Many
Manuals
search
Kategorie
Marki
Strona główna
ACRONIS
Oprogramowanie do odzyskiwania kopii zapasowych
Backup & Recovery 10 Advanced Server Virtual Edition
Podręcznik Użytkownika
ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition Podręcznik Użytkownika Strona 29
Pobierz
Podziel się
Dzielenie się
Dodaj do moich podręczników
Drukuj
Strona
/
410
Spis treści
ROZWIĄZYWANIE PROBLEMÓW
BOOKMARKI
Oceniono
.
/ 5. Na podstawie
oceny klientów
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
Copyrig
ht © A
croni
s, In
c., 200
0
-
20
09
29
The following diagram illustrates the notions discussed abov
e. For more definitions please refer to
the Glossary.
1
2
...
24
25
26
27
28
29
30
31
32
33
34
...
409
410
User's Guide
1
Table of Contents
3
1.2. Getting started
8
• Using deduplication
10
Navigation tree
12
Shortcuts bar
13
"Tasks" view
15
Action pages
16
1.3.1. Agent for Windows
18
1.3.2. Agent for Linux
19
1.3.3. Agent for ESX/ESXi
19
1.3.5.1. Management Server
20
VMware vCenter integration
21
1.3.5.2. Storage Node
21
1.3.5.3. PXE Server
22
1.3.5.4. License Server
22
1.3.6. Management Console
23
1.5. Supported file systems
25
1.6. Hardware requirements
25
1.7. Technical support
26
2.1. Basic concepts
28
Backup using bootable media
30
2.3. Owners and credentials
33
Full backup
35
Incremental backup
35
Differential backup
35
2.5. GFS backup scheme
36
The resulting archive: ideal
38
The resulting archive: real
39
Tower of Hanoi overview
40
Tower of Hanoi by Acronis
41
2.7. Retention rules
42
Combination of rules 1 and 2
44
Best practices
45
Backing up dynamic volumes
45
Recovering dynamic volumes
46
Software RAID arrays
49
Hardware RAID arrays
50
Virtual machines backup
51
Guest operating systems
52
Guest HDD
52
Troubleshooting
53
2.12. Tape support
54
2.13.1. Acronis Secure Zone
56
Limitation
57
Restore)
58
Limitations
59
Getting Universal Restore
59
Supported operating systems
59
How it works
60
Usage scenarios
60
How to use
60
2.14.1. Basic concepts
61
Setting up the storage node
64
2.14.3.4. Example
67
Policy on a machine
70
Policy on a group
70
Backup policy state diagram
75
2.14.6. Deduplication
77
Deduplication database
78
Deduplication at source
78
Deduplication at target
79
What ratio to expect
81
Local connection
82
Remote connection
82
Example 1
84
Example 2
85
On a domain controller
86
Remote Agent ports
90
Client Encryption options
91
Server Encryption options
92
2.14.8.5. SSL certificates
93
Self-signed certificates
94
Non-self-signed certificates
95
3. Options
96
3.1.3. Time-based alerts
97
3.1.4. Number of tasks
97
3.1.5. Fonts
98
3.2.1. Logging level
98
3.2.2. Log cleanup rules
98
3.2.3. Event tracing
99
3.2.5. Acronis WOL Proxy
100
3.3. Machine options
102
3.3.2. Event tracing
103
Windows
104
3.3.3. Log cleanup rules
105
3.4.1.1. Archive protection
108
3.4.1.3. Pre/Post commands
109
Pre-backup command
110
Post-backup command
111
Pre-data capture command
112
Post-data capture command
112
• Always create a snapshot
113
• Do not create a snapshot
113
Volume shadow copy writers
114
3.4.1.8. Compression level
115
3.4.1.9. Backup performance
115
Backup priority
115
HDD writing speed
116
Network connection speed
116
3.4.1.10. Notifications
117
Messenger service (WinPopup)
118
3.4.1.11. Event tracing
118
Windows event log
118
SNMP notifications
119
3.4.1.13. Backup splitting
120
3.4.1.15. Media components
121
3.4.1.16. Error handling
122
3.4.1.17. Dual destination
123
Skip the task execution
124
3.4.1.20. Tape support
125
Always use a free tape
126
Reset archive bit
127
Use FTP in Active mode
128
3.4.2.1. Pre/Post commands
130
Pre-recovery command
131
Post-recovery command
131
3.4.2.2. Recovery priority
132
3.4.2.4. Notifications
132
3.4.2.5. Event tracing
134
3.4.2.6. Error handling
