docu79471.pdf - RecoverPoint for Virtual Machines Version...

This preview shows page 1 - 5 out of 77 pages.

RecoverPoint for Virtual MachinesVersion 5.0Installation and Deployment GuideP/N 302-003-382REV 02
We have textbook solutions for you!
/Linux-and-LPIC-1-Guide-to-Linux-Certification-5th-Edition-9781337569798-1291/
The document you are viewing contains questions related to this textbook.
Chapter 13 / Exercise 1
Linux+ and LPIC-1 Guide to Linux Certification
Eckert
Expert Verified
Copyright©2016-2017 Dell Inc. or its subsidiaries. All rights reserved.Published February 2017Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KINDWITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBEDIN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.Published in the USA.EMC CorporationHopkinton, Massachusetts 01748-91031-508-435-1000 In North America 1-866-464-73812RecoverPoint for Virtual Machines5.0Installation and Deployment Guide
79Preface11Purpose.......................................................................................................12Audience.....................................................................................................12Related documentation...............................................................................12Introduction to RecoverPoint for VMs13RecoverPoint for VMs system.....................................................................14Preparing to install RecoverPoint for VMs17RecoverPoint for VMs networking example................................................18Planning your system..................................................................................19System limitations..........................................................................19Choosing a vRPA topology.............................................................19Choosing a vRPA performance profile...........................................20Allocating IP addresses..................................................................20Choosing a network adapter topology...........................................20Documenting your installation settings..........................................21Preparing the VMware environment...........................................................22Supported vSphere versions..........................................................22Preparing the network...................................................................22Preparing the storage....................................................................23Understanding the installation flow............................................................24Installing RecoverPoint for VMs27Downloading the installation package.........................................................28Creating vRPAs..........................................................................................28Creating vRPA clusters..............................................................................29Connecting between vRPA clusters............................................................31Changing default passwords.......................................................................32Registering and licensing your system........................................................32Registering ESXi clusters...........................................................................32Protecting VMs..........................................................................................33Maintaining RecoverPoint for VMs35Modifying vRPA cluster network settings...................................................36Modifying network adapter topology for vRPA 1........................................36Modifying network adapter topology for additional vRPAs.........................37Adding vRPAs to a vRPA cluster.................................................................37Removing a vRPA from a vRPA cluster......................................................38Replacing a vRPA.......................................................................................38FiguresTablesChapter 1Chapter 2Chapter 3Chapter 4Chapter 5CONTENTSRecoverPoint for Virtual Machines5.0Installation and Deployment Guide3
Upgrading RecoverPoint for VMs41Upgrade overview.......................................................................................42The Upgrade and Maintenance package.....................................................43Upgrading a vRPA Cluster..........................................................................43Upgrading the RecoverPoint for VMs splitters...........................................44Installing the splitter with the RecoverPoint for VMs VIB installer....44Upgrading the RecoverPoint for VMs plug-in.............................................45Uninstalling RecoverPoint for VMs47Uninstalling a single vRPA cluster from a vCenter......................................48Uninstalling all vRPA clusters from a vCenter.............................................48Procedures used when uninstalling vRPA clusters......................................49Unprotecting VMs.........................................................................49Removing ESX clusters from vRPA clusters..................................49Uninstalling a vRPA Cluster...........................................................50Removing the vRPA cluster from the RecoverPoint for VMs system......................................................................................................50Uninstalling the RecoverPoint for VMs splitter..............................50Installing in VxRail environments51

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 77 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Pradeep K. sinna
Tags
IP address, Subnetwork, ISCSI
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Linux+ and LPIC-1 Guide to Linux Certification
The document you are viewing contains questions related to this textbook.
Chapter 13 / Exercise 1
Linux+ and LPIC-1 Guide to Linux Certification
Eckert
Expert Verified

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture