Acronis vmProtect 6 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 95 Seiten
- N/A
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Backup Software
Acronis True Image Home 2011
217 Seiten -
Backup Software
Acronis Backup & Recovery 11 Server
240 Seiten -
Backup Software
Acronis True Image Home 2011 Netbook Edition
166 Seiten -
Backup Software
Acronis Backup & Recovery 10 Advanced Server Virtual Edition
17 Seiten -
Backup Software
Acronis True Image 2013
241 Seiten -
Backup Software
Acronis True Image 2016
161 Seiten -
Backup Software
Acronis True Image 2015
19 Seiten -
Backup Software
Acronis True Image 2016 Cloud
161 Seiten
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Acronis vmProtect 6 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Acronis vmProtect 6, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Acronis vmProtect 6 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Acronis vmProtect 6. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Acronis vmProtect 6 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Acronis vmProtect 6
- Den Namen des Produzenten und das Produktionsjahr des Geräts Acronis vmProtect 6
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Acronis vmProtect 6
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Acronis vmProtect 6 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Acronis vmProtect 6 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Acronis finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Acronis vmProtect 6 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Acronis vmProtect 6, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Acronis vmProtect 6 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
User Guide[...]
-
Seite 2
2 Copyr ight © Acr onis, In c ., 200 0-2011 Table o f con ten ts 1 Introducing Acro nis vmProtec t 6.0 ............................................................................................. 5 2 Acronis vmProtec t 6.0 Overvi ew ................................................................................................ 6 2.1 Acronis vmPr[...]
-
Seite 3
3 Copyr ight © Acronis, In c., 200 0-2011 6.6 Managing created backup task ............................................................................................ 34 7 Restoring a Backup o f Vir tu al Machines ................................................................................... 35 7.1 What t o restore ..........................[...]
-
Seite 4
4 Copyr ight © Acronis, In c., 200 0-2011 12 Other Operati ons ..................................................................................................................... 64 12.1 Validating backups (Actions -> Validate) .............................................................................. 64 1 2 .1. 1 W ha t t o va li d a te [...]
-
Seite 5
5 Copyr ight © Acronis, In c., 200 0-2011 1 In tro duc ing Ac ron is v mP rotec t 6 .0 Acronis believes t hat virtualization and transition t o the cloud are not only a better way of doing comput ing, but also allow for achievi ng less downtime s and faster rec overies while reducing cost s. Unfortunat ely, most o f backup and re covery solutions [...]
-
Seite 6
6 Copyr ight © Acronis, In c., 200 0-2011 2 Ac ron is vmP ro tec t 6 .0 Ov erv ie w Acronis vmProtec t 6.0 i s a c omprehensive backup and recovery solut ion designed for VMware [...]
-
Seite 7
7 Copyr ight © Acronis, In c., 200 0-2011 3 Ho w Ac ron is vmP ro tec t 6 .0 W ork s 3. 1 V i rt ua l ma chi nes ba ck up a nd res to re As with a p hysical machine, your virtual mac hine (or several VMs as a whole vir tual infrastruct ure) should also b e prot ected. Once you have installed Acr onis vmProtect 6.0 agent, you can: Back up a vir[...]
-
Seite 8
8 Copyr ight © Acronis, In c., 200 0-2011 3 . 2. 2 S i n g l e f i l e b a c k u p sc h e m e (A l w a y s I n c r e m e n t a l m o d e ) Usually, bac kups are kept o nly for a cert ain time period (ret ention t ime) or th ere is a policy to keep only the last X bac kups in the b ackup chain. Backup a rchives are managed on a daily, week l y, et [...]
-
Seite 9
9 Copyr ight © Acronis, In c., 200 0-2011 4 In st alla tion of Acro nis vm Prot ec t 6 .0 4. 1 R e q ui re men ts 4 . 1. 1 S u p p o r t e d o p e r a t i n g s y s t e m s Acronis vmProtec t supp orts the fo llowing operat i ng sy stems: Windows XP Profess i onal SP3 (x86, x64). Windows Server 20 03/20 03 R2 - the Standard, E nterpr ise, [...]
