ACRONIS Cyber Appliance Quick Start Manual

ACRONIS Cyber Appliance Quick Start Manual

Hide thumbs Also See for Cyber Appliance:

Advertisement

Quick Links

acronis.com
Acronis Cyber Appliance
Quick Start Guide
R E V I S I O N : 6 / 1 4 / 2 0 2 1

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS Cyber Appliance

  • Page 1 Acronis Cyber Appliance Quick Start Guide R E V I S I O N : 6 / 1 4 / 2 0 2 1...
  • Page 2: Table Of Contents

    6  Configuring Acronis Cyber Infrastructure and Acronis Cyber Protect 6.1  Deploying the compute cluster 6.2  Deploying the Acronis Cyber Protect “All-in-One” Appliance virtual machine 6.2.1  Downloading the Acronis Cyber Protect “All-in-One” Appliance 6.2.2  Deploying the Acronis Cyber Protect “All-in-One” Appliance 6.3  Creating backup storage...
  • Page 3: About Acronis Cyber Appliance

    1.1  Acronis Cyber Appliance exterior Acronis Cyber Appliance consists of five identical nodes. On the front of the appliance, under the front bezel are the power/reset buttons, a power LED of each node, as well as the main power switch.
  • Page 4 The default IPMI password to access the management node via SSH is Acronis!Infra%30 (it changes to a user- specified password during deployment). The USB and VGA ports allow you to connect a keyboard and a monitor to a node if the network is unavailable.
  • Page 5: Safety Instructions

    2  Safety instructions Warning! Acronis Cyber Appliance may only be repaired by a certified service technician. You may only perform troubleshooting as authorized by the support team. Damage due to unauthorized repairs is not covered by the warranty. If you need to reset a node to the factory default settings, contact the support, as described in "Getting technical support"...
  • Page 6: Installing Acronis Cyber Appliance

    3  Installing Acronis Cyber Appliance Before installing Acronis Cyber Appliance, make sure you have the following:   3U of server rack space in a standard 19-inch cabinet   At least five free 1/10 GbE ports in a network switch (10 GbE recommended)  ...
  • Page 7 Make sure that the safety lock is unlocked before mounting the brackets. Insert the locating pins into the upper and lower square holes on the rail from the back of rail. Push the safety lock forward to secure the bracket. © Acronis International GmbH, 2003-2021...
  • Page 8 Two people are required to perform this step. Insert the inner rail into the outer rail as shown in the figure. Important Make sure that the ball retainer is fully open before installing the chassis. Otherwise, you risk damaging the chassis! © Acronis International GmbH, 2003-2021...
  • Page 9: Connecting Cables To Acronis Cyber Appliance

    Note For more details on configuring the network infrastructure, refer to the Administrator Guide. To prepare Acronis Cyber Appliance for configuration, do the following:  1. Connect the appliance to the electrical outlets by using the supplied power cables.  2. On every node, connect any SFP+ or RJ45 network port (1 on the diagram) to a switch (2 on the diagram) with access to a dedicated subnet for your infrastructure.
  • Page 10 (1 on the diagram) to a switch with access to the IPMI subnet for your appliance (2 on the diagram). The nodes have preconfigured IPMI IP addresses: 10.20.30.11 to 10.20.30.15. The chassis has the preconfigured IPMI IP address 10.20.30.10. Connect the admin laptop (3 on the diagram) to the same switch. © Acronis International GmbH, 2003-2021...
  • Page 11: Configuring Acronis Cyber Appliance

     1. Turn on the power: (a) press and hold down the main switch for five seconds, (b) press the power buttons of each node.  2. Connect an admin laptop (from which you will configure Acronis Cyber Appliance) to the network. Assign a static IP address to it from the same subnet that the nodes are in, for example, 10.20.20.100.
  • Page 12 Otherwise, the installation will stop. You can rename the nodes to fit your organization’s naming policies.   New static IP addresses for the network interfaces connected on all the nodes. If you leave the fields empty, the default addresses of 10.20.20.11 to 10.20.20.15 will be used. © Acronis International GmbH, 2003-2021...
  • Page 13 You will be able to configure bonds and VLANs later in the admin panel.  5. Under Appliance name, enter the cluster name. You cannot change it later.  6. Under Password, enter a password to log in to the local Acronis Cyber Infrastructure admin panel.
  • Page 14: Joining The Existing Cluster

    Acronis Cyber Appliance. 3.4.2  Joining the existing cluster You can connect the appliance to the existing Acronis Cyber Infrastructure cluster. For this, you will need the private IP address of the management node and the administrator credentials for the existing cluster.
  • Page 15 New static IP addresses for the network interfaces connected on all the nodes. Note Use IP addresses from the network/subnet of the existing cluster. The installation will be blocked until all of the five nodes are given IPs from the same subnet/network as the existing cluster. © Acronis International GmbH, 2003-2021...
  • Page 16  5. Under Join existing cluster, enter the private IP address of the management node and the administrator password of the existing cluster.  6. During the deployment, the Acronis Cyber Infrastructure versions are compared in the existing cluster and in the appliance. If there are major discrepancies, you will be asked to specify a network configuration for access to the Internet.
  • Page 17: Configuring The Cluster By Using The Admin Panel

