Quest Engineering DL1300 Kurzanleitung

DL1300 Appliance
Deployment Guide

DL1300 Appliance 2
Table of Contents
Notes, cautions, and warnings................................................................................................................5
Introducing your Quest DL1300.............................................................................................................. 6
Quest DL1300 core technologies.................................................................................................... 6
Live Recovery.......................................................................................................................... 6
Universal Recovery.................................................................................................................. 6
True Global Deduplication....................................................................................................... 7
Encryption.................................................................................................................................7
Quest DL1300 data protection features.......................................................................................... 7
Quest DL1300 Core.................................................................................................................7
Quest DL1300 Smart Agent.................................................................................................... 8
Snapshot process.................................................................................................................... 8
Replication — disaster recovery site or service provider........................................................ 8
Recovery.................................................................................................................................. 9
Recovery-as-a-Service............................................................................................................. 9
Virtualization and cloud............................................................................................................9
Quest DL1300 deployment architecture........................................................................................10
Other information you may need...................................................................................................11
Installing your Quest DL1300................................................................................................................13
Introduction.....................................................................................................................................13
Available configurations......................................................................................................... 13
Installation overview.......................................................................................................................14
Installation prerequisites................................................................................................................ 14
Network requirements............................................................................................................ 14
Recommended network infrastructure................................................................................... 14
Setting up the hardware................................................................................................................ 15
Installing the DL1300 appliance in a rack............................................................................. 15
Using the system without a rack........................................................................................... 15
Cabling the appliance............................................................................................................ 16
Connecting the Cable Management Arm (Optional)..............................................................16
Turning on the DL1300 Appliance.........................................................................................16
Initial software setup......................................................................................................................16
AppAssure Appliance Configuration Wizard..........................................................................17
Configuring the network interface.................................................................................. 17
Configuring host name and domain settings................................................................. 18
Configuring SNMP settings............................................................................................ 19
Recovery and Update Utility..........................................................................................................20

DL1300 Appliance 3
Rapid Appliance Self Recovery.....................................................................................................20
Creating the RASR USB key.................................................................................................20
Executing RASR.................................................................................................................... 21
Configuring Your Quest DL1000........................................................................................................... 23
Configuration overview.................................................................................................................. 23
Configuring browsers to remotely access the DL1300 Core Console...........................................23
Configuring browser settings in Internet Explorer and Chrome.............................................24
Configuring browser settings in Firefox................................................................................. 24
Accessing the DL1300 Core Console........................................................................................... 24
Updating trusted sites in Internet Explorer............................................................................ 25
Managing licenses......................................................................................................................... 25
Contacting the license portal server...................................................................................... 26
Changing a license key......................................................................................................... 26
Changing the AppAssure language manually....................................................................... 26
Changing the operating system language during installation................................................ 27
Encrypting agent snapshot data....................................................................................................27
Configuring an Email server and Email notification template........................................................28
Preparing to protect your servers......................................................................................................... 30
Protecting machines...................................................................................................................... 30
Checking network connectivity...............................................................................................31
Checking the firewall settings................................................................................................ 31
Checking DNS resolution.......................................................................................................31
Teaming network adapters.................................................................................................... 31
Reinstalling Broadcom Advanced Configuration Suite.................................................. 32
Creating the NIC team................................................................................................... 32
Adjusting concurrent streams................................................................................................ 33
Installing agents on clients............................................................................................................ 33
Installing agents remotely (Push).......................................................................................... 33
Deploying the Agent Software when protecting a machine...................................................34
Installing Microsoft Windows agents at the client......................................................................... 35
Adding an agent by using the license portal.................................................................................35
Installing agents on Linux machines............................................................................................. 36
Location of Linux agent files..................................................................................................37
Agent dependencies.............................................................................................................. 38
Installing the agent on Ubuntu...................................................................................................... 39
Installing the agent on Red Hat Enterprise Linux and CentOS.....................................................39
Installing the agent on SUSE Linux Enterprise Server................................................................. 40
Common use cases...............................................................................................................................41