-
Seite 10
10 Copyr ight © Acronis, In c., 200 0-2011 For t he smoot h operation of the Acronis vmProtec t Web Console, yo u should have one o f the following versions of y our web browser: Mozilla Firefox 3.6 o r higher . Internet E xpl orer 7.0 or higher. Opera 1 0. 0 o r hig her. Safari 5.0 o r higher. Google Chrome 10.0 or higher. 4 .[...]
-
Seite 11
11 Copyr ight © Acronis, In c., 200 0-2011 4 . 2. 1 I n s t a l l i n g A c r o n i s v m P r o t e c t 6. 0 a s V i r t u a l A p p l i a n c e o n a n E S X ( i ) h o s t Acronis vmProtec t soft ware could be installed direct l y on an ESX(i) host . The proc ess of remote installation of Ac ronis vmProtect Virtual Appli ance t o a n ESX(i) ho st[...]
-
Seite 12
12 Copyr ight © Acronis, In c., 200 0-2011 cannot change th e login for your Web Console. To change the Web Console password, go t o Configure -> Agent Pas sword page (for m ore informati on refer to Managing Agent Password sec tion (p. 81 ) ). If there is an y problem, t he Virtual Appliance (parts of it which have already been deployed d urin[...]
-
Seite 13
13 Copyr ight © Acronis, In c., 200 0-2011 The diagram below i l lustrates a LAN -based and a LAN-free backup. L AN-free access t o virtual machines is availabl e if you have a fibre c hannel (FC) or iSCSI Storage Area Network . To co mpletely eliminate tran sferring the bac ke d up data via LAN, st ore the backup s on a loc al disk of the agent&a[...]
-
Seite 14
14 Copyr ight © Acronis, In c., 200 0-2011 3. Select t he way you want your c omponen ts t o be installed, i.e. specify the location where to install the soft ware. The default dest ination for i nstalling Acro nis vmProtect i s the C: Program FilesAcronis folder. Yo u can chan ge the d es tination by typing in a new folder n ame or select ing i[...]
-
Seite 15
15 Copyr ight © Acronis, In c., 200 0-2011 Specify th e location y ou want t o extract your fi les to, a nd then click Extract . The Di sk usage butto n shows t he available space for the different volumes on your PC and hel ps you t o choo se the destination disk for t he files extract ion. Close the dialog when t he extraction process is complet[...]
-
Seite 16
16 Copyr ight © Acronis, In c., 200 0-2011[...]
-
Seite 17
17 Copyr ight © Acronis, In c., 200 0-2011 5 G ett in g star ted Onc e you installed t he Acron is vmProtect or deployed your Acro nis vmProtect Virtual Appliance, y ou can run the Acron is vmProtect Web Console. The Web Console will be opened i n the defaul t Int ernet browser. Note t hat the Acro nis vmProtect web server (inst alled on the A gen[...]
-
Seite 18
18 Copyr ight © Acronis, In c., 200 0-2011 Login pa ge After logging in t he Acron is vmProtect you will see a w el come sc reen with t he Dashb ord's Quic k Start. The three but tons of this sect i on will give you a hint of what to start with: First of all, to be able to p erform the first bac k up task of a Vi rtual Mac hi nes, you hav[...]
-
Seite 19
19 Copyr ight © Acronis, In c., 200 0-2011 status of your backup, restore and other tasks. It do es so by using co lor -coding fo r successful a nd failed tasks. As the dashboard outlines all act ions you can perform with Ac ronis vmProtect , it presents a v ery useful to ol for a quick operational d ecision making. You can switch to the dashboard[...]
-
Seite 20
20 Copyr ight © Acronis, In c., 200 0-2011 There are 3 main t abs in the Acro nis vmProtect ri bbon menu: Actions tab, V iew tab an d Conf igure tab. T he fourth add itional Acronis t ab appears dynamically depending on the c urrent user-selected View or Configure operation. Dashboard view The Home button which always appears on the ribbon bar lea[...]
-
Seite 21
21 Copyr ight © Acronis, In c., 200 0-2011 c. Mounted VMs view This is th e link to Mounted VMs view. The Moun ted virtual mac hines management is described in the " Managi ng mounted VMs" section (p. 66 ). d. Show logs view This is th e link to t he Sh ow logs view. The L og s management is desc ri bed in t he "Managing logs" [...]