    18)). If you do not have a license, contact your sales representative.  4. Then, you can configure the cluster for using Acronis Cyber Protect (refer to "Configuring Acronis Cyber Infrastructure and Acronis Cyber Protect" (p. 23)), or another desired workload, as described in the Administrator Guide.
  • Page 18: Managing Licenses

    For reports to reach their destination, the cluster must be able to access the Acronis datacenter that has been used to enable the SPLA. Make sure that TCP port 443 is open.
  • Page 19: Installing License Keys

    Switching from an SPLA to a license key changes the licensing model to subscription or perpetual. After doing so, ask your service provider to terminate your SPLA by either disabling the Acronis Cyber Infrastructure application for your account or deleting the account.
  • Page 20: Installing Spla Licenses

     4. In the Register cluster window, accept the license agreement.  5. In the registration confirmation window, click Done. The registered cluster will show up in Acronis Cyber Cloud. You will be able to monitor its resource usage and download reports.
  • Page 21: Managing Updates

    5  Managing updates Acronis Cyber Infrastructure supports non-disruptive rolling updates. Cluster nodes are updated one by one, with the data availability unaffected. During the update, the node enters maintenance mode and its workloads and VMs are migrated to other nodes. After the update, the node returns to operation.
  • Page 22 After the update is complete, the node statuses will change to Up to date. To update the kernel with ReadyKernel, refer to "Updating kernel with ReadyKernel" in the Administrator Command Line Guide. © Acronis International GmbH, 2003-2021...
  • Page 23: Configuring Acronis Cyber Infrastructure And Acronis Cyber Protect

    One Appliance” virtual machine in Acronis Cyber Infrastructure. You can then connect your Acronis Cyber Appliance cluster to Acronis Cyber Protect as a storage backend. As a result, you will have both the storage and the backup server running on Acronis Cyber Appliance.
  • Page 24: Deploying The Acronis Cyber Protect "All-In-One" Appliance

     h. Back in the Create virtual machine window, click Deploy to create and boot the VM.  i. On the Compute > Virtual machines > Virtual machines tab, select the created virtual machine. Then, click Console and install the Acronis Cyber Protect OS by using the built-in © Acronis International GmbH, 2003-2021...
  • Page 25 VNC console.  i. On the initial installer screen, select Install or update Acronis Cyber Protect and press Enter. Note The initial installer times out after 15 seconds, and the system will attempt to boot from the newly created virtual volume. If you see the message “Booting from local disk… No bootable device,”...
  • Page 26: Creating Backup Storage

    Click Next.  7. On the Acronis account step, specify the URL with the IP address or hostname of the machine used to access the Acronis Cyber Protect console (example: http://192.168.128.212:9877). If you use https, make sure the SSL certificate is trusted.
  • Page 27  1. Select the machines that you want to protect.  2. Click Protect, and then click Create plan. The new protection plan template opens.  3. Click Where to back up.  4. Click Add location, and then select Acronis Cyber Infrastructure. © Acronis International GmbH, 2003-2021...
  • Page 28  5. Click Done.  6. Click Create to create a new plan. To run an existing protection plan, click Run now. For detailed information on how to configure and use Acronis Cyber Protect, see the product documentation. © Acronis International GmbH, 2003-2021...
  • Page 29: Getting Technical Support

     4. Choose how you would like to contact the support team: via e-mail or phone. Please be ready to provide support engineers with remote access to your Acronis Cyber Appliance, per your Service Level Agreement. To maintain security, it is recommended to whitelist only specific IP addresses communicated to you by support engineers and to block external access from any other addresses.
  • Page 30: Appendix: Specifications

    8  Appendix: Specifications This chapter lists the technical and environmental specifications of Acronis Cyber Appliance. 8.1  Technical specifications The following table lists Acronis Cyber Appliance hardware parts. Chassis 3U, 435x130x600 mm (WxHxD), 34.5 kg Intel Atom C3958 @ 2.00GHz, 16 cores, 31W TDP, VT-d support, w/o Hyper-...
  • Page 31: Environmental Specifications

    Tested at 230 Vac, 50 Hz and 115 Vac, 60 Hz. The input power factor is greater than values in the table at power supply’s rated output and meets Energy Star® requirements. 8.2  Environmental specifications Acronis Cyber Appliance environmental specifications are listed in the following tables. Store temperature -40°C to 85°C (-40°F to 185°F) Store temperature gradient 20°C (68°F) per hour...
  • Page 32 Gaseous corrosion level in terms of (in Angstrom) as per ISA:   Copper reactivity rate must be less than 300 A/month, class G1(ANSI/ISA71.04-1985).   Silver reactivity rate must be less than 200 A/month (AHSRAE TC9.9). © Acronis International GmbH, 2003-2021...

This manual is also suitable for:

150311506215078150931510815124

Table of Contents