Acronis vmProtect 6 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Acronis vmProtect 6. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Acronis vmProtect 6 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Acronis vmProtect 6 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Acronis vmProtect 6 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Acronis vmProtect 6
- nom du fabricant et année de fabrication Acronis vmProtect 6
- instructions d'utilisation, de réglage et d’entretien de l'équipement Acronis vmProtect 6
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Acronis vmProtect 6 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Acronis vmProtect 6 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Acronis en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Acronis vmProtect 6, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Acronis vmProtect 6, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Acronis vmProtect 6. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    User Guide[...]

  • Page 2

    2 Copyr ight © Acr onis, In c ., 200 0-2011 Table o f con ten ts 1 Introducing Acro nis vmProtec t 6.0 ............................................................................................. 5 2 Acronis vmProtec t 6.0 Overvi ew ................................................................................................ 6 2.1 Acronis vmPr[...]

  • Page 3

    3 Copyr ight © Acronis, In c., 200 0-2011 6.6 Managing created backup task ............................................................................................ 34 7 Restoring a Backup o f Vir tu al Machines ................................................................................... 35 7.1 What t o restore ..........................[...]

  • Page 4

    4 Copyr ight © Acronis, In c., 200 0-2011 12 Other Operati ons ..................................................................................................................... 64 12.1 Validating backups (Actions -> Validate) .............................................................................. 64 1 2 .1. 1 W ha t t o va li d a te [...]

  • Page 5

    5 Copyr ight © Acronis, In c., 200 0-2011 1 In tro duc ing Ac ron is v mP rotec t 6 .0 Acronis believes t hat virtualization and transition t o the cloud are not only a better way of doing comput ing, but also allow for achievi ng less downtime s and faster rec overies while reducing cost s. Unfortunat ely, most o f backup and re covery solutions [...]

  • Page 6

    6 Copyr ight © Acronis, In c., 200 0-2011 2 Ac ron is vmP ro tec t 6 .0 Ov erv ie w Acronis vmProtec t 6.0 i s a c omprehensive backup and recovery solut ion designed for VMware    [...]

  • Page 7

    7 Copyr ight © Acronis, In c., 200 0-2011 3 Ho w Ac ron is vmP ro tec t 6 .0 W ork s 3. 1 V i rt ua l ma chi nes ba ck up a nd res to re As with a p hysical machine, your virtual mac hine (or several VMs as a whole vir tual infrastruct ure) should also b e prot ected. Once you have installed Acr onis vmProtect 6.0 agent, you can:  Back up a vir[...]

  • Page 8

    8 Copyr ight © Acronis, In c., 200 0-2011 3 . 2. 2 S i n g l e f i l e b a c k u p sc h e m e (A l w a y s I n c r e m e n t a l m o d e ) Usually, bac kups are kept o nly for a cert ain time period (ret ention t ime) or th ere is a policy to keep only the last X bac kups in the b ackup chain. Backup a rchives are managed on a daily, week l y, et [...]

  • Page 9

    9 Copyr ight © Acronis, In c., 200 0-2011 4 In st alla tion of Acro nis vm Prot ec t 6 .0 4. 1 R e q ui re men ts 4 . 1. 1 S u p p o r t e d o p e r a t i n g s y s t e m s Acronis vmProtec t supp orts the fo llowing operat i ng sy stems:  Windows XP Profess i onal SP3 (x86, x64).  Windows Server 20 03/20 03 R2 - the Standard, E nterpr ise, [...]

  • Page 10

    10 Copyr ight © Acronis, In c., 200 0-2011 For t he smoot h operation of the Acronis vmProtec t Web Console, yo u should have one o f the following versions of y our web browser:  Mozilla Firefox 3.6 o r higher .  Internet E xpl orer 7.0 or higher.  Opera 1 0. 0 o r hig her.  Safari 5.0 o r higher.  Google Chrome 10.0 or higher. 4 .[...]

  • Page 11

    11 Copyr ight © Acronis, In c., 200 0-2011 4 . 2. 1 I n s t a l l i n g A c r o n i s v m P r o t e c t 6. 0 a s V i r t u a l A p p l i a n c e o n a n E S X ( i ) h o s t Acronis vmProtec t soft ware could be installed direct l y on an ESX(i) host . The proc ess of remote installation of Ac ronis vmProtect Virtual Appli ance t o a n ESX(i) ho st[...]

