Experion Backup and Restore
Release 520
Experion Backup and Restore User Guide
EPDOC-X111-en-520G
August 2024
DISCLAIMER
This document contains Honeywell proprietary information.
Information contained herein is to be used solely for the
purpose submitted, and no part of this document or its
contents shall be reproduced, published, or disclosed to a third
party without the express permission of Honeywell
International Sàrl.
While this information is presented in good faith and believed
to be accurate, Honeywell disclaims the implied warranties of
merchantability and fitness for a purpose and makes no
express warranties except as may be stated in its written
agreement with and for its customer.
In no event is Honeywell liable to anyone for any direct, special,
or consequential damages. The information and specifications
in this document are subject to change without notice.
Copyright 2024 - Honeywell International Sàrl
2
CONTENTS
Chapter 1 - About this guide 11
Chapter 2 - Introduction to EBR 14
Virtualization in EBR 520 16
Experion Backup and Restore Terminologies 16
Experion Backup and Restore Topologies 18
EBR R520 components 20
Chapter 3 - Getting started with EBR installation 21
EBR Software Packages 22
EBR installation environments 22
Hardware and software requirements for EBR Manager 23
Creating EBR user 24
Chapter 4 - All-In-One Virtual Appliance 34
Installing the software 34
Chapter 5 - Installing EBR manager 42
Installing the EBR Manager Software package 43
Adding Licenses to EBR Manager 49
Adding Users to EBR Manager 49
Chapter 6 - Installing EBR agents in physical environment 51
Installing EBR agents manually 52
EBR scripts 56
Installing EBR scripts 56
Chapter 7 - Adding computers to the management server 59
Adding Windows Server to the EBR Manager 60
Adding Windows Workstation to the EBR Manager 60
3
Adding VMware ESXi Virtual Machines to EBR Manager 62
Chapter 8 - Setting up EBR in a virtual environment 65
Virtual appliance 66
Getting started 66
Network router configuration 67
Preparing the list of free IP addresses for agent for ESX(i) host 67
Deploying Agent for ESX(i) from EBR R520 Manager 68
Applying license to the virtual appliance 68
Configuring bindings 68
Removing agent for ESX(i) from EBR manager 69
Chapter 9 - Protection planning 70
Protection considerations 71
Preventing data loss 71
Prerequisites for a backup 72
Centralized backup management 72
File naming guidelines 72
Backup after Windows Update 72
Staggering start times 73
Adding Storage Nodes 73
Storing Backups 74
Offsite storage 75
Backup/restore speed 75
Rebuilding or restoring data 76
Running disk I/O intensive applications 76
Running disk defragmentation software 76
Running general applications 76
Virtual Machines with snapshots 76
4
Data compression 77
Using routers 77
Deduplication 77
Backup recommendations 78
Changing Drive letter for system reserved partition 78
Experion Servers 80
Experion Stations, Console Extension Stations, Flex Stations, TPS
Stations 80
ACE-T, SIM-ACE-T, and SIM-C200 nodes 80
Protection (Backup) types 80
Protection (Backup) schemes 81
Scheduling backups 82
Scheduling considerations 82
Default Backup settings 83
Default backup options 84
Retention rules 86
Setting up a storage node 87
Adding a Managed Location 87
To protect the location with encryption 89
Backup replication 94
Chapter 10 - Backups on a physical node 95
Getting started 96
Table 1. Sample backup configuration form 96
Creating a protection (backup) plan for a physical node 99
Running protection (backup) job manually 100
Editing protection (backup) jobs 100
Deleting protection (backup) plans/jobs 101
5
Backup in a recovery environment 102
Chapter 11 - Protection(Backup) on a virtual node 109
Getting started 110
Sample backup configuration form 110
Creating a protection (backup) plan for a virtual node 113
General recommendations 116
Chapter 12 - Recovery planning 118
General recovery plan considerations 119
Elements of a recovery plan 119
Overview of tasks to develop a recovery plan 120
Analyze the business impact 120
Perform a risk assessment 121
Use the recovery plan 121
Test and audit the plan 121
Restore modes/options 122
Universal Restore option 122
Default recovery options 122
Chapter 13 - Checklists for Restoring Experion Nodes 123
Checklists for restoring nodes with similar hardware 124
Restoring a non-redundant node with similar hardware 124
Restoring redundant Experion Server A with similar hardware 124
Restoring redundant Experion Server B with similar hardware 125
Checklists for restoring nodes after recovery from a virus infection 126
Considerations 126
Restoring a non-redundant node after recovery from a virus
infection 127
Restoring redundant Experion Server B after recovery from a
virus infection 129
6
Checklists for restoring selected files or folders from a backup 131
Considerations using EBR 131
Restoring selected folders or files to a node 131
Chapter 14 - Restoring Physical Nodes 132
Using EBR Recovery Media to restore hard disks and images 133
Prerequisites 133
Restoring a hard disk 133
EBR Recovery on Dell 15G and Dell 16G Platforms 145
Chapter 15 - Restoring Virtual Nodes 151
Methods of restoring a virtual node 151
Restoring to an existing virtual node using EBR recovery media 158
Restoring virtual node using virtual appliance from EBR
Manager 158
Chapter 16 - Restoring Experion Databases 164
Disabling ERDB and/or EMDB replication for Redundant Experion
Server B 165
Disabling ERDB and/or EMDB replication for Redundant
Experion Server B 165
Restoring the ERDB for Redundant Experion Server A 165
Restoring the ERDB for Redundant Experion Server B 166
Restoring the EMDB for Redundant Experion Server A 167
Restoring the EMDB for Redundant Experion Server B 169
Restoring Controllers from controller checkpoint files 170
Restoring the Engineering Repository Database and controllers 170
Restoring the events database 172
Restoring the EMDB 173
Chapter 17 - Configuration items in the Management Console 175
Deleting computers from the EBR Manager 176
7
Revoking licenses 176
Chapter 18 - Moving between physical node and virtual node 178
Converting a physical node to virtual node using virtual appliance 179
Virtual to physical 182
Prerequisite 182
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade 188
To upgrade EBR manager from R501.3 to R520.1 188
To update All in One Appliance 194
To validate the installation 195
Post installation tasks 196
Chapter 20 - Security 199
Security recommendations 200
Installing the latest antivirus software 200
Chapter 21 - Troubleshooting 203
Manually applying license to the virtual appliance 204
To verify the application of license 204
Manually removing virtual appliance from vCenter 205
Prerequisites 205
Uninstalling the R520 version of EBR Manager, Server, and
Desktop software packages 205
About this section 205
Uninstalling Acronis Cyber Protect 15 205
Network Adapters are not shown in Network Connections Folder 206
Appendix A: Installing FTE MUX adapter 209
Installing FTE MUX adapter after Restore 209
Appendix B: Initialization Media versions 211
Initialization Media versions and their corresponding product
releases 211
8
Appendix C: Configuring and connecting protection devices 212
Prerequisites 213
Setting up the NAS hardware 213
Configuring the physical client to access the subnet of the NAS
device 216
Configuring the physical client to access the subnet of the NAS
device 216
Connecting to the NAS device and configuring DNS, WINS, and
bonding mode 217
Connecting to the NAS device and configuring DNS, WINS, and
bonding mode 217
Configuring networking properties 217
Configuring the physical client to access the management subnet 218
Bonding the network interfaces to support load balancing 218
Identifying NAS devices 219
Adding the NAS device to the DNS server 219
Enabling security 220
Appendix D: Re-adding back the restored node to domain 221
Appendix E: Removing Phantom FTE devices 222
To verify a phantom FTE device 223
To remove a phantom FTE device 224
Notices 226
9
10
CHAPTER
1 ABOUT THIS GUIDE
This guide describes how to install, configure and use Experion
Backup and Restore (EBR) in a Honeywell process control system.
You use EBR to back-up and then restore critical system data for
Experion Process Knowledge System (PKS) nodes.
Revision history
Revision Date Descriptionz
A August Initial release of the document.
2021
B April 2022 Updated for Experion PKS R520.
C August Updated the following section:
2022
l Setting up the NAS hardware
l Added new chapter 19 (EBR R501.3
to 520.1 upgrade)
D December EBR R501.3 HF3 or HF4 update has
2022 been added in Chapter 19.
E February Updated the following sections:
2023 l Installing the EBR Manager Software
package
l Using EBR Recovery Media to restore
hard disks and images
l Universal Restore
F October Update the following section:
2023 l EBR Recovery on Dell 15G Platforms
G August Updated the follwoing sections:
2024 l Prerequisite skills
l Experion Backup and Restore
Terminologies
11
Chapter 1 - About this guide
Revision Date Descriptionz
l EBR Software Packages
l Using EBR Recovery Media to restore
hard disks and images
l EBR Recovery on Dell 15G Platforms
l Setting up the NAS hardware
Intended audience
This guide is intended for engineers, system administrators,
and other technical personnel who are responsible for backing
up and restoring data for Experion PKS nodes.
Prerequisite skills
You must have practical experience with system backup and
restore operations, as well as proficiency with the following
Microsoft® Windows operating systems:
n Embedded Microsoft Windows Server 2016 Standard
n Embedded Microsoft Windows Server 2019 Standard
n Embedded Microsoft Windows Server 2022 Standard
n Embedded Microsoft Windows Server 2016 Datacenter
n Embedded Microsoft Windows Server 2019 Datacenter
n Embedded Microsoft Windows Server 2022 Datacenter
n Embedded Microsoft Windows 10 LTSB Enterprise
n Embedded Microsoft Windows 10 LTSC 2019 Enterprise
n Embedded Microsoft Windows 10 LTSC 2021 Enterprise
References
This publication references various documents for further
information. The Acronis®Cyber Protect 15 User Guide serves
as a key source for material discussed herein.
Abbreviations
The following list defines the special abbreviations used in this
guide.
12
Chapter 1 - About this guide
Abbreviation Definition
ACE Application Control Environment
AMS Acronis Management Server
EBR Experion Backup and Restore
EMDB Enterprise Model Database
ERDB Engineering Repository Database
FTE Fault-Tolerant Ethernet
MBR Master Boot Record
PHD Process History Database
SIM Simulation Interface Module
13
CHAPTER
2 INTRODUCTION TO EBR
In this section:
Virtualization in EBR 520 16
Experion Backup and Restore Terminologies 16
Experion Backup and Restore Topologies 18
EBR R520 components 20
14
Chapter 2 - Introduction to EBR
Experion Backup and Restore (EBR) provides real-time,
continuous backup infrastructure for Experion PKS nodes
within a Honeywell process control system.
During a backup - scheduled or manual, EBR copies the disk
image of a node to a Backup Repository.
During a restore, the disk image restores to the same or a
different node and Experion repositories [Enterprise Model
Database (EMDB) and Engineering Repository Database
(ERDB)].
EBR R520 can be deployed in two types of nodes:
n On physical Nodes
n On virtual nodes
EBR provides the following functionality:
n Console is used for creating backup jobs and monitoring job
status through various event logs and status notifications.
n Restore function uses a bootable media. Using this, the
node can be booted in recovery mode to recover a repaired
or replacement node.
n Creating backup task's function provides an option for
configuring scheduled or manual backup jobs. The backup
job performs a backup of all the node data including the
operating system, drivers, service packs, Experion and node
configuration. The resulting backup is used for restoring the
original node or replacement node (to when it was last
backed up). No post-restore installation or configuration is
required.
n File/folder recovery function provides an option to restore
backups at Files and Folder levels.
n Centralized Management function provides a central user
interface for creating backups and monitoring the status of
multiple nodes.
15
Chapter 2 - Introduction to EBR
Virtualization in EBR 520
Virtual Node Support
EBR R520 supports protection (backup) of virtual nodes by
using Acronis Cyber Protect 15 Virtual Edition. Protection
(Backup) of VMware virtual machines is integrated with other
platform components allowing centralized management,
reporting, cataloguing with search, and other platform features.
For more details on virtualization support in EBR R520, see
Setting up EBR in a virtual environment.
NOTE:
For more details on virtualization, see:
l Experion PKS Software Installation User's Guide
l Experion PKS Virtualization Planning and
Implementation Guide
Experion Backup and Restore Terminologies
The following list defines the EBR terms used in this guide
n Backup and backup image are synonymous terms for an
exact reproduction of the contents of a hard disk. Typically,
the backup image contains the applications, configuration
settings, operating system, and other data that is
compressed and stored as a file. The backup image is used
for restoring a hard disk to the state when it was last backed
up.
n Manager Node is a server computer that uses EBR to
manage backup jobs for multiple server and desktop nodes
in a centrally managed environment. In addition, the
Manager Node contains system configuration information
and maintains a database of backup history. The Operating
system must be Embedded Microsoft Window Server 2022
datacenter / Microsoft Windows Server 2022 Standard /
Embedded Microsoft Windows Server 2019 Standard /
Microsoft Windows Server 2019 Datacenter / Embedded
16
Chapter 2 - Introduction to EBR
Microsoft Windows Server 2016 Standard / Microsoft
Windows Server 2016 Datacenter.
n Agent for ESX(i)host or Virtual Appliance enables Acronis
Cyber Protect 15 enables protection (backup) and recovery
of ESX(i) virtual machines without installing the agents into
the virtual nodes.
n Target Node is a physical node with EBR installed (must be
a Server or Desktop Node) or a virtual node.
n Backup destination is a computer (usually a file server or
NAS device) that stores all of the backup images for the
Target Nodes.
n Management Console is a common GUI for local and central
management tasks which is basically the EBR Manager
itself. You must connect to the management server to be
able to centrally manage the target nodes using the
management console.
n Managed node (Managed host) is a computer where a
Backup Agent and Acronis Protect Management Server is
installed. The target node is added to the management
server and it is operated and monitored from the
management console. A server node, desktop node or ESX(i)
hosts can be added to the management server to make it a
managed node or managed host.
n Restore to same node is taking a backup from a node and
restoring it on the same node. Ex: restoring backup of a
T5810XL machine to the same machine.
n Restore to similar node is taking a backup from a node and
restoring it to another machine of the same physical
configuration. Ex: restoring backup of a T5810XL machine
to another T5810XL machine.
n Restoring virtual machines is taking backup of virtual nodes
and restoring to a virtual node on the same or a different
host.
17
Chapter 2 - Introduction to EBR
Experion Backup and Restore Topologies
EBR topology in a physical environment.
18
Chapter 2 - Introduction to EBR
EBR topology in a virtual environment
19
Chapter 2 - Introduction to EBR
EBR R520 components
The following are the key EBR R520 components:
n EBR Scripts
n Management Server
n Backup Monitor
n Command-Line Tool
n Agent for VMware (Virtual Appliance)
n Bootable Media Builder
n Agent for Windows
Management server
The Management server is a central server that manages
backup and recovery activities. The administrators can connect
from the management console and manage the entire EBR
infrastructure.
n All backup policies and backup and recovery jobs are
managed, executed, and tracked on the management server.
n The Management server maintains a list of registered
storage nodes, vaults and managed computers, and the
respective configuration databases.
n The Management server maintains a centralized log
repository that tracks the results of all activities within the
EBR infrastructure.
The Management server generates reports using the
information from the centralized log repository and the
configuration database.
Management console
The Acronis Backup Management Console is a browser for
managing agents remotely or locally. When the console is
connected to the management server, you can perform central
management tasks such as managing licenses, configuring,
and managing backup policies.
20
CHAPTER
3 GETTING STARTED WITH EBR
INSTALLATION
This chapter provides information on requirements for
installing the EBR Manager and EBR software packages.
In this section:
EBR Software Packages 22
Hardware and software requirements for EBR Manager 23
21
Chapter 3 - Getting started with EBR installation
EBR Software Packages
EBR contains Manager and software packages designed for
installation on nodes with Windows operating systems as
specified in the following tables
Specified
Windows
Software Functional description
operating
package system
Manager Manages the recovery activities, Embedded
monitors real-time status and Microsoft
centrally manages backup Windows Server
2022 Standard /
operations of multiple machines,
Embedded
executes scheduled and on-
Microsoft
demand backup jobs, which Windows Server
includes both physical and virtual 2022
machines. Datacenter.
Embedded
Microsoft
Windows Server
2019 Standard /
Embedded
Microsoft
Windows Server
2019
Datacenter.
Embedded
Microsoft
Windows Server
2016 Standard /
Embedded
Microsoft
Windows Server
2016
Datacenter.
EBR installation environments
EBR must be installed in a centrally or locally managed
environment.
n In a centrally managed environment, the EBR Manager is
installed on a standalone, dedicated server grade machine
(Physical or VM). Backup policies and tasks for all server,
22
Chapter 3 - Getting started with EBR installation
desktop, or virtual machines are created from the
management console/browser from any node by connecting
to the management server.
n In a locally managed environment, EBR is installed on each
server or desktop node to be backed up.
Hardware and software requirements for EBR
Manager
ATTENTION:
The computer used as the Manager Node must meet the
following requirements:
l It must be added to the domain / workgroup.
l It must NOT be: an Experion server, a PHD server, NAS or
an APP node.
l Honeywell recommends installing the Manager on a
dedicated server in both physical and virtual
environments.
l Do NOT install the Manager on a domain controller.
Virtual
Physical Node Virtual Node
Appliance
n Intel® Pentium 4 processor, 2 n EBR n EBR
GHz or more Manager Appliance
n 3300 MHz Agent
n Microsoft Embedded Microsoft
3 Virtual n 3300MHz
Windows Server 2019 Standard n
CPUs n 2 vCPU
n 64 bit operating systems n 8 GB RAM n 8 GB RAM
n 4 GB RAM. n 50 avg n 10 avg
n Free disk space - 60 GB or more IOPs IOPs
(note this is not intended for n 250 max n 10 max
backup storage) IOPs IOPs
n 10 n 10 network
Network n 5GB+1GB
n 60 GB disk disk
23
Chapter 3 - Getting started with EBR installation
ATTENTION:
It is recommended to deploy the EBR Appliance to the
vCenter Server instead of an individual host. In this
configuration, the appliance aware of the entire virtual
machine inventory of the vCenter instead of an isolated
view of the virtual machines running on a specific host.
Each EBR Virtual Appliance must be assigned to only one
vCenter Server, and if more than one vCenter Server exists
in a system, deploy at least one EBR Virtual Appliance to
each vCenter Server instance.
Each EBR Virtual Appliance can perform ten concurrent
backups, and backups beyond this are held in a queue.
Once the first ten backup jobs are complete, the next job in
the queue starts. However, we recommend staggering start
times so that only one node is backed up at a time (to
minimize loading on the network). The ability to manage
and queue multiple concurrent backups means that a
vCenter Server will generally only require one EBR Virtual
Appliance, each configured with a quantity of two virtual
CPUs and 8 GB memory. Therefore, exceeding more than
10 EBR Virtual Appliances is not recommended per vCenter
Server instance.
Creating EBR user
Creating an EBR user involves the following three tasks:
Create the EBR user in the domain controller/workgroup.
1. Add the user to the group.
2. The user should be part of the following groups:
System in workgroup
lAdministrators
System in domain
l Target System Local Administrators
l Domain Users
l Domain Admins
l DCS Administrators
Assign user rights to the EBR user.
24
Chapter 3 - Getting started with EBR installation
NOTE: On a system in workgroup it is local group policy of
that system and on a system in domain, it is group policy in
domain controller.
The user must have the following user rights:
l Access this computer from the network
l Adjust memory quotas for a process
l Impersonate a client after authentication
l Log on as a service
l Create a token object
l Replace a process level token
Creating EBR user in Domain Controller
You should perform the following procedure in the domain
controller.
Prerequisite
Install the Experion domain security package.
Creating a user
1. Type the new username and provide necessary details. The
New Object –User window appears.
2. Right-click and then select New > User.
3. Click Start > Windows Administrative Tools > Computer
Management > Local Users and Groups > Users.
25
Chapter 3 - Getting started with EBR installation
4. Click Next and then type a Password.
5. Select the required check boxes and then click Next.
6. If you want to edit any information regarding the New
Object, click Back
7. Click Finish.
EBR Administrator as a user appears in the Users window.
Adding user to the group
1. Right-click EBR Administrator and click Properties. The EBR
Administrator Properties window appears.
2. Enter the necessary details.
3. Click Apply and then click the Member Of tab.
4. On this tab, you can assign the newly created user to the
required Groups.
5. By default, the new User is assigned to the group, Domain
Users.
26
Chapter 3 - Getting started with EBR installation
6. In the Member Of tab, click Add.
7. The Select Groups window appears.
8. Click Advanced.
9. The window expands to show a Search Results pane.
10. In the Search Results pane, select the following:
l Administrators
l Domain Users
l Domain Admins
l DCS Administrators
11. Click OK.
The selected groups are displayed in the Select Groups
window.
12. Click Apply and then click OK in the EBR Administrator
Properties window.
Assigning user rights to the EBR user in domain controller
27
Chapter 3 - Getting started with EBR installation
n Click Start > Windows Administrative tools > Local Security
Policy > Local Policies > User Rights Assignment.
n The User Rights Assignment window appears.
n Right-click Log on as a service and then click Properties.
The Log on as a service Properties dialog box appears.
n Click Add User or Group.
n The Select Users, Accounts , Service Accounts, or Groups
dialog box appears
n Click Advanced.
n The dialog box expands to show a Search Results pane.
n Click Find Now. The search results are displayed.
n Select EBR Administrator from the list and then click OK.
n The EBR Administrator you chose appears in the Select
Users, Accounts, Service Accounts, or Groups window.
28
Chapter 3 - Getting started with EBR installation
n Click OK
n Repeat steps 2 to 7 for assigning other user rights to the
user.
NOTE: Refer section Creating EBR User for more details on
user rights.
29
Chapter 3 - Getting started with EBR installation
Creating EBR user in a workgroup
Creating an EBR user involves the following four tasks:
Creating a user in the local system where EBR manager will be
installed.
1. Click Start > Windows Administrative Tools > Computer
Management > Local Users and Groups > Users.
2. Right-click and then select New > User.
The New Object – User window appears.
3. Type the new username and provide necessary details. Click
Create.
4. Click Finish.
EBR Administrator as a user appears in the Users window.
Adding user to the group
5. Right-click EBR Administrator and click Properties.
The EBR Administrator Properties window appears
30
Chapter 3 - Getting started with EBR installation
6. Select Password never expires checkbox.
7. Click Apply and then click the Member Of tab.
On this tab, you can assign the newly created user to the
required Groups.
NOTE: By default, the new account is assigned to the
Users group
8. In the Member Of tab, click Add.
The Select Groups window appears.
9. Click Advanced.
The window expands to show a Search Results pane.
10. In the Search Results pane, select the following:
l Administrators
Click OK.
The selected groups are displayed in the Select Groups
window.
31
Chapter 3 - Getting started with EBR installation
11. Click OK.
12. Click Apply and then click OK in the EBR Administrator
Properties window.
NOTE: Make sure the EBR agent installed on Experion
nodes have Administrator and Product Administrator group
added as part of EBR user.
Assigning user rights to the EBR user in workgroup
1. Click Start > Windows Administrative tools > Local Security
Policy > Local Policies > User Rights Assignment.
The User Rights Assignment window appears.
2. Right-click Log on as a service and then click Properties.
The Log on as a service Properties dialog box appears.
n Click Add User or Group.
n The Select Users, Accounts, Service Accounts, or Groups
dialog box appears.
32
Chapter 3 - Getting started with EBR installation
3. Click Advanced.
4. The dialog box expands to show a Search Results pane.
5. Click Find Now. The search results are displayed.
6. Select EBR Administrator from the list and then click OK.
7. The EBR Administrator you chose appears in the Select
Users, Accounts, Service Accounts, or Groups window.
8. Click OK.
9. Repeat steps 2 to 7 for assigning other user rights to the
user.
NOTE: Refer section Creating EBR User for more details on
user rights.
33
CHAPTER
4 ALL-IN-ONE VIRTUAL APPLIANCE
All-in-One Virtual Appliance combines EBR Manager and
Protection (Backup) agent into a single, Linux appliance.
The advantages of All-In-One Virtual Appliance are as follows:
n Easy updates and migration
n Eliminates licensing and simplifies administration.
n Provides the same EBR manager experience as the original
Windows install.
Honeywell provides the choice of whether to utilize the EBR All-
in-One Virtual Appliance with Experion systems. The separate
Windows-based EBR Manager architecture may continue to be
used if preferred.
NOTE: The All-in-One appliance does not support login via
an Active Directory accounts. Local accounts are used for
administration of the All-in-One appliance.
Installing the software
With All-In-One Virtual appliance, you can easily obtain a
virtual machine and do protections (backups).
The following is the software required:
Acronis Protect components:
n Management Server
n Agent for Linux
n Agent for VMware (Linux)
n CentOS
The appliance is provided through DVD. It contains the .ovf and
.iso files. You can deploy the .ovf file to an ESXi host or use the
.iso file to boot an existing virtual machine. It also contains the
.vmdk file that should be placed in the same directory with .ovf.
34
Chapter 4 - All-In-One Virtual Appliance
NOTE:
VMware Host Client (a web client used to manage
standalone ESXi 6.0+) does not allow deploying OVF
templates with an ISO image inside. If this is your case,
create a virtual machine that meets the requirements
below, and then use the .iso file to install the software.
All-In-One virtual Appliance cannot be added to domain.
Requirements for the virtual appliance are as follows:
Minimum system requirements:
n 2 CPUs
n 6 GB RAM
n One 45 GB virtual disk (60 GB recommended)
In VMware virtual machine settings, click Options tab > General
> Configuration Parameters, and then ensure that the
disk.EnableUUID parameter value is true.
After the management server is installed, the virtual appliance's
OVF package is located in the folder
%ProgramFiles%\Acronis\ESXAppliance (in Windows) or
/usr/lib/Acronis/ESXAppliance (in Linux).
The folder contains one .ovf file and two .vmdk files. Ensure
that these files can be accessed from the machine running the
vmware vSphere Client.
Deploying the OVF template
1. Start the vmware vSphere Client and log on to the vCenter
Server.
2. Select Host and right-click. Select Deploy OVF Template.
35
Chapter 4 - All-In-One Virtual Appliance
The Deploy OVF Template dialog box appears.
3. Click the Select an OVF Template, select Local file and
Browse.
4. Select all the files associated with OVF template (ovf, vmdk,
etc.) and then click Open.
5. A tick mark appears after the template has been selected.
On clicking Next, select a name and folder page appears.
Enter a name for the OVF, e.g. AIO-15-Doc, and select a
deployment location as directed. Click Next.
36
Chapter 4 - All-In-One Virtual Appliance
6. Select a computer resource page appears. Select the
destination computer resource for this operation. Click Next.
7. Review Details page appears. Verify the template details.
Click Next to accept the advanced configuration options.
ATTENTION: The OVF package contains advanced
configuration options, which might pose a security
risk. Review the advanced configuration options given.
37
Chapter 4 - All-In-One Virtual Appliance
8. Select storage page appears. Then, select the storage for the
configuration and disk files. Click Thick Provision Lazy
Zeroed, and then click Next.
9. Select networks page appears. In Destination Network drop-
down, select VM Network. Click Next.
38
Chapter 4 - All-In-One Virtual Appliance
10. Finally, Ready to complete page appears. Click Finish.
ATTENTION: Wait for 15 minutes, and then power on
the machine.
39
Chapter 4 - All-In-One Virtual Appliance
Installing/updating Acronis Protect Virtual Appliance
1. After the deployment has been completed, power on the
resulting machine or boot an existing virtual machine from
the .iso.
2. Select Install or update Acronis Cyber Protect, and then
press Enter. Wait for the initial setup window to appear.
3. Scroll down and select Change Settings.
4. Enter the Host name, password for user and enter Network
settings details.
5. Select Install with Current Settings.
6. The Welcome screen will appears.
NOTE: To access All-In-One manager, user needs to use
Acronis Protect Console address shown in the Welcome
screen.
NOTE:
Please follow the below mentioned steps for synchronizing
the time externally:
1. Open the Acronis Virtual Appliance Graphical User
Interface, scroll down to the time zone and change the
time zone to some different time zone.