-
Seite 22
22 Copyr ight © Acronis, In c., 200 0-2011 c. View - > Mou nted VMs When th e Mounted VMs view is se l ected, the Mounted VMs tab appears in the ribbo n menu. The Mounted VM s page is desc ribed in the " Managi ng mount ed VMs" sec tion (p. 66 ). d. View - > Sh ow Logs When th e Show Logs view is selec ted, the Logs tab appears in [...]
-
Seite 23
23 Copyr ight © Acronis, In c., 200 0-2011 6 Cr eat in g a Bac ku p o f Vir tu al M ach ine s Click Cre ate Backup Task Q uick s ta rt or Backup in the Actions t ab of th e main menu to creat e a new backup task. The New Backup Task wizard opens in the main wor kspace area and asks you to[...]
-
Seite 24
24 Copyr ight © Acronis, In c., 200 0-2011 Create Backu p wiza r d, Step The Arc hive name field shows t he name of the arch ive selected in th e Browse pop- up. The left side of t he Browse pop-up shows the list o f: Online backup sto rages. Local folders. Network folders. [...]
-
Seite 25
25 Copyr ight © Acronis, In c., 200 0-2011 Enter y our archive name value in t he co rresponding Archive name field below . Note that i t is not recommended t o have more than one backup task writing data t o the same archive. The ret ention rules applied to the arc hi ve by different backup tasks may cause an unpredic table outcome. ?[...]
-
Seite 26
26 Copyr ight © Acronis, In c., 200 0-2011 example, with t he Every 2 week(s) on Mon sett i ng, t he task will be performed on Monday of every other week. In the Duri ng the day execute the task... area, sel ect o ne of t he following: Once at: <... > or E very: <...> From: <...> Until: <...>. For t he Once at: <. ..>[...]
-
Seite 27
27 Copyr ight © Acronis, In c., 200 0-2011 In case o f editing your existing backup task or sel ecting an existing archive for t he backup location, this sett ing is not shown. 6 . 4. 2 R e t e n t i o n r u l e s Next, yo u should define the ret ention rules for b ackup management i nside the archive. The availability o f the options depends on t[...]
-
Seite 28
28 Copyr ight © Acronis, In c., 200 0-2011 [...]
-
Seite 29
29 Copyr ight © Acronis, In c., 200 0-2011 Note t hat ret en tion rules are applied only before t he b ackup task execu tion. The reason fo r t[...]
-
Seite 30
30 Copyr ight © Acronis, In c., 200 0-2011 6 . 4. 3 B a c k u p v a l i d a t i o n If you would like to ch eck t he newly creat ed backup for c onsistency (perform th e backup validation), select t he Validate after backup chec k box ( for further information on Back u p valid ation, ple ase refer to section "Valid ating backups" (p. 64[...]
-
Seite 31
31 Copyr ight © Acronis, In c., 200 0-2011 6 . 5. 2 S o u r c e F i l e s Ex c l u s i o n With th e sourc e files exclusion rules you can d efine which dat a will be skipped from t he source dat a during the backup process and t h us be excluded from the list of backed up items. These can be fil es or folders defined by a p ath set up for exclusi[...]
-
Seite 32
32 Copyr ight © Acronis, In c., 200 0-2011 When a rec overabl e error occ urs, the program re-attempts to perform the failed operat ion. You can set t he time interval and the number of attempts. The task finishes as soon as the operation succ eeds OR the spec i fied number of at tempts is reached. If you select the Re -attempt, if an err or occur[...]
-
Seite 33
33 Copyr ight © Acronis, In c., 200 0-2011 2) SNMP notifications This opt i on defines whet her the ag ent(s) op erating on the managed machine have to send the logs of the bac kup operation events t o the specified Simple N etwork M anagement Proto col (SNMP) managers. Y ou c an choose the t y pes of events t o be sent. The default setting for th[...]
-
Seite 34
34 Copyr ight © Acronis, In c., 200 0-2011 6. 6 M a nag ing cre ate d b ack up task When editing an existing bac kup task you will see all the sections (steps) of the backup wizard you completed while creating your b ackup task. All four steps of the wizard will appear o n the screen at once. Not e that when editing an existing bac kup t a sk you [...]