135
4. Vaults
138
4.1. Centralized vaults
139
Vault toolbar
140
Pie chart with legend
140
Vault content
141
Vault path
143
Vault database path
144
Vault encryption
144
4.1.3. Tape libraries
146
4.1.3.1. Overview
147
4.1.3.2. Hardware
147
4.1.3.3. Limitations
148
4.1.3.4. RSM Media Pools
148
Prerequisites
149
Backing up to tape library
151
Recovering from tape library
151
Inventory
152
Labeling
153
4.1.3.7. Tape support
154
4.1.3.8. Tape rotation
155
Choosing a backup scheme
155
Criteria of the choice
156
Case to analyze
156
GFS Example 1
158
GFS Example 2
161
GFS Example 3
162
ToH Example 1
164
ToH Example 2
165
ToH Example 3
166
Tape planning
167
Tape planning: Example 1
168
Tape planning: Example 2
168
4.1.3.9. What if
169
4.2. Personal vaults
170
4.3. Common operations
173
To show or hide columns
176
5. Scheduling
177
5.1. Daily schedule
178
Examples
179
5.2. Weekly schedule
180
5.3. Monthly schedule
182
Parameters
185
Use Wake-On-LAN
187
5.6. Conditions
188
5.6.1. User is idle
189
5.6.3. Fits time interval
190
5.6.4. User logged off
191
6. Direct management
193
Activities
194
Way of working
195
System view
195
Backup plan execution states
196
Backup plan statuses
197
Task states
197
Task statuses
198
• Backup plan (p. 209)
199
• Recovery task (p. 230)
199
• Validation task (p. 251)
199
Run backup plan
203
Task details
203
Archive
204
Settings
204
Backup plan details
205
6.1.3. Log
206
• Click View Details
207
6.1.3.3. Log entry details
208
6.2. Creating a backup plan
209
How to back up
210
Archive validation
210
Backup options
210
Convert to VM
210
To specify credentials
211
6.2.3. Source type
212
6.2.4. Items to back up
213
6.2.6. Exclusions
215
6.2.7. Archive
216
2. Using the archives table
217
3. Naming the new archive
217
6.2.9. Backup schemes
218
6.2.9.1. Back up now scheme
219
6.2.9.3. Simple scheme
219
Description
220
At a glance
223
Example
224
Roll-back period
224
6.2.10. Archive validation
228
6.3. Recovering data
230
General
231
What to recover
231
Where to recover
232
When to recover
232
Recovery options
232
6.3.1. Task credentials
233
6.3.2. Archive selection
233
6.3.3. Data type
234
6.3.4. Content selection
234
6.3.4.2. Files selection
235
6.3.6.1. Disks
236
Disk destination
237
NT signature
237
6.3.6.2. Volumes
237
Recover to:
238
MBR destination
239
Volume destination
239
Volume properties
239
6.3.6.5. File destination
241
Exclusions
242
6.3.8. When to recover
243
6.3.9. Universal Restore
243
Preparation
244
Universal Restore settings
244
Windows NT/2000/XP/2003
249
Windows Vista/2008
249
What to validate
252
When to validate
252
6.4.1. Task credentials
253
6.4.2. Archive selection
253
6.4.3. Backup selection
254
6.4.4. Location selection
254
6.5. Mounting an image
255
6.5.1. Archive selection
256
6.5.2. Backup selection
257
6.5.3. Access credentials
257
6.6. Managing mounted images
258
Unmounting images
259
6.7.1. Task credentials
261
6.7.2. Archive selection
262
6.7.3. Backup selection
263
6.7.5. Location selection
263
6.8. Acronis Secure Zone
265
Activate
269
Do not activate
269
6.10. Bootable media
270
Linux-based bootable media
271
PE-based bootable media
271
Using Bart PE
272
Kernel parameters
273
Network settings
274
Network port
275
2.0 is 512MB
277
To add an iSCSI device
280
To add an NDAS device
280
Linux commands and utilities
281
Mounting backup volumes
285
6.10.6. Acronis PXE Server
286
6.11. Disk management
288
Starting the operations
289
6.11.5. Disk operations
290
Using advanced options
292
System disk conversion
294
6.11.6. Volume operations
296
Types of dynamic volumes
297
Create volume wizard
298
Select destination disks
298
Set the volume size
299
Set the volume options
299
6.11.6.2. Delete volume
300
6.11.6.3. Set active volume
301