40
Chapter 4 - All-In-One Virtual Appliance
2. Reboot the Virtual Appliance, scroll down to the time
zone, and then change the time zone to the correct time
zone.
3. Reboot the Virtual Appliance again, press Ctrl+Alt+F2 this
will direct you to the Appliance Shell.
4. Run the command date and verify if the Graphical User
Interface time correlates with Shell time.
5. Open All in One Appliances Manager, login with root and
its password.
6. Run the following command timedatectl set-timezone
<your-time-zone>.
Example: timedatectl set-timezone Asia/Kolkata.
7. Run reboot command to reboot the All In One Appliances
Manager.
8. Now ensure All In One Appliances Manager, All In One
Virtual Appliances Graphical User Interface and Shell
time are same.
41
CHAPTER
5 INSTALLING EBR MANAGER
This chapter describes how to install the EBR Manager
software package to back up and restore your Experion PKS
Nodes in a Honeywell process control system.
ATTENTION:
l If you are installing EBR Manager in domain
environment, login to the EBR Manager node using the
user created in Creating EBR user in Domain Controller
section in Creating EBR user.
l If you are installing EBR Manager in workgroup
environment, login to the EBR Manager node using the
user created in Creating EBR user in a workgroup
section in Creating EBR user.
In this section:
Installing the EBR Manager Software package 43
Adding Licenses to EBR Manager 49
Adding Users to EBR Manager 49
42
Chapter 5 - Installing EBR manager
Installing the EBR Manager Software package
The EBR Manager Software package is designed for installation
on the Manager Node.
The following components are available on the EBR Installation
DVD for installation.
n Acronis Cyber Protect 15
n EBR Scripts
NOTE: Installation of the EBR Manager Software package is
not supported on encrypted file systems.
NOTE: EBR Manager can be installed on Dell PE R350XE
NAS devices.
Leave the computer undisturbed during EBR Manager software
installation (recommended.)
ATTENTION: When installing the EBR Manager, do not
perform any other operation except for the inputs to be
provided to the Manager installation wizard.
To install EBR Manager Software package:
1. Insert the EBR Installation DVD into the DVD drive. The
AutoPlay dialog box appears.
2. Double-click Open Folder to view files.
NOTE:
If the AutoPlay dialog box does not appear, right-click
the DVD/CD drive and then select Open.
or
Open Windows Explorer, and then navigate to the DVD
drive.
43
Chapter 5 - Installing EBR manager
3. Right-click Setup.exe, and select Run as administrator from
the drop-down list.
The User Account Control dialogue box appears.
4. Click Yes.
The Honeywell Experion Backup and Restore window
appears.
5. Click Next.
The License Agreement dialog box appears.
6. Read the license agreement, select I accept the terms in the
License agreement, and click Next.
The License Information dialog box appears.
7. Type the system number in in the System Number field.
44
Chapter 5 - Installing EBR manager
8. Type authorization number in the Authorization Number
Field.
NOTE: The System Number and Authorization Number
are available from the License Authorization of
Honeywell. This information determines which
software packages you are authorized to install.
9. Click Next.
The Features and Options Selection dialogue box appears.
10. Select Acronis Cyber Protect 15 and EBR Scripts, and click
Next.
The Summary dialog box appears.
ATTENTION:
EBR Scripts are applicable to Server nodes.
If Workstation/Servers added as per section “EBR
Scripts” EBR Scripts will not get . In such cases, install
the EBR Scripts per above procedure.
EBR scripts cannot be run as part of the backup policy
of a virtual machine. We recommend creating a
scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
protection (backup) of the virtual machine. Applicable
for Experion Server only.
11. Click Install.
The wizard installs Acronis Cyber Protect 15 page appears.
45
Chapter 5 - Installing EBR manager
NOTE: The check box on left hand column displays the
status of completion after each component
installation.
12. As the installation progresses, the ACRONIS SOFTWARE
LICENSE AGREEMENT dialogue box appears.
13. Select I accept the terms of this license agreement check
box.
14. Click Proceed. The following window appears.
46
Chapter 5 - Installing EBR manager
15. Click Customize Installation settings to customize the
settings.
The Installation settings window appears.
16. Click Change next to What to Install.
The What to install window appears.
17. By default, the following options are selected:
l Management Server
l Components for Remote Installation
l Agent for Windows
l Agent for VMware (windows)
l Command-Line Tool
l Cyber Protect Monitor
Select the below listed options as per your requirement.
Agent for VMware (Virtual Appliance)
18. Click Done.
The Installation settings window appears.
19. Click Specify next to vCenter Server or ESXi host and log in
using the credentials that were created for EBR in domain
environment. For example, domain\user.
47
Chapter 5 - Installing EBR manager
20. Click Done.
21. After the wizard installs Acronis Protect, click Close.
22. The Status Display window appears.
After the wizard installs EBR Scripts, click OK.
This completes the EBR Manager installation. An Acronis
Cyber Protect shortcut will be created on the desktop.
23. Double - click on the Acronis Cyber Protect (Secure
connection) shortcut. It redirects you to the login page.
48
Chapter 5 - Installing EBR manager
24. Click SIGN IN and then enter username and password.
Adding Licenses to EBR Manager
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. At the left pane of the Acronis Protect home page, click
Settings > Licenses.
The Licenses page appears.
4. Navigate to the EBR_License.txt file in the EBR License
folder.
5. Open the EBR_License.txt file in the EBR License folder of
the EBR Installation DVD.
6. Copy the required server/workstation key from the keys list.
7. Click Add keys tab on the Licenses page.
8. Paste the copied license key.
9. Click Add, and then Done.
Adding Users to EBR Manager
1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand SETTINGS, and then click Account.
49
Chapter 5 - Installing EBR manager
3. Click Add account.
4. The Add account pane appears.
5. In the Add account pane, click the drop-down menu and
choose domain name or system name (for workgroup).
6. Enter Username that needs to be added, and then click
search.
7. Select the user and role for that user.
8. Click Done.
50
CHAPTER
6 INSTALLING EBR AGENTS IN PHYSICAL
ENVIRONMENT
EBR agents can be installed in two ways:
n Installing EBR agents manually.
n Installing through EBR manager (if user adds physical
machine through EBR manager, it pushes EBR agent to the
machine automatically), refer to section “Adding computers
to the management server”.
NOTE: If you are using All-In-One appliance, you need to
follow option 1 (installing EBR agent manually for physical
platforms).
In this section:
Installing EBR agents manually 52
EBR scripts 56
51
Chapter 6 - Installing EBR agents in physical environment
Installing EBR agents manually
1. Open Windows Explorer, and then navigate to the EBR DVD
drive.
2. Right-click Setup.exe, and select Run as administrator from
the drop-down list. The User Account Control dialog box
appears.
3. Click Yes.
The Honeywell Experion Backup and Restore window
appears.
4. Click Next.
The License Agreement dialog box appears.
52
Chapter 6 - Installing EBR agents in physical environment
5. Read the license agreement, select I accept the terms in the
License agreement, and click Next.
The License Information dialog box appears.
6. Type the system numberin in the System Number field.
7. Type authorization number in the Authorization Field.
NOTE: The System Number and Authorization Number
are available from the License Authorization of
Honeywell. This information determines which
software packages you are authorized to install.
8. Click Next.
The Features and Options Selection dialogue box appears.
53
Chapter 6 - Installing EBR agents in physical environment
9. Select Acronis Cyber Protect 15 and EBR Scripts, and click
Next.
The Summary dialog box appears.
ATTENTION:
EBR Scripts are applicable to Server nodes.
If Workstation/Servers added as per section “EBR
Scripts” EBR Scripts will not get . In such cases, install
the EBR Scripts per above procedure.
EBR scripts cannot be run as part of the backup policy
of a virtual machine. We recommend creating a
scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
protection (backup) of the virtual machine. Applicable
for Experion Server only.
10. Click Install.
The wizard installs Acronis Cyber Protect 15.
54
Chapter 6 - Installing EBR agents in physical environment
NOTE: The check box on left hand column displays the
status of completion after each component
installation.
11. As the installation progresses, the ACRONIS SOFTWARE
LICENSE AGREEMENT dialogue box appears.
12. Select I accept the terms of this license agreement check
box.
13. Click Proceed.
14. Select Install a protection agent and enter IP address of
previously installed Management server.
55
Chapter 6 - Installing EBR agents in physical environment
15. Click Install.
16. After the wizard installs Acronis Protect, click Close.
17. The Status Display window appears.
After the wizard installs EBR Scripts, click OK.
This completes the EBR Manager installation.
EBR scripts
Installing EBR scripts
1. Insert the EBR Installation DVD into the DVD drive. The
AutoPlay dialog box appears.
2. Double-click Open Folder to view files.
NOTE:
If the AutoPlay dialog box does not appear, right-click
the DVD drive and then select Open.
Or
Open Windows Explorer, and then navigate to the DVD
drive.
56
Chapter 6 - Installing EBR agents in physical environment
3. Right-click Setup.exe, and select Run as administrator from
the drop-down list. The User Account Control dialogue box
appears.
4. Click Yes.
The Honeywell Experion Backup and Restore window
appears.
5. Click Next.
The License Agreement dialog box appears.
6. Read the license agreement, select I accept the terms in the
License agreement, and click Next. The License Information
dialog box appears.
7. Type the system numberin in the System Number field.
8. Type authorization number in the Authorization Field.
NOTE: The System Number and Authorization Number
are available from the License Authorization of
57
Chapter 6 - Installing EBR agents in physical environment
Honeywell. This information determines which
software packages you are authorized to install.
9. Click Next.
The Features and Options Selection dialogue box appears.
10. Select EBR Scripts and click Next.
The Summary dialogue box appears.
11. Click Install and then once the installation is completed,
click OK.
ATTENTION:
EBR Scripts are applicable to Server nodes.
EBR scripts cannot be run as part of the backup policy of a
virtual machine. We recommend creating a scheduled task
in Windows to run the EBR script locally on the virtual
machine prior to the actual EBR backup of the virtual
machine. Applicable for Experion Server only.
58
CHAPTER
7 ADDING COMPUTERS TO THE
MANAGEMENT SERVER
Adding computers to the management server requires you to
connect the management console to the management server.
In this section:
Adding Windows Server to the EBR Manager 60
Adding Windows Workstation to the EBR Manager 60
Adding VMware ESXi Virtual Machines to EBR Manager 62
59
Chapter 7 - Adding computers to the management server
Adding Windows Server to the EBR Manager
1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand DEVICES, and then click All Devices.
3. Click Add.
4. The Add Devices pane appears.
5. In the Add devices pane, under Servers click Windows.
6. Enter the following details:
a. In the IP address or name field, enter the machine IP
address or the machine name.
b. Enter the username and password in the respective fields.
7. Click Install.
8. After the installation the server appears in the All Devices
page.
Adding Windows Workstation to the EBR
Manager
1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand DEVICES, and then click All Devices
60
Chapter 7 - Adding computers to the management server
3. Click Add.
4. The Add Devices pane appears.
5. In the Add devices pane, under WORKSTATIONS click
Windows.
6. Enter the following details:
a. In the IP address or name box type the machine IP
address or the machine name.
b. In the Username box, type the username the to connect
to the machine.
c. In the Password box type the password to connect to the
machine.
7. Click Install.
8. After installation the workstation appears in the All Devices
page.
ATTENTION: Refer to the Setting up EBR in a virtual
environment section, before you perform the steps given in
the Adding VMware ESXi virtual machines to EBR Manager
section.
ATTENTION:
If user adds a machine (workgroup) that is not a member of
an Active Directory domain and EBR Manager is in domain,
User Account Control (UAC) must be disabled. To disable
UAC, do one of the following depending on the operating
system:
61
Chapter 7 - Adding computers to the management server
l In any Windows operating system:
1. Open Registry Editor.
2. Locate the following registry key: HKEY_LOCAL_
MACHINE\Software\Microsoft\Windows\CurrentVe
rsion\Policies\System
3. For the EnableLUA value, change the setting to 0.
4. Restart the system.
Adding VMware ESXi Virtual Machines to EBR
Manager
1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand DEVICES, and then click All Devices.
3. Click Add.
4. The Add devices pane appears.
5. In the Add devices pane, under the VIRTUALIZATION HOSTS
section, click VMware ESXi.
62
Chapter 7 - Adding computers to the management server
6. The VMware ESXi pane appears.
7. Click Deploy as a virtual appliance to each host of a vCente.
The Add VMWare ESXi virtual machines window appears.
8. Enter the following details:
a. In the IP address or name box, type the machine IP
address or the machine name.
b. In the Username box, type the username used to connect
to the virtual machine.
c. In the Password box type the password to connect to the
virtual machine.
9. Click the drop-down menu and choose the management
server that is used to access the server.
10. Click Settings.
Deploy virtual appliances to ESXI hosts screen appears.
11. Ensure that the Deploy a virtual appliance options set to
Yes.
12. The Virtual appliance name, Data source, and Resource
fields are automatically populated.
63
Chapter 7 - Adding computers to the management server
13. Click the Network drop-down menu, and then select VM
Network.
14. Ensure that the Obtain settings from DHCP server check
box is not selected.
15. Enter the following details:
a. IP address
b. Subnet mask
c. Default gateway
d. DNS Servers
e. DNS suffix
f. WNS servers
16. Click Deploy.
NOTE:
Please follow the below mentioned steps for synchronizing
the time externally:
1. Open the Acronis Virtual Appliance Graphical User
Interface, scroll down to the time zone and change the
time zone to some different time zone.
2. Reboot the Virtual Appliance, scroll down to the time
zone, and then change the time zone to the correct time
zone.
3. Reboot the Virtual Appliance again, press Ctrl+Alt+F2 this
will direct you to the Appliance Shell.
4. Run the command date and verify if the Graphical User
Interface time correlates with Shell time.
NOTE: Please ensure that the both shell timing and
server timings are synchronized.
64
CHAPTER
8 SETTING UP EBR IN A VIRTUAL
ENVIRONMENT
In EBR R520, Management Server, a machine is considered
virtual if it can be backed up from the virtualization host
without installing an agent on the machine. Such machine
appears in the Virtual machines section.