-
Seite 35
35 Copyr ight © Acronis, In c., 200 0-2011 7 Re s to rin g a B ack up of Vi rtual M ach ines Click on the Restore button in t he Actions t ab of th e mai n menu t o restore one or several backed up virtual machines . The Rest ore Bac kup wizard o pens in the main workspac e area and asks you to provide the required information and c onfigure the n[...]
-
Seite 36
36 Copyr ight © Acronis, In c., 200 0-2011 In the Select Reco very Point po p-up you can see the l ist of all rec overy points available for this virtual machine and select t he reco very point to be restored. The list includes t he name of the archive which includes this rec overy point and its creat ion time. ?[...]
-
Seite 37
37 Copyr ight © Acronis, In c., 200 0-2011 current locat ion of the virtual machine. For example, a t t he moment of creating th e recovery point the VM was in vApp1 , but lat er it has migrated to vApp2. Then this VM wil l be restored to vApp2 overwriting t he existing VM. Onc e the ESX h ost is defined, t he li st of available resou rce pools an[...]
-
Seite 38
38 Copyr ight © Acronis, In c., 200 0-2011 Note t hat in this c ase the datast ore selection wi ll be unavailable (si nce it is alread y defined by t he target VM being overwritten), ho wever, you can change the resou rce pool locat ion for this VM by choo sing correspond ing item in the Resource Pool select ion. Note t hat if the existing mac hin[...]
-
Seite 39
39 Copyr ight © Acronis, In c., 200 0-2011 To complete t he wizard and c reate the resto re backup task you must set up the task name an d define how t o run it. Note t ha t [ ] { } ; [...]
-
Seite 40
40 Copyr ight © Acronis, In c., 200 0-2011 7 . 4. 1 N o t i f i ca t i o n s 1) E-mail notifications This opt i on allows sett ing up th e e-mail not ifications abo ut t he basic events during yo ur restore task, such as successful co mpletion, rest ore failure or need for user interac tion. The default setting for this option is disabled. Select [...]
-
Seite 41
41 Copyr ight © Acronis, In c., 200 0-2011 Community t y pe th e name of the SNMP co mmunity to which b oth the host running t he SNMP management application an d th e sending machine belong. T he typical c ommuni ty is " public"; Click Send test mess age to make sur e all your set tings are correct . Do not send SNMP notif icati[...]
-
Seite 42
42 Copyr ight © Acronis, In c., 200 0-2011 7 . 4. 4 A d d i t i o n a l S e t t i n g s Use FTP in active mode It is possible to use FT P active mode for FT P authentication and data transfer. Th e default setting for Use FTP in active mode is disabled. Enable t his option if your FTP server sup ports active mode and you want this mod e to be used[...]
-
Seite 43
43 Copyr ight © Acronis, In c., 200 0-2011 8 F i le Rec ove ry Sometimes there is a need t o rec over just a singl e file o r just a few files from a backup arc hive without restoring th e whole virtual mach ine. The File Recovery feature allows browsing t he archive and rest oring the select ed files for t he pre -defined version of this archive [...]
-
Seite 44
44 Copyr ight © Acronis, In c., 200 0-2011 There are two ways of selecting loc ations in t he browsing window. First, you can select just a location. In t hi s case, you will see t he whole t ree -list (un[...]
-
Seite 45
45 Copyr ight © Acronis, In c., 200 0-2011 8. 2 E xp lor e R ec ov e ry P oi nt In the second step of the File Recovery wizard yo u have to c h oose which files or folders to rest ore. Here you c an see t he selected VM recovery point contents with a Windows Explorer-like directory browser. In th e browsing tree on t he left side you can expand th[...]
-
Seite 46
46 Copyr ight © Acronis, In c., 200 0-2011 you c an select the destination for saving the selected backup files. A ll files and fo lders you select ed will be download ed there as a single .zip archive .[...]
-
Seite 47
47 Copyr ight © Acronis, In c., 200 0-2011 9 Ru nn in g V M f rom Back up Click Run VM from Backup in t he Home t ab of th e main menu to mou nt certain backed up virtual machine without restoring it. The Run VM from B ackup wizard o pens in t he main workspac e area and asks you to pro vide the required information and configure th e necessary se[...]