6.11.6.6. Format volume
302
6.11.7. Pending operations
303
7. Centralized management
304
7.1.2. Backup policies
306
Machines selection
309
7.1.2.4. Policy details
310
7.1.3. Physical machines
311
Applying policies
313
Grouping actions
313
Other actions
314
To add a machine
315
• installing the agent
315
Text file requirements
316
Adding machines to a group
318
Machine details
318
Plans and tasks
320
Inheritance order
323
7.1.3.2. Actions on groups
324
Adding multiple criteria
325
Move one group to another
327
Editing custom groups
327
Group details
327
7.1.4. Virtual machines
329
Grouping of virtual machines
330
• Host/VA
331
7.1.5. Storage nodes
333
• Information panel
334
Adding a storage node
336
7.1.6. Tasks
337
7.1.7. Log
339
Configuring the log table
342
7.1.8. Reporting
343
Generating reports
344
Filters
344
Report view
344
Report coverage
347
7.1.8.8. Column selection
348
7.1.8.9. Report view
348
Connection parameters
361
Event tracing parameters
363
When to modify
365
What to back up
366
Where to back up
366
7.3.1. Policy credentials
368
7.3.2. Items to back up
368
7.3.4. Exclusions
373
7.3.5. Archive
374
7.3.7.1. Back up now scheme
376
7.3.7.3. Simple scheme
377
Resulting tasks
385
7.3.8. Archive validation
386
Glossary
387
Backup plan (Plan)
389
Backup policy (Policy)
389
Backup scheme
390
Bootable agent
390
Bootable media
390
Built-in group
390
Centralized backup plan
391
Centralized management
391
Centralized task
391
Centralized vault
391
Cleanup
392
Consolidation
392
Deduplicating vault
392
Deduplication
392
Direct management
393
Disk backup (Image)
393
Disk group
393
Dynamic disk
394
Dynamic group
394
Dynamic volume
395
Encrypted archive
395
Encrypted vault
395
Managed vault
397
Media builder
397
Personal vault
397
Physical machine
397
Storage node-side cleanup
399
Storage node-side validation
399
Tower of Hanoi
399
Unmanaged vault
400
Validation
400
Validation rules
400
Virtual machine
401
Komentarze do niniejszej Instrukcji
Brak uwag
Publish
Powiązane produkty i podręczniki dla Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS Backup & Recovery 10 UR Advanced Server Instrukcja Obsługi
(10 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS Disk Director 11 Home Podręcznik Użytkownika
(96 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Przewodnik Instalacji
(59 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS TRUE IMAGE 9.0 - HOME Podręcznik Użytkownika
(124 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU Podręcznik Użytkownika
(182 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS TRUE IMAGE 9.0 - HOME Instrukcja Użytkownika
(16 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS TRUE IMAGE 9.0 - HOME Podręcznik Użytkownika
(31 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP AND RECOVERY 10 ONLINE STAND-ALONE Podręcznik Użytkownika
(31 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Przewodnik Instalacji
(69 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP RECOVERY 10 MANAGEMENT SERVER REPORTS - Przewodnik Instalacji
(31 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - INSTALLATION UPDATE 3 Podręcznik Użytkownika
(16 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Instrukcja Użytkownika
(10 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Dokumentacja
(88 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS MIGRATE EASY 7.0 Podręcznik Użytkownika
(78 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Instrukcja Użytkownika
(23 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS TRUE IMAGE 8.0 Podręcznik Użytkownika
(81 strony)
Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - INSTALLATION UPDATE 3 Przewodnik Instalacji
(33 strony)
Drukuj dokument
Drukuj stronę 29
Komentarze do niniejszej Instrukcji