See the EBR SCN for VMware vSphere versions supported by
EBR R520.
In this section:
Virtual appliance 66
Getting started 66
Deploying Agent for ESX(i) from EBR R520 Manager 68
Applying license to the virtual appliance 68
Configuring bindings 68
Removing agent for ESX(i) from EBR manager 69
65
Chapter 8 - Setting up EBR in a virtual environment
Virtual appliance
Acronis Cyber Protect 15 enables protection (backup) and
recovery of ESX(i) virtual machines without installing the
agents into the guest systems. This backup method is known as
agent-less backup.
Agent for VMware vSphere ESX(i) (Virtual Appliance) can be
imported or deployed to a VMware ESX(i) host.
NOTE: Backup of ESXi configuration is not supported with
EBR.
ATTENTION:
It is recommended to deploy the EBR Appliance to the
vCenter Server instead of an individual host. In this
configuration, the appliance aware of the entire virtual
machine inventory of the vCenter instead of an isolated
view of the virtual machines running on a specific host.
Each EBR Virtual Appliance must be assigned to only one
vCenter Server, and if more than one vCenter Server exists
in a system, deploy at least one EBR Virtual Appliance to
each vCenter Server instance.
Each EBR Virtual Appliance can perform 10 concurrent
backups, and backups beyond this are held in a queue.
Once the first 10 backup jobs completes, the next job in the
queue starts. However, we recommend to stagger start
times so that only one node is backed up at a time (to
minimize loading on the network). The ability to manage
and queue multiple concurrent backups means that a
vCenter Server will generally only require one EBR Virtual
Appliance, each configured with quantity 2 virtual CPU and
8 GB memory. It is not recommended to exceed more than
10 EBR Virtual Appliances per vCenter Server instance.
Getting started
Prior to taking protection (backup) of virtual machines, you
must do the following:
1. Install latest VMware Tools on every virtual machine to be
backed up
66
Chapter 8 - Setting up EBR in a virtual environment
2. Configure Network router
3. Prepare list of free IP addresses available for each host. This
is required to allocate an IP address from management
network subnet to agents for each ESX(i) host.
4. Collect user credentials for vCenter and ESX(i) Hosts
Network router configuration
The router or a similar network device must not block traffic
from the management server through the device.
Recommended ACLs to be set on the management interface of
the gateway router in the outbound direction are as follows:
n 443
n 902
n 9876
ATTENTION:
Best Practices.
https://www.process.honeywell.com/library/support/Docu
ments/Trusted/Experion/NetworkRouterConfigurationBP.p
df
For assistance related to network router configuration,
contact your System Administrator.
Contact your Network Administrator to ensure that the
changes are implemented if ACLs are being applied to the
router.
Preparing the list of free IP addresses for agent for ESX(i) host
The agent for ESX(i) host uses an IP. Before deploying the
appliance ensure there are free IPs on the management
network subnet. Make a list of free IP addresses for each ESX(i)
host.
For Example:
IP Address of the
ESXi Host Virtual Appliance Name
Virtual Appliance
Experion AcronisVirtualApplianceES1 10.1.21.222
Server ESXi
67
Chapter 8 - Setting up EBR in a virtual environment
ATTENTION: You can prepare a table for your site as shown
in the above example.
Administrator credentials for vCenter and ESX(i) Hosts
You should know the administrator credentials for vCenter and
ESX(i) Hosts.
Deploying Agent for ESX(i) from EBR R520
Manager
Adding VMware ESX(i) virtual machines to the EBR Manager
automatically deploys Virtual Appliance to each host of
VCenter. Refer to Section Adding VMware ESXi virtual machines
to EBR Manager for more details.
Applying license to the virtual appliance
Licenses are assigned automatically to the virtual appliances
by the license server. If this does not happen, see security.
1. Log On to the EBR Manager node.
2. On the Acronis Cyber Protect 15 home page, click Settings.
3. Select Licenses under Settings which displays the available
licenses and the machines they are assigned to.
4. Click Assign.
5. The software displays the machines that the selected key to
be assigned.
6. Select the machine, and then click Done.
Configuring bindings
In cases where less Agents have been deployed than there are
hosts or where more granular control of Agent to VM workloads
is desired Agent bindings can be customized.
68
Chapter 8 - Setting up EBR in a virtual environment
ATTENTION: If the number of VMS are considerably more,
then this binding concept will help to balance the load
between the virtual appliances.
Removing agent for ESX(i) from EBR manager
To remove Agent for ESX(i) from EBR manager:
1. Connect to the EBR Manager.
2. In the home page, click All Devices. The All Devices page
appears.
3. Under Devices, click Machines with agents.
The Machines with Agents window appears.
4. From the list choose the virtual appliances that you want to
remove.
The options window pane for the selected Virtual Appliance
appears.
5. From the right pane click Delete.
The Delete Machine window appears.
6. Click Delete to remove the ESX(i) host from the EBR
Manager.
69
CHAPTER
9 PROTECTION PLANNING
In this section:
Protection considerations 71
Deduplication 77
Backup recommendations 78
Protection (Backup) types 80
Protection (Backup) schemes 81
Scheduling backups 82
Default Backup settings 83
Retention rules 86
Setting up a storage node 87
Backup replication 94
70
Chapter 9 - Protection planning
Protection considerations
When developing a protection plan, consider the following:
n What are the prerequisites (if any) before protections
(backups) are started?
n Which system nodes and data repositories are backed
up?
n Are the protections (backups) hourly, daily, weekly, or
monthly? What time of the day, is the protection
(backup) performed?
n What type of protection (backup) is required for each
node—full, incremental, or differential?
n How are the protections (backups) tracked when
developing the protection plan?
n Where are the protections (backups) stored?
n Are the protections (backups) performed correctly?
n How can the protection (backup) plan effectively
manage the following unexpected events?
− Natural events: Fire, flood, earthquake, storms, and
extreme weather conditions.
− Technological events: Hardware, software, power
failure, virus, and service denial.
− Human events: Judgment error, theft, vandalism,
misconduct, and security breach.
Preventing data loss
One method of preventing data loss due to unexpected events
is to perform regularly scheduled system protections. You must
analyze the importance of your data and systems and ensure
that an appropriate protection (backup) plan is established and
performed regularly.
You can monitor system usage and other controls to check the
load on system resources such as hard disks and networks.
This enables you to perform needed upgrades and preventive
scheduled maintenance before a hardware or software failure
occurs.
71
Chapter 9 - Protection planning
The integrity of your data and systems must be maintained by
regularly running virus scans to ensure your systems are not
infected.
NOTE: Honeywell recommends adhering to the Acronis 3-
2-1 backup rule by maintaining three copies of your data:
one primary copy in production and two backups on
different types of storage media. One of these backup
copies should be stored offsite in protected storage that
cannot be deleted.
Prerequisites for a backup
You must know the nodes and node types in your system to
determine the following:
n Which nodes are backed up?
n Which drives in each node are backed up?
n Which server is used as the archive for the backup?
Centralized backup management
Administrative activities include creating and scheduling
protection (backup) jobs, monitoring the progress and results
of those jobs through logs and event notifications, and
controlling the protection (backup) jobs. You can accomplish
these activities using the Management Console to manage
locally, centrally, or remotely.
File naming guidelines
Be consistent with naming backup files. In addition, the names
must be clear and meaningful. This makes the task of restoring
data easier. For example, for a node named “ESVR_1,” a good
backup filename would be “ESVR_1_C” rather than “C_Drive.”
This provides proper identification of the backup file when you
copy or export the file to another location.
Backup after Windows Update
It is recommended to protect (backup) the machine prior to and
after loading Windows updates to the system.
72
Chapter 9 - Protection planning
Staggering start times
When scheduling protection (backup) jobs for multiple nodes,
stagger start times (recommended) so that only one node is
backed up at a time (to minimize loading on the network).
Adding Storage Nodes
A storage node is a server designed to optimize the usage of
various resources (such as the corporate storage capacity, the
network bandwidth, and the production servers' CPU load) that
are required to protect enterprise data. This goal is achieved by
organizing and managing the locations that serve as dedicated
storages of the enterprise backups.
ATTENTION: Storage nodes need to be manually added.
Please refer section Installing the EBR Manager Software
package. Follow the steps until step 18 and select Storage
Node. Then, add the storage node as explained in the steps
below. Then, follow through until the last step, step 24, in
4.3: Installing the EBR Manager Software package.
1. Select the check boxes Storage Nodes and Agent for
Windows.
2. Click Done.
3. Select Acronis Cyber Protect Management Server.
73
Chapter 9 - Protection planning
4. Enter Server name or IP address. Enter account details.
5. Click Done
Storing Backups
ATTENTION:
Do not use the local hard disk of the node being backed up
to store backup images. If the hard disk becomes full, it can
impede the node’s performance.
Do not use the shared storage of Honeywell Premium
Platform for Virtualization for storing backups.
Typically, a Target Node does not contain sufficient space to
store all backups. Storing a backup on a Target Node may
degrade the performance of the node. In addition, if the hard
disk drive in the Target Node fails, all backups are lost.
For security purposes, the server that stores the backups must
be located in the most physically secure location.
The number of nodes in your system determines the number of
servers required.
The primary guideline is that each full backup requires about
half the amount of space as the hard disk being backed up.
74
Chapter 9 - Protection planning
Offsite storage
The frequencies of the backups are determined by the
importance of the data and systems. Any mission-critical
systems or data (those that must be recovered within minutes
or hours of the system failure) must be backed up and taken
offsite at least daily. The location you choose is important. The
backups must not only be safe and secure, but must be easily
accessible in the event of a disaster.
It is recommended that you transfer backup images onto a DVD
or tape (a CD may not contain sufficient capacity) on a
regularly-scheduled basis. You can store the media offsite in a
secure temperature-controlled environment for long-term
storage. In addition, you can define the protection (backup)
retention rules for the media.
EBR also offers the ability to Export —copying backup images
from one location to another.
Backup/restore speed
Both the backup and restore procedures transfer data at a rate
of 1Gigabit per minute to a network drive (based on the
uncompressed disk space in use). Backup to a USB hard disk
mounted locally has similar performance. However, the
recovery time is nearly twice as fast.
Network speed depends on:
Network destination: Device type (NAS), network bandwidth
(1GB or bonded with 2GB) and the source or traffic that is
traversing a router. For example: If the source is a 100Mb
physical machine, it would be slower than a 1GB virtual
machine backup from a host.
Network throttling setting: A setting that limits available
bandwidth utilization.
For older platforms, the transfer rate may be 0.5 Gigabits per
minute to a network drive.
Scanning a hard disk with anti-virus software may require up to
75 percent longer time to complete if performed concurrently
with a backup job.
75
Chapter 9 - Protection planning
In each of these cases, the impact on the time required for the
backup is less than 10 percent.
NOTE: The approximate data provided is valid in ideal
conditions.
Rebuilding or restoring data
Do not rebuild or restore a database at the same time that a
backup is being performed. Database corruption can occur
when the node is low on hard disk space and you are
performing a database rebuild when a backup is in progress.
Running disk I/O intensive applications
Running disk I/O intensive applications at the same time a
backup is being performed can cause a significant
performance impact on the time required to complete the
backup and/or to complete the other application. It is best to
avoid using these applications at the same time.
Controller checkpointing should not be performed when an
EBR backup job is running.
Running disk defragmentation software
Do not run disk defragmentation software when a backup is in
progress. It causes the backup image to be invalid and you are
not allowed to restore the hard drive. In addition, do not run any
partitioning software at the same time when a backup is being
performed.
Running general applications
Some general applications must be disabled when a backup is
in progress. For example, ScanDisk, as this is a disk intensive
activity. In addition, you must avoid Honeywell specific actions
such as Experion Server synchronization, archiving/restoring
to/from a tape, and file transfer to/from the LCN.
Virtual Machines with snapshots
VMs with snapshots will have performance issues, which could
cause Experion server issues. We do not recommend running
ON process VMs with snapshots. Also, snapshots should not
76
Chapter 9 - Protection planning
last more than 48 hours, due to the performance issues to the
machine.
Data compression
Using data compression, you can save recovery points in a
smaller size file.
TIP: It is recommended that you use the Normal option
for data compression, as it provides the best overall
performance results.
EBR R520 provides the following compression options:
Normal – Honeywell recommends this option.
None – Data is copied as is without any compression.
High – The backup size is typically less than a normal
compression.
Maximum – Compresses the Data to the maximum possible
level and takes the maximum duration to complete the backup.
Using routers
Although you can backup a device through a router, this could
affect the routed traffic. It is recommended that you check with
the local IT department regarding any possible impact on
traffic. Where possible, it is recommended that the backup
images be stored on a device that is on the same LAN segment
as the Target Nodes.
Deduplication
Deduplication is the process of minimizing storage space taken
by the backed-up data by detecting backup data repetition and
storing identical backup data only once. Acronis deduplicates
backups saved to a managed vault if you enable deduplication
during the vault creation. A vault where deduplication is
enabled is called a deduplicating vault.
77
Chapter 9 - Protection planning
ATTENTION:
The storage node component must be installed for using
deduplication.
Deduplication is possible only when the backup is stored to
a managed vault.
The most important factors that influence deduplication speed
are:
n The speed of access to the deduplication database
n The RAM capacity of the storage node
n The number of deduplicating locations created on the
storage node.
NOTE: For more information about Deduplication see,
chapter Deduplication best practices in the Acronis Cyber
Protect 15 User’s Guide.
Backup recommendations
Changing Drive letter for system reserved partition
1. Click This Pc.
l The This PC windowappearsdisplaying System reserved
partition with a drive letter assigned to it.
2. Right-click Start > Disk Management.
l The Disk Management window appears.
78
Chapter 9 - Protection planning
3. Right-click the System Reserved drive and then click
Change Drive Letter and Paths.
The Change Drive Letter and Paths for System Reserved
dialog box appears.
4. Click Remove to remove the Drive letter of the System
Reserved drive.
A confirmation message appears.
5. Click Yes.
The following warning message appears.
79
Chapter 9 - Protection planning
6. Click Yes.
The Drive Letter is removed from the System Reserved
partition of the Disk Management window.
