Users Guide
and that you protect the passphrase you define. Store the passphrase in a secure location as it is critical for
data recovery. Without a passphrase, data recovery is not possible.
17. If you want to encrypt these protected machines using an encryption key that is already defined on this Rapid Recovery
Core, select Encrypt data using an existing Encryption key, and select the appropriate key from the drop-down menu.
Proceed to Step 19.
18. If you want to add a new encryption key to the Core and apply that key to these protected machines, then enter the
information as described in the following table.
Table 84. Encryption key settings
Text Box Description
Name Enter a name for the encryption key.
Encryption key names must contain between 1 and 130 alphanumeric characters. You may not include
special characters such as the back slash, forward slash, pipe, colon, asterisk, quotation mark,
question mark, open or close brackets, ampersand or hash.
Description Enter a comment for the encryption key.
This information appears in the Description field when viewing encryption keys from the Core Console.
Passphrase Enter the passphrase used to control access.
Best practice is to avoid special characters listed above.
Record the passphrase in a secure location. Dell Support cannot recover a passphrase. Once you
create an encryption key and apply it to one or more protected machines, you cannot recover data if
you lose the passphrase.
Confirm
Passphrase
Re-enter the passphrase you just entered.
19. Click Finish to save and apply your settings.
The wizard closes.
20. If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software is deployed to the specified machines, if necessary, and the machines are added to
protection on the Core.
Protecting multiple machines on a VMware vCenter/ESX(i) virtual host
Use this procedure to simultaneously protect one or more machines on a VMware vCenter/ESX(i) virtual host.
CAUTION:
If you use agentless protection, Dell recommends that you limit protection to no more than 200 VMs
at once. For example, do not select more than 200 VMs when using the Protect Multiple Machines Wizard.
Protecting more than 200 VMs results in slow performance. There is no limit to how many VMs a Core can
agentlessly protect over time. For example, you could protect 200 VMs today and another 200 VMs tomorrow.
1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Protect Multiple Machines.
The Protect Multiple Machines Wizard opens.
2. On the Welcome page, select one of the following options:
● Typical
● Advanced (show optional steps)
3. Click Next.
4. On the Connection page of the wizard, from the Source drop-down list, select vCenter / ESX(i).
5. Enter the host information and logon credentials as described in the following table.
Table 85. vCenter/ESX(i) connection settings
Text Box Description
Host The name or IP address of the VMware vCenter Server/ESX(i) virtual host.
Protecting workstations and servers 149