  • Page 12

    12 Copyr ight © Acronis, In c., 200 0-2011 cannot change th e login for your Web Console. To change the Web Console password, go t o Configure -> Agent Pas sword page (for m ore informati on refer to Managing Agent Password sec tion (p. 81 ) ). If there is an y problem, t he Virtual Appliance (parts of it which have already been deployed d urin[...]

  • Page 13

    13 Copyr ight © Acronis, In c., 200 0-2011 The diagram below i l lustrates a LAN -based and a LAN-free backup. L AN-free access t o virtual machines is availabl e if you have a fibre c hannel (FC) or iSCSI Storage Area Network . To co mpletely eliminate tran sferring the bac ke d up data via LAN, st ore the backup s on a loc al disk of the agent&a[...]

  • Page 14

    14 Copyr ight © Acronis, In c., 200 0-2011 3. Select t he way you want your c omponen ts t o be installed, i.e. specify the location where to install the soft ware. The default dest ination for i nstalling Acro nis vmProtect i s the C: Program FilesAcronis folder. Yo u can chan ge the d es tination by typing in a new folder n ame or select ing i[...]

  • Page 15

    15 Copyr ight © Acronis, In c., 200 0-2011 Specify th e location y ou want t o extract your fi les to, a nd then click Extract . The Di sk usage butto n shows t he available space for the different volumes on your PC and hel ps you t o choo se the destination disk for t he files extract ion. Close the dialog when t he extraction process is complet[...]

  • Page 16

    16 Copyr ight © Acronis, In c., 200 0-2011[...]

  • Page 17

    17 Copyr ight © Acronis, In c., 200 0-2011 5 G ett in g star ted Onc e you installed t he Acron is vmProtect or deployed your Acro nis vmProtect Virtual Appliance, y ou can run the Acron is vmProtect Web Console. The Web Console will be opened i n the defaul t Int ernet browser. Note t hat the Acro nis vmProtect web server (inst alled on the A gen[...]

  • Page 18

    18 Copyr ight © Acronis, In c., 200 0-2011 Login pa ge After logging in t he Acron is vmProtect you will see a w el come sc reen with t he Dashb ord's Quic k Start. The three but tons of this sect i on will give you a hint of what to start with:  First of all, to be able to p erform the first bac k up task of a Vi rtual Mac hi nes, you hav[...]

  • Page 19

    19 Copyr ight © Acronis, In c., 200 0-2011 status of your backup, restore and other tasks. It do es so by using co lor -coding fo r successful a nd failed tasks. As the dashboard outlines all act ions you can perform with Ac ronis vmProtect , it presents a v ery useful to ol for a quick operational d ecision making. You can switch to the dashboard[...]

  • Page 20

    20 Copyr ight © Acronis, In c., 200 0-2011 There are 3 main t abs in the Acro nis vmProtect ri bbon menu: Actions tab, V iew tab an d Conf igure tab. T he fourth add itional Acronis t ab appears dynamically depending on the c urrent user-selected View or Configure operation. Dashboard view The Home button which always appears on the ribbon bar lea[...]

  • Page 21

    21 Copyr ight © Acronis, In c., 200 0-2011 c. Mounted VMs view This is th e link to Mounted VMs view. The Moun ted virtual mac hines management is described in the " Managi ng mounted VMs" section (p. 66 ). d. Show logs view This is th e link to t he Sh ow logs view. The L og s management is desc ri bed in t he "Managing logs" [...]

  • Page 22

    22 Copyr ight © Acronis, In c., 200 0-2011 c. View - > Mou nted VMs When th e Mounted VMs view is se l ected, the Mounted VMs tab appears in the ribbo n menu. The Mounted VM s page is desc ribed in the " Managi ng mount ed VMs" sec tion (p. 66 ). d. View - > Sh ow Logs When th e Show Logs view is selec ted, the Logs tab appears in [...]