DL1300 Appliance 4
Protecting machines...................................................................................................................... 41
Snapshots...............................................................................................................................41
Quest DL1300 Smart Agents.................................................................................................41
Deploying Smart Agents........................................................................................................ 41
Step 1: Obtaining the Agent Software........................................................................... 42
Step 2: Install the Agent Software................................................................................. 42
Configuring protection jobs.................................................................................................... 43
Protecting a machine............................................................................................................. 43
Recovering data.............................................................................................................................45
Recovering directories or files............................................................................................... 45
Restoring volumes................................................................................................................. 46
Bare Metal Recovery..................................................................................................................... 47
Prerequisites for performing a Bare Metal Restore for a Windows machine.........................48
Roadmap for performing a Bare Metal Restore for a Windows machine.............................. 48
Replicating recovery points........................................................................................................... 48
Setting up your environment..................................................................................................49
Steps for configuring replication............................................................................................ 50
Using virtual standby..................................................................................................................... 51
Performing a one-time Hyper-V export..................................................................................51
Defining one-time settings for performing a Hyper-V export..........................................51
Performing a continuous (virtual standby) Hyper-V export....................................................52
Managing recovery points............................................................................................................. 53
Archiving data........................................................................................................................ 54
Creating an archive........................................................................................................ 54
Archiving to a cloud............................................................................................................... 56
Getting help........................................................................................................................................... 57
Finding documentation and software updates...............................................................................57
Contacting Quest........................................................................................................................... 57
Documentation feedback............................................................................................................... 57

DL1300 Appliance
Notes, cautions, and warnings 5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to
avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2017 Quest Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. Quest and the Quest logo are trademarks of Quest Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

DL1300 Appliance
Universal Recovery 6
Introducing your Quest DL1300
Your Quest DL1300 combines backup and replication into a unified data protection product. It provides reliable
application data recovery from your backups to protect virtual machines and physical machines. Your appliance
is capable of handling up to terabytes of data with built-in global deduplication, compression, encryption, and
replication to specific private or public cloud infrastructure. Server applications and data can be recovered in
minutes for data retention and compliance purposes.
Your DL1300 supports multi-hypervisor environments on VMware vSphere, Oracle VirtualBox and Microsoft
Hyper-V private and public clouds.
Quest DL1300 core technologies
Your appliance combines the following technologies:
•Live Recovery
•Universal Recovery
•True Global Deduplication
•Encryption
Parent topic
Live Recovery
Live Recovery is instant recovery technology for VMs or servers. It gives you near-continuous access to data
volumes on virtual or physical servers.
DL1300 backup and replication technology records concurrent snapshots of multiple VMs or servers, providing
near instantaneous data and system protection. You can resume the use of the server by mounting the recovery
point without waiting for a full restore to production storage.
Parent topic
Universal Recovery
Universal Recovery provides unlimited machine restoration flexibility. You can restore your backups from physical
systems to VMs, VMs to VMs, VMs to physical systems, or physical systems to physical systems, and carry out
bare metal restores to dissimilar hardware.
Universal Recovery technology also accelerates cross-platform moves among virtual machines. For example,
moving from VMware to Hyper-V or Hyper-V to VMware. It builds in application-level, item-level, and object-level
recovery (individual files, folders, email, calendar items, databases, and applications).
Parent topic

DL1300 Appliance
Quest DL1300 Core 7
True Global Deduplication
True Global Deduplication eliminates redundant or duplicate data by performing incremental block-level backups
of the machines.
The typical disk layout of a server consists of the operating system, application, and data. In most environments,
the administrators often use a common version of the server and desktop operating system across multiple
systems for effective deployment and management. When backup is performed at the block-level across multiple
machines, it provides a more granular view of what is in the backup and what is not, irrespective of the source.
This data includes the operating system, the applications, and the application data across the environment.
Figure 1. Diagram of True Global Deduplication
Parent topic
Encryption
Your DL1300 provides encryption to protect backups and data-at-rest from unauthorized access and use,
ensuring data privacy. The data can be accessed and decrypted using the encryption key. Encryption is
performed inline on snapshot data, at line speeds without impacting performance.
Parent topic
Quest DL1300 data protection features
Parent topic
Quest DL1300 Core
The Core is the central component of the DL1300 deployment architecture. The Core stores and manages
machine backups and provides services for backup, recovery, retention, replication, archival, and management.
The Core is a self-contained network, addressable computer that runs a 64-bit version of Microsoft Windows

