Dell DL1000 Appliance Users Guide - Page 51

Monitoring the protection of multiple machines

Page 51 highlights

• If you have selected a Typical configuration for the Protect Multiple Machines Wizard and specified custom protection, click Next and set up a custom schedule. • If you have selected Advanced configuration for the Protect Machine Wizard, click Next and proceed to Step 9 to see repository and encryption options. 9. On the Repository page select Use an existing repository. 10. Click Next. The Encryption page appears. 11. To enable encryption, on the Encryption page, select Enable Encryption. Encryption key fields appear on the Encryption page. NOTE: If you enable encryption, it will be applied to data for all protected volumes for the machines you have specified for protection. You can change the settings later from the Configuration tab in the Core Console. For more information about encryption, see Managing Security . 12. Enter the information as described in the following table to add an encryption key for the Core. Text Box Description Name Enter a name for the encryption key. Description Enter a description to provide additional details for the encryption key. Passphrase Enter the passphrase used to control access. Confirm Passphrase Re-enter the passphrase you just entered. 13. Click Finish to save and apply your settings. Monitoring the protection of multiple machines You can monitor the progress as AppAssure applies the protection polices and schedules to the machines. To monitor the protection of multiple machines navigate to the Core Console Home tab and click Events . The Events tab displays Tasks, Alerts, and Events. When volumes are transferred, the status, start times, and end times display in the Tasks pane. You can also filter tasks by status (active, waiting, completed and failed). As each protected machine is added, an alert is logged, indicating if the operation was successful or if errors were logged. 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

If you have selected a Typical configuration for the
Protect Multiple Machines Wizard
and
specified custom protection, click
Next
and set up a custom schedule.
If you have selected Advanced configuration for the Protect Machine Wizard, click
Next
and
proceed to Step 9 to see repository and encryption options.
9.
On the
Repository
page select
Use an existing repository
.
10.
Click
Next
.
The
Encryption
page appears.
11.
To enable encryption, on the
Encryption
page, select
Enable Encryption
.
Encryption key fields appear on the
Encryption
page.
NOTE:
If you enable encryption, it will be applied to data for all protected volumes for the
machines you have specified for protection. You can change the settings later from the
Configuration
tab in the Core Console. For more information about encryption, see
Managing
Security
.
12.
Enter the information as described in the following table to add an encryption key for the Core.
Text Box
Description
Name
Enter a name for the encryption key.
Description
Enter a description to provide additional details for the encryption key.
Passphrase
Enter the passphrase used to control access.
Confirm
Passphrase
Re-enter the passphrase you just entered.
13.
Click
Finish
to save and apply your settings.
Monitoring the protection of multiple machines
You can monitor the progress as AppAssure applies the protection polices and schedules to the
machines.
To monitor the protection of multiple machines navigate to the Core Console Home tab and click
Events
.
The Events tab displays Tasks, Alerts, and Events. When volumes are transferred, the status, start times,
and end times display in the Tasks pane. You can also filter tasks by status (active, waiting, completed and
failed).
As each protected machine is added, an alert is logged, indicating if the operation was successful or if
errors were logged.
51