  • Page 23

    23 Copyr ight © Acronis, In c., 200 0-2011 6 Cr eat in g a Bac ku p o f Vir tu al M ach ine s Click Cre ate Backup Task    Q uick s ta rt or Backup in the Actions t ab of th e main menu to creat e a new backup task. The New Backup Task wizard opens in the main wor kspace area and asks you to[...]

  • Page 24

    24 Copyr ight © Acronis, In c., 200 0-2011 Create Backu p wiza r d, Step      The Arc hive name field shows t he name of the arch ive selected in th e Browse pop- up. The left side of t he Browse pop-up shows the list o f:  Online backup sto rages.  Local folders.  Network folders. [...]

  • Page 25

    25 Copyr ight © Acronis, In c., 200 0-2011 Enter y our archive name value in t he co rresponding Archive name field below . Note that i t is not recommended t o have more than one backup task writing data t o the same archive. The ret ention rules applied to the arc hi ve by different backup tasks may cause an unpredic table outcome. ?[...]

  • Page 26

    26 Copyr ight © Acronis, In c., 200 0-2011 example, with t he Every 2 week(s) on Mon sett i ng, t he task will be performed on Monday of every other week. In the Duri ng the day execute the task... area, sel ect o ne of t he following: Once at: <... > or E very: <...> From: <...> Until: <...>. For t he Once at: <. ..>[...]

  • Page 27

    27 Copyr ight © Acronis, In c., 200 0-2011 In case o f editing your existing backup task or sel ecting an existing archive for t he backup location, this sett ing is not shown. 6 . 4. 2 R e t e n t i o n r u l e s Next, yo u should define the ret ention rules for b ackup management i nside the archive. The availability o f the options depends on t[...]

  • Page 28

    28 Copyr ight © Acronis, In c., 200 0-2011                      [...]

  • Page 29

    29 Copyr ight © Acronis, In c., 200 0-2011               Note t hat ret en tion rules are applied only before t he b ackup task execu tion. The reason fo r t[...]

  • Page 30

    30 Copyr ight © Acronis, In c., 200 0-2011 6 . 4. 3 B a c k u p v a l i d a t i o n If you would like to ch eck t he newly creat ed backup for c onsistency (perform th e backup validation), select t he Validate after backup chec k box ( for further information on Back u p valid ation, ple ase refer to section "Valid ating backups" (p. 64[...]

  • Page 31

    31 Copyr ight © Acronis, In c., 200 0-2011 6 . 5. 2 S o u r c e F i l e s Ex c l u s i o n With th e sourc e files exclusion rules you can d efine which dat a will be skipped from t he source dat a during the backup process and t h us be excluded from the list of backed up items. These can be fil es or folders defined by a p ath set up for exclusi[...]

  • Page 32

    32 Copyr ight © Acronis, In c., 200 0-2011 When a rec overabl e error occ urs, the program re-attempts to perform the failed operat ion. You can set t he time interval and the number of attempts. The task finishes as soon as the operation succ eeds OR the spec i fied number of at tempts is reached. If you select the Re -attempt, if an err or occur[...]

  • Page 33

    33 Copyr ight © Acronis, In c., 200 0-2011 2) SNMP notifications This opt i on defines whet her the ag ent(s) op erating on the managed machine have to send the logs of the bac kup operation events t o the specified Simple N etwork M anagement Proto col (SNMP) managers. Y ou c an choose the t y pes of events t o be sent. The default setting for th[...]

  • Page 34

    34 Copyr ight © Acronis, In c., 200 0-2011 6. 6 M a nag ing cre ate d b ack up task When editing an existing bac kup task you will see all the sections (steps) of the backup wizard you completed while creating your b ackup task. All four steps of the wizard will appear o n the screen at once. Not e that when editing an existing bac kup t a sk you [...]

  • Page 35

    35 Copyr ight © Acronis, In c., 200 0-2011 7 Re s to rin g a B ack up of Vi rtual M ach ines Click on the Restore button in t he Actions t ab of th e mai n menu t o restore one or several backed up virtual machines . The Rest ore Bac kup wizard o pens in the main workspac e area and asks you to provide the required information and c onfigure the n[...]

  • Page 36

    36 Copyr ight © Acronis, In c., 200 0-2011 In the Select Reco very Point po p-up you can see the l ist of all rec overy points available for this virtual machine and select t he reco very point to be restored. The list includes t he name of the archive which includes this rec overy point and its creat ion time.  ?[...]