Experion Servers
n Full backups run weekly.
n Incremental backups run every 8 hours.
Experion Stations, Console Extension Stations, Flex Stations, TPS Stations
n Full backups run weekly
ACE-T, SIM-ACE-T, and SIM-C200 nodes
n Full backups run weekly.
n Incremental backups run every shift change.
ATTENTION: Do not schedule backup from 0:00 to 2:00 AM,
as Experion default queries are launched at that time.
Protection (Backup) types
With EBR R520, three types of protections (backups) are
available:
l Full Backup: A self-sufficient backup containing all data
chosen for protection (backup). You do not need access to
any other backup to recover the data from a full backup.
l Incremental Backup: A backup that stores changes to the
data against the latest protection (backup). You need access
80
Chapter 9 - Protection planning
to other backups from the same archive to recover data from
an incremental backup.
l Differential Backup: A differential backup stores changes to
the data against the latest full backup. You need access to
the corresponding full backup to recover the data from a
differential backup.
Protection (Backup) schemes
When creating a protection (backup) plan, the following
protection (backup) schemes are available:
n Always incremental (Single – File)
Under this protection (backup) scheme, incremental
backups can be scheduled on Monthly, Weekly, Daily, or
Hourly basis.
1. The Monthly option has sub provisions to schedule the
backups by Days of Month or Days of Week.
2. The Weekly option allows the user to schedule backups
for Days of Week.
3. The Daily option allows the user to schedule the backups
to Run Every Day or to Run Monday to Friday.
4. The Hourly option allows user to schedule the backups to
run on hourly basis or within the specified time.
NOTE: The user can select the date range to run the
protection (backup) plan based on requirement
n Always full
n Same as Always incremental (Single – File), this protection
(backup) scheme too can be scheduled on Monthly, Weekly,
Daily, or Hourly basis, but for full backups.
1. The Monthly option has sub provisions to schedule the
backups by Days of Month or Days of Week.
2. The Weekly option allows the user to schedule backups
for Days of Week.
3. The Daily option allows the user to schedule the backups
to Run Every Day or to Run Monday to Friday.
81
Chapter 9 - Protection planning
4. The Hourly option allows user to schedule the backups to
run on hourly basis or within the specified time.
NOTE: The user can select the date range to run the
protection (backup) plan based on requirement.
n Weekly full, Daily incremental
This protection (backup) scheme provides provision for the
user to schedule full backups on weekly basis and
incremental backups on daily basis.
NOTE: The user can select the date range to run the
protection (backup) plan based on requirement.
Custom
This protection (backup) scheme provides provision for the user
to schedule full, differential, and incremental backups on
Monthly, Weekly, Daily, or Hourly basis based on requirement.
The user can add multiple schedules under each protection
(backup) types.
Scheduling backups
You can set a schedule for backup tasks. This helps in running
the backup tasks systematically.
The scheduler uses the local time of that particular computer in
which the protection (backup) plan exists.
Scheduling considerations
ATTENTION:
When scheduling backup jobs for multiple nodes,
Honeywell recommends backing up only one node at a time
by staggering the start times.
It is better to schedule backup operations on a
predetermined time slot to avoid any inconvenience or
interruption.
82
Chapter 9 - Protection planning
Scheduling the frequency of backups depends on the following
factors:
n Rate of data change (configured data)
n Database availability
n Value of the data to the company
Default Backup settings
Each Acronis agent has default backup options. The default
options have pre-defined values. When creating a protection
(backup) plan, you can use a default option, or use a custom
value applicable to that particular plan.
In addition, you can customize a default option by changing the
default values. The new value is used by default for all the
protection (backup) plans that are created on that computer.
To view and change default backup options:
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. In the left pane, expand SETTINGS, and then click System
Settings.
4. For more information on the backup options, refer to the
Default backup options table below.
NOTE: For more information about connecting to the
management server, see Adding computers to the
management server.
83
Chapter 9 - Protection planning
Default backup options
Available default backup options for EBR R520 and Honeywell
recommendations for these options are listed in the following
table:
Default setting Honeywell
Default backup option
(Preset) recommendation
Alerts No Select if required
Yes No
Changed Block Tracking
(CBT)
Compression Level Normal Normal
Email Notifications No No
Error Handling Yes Yes
Fast Yes Yes
Incremental/differential
backup
Automatic Automatic selection
selection
File filters
File - level backup Automatic Automatic selection
snapshot selection
File - level security Automatic Automatic selection
selection
LVM snapshotting Automatic Automatic selection
selection
84
Chapter 9 - Protection planning
Default setting Honeywell
Default backup option
(Preset) recommendation
Log truncation Yes Yes
Mount points No No
Multi-volume snapshot Yes Yes
No Select if required
Performance and backup
window
No Select if required
Pre-post commands
No Select if required
Pre-post data capture
commands
Scheduling Automatic Automatic selection
selection
No No
Sector-by-sector backup
Splitting Automatic Automatic selection
selection
Tape Management Automatic Automatic selection
selection
Task failure handling No No
Task start conditions Automatic Automatic selection
selection
Volume Shadow Copy Yes Yes
Service (VSS)
85
Chapter 9 - Protection planning
Default setting Honeywell
Default backup option
(Preset) recommendation
Yes No
Volume Shadow Copy
Service (VSS) for virtual
machines
Weekly backup Automatic Select if required
selection
Windows event log No No
ATTENTION:
For more information about Backup options see, chapter
Backup in the Acronis® Cyber Protect 15 User’s Guide.
For Tape Management settings see section Tape
Management in the Acronis® Cyber Protect 15 User’s
Guide.
Due to the wide range of tape options that exist on the
market, Honeywell is unable to provide technical support
for using tape drives in conjunction with Experion Backup
and Restore. All references are provided for informational
purposes only. Honeywell customers should contact the
tape drive manufacturer for all technical support required
for the use of this interface.
For Configuring EBR Backups without VSS for Experion
nodes, refer HPS Technical Support, Article No. 89808.
Retention rules
With EBR R520, you can set two types of retention rules for
your protection (backup) archives. They are based on:
a. Click on HOW LONG TO KEEP in the protection plan pane to
open the Cleanup pane where the following options can be
86
Chapter 9 - Protection planning
selected as per user requirement.
Cleanup by Backup age.
Under this option, the Monthly, Weekly & Daily backups
retention time can be individually selected based on user
requirement.
Cleanup by number of backups
Under this option, backups can be set to retain till it reaches
the desired maximum number configured here based on user
requirement.
Keep backups indefinitely
By selecting this option, the backups will be retained for an
indefinite time.
b. Switch to single rule for all backup sets option available at
the bottom of the cleanup pane provides provision for the
user to create single rule for all backup sets by setting the
number of hours, days, weeks, months, or years to retain the
backup files.
c. Click Done.
NOTE: Honeywell recommends maintaining backups to
cover at least six months of data. It may be necessary to
have multiple options for recovery points in the event more
recent backups are not usable.
Setting up a storage node
Adding a Managed Location
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15
3. In the left pane, click BACKUP STORAGE
It is recommended to always add location
(managed/Unmanaged) via clicking Backup Storage>Add
location on the left panel of home page.
87
Chapter 9 - Protection planning
4. Click Add location.
The Specify folder page appears.
5. Click Storage Node.
The Location managed by storage node page appears.
6. In the Name box, enter the applicable name.
7. In the Path box, enter the respective path or click Browse
and locate the applicable folder.
88
Chapter 9 - Protection planning
8. Click Done.
ATTENTION: There is no limitation for Acronis Storage
Nodes that can be registered on Acronis Management
Server. Regarding the vaults - the non-deduplication
vaults must not affect the Acronis Storage Node
performance but for the vault with deduplication - we
recommend to use one vault per Acronis Storage
Node.
To protect the location with encryption
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15
3. In the left pane, under All Devices click Devices.
The All Devices page appears.
4. Select the respective machine that needs to be encrypted.
89
Chapter 9 - Protection planning
5. Click Protect.
The New Protection plan page appears.
6. Turn on the Encryption.
The Encryption page appears.
7. Create a Password and confirm the password and choose
the Encryption algorithm. The default algorithm is AES256.
8. Click OK.
NOTE:
l Make sure Active Protection and Vulnerability
assessment under Protection plan is turned off.
90
Chapter 9 - Protection planning
l Acronis Active Protection Service and Acronis Cyber
Protection Service need to be Disabled in agent
machines. Reboot machine once with both services
are disabled, so they are also stopped and not
working.
l Windows GUI may not allow you to disable services.
These could still be disabled in registry as follows:
l Open regedit.exe from Windows search or
command prompt with administrative privilege
l Navigate to both keys shown below and set Start
value to 4 under both of them
l HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Servic
es \AcronisActiveProtectionService
l HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Servic
es \AcronisCyberProtectionService
l Reboot node
Disabling Acronis Active Protection and Cyber
Protection services is expected to cause alerts
about Cyber Protection / Active Protection
services on Acronis dashboard. These are safe to
ignore / clear.
Customers could follow Acronis article ( link ) to
change priority or disable alerts for
91
Chapter 9 - Protection planning
l Active Protection Service Not Available
l Active Protection Service Not Running
Deduplication
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. In the left pane, click BACKUP STORAGE, and then click Add
location.
NOTE: It is recommended to always add location (managed /
unmanaged) via clicking BACKUP STORAGE>Add location on
the left panel of home page.
4. The Add location page appears.
92
Chapter 9 - Protection planning
5. Click Storage Node
The Location Managed by Storage Node page appears.
6. In the Name box, type name for the storage node.
7. Click the Address drop-down arrow and choose the address.
8. Under Path click Browse and choose the storage path.
9. Under Deduplication database path click Browse and choose the
database path.
10. Click Deduplication button to ON. By default, this option will be in
OFF stage.
ATTENTION:
l Only if deduplication is enabled specify or change the
Deduplication database path field value.
l This must be a folder on a hard drive local to the storage
node. To improve the system performance, we recommend
93
Chapter 9 - Protection planning
that you create the deduplication database and the
managed location on different disks.
11. Click Done.
Backup replication
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. Click Create plan.
4. The Create plan page appears.
5. Enter the following details:
a. Specify the AGENT.
b. Specify the DESTINATION.
c. Click How to Replace drop-down arrow and choose the desired
option.
6. Click CREATE.
94
CHAPTER
10 BACKUPS ON A PHYSICAL NODE
In this section:
Getting started 96
Creating a protection (backup) plan for a physical node 99
Running protection (backup) job manually 100
Editing protection (backup) jobs 100
Deleting protection (backup) plans/jobs 101
Backup in a recovery environment 102
95
Chapter 10 - Backups on a physical node
Getting started
Sample backup configuration form Table is a sample backup
configuration form that you can create as a spreadsheet to
simplify backup scheduling by having all the data in one place.
After entering the data, you can use the spreadsheet data to
configure backups for each node.
Table 1. Sample backup configuration form
Configuration Node Node
Range/Options/Notes
Information A B
Node Number
Node Name
Node Type
Hardware Platform
(optional)
Drives to be backed up
General backup
information:
• Network file name Name of backup file
• Network folder name
of backup
MAC Address
IP Addresses:
• Node (Yellow FTE)
• Default Gateway
• File Server
• Access credentials for
Vault
Scheduling backups l Once
(Full or Base with l Weekly
incrementals):
l Monthly
l No schedule
96
Chapter 10 - Backups on a physical node
.Sample backup configuration form Table is a sample backup
configuration form that you can create as a spreadsheet to
simplify backup scheduling by having all the data in one place.
After entering the data, you can use the spreadsheet data to
configure bac.
Configuration Node Node
Range/Options/Notes
Information A B
• Weekly:
− Day of the week Sun, Mon, Tue, Wed, Thu, Fri,
Sat
− Start time Hours: Minutes AM/PM
− First backup of Hours: Minutes AM/PM
each day
− Last backup of Hours: Minutes AM/PM
each day
• Monthly:
− Day of the 1–31
month
− Start time Hours: Minutes AM/PM
− Number of 1–8
hours between
incrementals
Data l Normal (recommended)
compression: l High
l Maximum
l None
Validate backup Not recommended.
after creation Verification doubles the time
to finish a backup.
Configuration Node Node
Range/Options/Notes
Information A B
• File descriptor
97
Chapter 10 - Backups on a physical node
Configuration Node Node
Range/Options/Notes
Information A B
(For each node
backup)
• File size • Blu-ray Disc • Tape:
Limit number of 5 backups maximum per
backups for each week are recommended.
hard disk
1 backup at month-end is
recommended.
User credentials for backup plan and vault
You must know the credentials of the EBR User Account and
the credentials for the Vault before creating a protection
(backup) plan.
98
Chapter 10 - Backups on a physical node
Creating a protection (backup) plan for a
physical node
To create a protection (backup) plan for a physical machine
1. From the Home page of Acronis Cyber Protect 15, click ADD
option to add the required physical node to the All devices
list by specifying the respective machine name or IP address
and entering the login credentials.
2. Select the required physical machine from the all devices
tab of the Acronis Cyber Protect 15 home page.
3. Select the option Protect from the right side menu of the
Acronis Cyber Protect 15 home page for the selected
physical node.
4. Use the Create Plan option to create a new protection
(backup) plan for the selected physical node and provide a
name for it by clicking the Edit icon.
ATTENTION:
While selecting the volumes to be backed up for nodes
loaded with Embedded Microsoft Windows 10 LTSC
Enterprise and Embedded Microsoft Windows Server
2019 Standard operating systems:
l Select the C drive (or other drive if CIP is used) as
well as the System Reserved partition (if present).
l If you used Custom Install Path for any software
installation, then select that drives as well.
5. Click What to protect (backup) to select entire machine or
disks / volumes.
l The Entire machine option is used to take the entire
machine protection (backup).
NOTE: The user can enable or disable the
application protection (backup) for selected entire
machine protection (backup) of the physical node.
99
Chapter 10 - Backups on a physical node
When the option disks / volumes is selected, the Items to
backup option is enabled .beneath where the user can
add rules and select what item to be backed up. Press OK.
ATTENTION: If your operating system and its loader
reside on different volumes, always include both the
volumes in the backup. Recover the volumes
together; otherwise there is a high risk of the
operating system failing to start.
