Dell DL4300 배포 매뉴얼 - 페이지 22

{카테고리_이름} Dell DL4300에 대한 배포 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Dell DL4300 33 페이지.
Dell DL4300에 대해서도 마찬가지입니다: 시작하기 (2 페이지), 시스템 시작하기 (2 페이지), 시스템 시작하기 (2 페이지)

Dell DL4300 배포 매뉴얼
Text Box
TLS
Username
Password
From
Email Subject
Email
5.
Click Send Test Email and review the results.
6.
After you are satisfied with the results of the tests, click OK.

Adjusting the number of streams

By default, AppAssure is configured to allow three concurrent streams to the appliance. It is
recommended that the number of streams is equal to one more than the number of machines (agents)
you are backing up. For example, if you are backing up six agents, the Maximum Concurrent Transfers
must be set to seven.
To change the number of concurrent streams:
1.
Select the Configuration tab and then click Settings.
2.
Select change in Transfer Queue.
3.
Change Maximum Concurrent Transfers to a number that is at least one more than the number of
clients you are backing up.

Protecting machines and checking connectivity to clients

After configuring the DL Appliance and Core, verify that you can connect to the machines you plan to
back up.
To protect a machine:
1.
Navigate to the Core Console, and select the Machines tab.
2.
In the Actions drop-down menu, click Protect Machine.
The Connect dialog box is displayed.
3.
In the Connect dialog box, enter the information about the machine to which you want to connect
as described in the following table.
Host
22
Description
The default is 30 seconds.
Select this option if the mail server uses a secure connection such as Transport
Layer Security (TLS) or Secure Sockets Layer (SSL).
Enter a user name for the email server.
Enter a password for accessing the email server.
Enter a return email address. It is used to specify the return email address for
the email notification template; for example, [email protected].
Enter a subject for the email template. It is used to define the subject of the
email notification template; for example, <hostname> - <level> <name>.
Enter information for the body of the template that describes the event, when
it occurred, and the severity.
The host name or IP address of the machine that you want to protect.