-
Seite 48
48 Copyr ight © Acronis, In c., 200 0-2011 Click Browse to select the loc ation and/or arc hive. In the pop-up window with t he browsing options, you c an define t he path and/or the archive name. Her e you can also see the locat ions which were used before under Rece nt Locations item. Note that fo r Run Vm fro m Backup locations, yo u can only s[...]
-
Seite 49
49 Copyr ight © Acronis, In c., 200 0-2011 Run VM from Back up First of all, with t he Select Location drop-do wn list you should d efine the E SX host where you want to mount the select ed VMs on. T he list shows only th ose ESX hos[...]
-
Seite 50
50 Copyr ight © Acronis, In c., 200 0-2011 Please, specify t he post fix for t he mount ed vi rtual mac hine name in t he Mou nted VM name p ost fix field. This is nec essary since run ning two virtual mac hines with th e same name on one ESX ho st is not possible, especial ly when there is the o riginal VM already running on it. The mou nted VM w[...]
-
Seite 51
51 Copyr ight © Acronis, In c., 200 0-2011 manually[...]
-
Seite 52
52 Copyr ight © Acronis, In c., 200 0-2011 10 Ma na gin g T ask s Click Tasks in the Vi ew tab of th e main menu to o pen the Tasks page ( V iew -> Tasks ), where you can see the details and perfo rm the operations with your tasks. Note that the Ta sks page allows ?[...]
-
Seite 53
53 Copyr ight © Acronis, In c., 200 0-2011 Note t hat yo u can only view task logs ( see "Viewing task logs" section (p. 53 )) and Canc el ( see "Stopping a task" sect ion (p. 53 )) in the active runn ing task. Ot her contro l buttons Run , Edit and Delete are disabled. In order to edit or delete the acti ve task, y ou [...]
-
Seite 54
54 Copyr ight © Acronis, In c., 200 0-2011 varying information depending on the task t ype ba ckup, restore or validation. The sec tions below describe t he tabs co ntents for the backup task. 1 0. 6. 1 S u m m a r y t a b The Summ ary tab gives overvi ew details of t he c urrent sele cted task. Here is an example of the possible cont ents o f[...]
-
Seite 55
55 Copyr ight © Acronis, In c., 200 0-2011 1 0. 6. 2 S o u r c e t a b The Source tab presen ts the tree of ESX hosts+vApps/VMs inc luded into the backup task. Th e tree is build up dynamical l y. If there was an entire E SX host selected for backup, t hen this tree will be shown for t he current state of the mac hines (the same list) same as i n [...]
-
Seite 56
56 Copyr ight © Acronis, In c., 200 0-2011 1 0. 6. 4 O p t i o n s t a b The Options t ab shows the settings o f the current select ed task. T his tab shows o nly the options which differ fro m default o nes. If all task op tions are default, then this tab ?[...]
-
Seite 57
57 Copyr ight © Acronis, In c., 200 0-2011 11 Ma na gin g Recov ery P oin t s Click th e Recovery P oints button in the View tab of t he mai n menu to open t he Recovery P oints page. The Recover y Points view of Acronis vmProtec t pro vides you with an interfac e to manage the recovery po ints available for the virtual machines in you r environme[...]
-
Seite 58
58 Copyr ight © Acronis, In c., 200 0-2011 Managing recove r y points, no locations ava ilabl e 11 .1 Ad di ng a b ac kup l oc ati on Optionally, you can add or remove the backup locations right from the Locations list. Click the Add New b utton on th e top to open th e Add Locat ion pop- up. Note t hat the remove o peration will not physically re[...]
-
Seite 59
59 Copyr ight © Acronis, In c., 200 0-2011 You can select t he desired loc ation by expanding the appropriate folder group and choosing it in th e folder tree or by ent eri ng the full path to the loc ation in the Location field. Choose one of th e backup location t ypes from t he browse tree on t he left side. If the selected location (Online bac[...]
-
Seite 60
60 Copyr ight © Acronis, In c., 200 0-2011 Managing recove r y points, passwo rd-protected location Only one virtual machine c an be selected in t his list at a time. The detail s window (th e right sect i on) for t he selected virtual machine c ontains 2 t abs as explained below th e Recovery P oints list and t he Recovery P oints details. 11[...]