Running protection (backup) job manually
Run a Protection (backup) job on demand. The Run option
allows you to run any protection (backup) job when required,
even if the protection (backup) job is scheduled.
1. Click Start > Acronis > Acronis Protection. The Acronis Protect
window appears.
2. Under Devices, select devices for protection.
3. Click Protection on right pane.
4. Select the Applied protection plan.
5. Click RUN NOW to start the protection.
Editing protection (backup) jobs
You can edit or modify the protection (backup) job settings. To
edit or modify protection (backup) job settings:
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. In the left pane, click PLANS.
100
Chapter 10 - Backups on a physical node
4. Under PLANS, click Protection.
5. The New protection plan page appears.
6. Review and change the required protection plan settings.
7. Click Save.
Deleting protection (backup) plans/jobs
Disabling a protection (backup) job locally using
Server/Desktop console:
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. In the left pane, click BACKUP STORAGE.
4. Select the plan that you want to delete.
The Remove from list pop-up appears.
101
Chapter 10 - Backups on a physical node
5. Click DELETE.
Backup in a recovery environment
To backup in a recovery environment:
1. Insert the EBR Recovery DVD into the DVD drive.
ATTENTION: Ensure that the computer starts from the
DVD drive.
2. Restart the computer using the EBR Recovery DVD.
3. After the computer hardware analysis is completed in the
EBR recovery environment, the computer restarts within 5–7
minutes.
The Starting Acronis Loader message appears, followed by
the Acronis Cyber Protect Bootable Agent Screen.
102
Chapter 10 - Backups on a physical node
Click Manage this machine locally.
4. The Network Settings dialog box appears. Enter the
appropriate network settings and then click OK.
5. The Acronis Bootable Agent dialog box appears. Click
Manage this machine locally.
103
Chapter 10 - Backups on a physical node
6. The Management console appears. On the home page,
under Actions, click Back up now. The Back up now page
appears.
104
Chapter 10 - Backups on a physical node
What to backup
1. Click Items to back up.
l The Data to Back Up dialog box appears.
l In the Data to back up list, select Disks/volumes or files
to back up.
2. Perform any one of the following, as necessary:
3. If you are selecting Disks/volumes, select the check box
corresponding to disk/volume you want to back up.
105
Chapter 10 - Backups on a physical node
4. If you are selecting files, select the location from the left
pane and then select the file folders from the right pane.
5. Click OK.
6. Click Location.
106
Chapter 10 - Backups on a physical node
The Location dialog box appears.
7. a. Select the Location from the left pane.
b. Provide a name for the new backup archive. Click OK.
107
Chapter 10 - Backups on a physical node
How to back up
1. In the Backup type list, select a suitable option.
Validation
1. In the Validation list, select a suitable option.
Parameters
1. Click Backup options to edit the default backup options.
The Options dialog box appears.
2. Select a suitable option and then click OK. The Back up now
page appears.
3. Click OK.
108
CHAPTER
11 PROTECTION(BACKUP) ON A VIRTUAL
NODE
In this section:
Getting started 110
Creating a protection (backup) plan for a virtual node 113
General recommendations 116
109
Chapter 11 - Protection(Backup) on a virtual node
Getting started
Prerequisite: You should have completed the procedures
mentioned in Chapter 8. Setting up EBR in a virtual
environment.
n Maintain a backup configuration form
Sample backup configuration form
Table 2 is a sample protection (backup) configuration form that
you can create as a spreadsheet to simplify backup scheduling
by having all the data in one place. After entering the data, you
can use the spreadsheet data to configure backups for each
node.
Configuration Node Node
Range/Options/Notes
Information A B
Node Number
Node Name
Node Type
Hardware Platform
(optional)
Drives to be backed up
General backup
information:
• Network file name Name of backup file
• Network folder name
of backup
110
Chapter 11 - Protection(Backup) on a virtual node
Configuration Node Node
Range/Options/Notes
Information A B
MAC Address
IP Addresses:
• Node (Yellow FTE)
• Default Gateway
• File Server
Access credentials
for Vault
Scheduling n Once
backups (Full or n Weekly
Base with
incrementals): n Monthly
n No schedule
• Weekly:
− Day of the week Sun, Mon, Tue, Wed, Thu,
Fri, Sat
− Start time Hours: Minutes AM/PM
− First backup of Hours: Minutes AM/PM
each day
− Last backup of Hours: Minutes AM/PM
each day
• Monthly:
− Day of the month 1–31
− Start time Hours: Minutes AM/PM
− Number of hours 1–8
between
incrementals
Data compression: n Normal (recommended)
n High
n Maximum
111
Chapter 11 - Protection(Backup) on a virtual node
Configuration Node Node
Range/Options/Notes
Information A B
n None
Validate backup Not recommended.
after creation Verification doubles the
time to finish a backup.
• File descriptor
(for each node
backup)
• File size • Blu-ray Disc • Tape:
Limit number of 5 backups maximum per
backups for each week are recommended.
hard disk
1 backup at month-end is
recommended.
112
Chapter 11 - Protection(Backup) on a virtual node
Creating a protection (backup) plan for a virtual
node
To create a protection plan for a virtual node:
Step Action
1. From the Home page of Acronis Cyber Protect 15, click ADD
option to add the required VMware ESXi to the All devices list by
specifying the respective host name or IP address and entering
the login credentials which adds the virtual machines that it
contains.
2. Select the required virtual machine from the All devices tab of
the Acronis Cyber Protect 15 home page.
3. Select the option Protect from the right side menu of the
Acronis Cyber Protect 15 home page for the selected virtual
node.
4. Use the Create plan option to create a new protection (backup)
plan for the selected virtual node and provide a name for it by
clicking the Edit icon.
ATTENTION:
While selecting the volumes to be backed up for nodes
loaded with Embedded Microsoft Windows 10 LTSC
Enterprise and Embedded Microsoft Windows Server 2019
Standard operating systems:
l Select the C drive (or other drive if CIP is used) as well
as the System Reserved partition (if present).
l If you used Custom Install Path for any software
installation, then select that drives as well.
5. Click What to back up to select entire machine or disks /
volumes.
The Entire machine option is used to take the entire machine
backup.
NOTE: The user can enable or disable the application
backup for selected entire machine backup of the physical
node.
113
Chapter 11 - Protection(Backup) on a virtual node
When the option disks / volumes is selected, the Items to
backup option is enabled beneath where the user can add rules
and select what item to be backed up. Press OK.
ATTENTION: If your operating system and its loader reside
on different volumes, always include both the volumes in
the backup. Recover the volumes together; otherwise there
is a high risk of the operating system failing to start.
Where to back up
ATTENTION: Ensure that the disk has sufficient space
before starting the backup.
6. Click Where to backup option to specify the location where the
backup needs to be saved.
l The Location dialog box appears.
7. Select any of the following as necessary:
a. Browse Local folders to save the backup in a local folder.
b. Browse Network folder using the respective login credentials to
save the backup in a network location
c. Click Done.
How to back up
8. Select the appropriate Protection (Backup) Scheme to schedule the
required backup plan under schedule option. Please refer the
Section Backup Schemes for more details. The schedule option can
be turned ON or OFF as per requirement.
Click Done.
TIP:
It is recommended to use the Custom back up scheme.
When you schedule the task to run, the following options are
available:
l Add schedule : Use this option to create more than one
schedule.
l Delete: Use this option to delete a schedule.
l Change: Use this option to edit the schedule.
114
Chapter 11 - Protection(Backup) on a virtual node
9. In the HOW LONG TO KEEP option, select a scheme that suits your
requirement.
e. Cleanup by backup age
l In this cleanup option, individual rule for each backup
sets can be selected on Monthly, Weekly, or Daily basis.
l OR
l Single rule for all backup sets can be selected.
f. Cleanup by number of backups
l Schedule cleanup when the maximum number of
backups is reached.
g. Keep backups indefinitely
h. Click Done.
10. Encryption option can be used to protect the backup files by
providing case sensitive passwords and selecting encryption
algorithms.
11. Click Apply.
ATTENTION: The Passwords set for the backup files using
Encryption option in the backup plan must be secured, as
the same needs to be provided during Recovery procedure.
ATTENTION: EBR scripts cannot be run as part of the
backup policy of a virtual machine. We recommend
creating a scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
Enter EBR Administrator credentials when prompted.
Server synchronization may corrupt a backup. Ensure
CAUTION that the servers do not synchronize during the
backup.
• Backups must not be scheduled when internal checks
and procedures are being performed by the Experion
system. Scheduling a backup during this period may
corrupt the backup. To ensure your backup does not
conflict with this time period, avoid scheduling
115
Chapter 11 - Protection(Backup) on a virtual node
Server synchronization may corrupt a backup. Ensure
CAUTION that the servers do not synchronize during the
backup.
backups between midnight and 3 AM. The backup
timings must be reviewed against the plant operating
and administration policies as they could change
based on the operating environment and operations
specific to your plant.
• During the backup, ensure that Controller Checkpoint
saves are not running in the background or scheduled
to run. To check this, choose Control Builder Menus
Controller > Checkpoint > Schedule Checkpoint Tasks.
Then, click Stop to cancel all the running and
scheduled tasks.
• Ensure event archiving is not occurring.
General recommendations
n Periodically check for logs to see if they are consistent
with the overall protection job status and backup
status of the node. It ensures that warnings and errors
are consistent with the overall status and are not
ignored.
n Files and Folder backup cannot be done for Virtual
machines. If it is required to take a backup of files and
folders on a virtual machine, then EBR Desktop
software or EBR Server software must be installed on
the Virtual node. It will use a workstation/server
license. However, if you intend to restore only files and
folders from a backup image, you can do so by
mounting the backup image.
n EBR scripts cannot be run as part of the backup policy
of a virtual machine. We recommend creating a
scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
backup of the virtual machine. Applicable for Experion
Server only.
116
Chapter 11 - Protection(Backup) on a virtual node
TIP: The procedures for Running protection
(backup) job manually, disabling & deleting
protection (backup) jobs, mounting an image
and validating backups are same for Physical
nodes and Virtual nodes. For details, see chapter
Backups on a physical node.
117
CHAPTER
12 RECOVERY PLANNING
This chapter provides instructions for restoring system data to
Experion nodes after recovering from an unexpected event. It
would be beneficial to include system administrators and users
in developing the recovery plan. You can then incorporate the
completed protection (backup)/recovery plan into your
Operations Policy.
In this section:
General recovery plan considerations 119
Overview of tasks to develop a recovery plan 120
Restore modes/options 122
118
Chapter 12 - Recovery planning
General recovery plan considerations
When developing recovery plan, consider the following:
l What are the possible unexpected events that can affect your
process and system?
l Depending on the unexpected events, what are the possible
recovery procedures?
l What is the recovery procedure for each scenario?
l Do you have to develop a plan for each of the possible
recovery scenarios?
l Who performs the recovery tasks?
l If your plant is divided into operational areas, is there a
hierarchy of operational areas to be restarted?
l What is the order in which the system nodes within a cluster
or operating area have to be restarted?
l Where are your backups stored? Are they available from a
nearby secure, temperature-controlled off-site location?
TIP: It is recommended to document the system
recovery plan and make it available to all the
participants.
Elements of a recovery plan
The recovery plan is a comprehensive set of measures and
procedures that are implemented to maintain critical resources
and infrastructure. This ensures that you have backup
alternatives in place, in case of an unexpected event.
The recovery plan must contain a comprehensive list of actions
that you must take before, during, and after an unexpected
event. Having a recovery plan means that your organization
implemented actions that allow you to respond to and recover
from an unexpected event in an organized and efficient
manner. The recovery plan must be documented, tested, and
approved to ensure the actions work as planned.
The recovery plan can protect the organization in several ways,
including:
119
Chapter 12 - Recovery planning
l Providing a sense of security.
l Ensuring system and resource stability during an
unexpected event.
l Minimizing system downtime and recovery.
l Minimizing the risk of permanent loss of critical systems and
data.
l Minimizing confusion during an event.
l Minimizing the amount of decision making after the event.
l Providing a platform on which to test various disaster
recovery scenarios.
l Ensuring the reliability of secondary systems such as mirror
servers and uninterruptible power supply (UPS) systems.
When developing a recovery plan, you must remember that its
instructions may be carried out in extremely stressful
conditions. Therefore, it is essential that the plan contains
easy-to-follow instructions written in a chronological order.
You must perform the following tasks when you begin
developing the recovery plan:
l Analyze the business impact
l Perform a risk assessment
l Develop the recovery plan
l Test and audit the plan
Overview of tasks to develop a recovery plan
Analyze the business impact
Identify the critical systems, applications, and business
processes and prioritize them in order of importance. You must
include:
l System software
l Experion application software
l Control strategies
l History and event archives
l Displays
120
Chapter 12 - Recovery planning
You must then evaluate the impact of an interruption on each
of the systems, applications, and processes you identified as
being critical.
Perform a risk assessment
Assessing the risks to your organization help to identify any
weaknesses to your critical systems, including the physical
security of your building, data security, and the likelihood of a
disaster occurring. The risk assessment may help to identify
potential risks to your organization and minimize certain
threats by identifying system vulnerabilities, which you can
then address.
Use the recovery plan
Recovery plans help to minimize downtime of your critical
systems. The recovery plans must outline how each of the
critical systems, applications, and processes are restored, and
provide a list of resources required for plan implementation.
The recovery teams must be prepared to quickly deal with the
unexpected event. With this in mind, you must ensure that the
recovery plan is concise and clearly written.
After the plan has been written and tested, employees must be
notified of its existence and key personnel must be trained in
its use. It is important to keep copies of the entire plan in a
secure offsite location. The plan must be stored in hard-copy
format, as well as electronically, in case computer systems are
unavailable.
Test and audit the plan
You must audit and test the plan periodically to ensure that it
continues to meet the organization’s procedures, practices, and
policies.
121
Chapter 12 - Recovery planning
Restore modes/options
Universal Restore option
Default recovery options
Available default recovery options for EBR R520 and Honeywell
recommendations for these options are listed in the following
table:
Default recovery option Default setting (Preset) Honeywell
recommendation
Backup
No Yes
Validation
Date and Time Yes Yes
for files
Error handling Yes Yes
(less number of attempts and less
interval between attempts
recommended)
File Exclusions Empty Provide file Exclusions as per
requirement.