  • Page 37

    37 Copyr ight © Acronis, In c., 200 0-2011 current locat ion of the virtual machine. For example, a t t he moment of creating th e recovery point the VM was in vApp1 , but lat er it has migrated to vApp2. Then this VM wil l be restored to vApp2 overwriting t he existing VM. Onc e the ESX h ost is defined, t he li st of available resou rce pools an[...]

  • Page 38

    38 Copyr ight © Acronis, In c., 200 0-2011 Note t hat in this c ase the datast ore selection wi ll be unavailable (si nce it is alread y defined by t he target VM being overwritten), ho wever, you can change the resou rce pool locat ion for this VM by choo sing correspond ing item in the Resource Pool select ion. Note t hat if the existing mac hin[...]

  • Page 39

    39 Copyr ight © Acronis, In c., 200 0-2011             To complete t he wizard and c reate the resto re backup task you must set up the task name an d define how t o run it. Note t ha t [ ] { } ; [...]

  • Page 40

    40 Copyr ight © Acronis, In c., 200 0-2011 7 . 4. 1 N o t i f i ca t i o n s 1) E-mail notifications This opt i on allows sett ing up th e e-mail not ifications abo ut t he basic events during yo ur restore task, such as successful co mpletion, rest ore failure or need for user interac tion. The default setting for this option is disabled. Select [...]

  • Page 41

    41 Copyr ight © Acronis, In c., 200 0-2011 Community  t y pe th e name of the SNMP co mmunity to which b oth the host running t he SNMP management application an d th e sending machine belong. T he typical c ommuni ty is " public"; Click Send test mess age to make sur e all your set tings are correct .  Do not send SNMP notif icati[...]

  • Page 42

    42 Copyr ight © Acronis, In c., 200 0-2011 7 . 4. 4 A d d i t i o n a l S e t t i n g s Use FTP in active mode It is possible to use FT P active mode for FT P authentication and data transfer. Th e default setting for Use FTP in active mode is disabled. Enable t his option if your FTP server sup ports active mode and you want this mod e to be used[...]

  • Page 43

    43 Copyr ight © Acronis, In c., 200 0-2011 8 F i le Rec ove ry Sometimes there is a need t o rec over just a singl e file o r just a few files from a backup arc hive without restoring th e whole virtual mach ine. The File Recovery feature allows browsing t he archive and rest oring the select ed files for t he pre -defined version of this archive [...]

  • Page 44

    44 Copyr ight © Acronis, In c., 200 0-2011       There are two ways of selecting loc ations in t he browsing window. First, you can select just a location. In t hi s case, you will see t he whole t ree -list (un[...]

  • Page 45

    45 Copyr ight © Acronis, In c., 200 0-2011 8. 2 E xp lor e R ec ov e ry P oi nt In the second step of the File Recovery wizard yo u have to c h oose which files or folders to rest ore. Here you c an see t he selected VM recovery point contents with a Windows Explorer-like directory browser. In th e browsing tree on t he left side you can expand th[...]

  • Page 46

    46 Copyr ight © Acronis, In c., 200 0-2011 you c an select the destination for saving the selected backup files. A ll files and fo lders you select ed will be download ed there as a single .zip archive .[...]

  • Page 47

    47 Copyr ight © Acronis, In c., 200 0-2011 9 Ru nn in g V M f rom Back up Click Run VM from Backup in t he Home t ab of th e main menu to mou nt certain backed up virtual machine without restoring it. The Run VM from B ackup wizard o pens in t he main workspac e area and asks you to pro vide the required information and configure th e necessary se[...]

  • Page 48

    48 Copyr ight © Acronis, In c., 200 0-2011 Click Browse to select the loc ation and/or arc hive. In the pop-up window with t he browsing options, you c an define t he path and/or the archive name. Her e you can also see the locat ions which were used before under Rece nt Locations item. Note that fo r Run Vm fro m Backup locations, yo u can only s[...]