-
Seite 61
61 Copyr ight © Acronis, In c., 200 0-2011 11 .4 Su mma ry ta b You can see the summary information o n the sel ected recovery point by switching to the Summary tab. T his tab sho ws the following information: VM C omments (t aken fr om VMWare vSph ere client Summary t ab for the selected VM). Guest OS (taken from VMWare vSphere cli ent Su[...]
-
Seite 62
62 Copyr ight © Acronis, In c., 200 0-2011 1 1. 5. 3 F i l e r e c o v e r y Click th e File rec overy button in the ribbo n menu to perform the Guest Fi le Download o peration b y running the File Recovery wizard . The wizard will be pre-filled with t he selected recovery point settings described in the " Fi le recovery" section (p. 43 [...]
-
Seite 63
63 Copyr ight © Acronis, In c., 200 0-2011 Note, that in a L egacy Mode arc hive (p. 7) some reco v ery points may have dependenc i es. This means that deleting a single recovery point is imposs ible. In th is case, the entire ch ain of rec overy points which depend on the selected one wi ll be designated f or deletion. The reco very points which [...]
-
Seite 64
64 Copyr ight © Acronis, In c., 200 0-2011 12 Ot he r Oper ati ons 12 .1 Va lid a tin g b a ck ups ( Acti ons - > Va l id ate ) Validating backups is an operation that checks t he pos sibility of data rec overy from a backup . Note that whi le successful validation means high probab ility of successful recovery, it does not check all facto rs t[...]
-
Seite 65
65 Copyr ight © Acronis, In c., 200 0-2011 Validate backu p task. What t o valida te. L o cation. Archive Validating an archive will check t he integri ty o f all backups (recovery points) inside the specified archive . In genera l, th is procedu re will be faster t han validating the whole location. However, it is slower than validating a spe[...]
-
Seite 66
66 Copyr ight © Acronis, In c., 200 0-2011 In the Selected Virtu al Machines sec tion you can see a list of th e selected virtual machines with t hei r available recovery points, i .e. point in time wh ich contains a p articular mac hine stat e. The rec overy point c an be selected by clicking on it. To complete t he vali dation t ask creation wiz[...]
-
Seite 67
67 Copyr ight © Acronis, In c., 200 0-2011 1 2. 2. 1 M o u n t e d V M s l i s t The Mounted VMs v iew provides an o verview on the virtual mac hines which are curren tly mounted or runn ing from bac kup on an ESX ho st. Mounted VMs view t have any virtual mac hines running, t[...]
-
Seite 68
68 Copyr ight © Acronis, In c., 200 0-2011 The first Summary tab presents overview detai ls of the cu rrently selected virtual machine. Her e is an example of the possible cont ents of the Summary tab: Start Time/Date : 2 0:1 1 11/05/20 11 The Source tab presen ts the tree of mounted ESX h osts+vApp s/VMs. Here is an examp le of t he Source tab co[...]
-
Seite 69
69 Copyr ight © Acronis, In c., 200 0-2011 Logs lis t The logs list c ontains the Date/Time , Task name an d Message c olumns. You can sort the logs list by clicking the c ol umn header. Fo r switching bet we en th e ascending and descend ing sort o rder click the column header one more time. Also, you can filter the log events usi ng several filt[...]
-
Seite 70
70 Copyr ight © Acronis, In c., 200 0-2011 Log clean up rules dialog Select t he ch eck box in order to enable this Log cleanup rules op tion. Then, define the maximum size of t he agent log fo lder (for example, in Windows XP/2 003 Server %ALLUSE RSPROFILE% Application DataAcronisAVMP6 MMS LogEvents). Along with the Maxim u m log si ze value[...]
-
Seite 71
71 Copyr ight © Acronis, In c., 200 0-2011 warning message in o rder to co nfirm the d elete logs operation. Upon y our c onfirm ation, all logs will be cleared. Clear log dialog 1 2. 3. 4 S a v e l o g s t o f i l e Click th e Save to File button in the ribbo n bar to save the filtered log entries from the logs l i st. This operation allows you t[...]
-
Seite 72
72 Copyr ight © Acronis, In c., 200 0-2011 The licensing sch eme in vmProt ect impli es that each CPU on t he managed ESX host/cluster consumes a license. At th e first run of Acronis vmProtec t there are n o licenses bound t o any ESX host s/clusters. Here, you can add a new license as desc ribed below. The import ed (added) serial numbers may co[...]