File-level Yes Yes
security
Full path No No
recovery
Mount points No No
Performance Normal Normal
Pre-post Disabled Enabled based on requirement.
commands
Windows Disabled Enabled based on requirement.
event log
122
CHAPTER
13 CHECKLISTS FOR RESTORING EXPERION
NODES
In this section:
Checklists for restoring nodes with similar hardware 124
Checklists for restoring nodes after recovery from a virus
infection 126
Checklists for restoring selected files or folders from a
backup 131
123
Chapter 13 - Checklists for Restoring Experion Nodes
Checklists for restoring nodes with similar
hardware
Restoring a non-redundant node with similar hardware
Step Task Go to Done?
1 Replace the failed hard disk / Not
failed node and replace the hard applicable
disk / reconnect the related
cables.
Note: While replacing a failed hard
disk ensure the address pinning is
identical to the original unit.
2 Use EBR Recovery Media to restore the hard disk. page 119
Restoring redundant Experion Server A with similar hardware
Step Task Go to Done?
1 Replace the failed hard disk / Not
failed node and replace the hard applicable
disk / reconnect the related
cables.
Note: While replacing a failed hard
disk ensure the address pinning is
identical to the original unit.
2 Use EBR Recovery Media to Chapter 14
restore the hard disk.
3 Disable ERDB/EMDB replication Chapter 16
from Experion Server B.
4 Delete the contents of this folder Not
on Experion Server A: applicable
• For Experion R5xx
The default path is:
C:\Programdata\Honeywell\
Experion PKS \Checkpoint
124
Chapter 13 - Checklists for Restoring Experion Nodes
Step Task Go to Done?
For custom installation path,
navigate to
User selected path\Honeywell\
Experion PKS \Checkpoint
5 Restore the ERDB for Redundant Section
Experion Server A. 16.2
6 Restore the EMDB for Redundant Section
Experion Server A. 16.2
7 Use a Station to connect to the Section
primary Experion 16.2
Server, and then synchronize both
Experion Servers.
Restoring redundant Experion Server B with similar hardware
Step Task Go to Done?
1 Replace the failed hard disk / Not
failed node and replace the hard applicable
disk / reconnect the related
cables.
Note: While replacing a failed hard
disk ensure the address pinning is
identical to the original unit.
2 Use EBR Recovery Media to Chapter 14
restore the hard disk.
Ensure you disconnect the node from the network before
proceeding to the next step to avoid the redundant servers
communicating with each other immediately.
3 Delete the contents of this folder on Experion Not
Server B:
applicable
l For Experion R5xx
The default path is:
125
Chapter 13 - Checklists for Restoring Experion Nodes
C:\Programdata\Honeywell\ Experion PKS
\Checkpoint
For custom installation path, navigate to
User selectedpath\Honeywell\ Experion PKS
\Checkpoint
4 Restore the ERDB for Experion Server B. Section
16.2
5 Restore the EMDB for Experion Server B. Section
16.2
6 Use a Station to connect to the primary Section
Experion Server, and then synchronize both 16.2
Experion Servers.
Checklists for restoring nodes after recovery
from a virus infection
Considerations
n Depending on your local Operations Policy about
viruses, you may want to disconnect the infected
nodes from all the networks and restore them from
removable media to avoid infecting the rest of the
network.
n Recovery from a virus infection may require restoring
an entire hard disk or set of hard disks, or it may
simply require recovery of a few quarantined files.
n This procedure can confirm whether the backup image
contains the virus, but it cannot remove the infected
file from the backup image.
If a backup image is infected, some uninfected files
can be safely recovered, but the backup image must
not be used for a full disk recovery. For this task, you
do not need to reformat the hard disk, as EBR
restoration overwrites the entire hard disk.
126
Chapter 13 - Checklists for Restoring Experion Nodes
Restoring a non-redundant node after recovery from a virus infection
Step Task . Go to Done?
1 Remove the computer from
the network. Not applicable
2 Use EBR Recovery Media to
restore the hard page 162
disk.
TIP: Accessing data on
an infected disk can
also infect the local
machine.
3 Use the virus scan software Virus scan
to scan the drive specified in software
step 2 documentation
4 If the virus scan detects a Not applicable
virus in the backup image,
use a previously archived,
virus-free image to restore
the hard disk.
5 Use EBR Recovery Media to Section 16.2
restore the hard disk.
6 Add the computer back to the Not applicable
network.
Restoring redundant Experion Server A after recovery
from a virus infection
Step Task Go to Done?
1 Remove the computer from Not applicable
the network.
2 Reformat the hard disk. Microsoft
documentation
3 Use EBR Recovery Media to Chapter 14
127
Chapter 13 - Checklists for Restoring Experion Nodes
Step Task Go to Done?
restore the hard disk.
4 Use the virus scan software to Virus scan
scan the selected disk drive. software
documentation
5 If the virus scan detects a Not applicable
virus in the backup image, use
a previously archived backup
image to restore the hard disk.
6 Disable ERDB/EMDB Section 16.2
replication for Experion Server
B.
7 Delete the contents of this Not applicable
folder on Experion Server A:
• For Experion R5xx
The default path is:
C:\Programdata\Honeywell\
Experion PKS \Checkpoint
For custom installation path,
navigate to
Userselectedpath\Honeywell\
Experion PKS \Checkpoint
8 Restore the ERDB for Experion Section 16.2
Server A.
9 Restore the EMDB for Section 16.2
Experion Server A
10 Use a Station to connect to the Section 16.2
primary Experion Server, and
then synchronize both the
Experion Servers.
128
Chapter 13 - Checklists for Restoring Experion Nodes
Restoring redundant Experion Server B after recovery
from a virus infection
Step Task Go to Done?
1 Remove the computer from the Not
network. applicable
2 Reformat the hard disk. Microsoft
documentat
ion
3 Use EBR Recovery Media to Chapter 14
restore the hard disk.
4 Use your virus scan software to Virus scan
scan the selected disk drive. software
documentat
ion
5 If the virus scan detects a virus Not
in the backup image, use a applicable
previously archived backup
image to restore the hard disk.
6 Disable ERDB/EMDB replication Section 16.2
for Experion Server B.
7 Delete the contents of this folder Not
on Experion Server B: applicable
• For Experion R5xx
The default path is:
C:\Programdata\Honeywell\
Experion PKS \Checkpoint
For custom installation path,
navigate to
Userselectedpath\Honeywell\
Experion PKS \Checkpoint
8 Restore the ERDB for Experion Section 16.2
Server B.
129
Chapter 13 - Checklists for Restoring Experion Nodes
Step Task Go to Done?
9 Restore the EMDB for Experion Section 16.2
Server B.
10 Use a Station to connect to the Section 16.2
primary Experion Server, and
then synchronize both the
Experion Servers.
130
Chapter 13 - Checklists for Restoring Experion Nodes
Checklists for restoring selected files or folders
from a backup
If you can start the node from its operating system, but have
lost data or program files on the hard disk (excluding some
operating system files), you can recover selected files or folders
from a backup image without restoring the entire hard disk.
This recovery method is useful when the node failures are
traced to a specific file or folder, or important data files are lost
and you do not want to use the Mount Image feature to restore
an entire backup image.
Considerations using EBR
If you are restoring from an incremental backup, the restore
process automatically detects any previous incremental backup
and the base backup image associated with the selected
incremental backup.
ATTENTION: Recovery of selected files and folders does not
recover the associated registry settings.
Restoring selected folders or files to a node
Task Go to Done?
Use EBR Recovery Media to restore the Chapter
selected files or folders. 14
131
CHAPTER
14 RESTORING PHYSICAL NODES
In this section:
Using EBR Recovery Media to restore hard disks and
images 133
EBR Recovery on Dell 15G and Dell 16G Platforms 145
132
Chapter 14 - Restoring Physical Nodes
Using EBR Recovery Media to restore hard
disks and images
Prerequisites
Configure backup for the nodes before restoring the hard disk
using EBR. For more information about backup configuration
form, see
Sample backup configuration form.
Restoring a hard disk
Starting up
ATTENTION: The boot sequence must be set to DVD Drive
in BIOS before inserting the DVD.
Step Action
1 Insert the EBR R520 recovery media into the DVD Drive.
NOTE: Check for the latest version from Experion
Update Matrix or local TAC.
2 Start from the DVD drive.
3 The Acronis Cyber Protect Bootable Agent screen
appears.
133
Chapter 14 - Restoring Physical Nodes
Step Action
ATTENTION: Wait for a few minutes before the
Acronis recovery media is loaded.
Configuring the Network
TIP: You must configure the network only if you
are restoring an image that is on the shared
network.
If you are not restoring an image on the network,
go to step 7.
4 Click the Configure network.
134
Chapter 14 - Restoring Physical Nodes
Step Action
The Network Settings dialog box appears.
5 Enter the following network settings for the target
computer:
n IP Address
n Subnet mask
n Default Gateways
135
Chapter 14 - Restoring Physical Nodes
Step Action
TIP: The appropriate network settings are
available from your System Administrator.
6 Click OK.
The Acronis Bootable Agent screen appears.
7 Click Manage this machine locally.
136
Chapter 14 - Restoring Physical Nodes
Step Action
On the home page, under Actions, click Recover.
The Recover data page appears.
What to recover
8 For Select data option, click Required.
137
Chapter 14 - Restoring Physical Nodes
Step Action
The Data to recover selection dialog box appears.
9 Perform one of the following actions:
n In the Data Path box, type the location of the
backup that contains the data you want to
recover.
Or
Browse through the folder tree and select the
138
Chapter 14 - Restoring Physical Nodes
Step Action
backup that contains the data you want to
recover.
10 Click OK
11 In the Backup contents list, click one of the following
options:
l Volumes
l Disks
l Files
139
Chapter 14 - Restoring Physical Nodes
Step Action
If you have selected Volume, then continue with Step
14. If you have selected Disk, then go to Step 15.
For Volume
TIP: If recovering a System volume, recover the
MBR along with the system volume to make the
recovered volume bootable
12 Click Required, and select the required physical volumes
to recover.
For Disks
13 Click Required, and select the required physical disk to
recover.
Where to recover
NOTE: If you are performing recovery of image taken from
platform with BOOT mode legacy to platform with BOOT
mode legacy, follow the step below.
140
Chapter 14 - Restoring Physical Nodes
Step Action
14 The data you want to recover and the selected
disks/files appear under Where to recover. Click
Required, and choose an appropriate destination for the
recovered data.
TIP: Ensure that the NT Signature option is set to
Select automatically.
NOTE: If the operating system is installed using
Experion Initialization media then the System
Reserved partition may not exist.
If the operating system is installed directly from the
media provided by Microsoft, then the System Reserved
partition may be present.
TIP: Ensure that the Acronis Active Restore option
is set to Select automatically.
Where to recover
NOTE: If you are performing recovery of image taken from
platform with BOOT mode legacy to platform with BOOT
mode UEFI (GPT), follow the step below.
15 The data you want to recover and the selected
disks/files appear under Where to recover.
1. Before recovery, click on the "Clear All" option.
2. Select Reserve, and assign MBR to PERC storage.
3. Set the path to System Reserved.
4. Set the path for restoring NTFS.
With all the above steps, the MBR to GPT conversion will
be complete.
TIP: Ensure that the Acronis Active Restore option
141
Chapter 14 - Restoring Physical Nodes
Step Action
is set to Select automatically.
16 Click OK
Restoring selected folders or files
ATTENTION: File and folder level restoration from a
backup is not possible in a virtual environment.
1. Open the Acronis Cyber Protect 15 and select the machine
that needs to be recovered.
2. Click Recovery on the pane popped up at the right side of
the home page against the selected machine.
l The available backup files related to the selected machine
are listed down.
3. Select the required backup file which is listed down based
on the time of backup.
l Click Recover.
What to recover
1. Select Files/Folders from the dropdown menu.
2. Select the required Files/Folders to be recovered and click
Recover on the right side pane.
Where to recover (path)
1. Select any of the following based on the requirement.
a. Original location:
l To recover the selected Files/Folders to their original
location.
b. Custom location:
l To browse and select a Custom location to recover the
selected Files/Folders.
l Click Start Recovery.
142
Chapter 14 - Restoring Physical Nodes
l Recovery options can be changed as per requirement. For
more details, please refer the Section Restore
modes/options.
Universal Restore
n If user wants to apply Universal Restore , click Stop after
Recovery.
n Click Apply Universal Restore.
Else, reboot the machine with EBR Recovery Media. Click
Acronis Universal Restore.
143
Chapter 14 - Restoring Physical Nodes
In Apply Universal Restore, click Add folder under Automatic
Driver search option and locate to the EBR Driver folder
available in INIT media and click OK.
NOTE: If using INIT media DVD, remove the Acronis DVD
and insert the INIT media DVD (R250.1 or R222.1 based on
Experion R530.1 release or prior) and locate to following
location: D_EXP\PACKAGES\EBR Drivers
If using USB where “EBR drivers” folder is already copied,
locate to same path in USB.
Once Apply Universal Restore completes, reboot the system
and login to the machine.
Run the INIT media to install and update all the drivers.
144
Chapter 14 - Restoring Physical Nodes
EBR Recovery on Dell 15G and Dell 16G
Platforms
NOTE: While Dell 15G and Dell 16G platforms use UEFI
BIOS mode, the steps following must be followed in order
for backups made in legacy mode to be seamlessly
recovered on Dell 15G and Dell 16G servers.
1. Verify the BIOS setting as mentioned in Planning
Installation and Service guide. (Refer Experion Update
Matrix for PISG links).
2. Boot from the EBR R520.1 Hotfix3 (Build 37420) recovery
media.
3. After booting with the EBR Recovery DVD, click Recover as
shown below.
4. Select data (browse path for .tibx file which is required to
restore).
145
Chapter 14 - Restoring Physical Nodes
5. When the "Select what you want to Recover" dialogue box
appears, select the partitions you want to recover.