  • Page 49

    49 Copyr ight © Acronis, In c., 200 0-2011 Run VM from Back up         First of all, with t he Select Location drop-do wn list you should d efine the E SX host where you want to mount the select ed VMs on. T he list shows only th ose ESX hos[...]

  • Page 50

    50 Copyr ight © Acronis, In c., 200 0-2011 Please, specify t he post fix for t he mount ed vi rtual mac hine name in t he Mou nted VM name p ost fix field. This is nec essary since run ning two virtual mac hines with th e same name on one ESX ho st is not possible, especial ly when there is the o riginal VM already running on it. The mou nted VM w[...]

  • Page 51

    51 Copyr ight © Acronis, In c., 200 0-2011           manually[...]

  • Page 52

    52 Copyr ight © Acronis, In c., 200 0-2011 10 Ma na gin g T ask s Click Tasks in the Vi ew tab of th e main menu to o pen the Tasks page ( V iew -> Tasks ), where you can see the details and perfo rm the operations with your tasks. Note that the Ta sks page allows  ?[...]

  • Page 53

    53 Copyr ight © Acronis, In c., 200 0-2011 Note t hat yo u can only view task logs ( see "Viewing task logs" section (p. 53 )) and Canc el ( see "Stopping a task" sect ion (p. 53 )) in the active runn ing task. Ot her contro l buttons  Run , Edit and Delete  are disabled. In order to edit or delete the acti ve task, y ou [...]

  • Page 54

    54 Copyr ight © Acronis, In c., 200 0-2011 varying information depending on the task t ype  ba ckup, restore or validation. The sec tions below describe t he tabs co ntents for the backup task. 1 0. 6. 1 S u m m a r y t a b The Summ ary tab gives overvi ew details of t he c urrent sele cted task. Here is an example of the possible cont ents o f[...]

  • Page 55

    55 Copyr ight © Acronis, In c., 200 0-2011 1 0. 6. 2 S o u r c e t a b The Source tab presen ts the tree of ESX hosts+vApps/VMs inc luded into the backup task. Th e tree is build up dynamical l y. If there was an entire E SX host selected for backup, t hen this tree will be shown for t he current state of the mac hines (the same list) same as i n [...]

  • Page 56

    56 Copyr ight © Acronis, In c., 200 0-2011 1 0. 6. 4 O p t i o n s t a b The Options t ab shows the settings o f the current select ed task. T his tab shows o nly the options which differ fro m default o nes. If all task op tions are default, then this tab    ?[...]

  • Page 57

    57 Copyr ight © Acronis, In c., 200 0-2011 11 Ma na gin g Recov ery P oin t s Click th e Recovery P oints button in the View tab of t he mai n menu to open t he Recovery P oints page. The Recover y Points view of Acronis vmProtec t pro vides you with an interfac e to manage the recovery po ints available for the virtual machines in you r environme[...]

  • Page 58

    58 Copyr ight © Acronis, In c., 200 0-2011 Managing recove r y points, no locations ava ilabl e 11 .1 Ad di ng a b ac kup l oc ati on Optionally, you can add or remove the backup locations right from the Locations list. Click the Add New b utton on th e top to open th e Add Locat ion pop- up. Note t hat the remove o peration will not physically re[...]

  • Page 59

    59 Copyr ight © Acronis, In c., 200 0-2011 You can select t he desired loc ation by expanding the appropriate folder group and choosing it in th e folder tree or by ent eri ng the full path to the loc ation in the Location field. Choose one of th e backup location t ypes from t he browse tree on t he left side. If the selected location (Online bac[...]

  • Page 60

    60 Copyr ight © Acronis, In c., 200 0-2011 Managing recove r y points, passwo rd-protected location Only one virtual machine c an be selected in t his list at a time. The detail s window (th e right sect i on) for t he selected virtual machine c ontains 2 t abs as explained below  th e Recovery P oints list and t he Recovery P oints details. 11[...]

  • Page 61

    61 Copyr ight © Acronis, In c., 200 0-2011 11 .4 Su mma ry ta b You can see the summary information o n the sel ected recovery point by switching to the Summary tab. T his tab sho ws the following information:  VM C omments (t aken fr om VMWare vSph ere client Summary t ab for the selected VM).  Guest OS (taken from VMWare vSphere cli ent Su[...]

