icon,orrightclickanareainthesubsystem.Thecontextsensitivehelpprovidesageneraldescriptionofthesystemsfunctionality.TheUnitrendsAdministratorsGuideisalsoaccessibleviathecontextsensitivehelpinterface.

    LogouticonUsethisicontologoutofthesystem.

    Note:Youmustchangetherootuserpasswordtodisabletheautologinfeature.Ifyouhavenotyetchangedthispassword,youareimmediatelyloggedbackinuponloggingout.Tochangethepassword,seeAdministratorinterfacerootpasswordconfigurationonpage 73.

    Introducing Unitrends 39

  • 40 C

    hapter 1

  • Chapter2

    GettingStarted

    ThischaptercontainsthefollowingsectionstoguideyouthroughsetupofanewUnitrendssystem:

    Important!Unitrendsshouldbeyourprimaryandonlysolutionforbackingupyourdata.Usingmultiplebackupsolutionsforthesamesetofdatacanresultinperformanceissues,VSSrelatedsystemissues,andbrokenlogchainsfordatabases.

    Prerequisitesforphysicalsystems(seebelow) Prerequisitesforvirtualsystems InitialconfigurationofUnitrendssystems Systemsetup Subsystemconfigurationsettings

    PrerequisitesforphysicalsystemsAdditionalrequirementsmustbemetwheninstallingphysicalsystems.CompletetheproceduresinthissectionbeforeproceedingtoInitialconfigurationofUnitrendssystemsonpage 43.

    Sitepreparation Physicalsystempreparation

    SitepreparationItisimportanttoensurethatthephysicalenvironmentmeetstherequirementsofthesystem.ProperpreparationofthesitehelpstoensureconsistentandstableoperationoftheUnitrendssolution.

    41

  • 42 C

    Thesitepreparationrequirementsthatmustbeconsideredpriortoinstallationare:

    Spaceandclearancerequirements Loadbearing(weight)requirements Powerrequirements Coolingandenvironmentalrequirements ConfigurationrequirementsTheUnitrendsSitePreparationGuidecontainsdetailedrequirementsforallUnitrendsphysicalsystems.Clicktodownload:SitePreparationGuide.

    PhysicalsystempreparationThefollowingitemsarerequiredtoperformtheinitialconfigurationofaUnitrendsphysicalsystem:

    UnitrendssystemsetupinaccordancewiththeSitePreparationGuide. Peripheralsthesystemmustbeconnectedtoadirectattachedmouse,

    keyboard,andmonitororhaveaccesstotheperipheraldevicesviaaKVM(Keyboard,video,mouse)switch.

    EthernetConnection1GbEEthernetcableconnectedtotheswitchingnetworkbackbone.

    Unitrendssystemsareconfiguredwiththefollowingdefaultsettings.

    Item Description

    Default operating system credentials Default user: rootDefault password: unitrends1

    Default administrator interface (AI) credentials

    Default user: rootDefault password: unitrends1

    Network configuration The first Ethernet port (eth0) is configured with an IP address of 10.10.10.1 and a subnet mask of 255.255.255.0

    hapter 2

    http://www.unitrends.com/docs/user-guides/site-preparation-guide.pdf
  • PrerequisitesforvirtualsystemsUnitrendsvirtualappliances,knownasUnitrendsEnterpriseBackup(