DL1300 Appliance
Replication — disaster recovery site or service provider 8
Server 2012 R2 Foundation and Standard operating systems.The appliance performs target-based inline
compression, encryption, and data deduplication of the data received from the agent. The Core then stores the
snapshot backups in the repository, which resides on the appliance. Cores are paired for replication.
The repository resides on internal storage within the Core. The Core is managed by accessing the following URL
from a JavaScript enabled web browser: https://CORENAME:8006/apprecovery/admin.
Parent topic
Quest DL1300 Smart Agent
The Smart Agent is installed on the core-protected machine. The Smart Agent tracks the changed blocks on
the disk volume and then snaps an image of the changed blocks at a predefined interval of protection. The
incremental block-level snapshots’ forever approach prevents repeated copying of the same data from the
protected machine to the Core.
After the agent is configured, it uses smart technology to track the changed blocks on the protected disk volumes.
When the snapshot is ready, it is rapidly transferred to the Core using intelligent multi-threaded, socket-based
connections.
Parent topic
Snapshot process
Your DL1300 protection process begins when a base image is transferred from a protected machine to the Core.
In this phase, full copy of the machine is transported across the network under normal operation, followed by
incremental snapshots forever. The DL1300 Agent for Windows uses Microsoft Volume Shadow copy Service
(VSS) to freeze and quiesce application data to disk to capture a file-system-consistent and an application-
consistent backup. When a snapshot is created, the VSS writer on the target server prevents content from being
written to the disk. During the process of halting of writing content to disk, all disk I/O operations are queued
and resume only after the snapshot is complete, while the operations in progress will be completed and all open
files will be closed. The process of creating a shadow copy does not significantly affect the performance of the
production system.
Your DL1300 uses Microsoft VSS because it has built-in support for all Windows internal technologies such
as NTFS, Registry, Active Directory, to flush data to disk before the snapshot. Additionally, other enterprise
applications, such as Microsoft Exchange and SQL, use VSS Writer plug-ins to get notified when a snapshot
is being prepared and when they have to flush their used database pages to disk to bring the database to a
consistent transactional state. The captured data is rapidly transferred and stored on the Core.
Parent topic
Replication — disaster recovery site or service
provider
Replication is the process of copying recovery points from an AppAssure core and transmitting them to another
AppAssure core in a separate location for disaster recovery. The process requires a paired source-target
relationship between two or more cores.
The source core copies the recovery points of selected protected machines, and then asynchronously and
continually transmits the incremental snapshot data to the target core at a remote disaster recovery site. You
can configure outbound replication to a company-owned data center or remote disaster recovery site (that is, a
“self-managed” target core). Or, you can configure outbound replication to a third-party managed service provider
(MSP) or cloud provider that hosts off-site backup and disaster recovery services. When replicating to a third-
party target core, you can use built-in work flows that let you request connections and receive automatic feedback
notifications.