-
Seite 73
73 Copyr ight © Acronis, In c., 200 0-2011 Managing licenses page, Ad d license dialo g Upon adding new licenses you wi ll get t he followi ng message indicat i n g the n umber of licenses added.[...]
-
Seite 74
74 Copyr ight © Acronis, In c., 200 0-2011 1 2. 4. 2 A d d i n g l i c e n s e f a i l u r e Adding a license m ay fail due t o th e following reasons: The license is already imported[...]
-
Seite 75
75 Copyr ight © Acronis, In c., 200 0-2011 12 .5 Ma nag i ng E SX ho sts (Co nfi g ure - > ES X hos ts ) Click ESX h osts in t he Configure tab of the Acro[...]
-
Seite 76
76 Copyr ight © Acronis, In c., 200 0-2011 Configurin g ESX Hosts page, Host s list Adding an ESX host/vCenter will not bind the licenses to it aut omatically. It will be b ound o nly when you execut e a backup/resto re task wi th a virtual machine runn ing on th is host. After you add an ESX host/vCenter you will be ab le to p erform backup /reco[...]
-
Seite 77
77 Copyr ight © Acronis, In c., 200 0-2011 Managing ESX hosts page, Add Host/vCenter dialo g 1 2. 5. 3 A d d i n g a n E S X h o s t wh i c h i s a p a r t o f v C e n t e r When you directly add an E SX host which is a part of vC enter inst ead of adding the vCenter itself, th e main conc ern is that Acronis vmProtect Ag ent will not be able to t[...]
-
Seite 78
78 Copyr ight © Acronis, In c., 200 0-2011 domainusername fo rmat. You can ch eck the co nnection with t he Test connection button to ensure that t he provided creden tials are co rrect. Click OK to add your E SX host/vCenter. Managing ESX Hosts page, Enter credentia l s dialo g 1 2. 5. 5 R e m o v i n g E S X h o s t Removing an ESX ho st from A[...]
-
Seite 79
79 Copyr ight © Acronis, In c., 200 0-2011 Managing ESX hosts page, R e move host d i alog 12 .6 Ma nag i ng se tt i ng s 1 2. 6. 1 M a n a g i n g O n l i n e B a c k u p P r o x y Click Online Backup Proxy in the Configure tab o f the Acronis vmProtec t main ribbon menu to o pen the Onl ine Backup Pr oxy settings page. Online backup proxy settin[...]
-
Seite 80
80 Copyr ight © Acronis, In c., 200 0-2011 Managing se tti n gs, Online backu p proxy To set up proxy server settings: Select t he Use a proxy server check b ox. In Address , specify t he networ k name or IP address of the proxy server, for example: proxy.example.com or 192.168.0.1 In Port , specify t he port nu mber of the proxy server, f[...]
-
Seite 81
81 Copyr ight © Acronis, In c., 200 0-2011 Google Chrome. In Optio ns , click Under the Hood . Under Network , click Change proxy settings . 1 2. 6. 2 M a n a g i n g A g e n t P a ss w o r d Click th e Agent Passw ord button in the Configure tab of the Acronis vmProtect mai n ribbon menu to change you r User p assword . Here you c an ch ange [...]
-
Seite 82
82 Copyr ight © Acronis, In c., 200 0-2011 13 Be st Pr act ice s In this sec tion we will give a few examples o f some op erations with Acronis vmProtect . After you installed your Acron is vmProtect A gent you have to conne ct to it with your access credent ials. 1. Add ESX host First of all, to be able to p erform backup and o ther operations, y[...]
-
Seite 83
83 Copyr ight © Acronis, In c., 200 0-2011 In order t o do that, you have to run the Restore b ackup task wizard which wil l guide you thro ugh all the st eps of the restore process. Click Restore i n the Home tab of the main menu. T hen go t hrough the wizard. T he detailed informat ion can be found in the "Restoring a backup of virtual mach[...]
-
Seite 84
84 Copyr ight © Acronis, In c., 200 0-2011 14 S u ppor t 14 .1 Te ch ni ca l S upp or t Maintenance and Support Program If you need assistance with your Acronis product , please go to http://www.acronis.com/support / Product Updates You can download t he latest updat es for all your registered Ac ronis software produc ts from our website at any ti[...]
