Deployment Guide
3 Configuring your Dell DL1300......................................................................... 26
Configuration overview...................................................................................................................... 26
Configuring browsers to remotely access the DL1300 Core Console.............................................26
Configuring browser settings in Internet Explorer and Chrome.................................................26
Configuring browser settings in Firefox....................................................................................... 27
Accessing the DL1300 Core Console.................................................................................................27
Updating trusted sites in Internet Explorer...................................................................................27
Managing licenses............................................................................................................................... 27
Updating or changing a license....................................................................................................29
Adding a license............................................................................................................................ 30
Contacting the Dell Data Protection | Rapid Recovery License Portal server............................ 31
Encrypting agent snapshot data......................................................................................................... 31
Configuring an Email server and Email notification template ..........................................................32
4 Preparing to protect your servers................................................................... 34
Overview..............................................................................................................................................34
Installing agents on clients................................................................................................................. 34
Deploying the agent software when protecting an agent.......................................................... 34
Installing the Rapid Recovery Agent software on Windows machines.......................................35
Deploying the Rapid Recovery Agent software to one or more machines................................ 37
About installing the Agent software on Linux machines...................................................................40
Location of Linux Agent files........................................................................................................ 42
Agent dependencies..................................................................................................................... 42
Installing the Rapid Recovery Agent software on Debian or Ubuntu......................................... 43
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server....................... 44
Installing the agent on Red Hat Enterprise Linux and CentOS................................................... 44
Installing the Agent software on offline Linux machines.................................................................. 45
Installing the Agent software on Windows Server Core Edition machines................................ 46
Configuring the Rapid Recovery Agent on a Linux machine...................................................... 46
Protecting a machine..........................................................................................................................48
Checking network connectivity.................................................................................................... 51
Checking the firewall settings....................................................................................................... 51
Checking DNS resolution..............................................................................................................52
Teaming network adapters........................................................................................................... 52
Adjusting the number of streams................................................................................................. 53
5 Common use cases............................................................................................ 54
Protecting machines...........................................................................................................................54
Snapshots...................................................................................................................................... 54
Dell DL1300 Smart Agents............................................................................................................54
Deploying Smart Agents............................................................................................................... 54
4