  • Page 62

    62 Copyr ight © Acronis, In c., 200 0-2011 1 1. 5. 3 F i l e r e c o v e r y Click th e File rec overy button in the ribbo n menu to perform the Guest Fi le Download o peration b y running the File Recovery wizard . The wizard will be pre-filled with t he selected recovery point settings described in the " Fi le recovery" section (p. 43 [...]

  • Page 63

    63 Copyr ight © Acronis, In c., 200 0-2011 Note, that in a L egacy Mode arc hive (p. 7) some reco v ery points may have dependenc i es. This means that deleting a single recovery point is imposs ible. In th is case, the entire ch ain of rec overy points which depend on the selected one wi ll be designated f or deletion. The reco very points which [...]

  • Page 64

    64 Copyr ight © Acronis, In c., 200 0-2011 12 Ot he r Oper ati ons 12 .1 Va lid a tin g b a ck ups ( Acti ons - > Va l id ate ) Validating backups is an operation that checks t he pos sibility of data rec overy from a backup . Note that whi le successful validation means high probab ility of successful recovery, it does not check all facto rs t[...]

  • Page 65

    65 Copyr ight © Acronis, In c., 200 0-2011 Validate backu p task. What t o valida te. L o cation. Archive  Validating an archive will check t he integri ty o f all backups (recovery points) inside the specified archive . In genera l, th is procedu re will be faster t han validating the whole location. However, it is slower than validating a spe[...]

  • Page 66

    66 Copyr ight © Acronis, In c., 200 0-2011 In the Selected Virtu al Machines sec tion you can see a list of th e selected virtual machines with t hei r available recovery points, i .e. point in time wh ich contains a p articular mac hine stat e. The rec overy point c an be selected by clicking on it. To complete t he vali dation t ask creation wiz[...]

  • Page 67

    67 Copyr ight © Acronis, In c., 200 0-2011 1 2. 2. 1 M o u n t e d V M s l i s t The Mounted VMs v iew provides an o verview on the virtual mac hines which are curren tly mounted or runn ing from bac kup on an ESX ho st. Mounted VMs view    t have any virtual mac hines running, t[...]

  • Page 68

    68 Copyr ight © Acronis, In c., 200 0-2011 The first Summary tab presents overview detai ls of the cu rrently selected virtual machine. Her e is an example of the possible cont ents of the Summary tab: Start Time/Date : 2 0:1 1 11/05/20 11 The Source tab presen ts the tree of mounted ESX h osts+vApp s/VMs. Here is an examp le of t he Source tab co[...]

  • Page 69

    69 Copyr ight © Acronis, In c., 200 0-2011 Logs lis t The logs list c ontains the Date/Time , Task name an d Message c olumns. You can sort the logs list by clicking the c ol umn header. Fo r switching bet we en th e ascending and descend ing sort o rder click the column header one more time. Also, you can filter the log events usi ng several filt[...]

  • Page 70

    70 Copyr ight © Acronis, In c., 200 0-2011 Log clean up rules dialog Select t he ch eck box in order to enable this Log cleanup rules op tion. Then, define the maximum size of t he agent log fo lder (for example, in Windows XP/2 003 Server %ALLUSE RSPROFILE% Application DataAcronisAVMP6 MMS LogEvents). Along with the Maxim u m log si ze value[...]

  • Page 71

    71 Copyr ight © Acronis, In c., 200 0-2011 warning message in o rder to co nfirm the d elete logs operation. Upon y our c onfirm ation, all logs will be cleared. Clear log dialog 1 2. 3. 4 S a v e l o g s t o f i l e Click th e Save to File button in the ribbo n bar to save the filtered log entries from the logs l i st. This operation allows you t[...]

  • Page 72

    72 Copyr ight © Acronis, In c., 200 0-2011 The licensing sch eme in vmProt ect impli es that each CPU on t he managed ESX host/cluster consumes a license. At th e first run of Acronis vmProtec t there are n o licenses bound t o any ESX host s/clusters. Here, you can add a new license as desc ribed below. The import ed (added) serial numbers may co[...]

  • Page 73

    73 Copyr ight © Acronis, In c., 200 0-2011 Managing licenses page, Ad d license dialo g Upon adding new licenses you wi ll get t he followi ng message indicat i n g the n umber of licenses added.[...]