-
Seite 85
85 Copyr ight © Acronis, In c., 200 0-2011 15 G los sa ry A Ag ent (A cron is vm Pro t ect Age nt ) An application that performs backup and recovery o f t he virtual mach ines and enables o ther management operations on the VM Ware ESX/ESXi infrast ruct ure such as task management and operations with available bac kups, machines, etc. Acronis vmPr[...]
-
Seite 86
86 Copyr ight © Acronis, In c., 200 0-2011 B B a c ku p The result of a single backup operat ion (p. 86 ) as a single recovery point (p. 92 ) i nside archive (p. 86 ) . Physically, it i s a file that contains a copy o f the backed up data (virtual machine volume s) from specific dat e and time for a spe cific virtual machine. Ba ckup files created[...]
-
Seite 87
87 Copyr ight © Acronis, In c., 200 0-2011 B a c ku p ta sk (Ta sk) A set o f rules that specify h ow the given virtual machin e or a set of virtual mac hines will be protec ted. A bac kup task spec ifies: What d ata to b ack up (i.e. which machines t o bac k up). Where to store the backup archive (t he bac kup archive name and location). [...]
-
Seite 88
88 Copyr ight © Acronis, In c., 200 0-2011 C CB T ( Cha ng ed B l oc k T rac king ) A feature o f VMWare ESX which allows to identify whic h blocks of the virtual disks have chan ged and to transfer only those blocks d uring the backup/replication pro cess. For example when using CBT techn ology, the i ncremental bac kup speed can increase up to 2[...]
-
Seite 89
89 Copyr ight © Acronis, In c., 200 0-2011 Deduplication in Acronis vmProtec t is managin g dat a within only o ne backup arch ive. For ex ample if the bac kups are saved into 2 different archives (even if t hey are in t he same location) then t here will be no relations between these arc hi ves and t hey may contain duplicated data. D iff er ent [...]
-
Seite 90
90 Copyr ight © Acronis, In c., 200 0-2011 D ynam ic d is k A hard disk managed by Logical D isk Manager (LD M) th at is available in Windows start i ng with Windows 200 0. LD M helps flexibly allocate volum es on a st orage device for better fault tolerance, better performance or larger volume size. A dynamic disk c an use either t he master boot[...]
-
Seite 91
91 Copyr ight © Acronis, In c., 200 0-2011 To reduce the access time (a striped volume). To achieve fault t olerance b y introducing redundan cy (mirrored and RAID -5 vo lumes). When bac king up virtual mach ines which c ontain d ynamic disks inside, Acron is vmProtect backs u p the logical dynamic volumes instead o f the entire dynamic d [...]
-
Seite 92
92 Copyr ight © Acronis, In c., 200 0-2011 I In cr em enta l ba cku p A bac kup (p. 85 ) that stores chan ges to the data against the latest backup. Y ou need access t o other backups from th e same archive (p. 85 ) to rest ore data from an inc remental backup. L Le ga cy m ode Ar ch i ve See Backup archive (p. 86 ). M Ma chi n e (V irtu al ma chi[...]
-
Seite 93
93 Copyr ight © Acronis, In c., 200 0-2011 R eg ist ere d ma ch in e A virtual machine mana ged by Acronis vmProtec t Agen t. All virtual mac hines which reside o n th e registered ESX/ESXi ho st o r vCenter are automatic ally regi stered and can be managed b y Acronis vmProtect A gent. R ep lic ati on A pro cess of repl icating the v irtual machi[...]
-
Seite 94
94 Copyr ight © Acronis, In c., 200 0-2011 U U ni ver sal Re st or e ( Acr oni s Un iv ersal R est ore ) The Acro nis proprietary techno logy that helps boo t up Windows on dissimilar hardware or a virtual machine. The Universal Restore han dles differenc es i n devices t hat are critic al for the operat i ng system start -up, such as storage cont[...]
-
Seite 95
95 Copyr ight © Acronis, In c., 200 0-2011 vC ent er VMware vCenter Server, formerl y VMware Virt ualCenter, cent ral ly manages VMware vSphere environments al lowing IT administrators dramat i cally i mproved contro l over the v irtual environment compared to other management platforms. See more det ails at htt p://www.vmware.com/product s/ vcent[...]