DL1300 Appliance
Virtualization and cloud 9
Replication is managed on a per-protected-machine basis. Any machine (or all machines) protected or replicated
on a source core can be configured to replicate to a target core.
Replication is self-optimizing with a unique Read-Match-Write (RMW) algorithm that is tightly coupled with
deduplication. With RMW replication, the source and target replication service matches keys before transferring
data and then replicates only the compressed, encrypted, deduplicated data across the WAN, resulting in a 10x
reduction in bandwidth requirements.
Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of
the protected machines, which can add up to hundreds or thousands of gigabytes of data. Initial replication can
be seeded to the target core using external media. This is typically useful for large sets of data or sites with slow
links. The data in the seeding archive is compressed, encrypted and deduplicated. If the total size of the archive
is larger than the space available on the removable media, the archive can span across multiple devices based
on the available space on the media. During the seeding process, the incremental recovery points replicate to the
target site. After the target core consumes the seeding archive, the newly replicated incremental recovery points
automatically synchronize.
Parent topic
Recovery
Recovery can be performed in the local site or the replicated remote site. After the deployment is in steady state
with local protection and optional replication, the DL1300 Core allows you to perform recovery using Verified
Recovery, Universal Recovery, or Live Recovery.
Parent topic
Recovery-as-a-Service
Managed Service Providers (MSPs) can fully leverage DL1300 as a platform for delivering Recovery As A
Service (RaaS). RaaS facilitates complete recovery-in-the-cloud by replicating customers' physical and virtual
servers. The service provider's cloud are used as virtual machines to support recovery testing or actual recovery
operations. Customers wanting to perform recovery-in-the-cloud can configure replication on their protected
machines on the local cores to an AppAssure service provider. In the event of a disaster, the MSPs can instantly
spin-up virtual machines for the customer.
The DL1300 is not multi-tenant. The MSPs can use the DL1300 at multiple sites and create a multi-tenant
environment at their end.
Parent topic
Virtualization and cloud
The DL1300 Core is cloud-ready, which allows you to leverage the compute capacity of the cloud for recovery and
archive.
DL1300 can export any protected or replicated machine to licensed versions of VMware or Hyper-V. With
continuous exports, the virtual machine is incrementally updated after every snapshot. The incremental updates

DL1300 Appliance
Quest DL1300 deployment architecture 10
are fast and provide standby-clones that are ready to be powered up with a click of a button. The supported virtual
machine exports are:
• VMware Workstation or Server on a folder
• Direct export to a Vsphere or VMware ESXi host
• Export to Oracle VirtualBox
• Microsoft Hyper-V Server on Windows Server 2008 (x64)
• Microsoft Hyper-V Server on Windows Server 2008 R2
• Microsoft Hyper-V Server on Windows Server 2012 R2
You can now archive your repository data to the cloud using platforms such as Microsoft Azure, Amazon S3,
Rackspace Cloud Block Storage, or other OpenStack-based cloud services.
Parent topic
Quest DL1300 deployment architecture
Your DL1300 deployment architecture consists of local and remote components. The remote components may
be optional for those environments that do not require leveraging a disaster recovery site or a managed service
provider for off-site recovery. A basic local deployment consists of a backup server called the Core and one or
more protected machines known as the agents. The off-site component is enabled using replication that provides
full recovery capabilities in the disaster recovery site. The DL1300 Core uses base images and incremental
snapshots to compile recovery points of protected agents.
Also, DL1300 is application-aware because it can detect the presence of Microsoft Exchange and SQL and their
respective databases and log files. Backups are performed by using application-aware block-level snapshots.
DL1300 performs log truncation of the protected Microsoft Exchange server.
The following diagram depicts a simple DL1300 deployment. DL1300 Agents are installed on machines such as a
file server, email server, database server, or virtual machines are connected to and protected by a single DL1300
Core, which consists of the central repository. The Quest software License Portal manages license subscriptions,
groups and users for the agents and cores in your environment. The License Portal allows users to log in, activate
accounts, download software, and deploy agents and cores per your license for your environment.
Figure 2. Quest DL1300 Deployment Architecture
You can also deploy multiple DL1300 Cores as shown in the following diagram. A central console manages
multiple cores.
Inhaltsverzeichnis
Andere Quest Engineering Server Handbücher
Beliebte Server Handbücher anderer Marken

iRobo
iRobo IPC2U Bedienungsanleitung

Nortel
Nortel 1000 Con?guration guide Bedienungsanleitung

Asus
Asus AP7500 Bedienungs- und Wartungshandbuch

Avid Technology
Avid Technology AirSpeed 5000 Bedienungsanleitung

HP
HP Integrity rx2600 Installationsanleitung

Milestone
Milestone Husky IVO 350T Bedienungsanleitung