  • Page 74

    74 Copyr ight © Acronis, In c., 200 0-2011       1 2. 4. 2 A d d i n g l i c e n s e f a i l u r e Adding a license m ay fail due t o th e following reasons:  The license is already imported[...]

  • Page 75

    75 Copyr ight © Acronis, In c., 200 0-2011            12 .5 Ma nag i ng E SX ho sts (Co nfi g ure - > ES X hos ts ) Click ESX h osts in t he Configure tab of the Acro[...]

  • Page 76

    76 Copyr ight © Acronis, In c., 200 0-2011 Configurin g ESX Hosts page, Host s list Adding an ESX host/vCenter will not bind the licenses to it aut omatically. It will be b ound o nly when you execut e a backup/resto re task wi th a virtual machine runn ing on th is host. After you add an ESX host/vCenter you will be ab le to p erform backup /reco[...]

  • Page 77

    77 Copyr ight © Acronis, In c., 200 0-2011 Managing ESX hosts page, Add Host/vCenter dialo g 1 2. 5. 3 A d d i n g a n E S X h o s t wh i c h i s a p a r t o f v C e n t e r When you directly add an E SX host which is a part of vC enter inst ead of adding the vCenter itself, th e main conc ern is that Acronis vmProtect Ag ent will not be able to t[...]

  • Page 78

    78 Copyr ight © Acronis, In c., 200 0-2011 domainusername fo rmat. You can ch eck the co nnection with t he Test connection button to ensure that t he provided creden tials are co rrect. Click OK to add your E SX host/vCenter. Managing ESX Hosts page, Enter credentia l s dialo g 1 2. 5. 5 R e m o v i n g E S X h o s t Removing an ESX ho st from A[...]

  • Page 79

    79 Copyr ight © Acronis, In c., 200 0-2011 Managing ESX hosts page, R e move host d i alog 12 .6 Ma nag i ng se tt i ng s 1 2. 6. 1 M a n a g i n g O n l i n e B a c k u p P r o x y Click Online Backup Proxy in the Configure tab o f the Acronis vmProtec t main ribbon menu to o pen the Onl ine Backup Pr oxy settings page. Online backup proxy settin[...]

  • Page 80

    80 Copyr ight © Acronis, In c., 200 0-2011 Managing se tti n gs, Online backu p proxy To set up proxy server settings: Select t he Use a proxy server check b ox.  In Address , specify t he networ k name or IP address of the proxy server, for example: proxy.example.com or 192.168.0.1  In Port , specify t he port nu mber of the proxy server, f[...]

  • Page 81

    81 Copyr ight © Acronis, In c., 200 0-2011  Google Chrome. In Optio ns , click Under the Hood . Under Network , click Change proxy settings . 1 2. 6. 2 M a n a g i n g A g e n t P a ss w o r d Click th e Agent Passw ord button in the Configure tab of the Acronis vmProtect mai n ribbon menu to change you r User p assword . Here you c an ch ange [...]

  • Page 82

    82 Copyr ight © Acronis, In c., 200 0-2011 13 Be st Pr act ice s In this sec tion we will give a few examples o f some op erations with Acronis vmProtect . After you installed your Acron is vmProtect A gent you have to conne ct to it with your access credent ials. 1. Add ESX host First of all, to be able to p erform backup and o ther operations, y[...]

  • Page 83

    83 Copyr ight © Acronis, In c., 200 0-2011 In order t o do that, you have to run the Restore b ackup task wizard which wil l guide you thro ugh all the st eps of the restore process. Click Restore i n the Home tab of the main menu. T hen go t hrough the wizard. T he detailed informat ion can be found in the "Restoring a backup of virtual mach[...]

  • Page 84

    84 Copyr ight © Acronis, In c., 200 0-2011 14 S u ppor t 14 .1 Te ch ni ca l S upp or t Maintenance and Support Program If you need assistance with your Acronis product , please go to http://www.acronis.com/support / Product Updates You can download t he latest updat es for all your registered Ac ronis software produc ts from our website at any ti[...]

  • Page 85

    85 Copyr ight © Acronis, In c., 200 0-2011 15 G los sa ry A Ag ent (A cron is vm Pro t ect Age nt ) An application that performs backup and recovery o f t he virtual mach ines and enables o ther management operations on the VM Ware ESX/ESXi infrast ruct ure such as task management and operations with available bac kups, machines, etc. Acronis vmPr[...]

  • Page 86

    86 Copyr ight © Acronis, In c., 200 0-2011 B B a c ku p The result of a single backup operat ion (p. 86 ) as a single recovery point (p. 92 ) i nside archive (p. 86 ) . Physically, it i s a file that contains a copy o f the backed up data (virtual machine volume s) from specific dat e and time for a spe cific virtual machine. Ba ckup files created[...]

  • Page 87

    87 Copyr ight © Acronis, In c., 200 0-2011 B a c ku p ta sk (Ta sk) A set o f rules that specify h ow the given virtual machin e or a set of virtual mac hines will be protec ted. A bac kup task spec ifies:  What d ata to b ack up (i.e. which machines t o bac k up).  Where to store the backup archive (t he bac kup archive name and location). [...]

  • Page 88

    88 Copyr ight © Acronis, In c., 200 0-2011 C CB T ( Cha ng ed B l oc k T rac king ) A feature o f VMWare ESX which allows to identify whic h blocks of the virtual disks have chan ged and to transfer only those blocks d uring the backup/replication pro cess. For example when using CBT techn ology, the i ncremental bac kup speed can increase up to 2[...]

  • Page 89

    89 Copyr ight © Acronis, In c., 200 0-2011 Deduplication in Acronis vmProtec t is managin g dat a within only o ne backup arch ive. For ex ample if the bac kups are saved into 2 different archives (even if t hey are in t he same location) then t here will be no relations between these arc hi ves and t hey may contain duplicated data. D iff er ent [...]

  • Page 90

    90 Copyr ight © Acronis, In c., 200 0-2011 D ynam ic d is k A hard disk managed by Logical D isk Manager (LD M) th at is available in Windows start i ng with Windows 200 0. LD M helps flexibly allocate volum es on a st orage device for better fault tolerance, better performance or larger volume size. A dynamic disk c an use either t he master boot[...]

  • Page 91

    91 Copyr ight © Acronis, In c., 200 0-2011  To reduce the access time (a striped volume).  To achieve fault t olerance b y introducing redundan cy (mirrored and RAID -5 vo lumes). When bac king up virtual mach ines which c ontain d ynamic disks inside, Acron is vmProtect backs u p the logical dynamic volumes instead o f the entire dynamic d [...]

  • Page 92

    92 Copyr ight © Acronis, In c., 200 0-2011 I In cr em enta l ba cku p A bac kup (p. 85 ) that stores chan ges to the data against the latest backup. Y ou need access t o other backups from th e same archive (p. 85 ) to rest ore data from an inc remental backup. L Le ga cy m ode Ar ch i ve See Backup archive (p. 86 ). M Ma chi n e (V irtu al ma chi[...]

  • Page 93

    93 Copyr ight © Acronis, In c., 200 0-2011 R eg ist ere d ma ch in e A virtual machine mana ged by Acronis vmProtec t Agen t. All virtual mac hines which reside o n th e registered ESX/ESXi ho st o r vCenter are automatic ally regi stered and can be managed b y Acronis vmProtect A gent. R ep lic ati on A pro cess of repl icating the v irtual machi[...]

  • Page 94

    94 Copyr ight © Acronis, In c., 200 0-2011 U U ni ver sal Re st or e ( Acr oni s Un iv ersal R est ore ) The Acro nis proprietary techno logy that helps boo t up Windows on dissimilar hardware or a virtual machine. The Universal Restore han dles differenc es i n devices t hat are critic al for the operat i ng system start -up, such as storage cont[...]

  • Page 95

    95 Copyr ight © Acronis, In c., 200 0-2011 vC ent er VMware vCenter Server, formerl y VMware Virt ualCenter, cent ral ly manages VMware vSphere environments al lowing IT administrators dramat i cally i mproved contro l over the v irtual environment compared to other management platforms. See more det ails at htt p://www.vmware.com/product s/ vcent[...]