6. The Initial Recovery Screen what to recover.
7. Click "Clear All".
146
Chapter 14 - Restoring Physical Nodes
8. Enter Values in "Where to recover" section as below for each
of line in left hand side row.
9. When recovery is close to 81% it will show the below
attention. (These observations may vary between AMT
images and physical platform backup).
10. Click show details, the below screen will be displayed.
11. Once Restore is completed, click universal restore (do not
reboot server\workstation).
147
Chapter 14 - Restoring Physical Nodes
12. Locate the row "Automatic driver search" (2nd row) and
ensure that search removable media is turned ON.
13. Select "Add Folder" in the next row, enter the location of the
chipset driver and then click OK.
NOTE: This procedure may not be necessary for
workstations.
14. Select last option add storage drive give path (the drivers
are provided along with the media).
S
Dell RAID Controll
l.
Platf Controll Driver location on Init Media er to
N
orm er Select
o.
1 Dell PERC <IM_DVD>:\PACKAGES\EBR PERC
T550 H755 Drivers\PERC_H755_T550_ H755
/ R450_XR11_R740\payload Adapte
R450 r, PERC
H755
Front
2 Dell PERC <IM_DVD>:\PACKAGES\EBR PERC
T150 H355 Drivers\PERCH355_T150_ H355
/ R250
R250
/
R350
/
XR11
3 Dell Intel <IM_DVD>:\ Intel
T582 SATA PACKAGES\DRIVERS\STORAG eSATA
0XL RAID co ECONTROLLER\T5820_ /
MLK ntroller R7920\DRIVERS\RSTE_F6_ sSATA
/ IASTORE_WIN8_64) / VROC
R792 controll
0XL er
4 HP Intel <IM_DVD>:\ Intel
Z4G4 SATA PACKAGES\DRIVERS\STORAG SATA
148
Chapter 14 - Restoring Physical Nodes
S
Dell RAID Controll
l.
Platf Controll Driver location on Init Media er to
N
orm er Select
o.
MLK RAID co ECONTROLLER\INTEL RSTE Control
ntroller Z4G4 DRIVER\DRIVERS ler
5 T586 <IM_DVD>:\PACKAGES\EBR Intel
0 Drivers\16G_Chipset\T5860XL Volume
manag
<IM_DVD>: \PACKAGES\EBR ement
Drivers\T5860_Z4G5_R7960_ device
DL320Gen11\VROC_ NVMe
8.2.0.2005 RAID
Control
ler
6 R796 <IM_DVD>:\PACKAGES\EBR Intel
0 Drivers\16G_Chipset\R7960XL Volume
<IM_DVD>:\PACKAGES\EBR manag
Drivers\T5860_Z4G5_R7960_ ement
DL320Gen11\VROC_ device
8.2.0.2005 NVMe
RAID
Control
ler
7 HP <IM_DVD>:\PACKAGES\EBR MR408
DL3 Drivers\T5860_Z4G5_R7960_ i
20 DL320Gen11\Chipset_ adapter
DL320Gen11
Gen
11 <IM_DVD>:\PACKAGES\EBR
Drivers\T5860_Z4G5_R7960_
DL320Gen11\Storage_MR408i
15. Click Ok to complete universal restore.
16. Once universal restore is completed, click OK and Reboot.
17. After rebooting, the system will Reboot at least twice, so wait
for at least 5 minutes.
149
Chapter 14 - Restoring Physical Nodes
18. Once logged in, look for device manager and examine if the
chipset driver is installed; for example, in the system device
section, the user should not notice any "other devices" line
item.
150
CHAPTER
15 RESTORING VIRTUAL NODES
Methods of restoring a virtual node
A virtual machine can be restored using the following methods:
n Restoring using EBR recovery media
o Restoring to a new virtual machine using EBR recovery media
o Restoring to an existing virtual machine using EBR recovery media
n Restoring virtual machine using virtual appliance from EBR Manager
Restoring to a new virtual machine using EBR
recovery media
1. Create a new virtual machine.
NOTE: For detailed information about creating a new
virtual machine, see the latest version of the Experion
PKS R520 Software Installation User’s Guide.
ATTENTION: Automatic check pointing from the
primary Experion Server to the backup Experion Server
does not occur until the two servers are properly
synchronized
2. Add CD/DVD drive to the virtual machine if not already
performed as part of step 1.
To add the CD/DVD drive, perform the following steps:
a. Power OFF the virtual machine.
b. In vSphere Client, select the virtual machine, right-click
and then choose Edit Settings.
c. Click Add. The Add Hardware dialog box appears.
d. In the list of available devices, click CD/DVD Drive and
then click Next.
e. Select Use physical drive.
f. Click Next.
151
Chapter 15 - Restoring Virtual Nodes
g. Select Host and then click Next.
h. Click Next.
i. Click Finish.
j. Click OK.
3. Power ON the new virtual machine from EBR R520 recovery
media.
4. In the vSphereClient page, right-click on the virtual machine
and open console.
5. Go to Boot Menu and select CD-ROM Drive.
6. The Starting Acronis Loader message appears.
7. The Acronis Cyber Protect Bootable Agent screen appears.
Click Manage this machine locally.
TIP: Wait for a few minutes before the Acronis recovery
media is loaded.
Configuring the Network
TIP: You must configure the network only if you are
restoring an image that is on the shared network.
If you are not restoring an image on the network, go to
step 7.
8. Click the Configure network.
152
Chapter 15 - Restoring Virtual Nodes
The Network Settings dialog box appears.
9. Enter the following network settings for the target computer:
l IP address
l Subnet mask
l Default Gateways
TIP: The appropriate network settings are available
from your System Administrator.
10. Click OK.
The Acronis Bootable Agent screen appears.
11. Click Manage this machine locally
153
Chapter 15 - Restoring Virtual Nodes
12. On the home page, under Actions, click Recover.
The Recover data page appears.
What to recover
154
Chapter 15 - Restoring Virtual Nodes
13. For Select data option, click Required.
The Data to recover selection dialog box appears.
14. Perform one of the following actions:
l In the Data Path box, type the location of the backup that
contains the data you want to recover.
Or
l Browse through the folder tree and select the backup that
155
Chapter 15 - Restoring Virtual Nodes
contains the data you want to recover.
15. Click OK.
16. In the Backup contents list, click one of the following:
l Volumes
l Disks
l Files
If you have selected Volume, then continue with Step 18.
If you have selected Disk, then go to Step 19.
For Volume
156
Chapter 15 - Restoring Virtual Nodes
TIP: If recovering a System volume, recover the MBR
along with the system volume to make the recovered
volume bootable
17. Click Required, and select the required physical volumes to
recover.
For Disks
18. Click Required, and select the required physical disk to
recover.
Where to recover
19. The data you want to recover and the selected disks/files
appear under Where to recover.
l Click Required, and choose an appropriate destination for
the recovered data.
TIP: Ensure that the NT Signature option is set to Select
automatically.
NOTE: If the operating system is installed using Experion
Initialization media then the System Reserved partition may
not exist.
If the operating system is installed directly from the media
provided by Microsoft, then the System Reserved partition
may be present.
20. Click OK.
21. After recovery completes, the Succeeded message appears.
Click Close.
22. Click the Close button on the upper-right corner of the
window to return to the Acronis Bootable Agent window.
23. Click Reboot.
TIP: If the reboot does not happen automatically,
reboot the system manually.
157
Chapter 15 - Restoring Virtual Nodes
24. Log on to the computer using appropriate credentials. The
device driver software installation begins.
25. After the installation, the system prompts for restart.
Click Restart Now.
ATTENTION: This is a mandatory step applicable for
Universal restore only.
TIP: To resolve the problem on replication not working
after an EBR image is restored back, see Appendix D: Re-
adding back the restored node to domain.
Restoring to an existing virtual node using EBR
recovery media
The procedure for restoring to an existing virtual node using
EBR recovery media is similar to the procedure for restoring to
a new virtual node using EBR recovery media.
To restore to an existing virtual node using EBR recovery
media, perform steps 2 to 26 of Restoring to a new virtual node.
Restoring virtual node using virtual appliance from
EBR Manager
Prerequisites
Virtual appliance must be deployed to the ESX(i) host on which
the recovery needs to be done which takes place when a
VMware host machine is added to the devices list in the EBR
Manager. Virtual machines must comply with
recommendations given in the Experion PKS Virtualization
Planning and Implementation Guide.
1. Login to the EBR Manager.
NOTE: For more information about connecting to the
management server, see Adding computers to the
management server.
158
Chapter 15 - Restoring Virtual Nodes
2. From the All devices list, choose the required virtual machine
that you want to restore. The right pane appears. Click Recovery.
3. All the available protections for the respective Virtual machine
are listed down with respect to their time of protect.
4. Select any of the following available options based on
requirement:
a. Recover:
This option can be used to recover the selected backup file to
the same Virtual machine with Entire machine or Files/Folders
options.
Click Recover and select any of the following options based on
the requirement.
159
Chapter 15 - Restoring Virtual Nodes
i. Entire Machine
n Use this option to recover the entire machine protection from the
selected backup file to any existing machine or new machine.
n Click Entire machine.
n The Specify credentials page appears.
n Enter the username and Password. Click OK.
n Click Start Recovery.
ii. Files/Folders
n Use this option to recover only the selected files/folders from the
selected backup file to any custom location as per requirement
160
Chapter 15 - Restoring Virtual Nodes
n Click the Files/Folders option to open the window where the
contents of the backup file can be browsed and the required
files/folders can be selected.
After selecting the required files/folders, click Recover on the
right-side pane.
n Click Browse under PATH to provide the custom location where
the selected files/folders need to be restored.
n Provide the necessary recovery options based on requirement.
Click Done.
n Click Start Recovery.
161
Chapter 15 - Restoring Virtual Nodes
b. Run as VM:
With this option a new virtual machine can be deployed to the required
Data Store using the selected backup file from the list directly.
The following details should be entered to execute the same.
a. Target Machine:
Browse and select the vCenter/VMware host where the new virtual
machine needs to be deployed.
Provide a name for the new Virtual machine, and then click OK.
b. Data Store:
Select the data store with which the new virtual machine needs to be
created.
Click OK.
c. VM Settings:
Select the required Memory and assign the applicable network
adaptors.
Click OK
162
Chapter 15 - Restoring Virtual Nodes
d. Power State:
Select the power state ON/OFF to set the state of the new VM after
deployment.
Click Run now.
163
CHAPTER
16 RESTORING EXPERION DATABASES
This chapter provides instructions for restoring various nodes
and Experion Server databases after recovery from a failure,
such as a hardware failure, virus infection, or database
corruption.
The sections describe node restoration based on whether the
node is being restored to dissimilar computer hardware from
the computer from which the backup was made, or to similar
computer hardware.
In addition, this section provides instructions for restoring the
EMDB and ERDB databases for Experion Servers.
CAUTION: If you are not sure about the partition mapping,
then it is recommended that you format the existing drives
and then delete all the partitions so that the entire hard
disk becomes an un-allocated space.
ATTENTION:
Use the appropriate checklists to restore nodes and
databases after recovery from an unexpected event. These
checklists specify the correct sequence of tasks for a
successful restoration.
It is recommended that the Experion server shouldn't be
primary when its database restore operation is carried out.
In this section:
Disabling ERDB and/or EMDB replication for Redundant
Experion Server B 165
Restoring Controllers from controller checkpoint files 170
164
Chapter 16 - Restoring Experion Databases
Disabling ERDB and/or EMDB replication for
Redundant Experion Server B
ATTENTION: This procedure is applicable only to Experion
Server B of a redundant server.
Prerequisites
Ensure that you login with a local account that has local
administrator and product administrator privileges.
Disabling ERDB and/or EMDB replication for Redundant Experion Server B
1. Start Configuration Studio and connect to the system with
Experion Server.
2. For the ERDB:
l In Configuration Explorer , click the server name, and then
click Administer the control strategy database.
l For the EMDB:
l In Configuration Explorer , click the server name, and then
click Administer the control strategy database.
3. Expand the DBAdmin and Server Node trees.
4. Click ERDB/EMDB Admin Tasks. The ERDB Admin Tasks page
opens.
5. Click Disable Replication, and then click Yes.
6. Click OK to acknowledge the Disable replication succeeded
message.
7. Close the DBAdmin dialog box.
Restoring the ERDB for Redundant Experion Server A
Use this procedure after restoring a backup of Experion Server
A to update it with the latest ERDB from Experion Server B.
This procedure can also be used to replace a corrupted ERDB
on Experion Server A with a valid ERDB from Experion Server B.
1. Start Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the server name, and then click
Administer the control strategy database.
165
Chapter 16 - Restoring Experion Databases
l The DBAdmin dialog box appears.
3. Expand the DBAdmin and Server Node trees, and then click
ERDB Admin tasks.
4. Select Recover Secondary Database, and then click Yes.
5. Click OK to acknowledge that the recovery is complete.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge the replication successful message.
8. Close the DBAdmin dialog box.
9. On Experion Server A, synchronize the SRDB with Server B as
follows:
n Choose Start > Windows Administrative Tools > Services.
n Click Experion PKS System Repository, and then click Stop
n Click Yes to stop the service.
n Go to, C:\ProgramData\Honeywell\ Experion PKS \SRDB.
Delete the file
n EPKSOperationalDB.sdf
Go to Start > Windows Administrative Tools > Engineering Tools
> Error Logs > SRDB. Delete the file EPKSOperationalDB.sdf
10. Close all Windows applications and restart the machine.
Restoring the ERDB for Redundant Experion Server B
Use this procedure after restoring a backup of Experion Server
B to update it with the latest ERDB from Experion Server A.
You can use this procedure to replace a corrupted ERDB on
Experion Server B with a valid ERDB from Experion Server A.
Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
1. Start Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the server name, and then click
Administer the control strategy database.
l The DBAdmin dialog box appears.
166
Chapter 16 - Restoring Experion Databases
3. Expand the DBAdmin and Server Node trees, and then click
ERDB Admin tasks.
4. Select Recover Secondary Database, and then click Yes.
5. Click OK to acknowledge that the recovery is complete.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge the replication successful message.
8. Close the DBAdmin dialog box.
9. On Experion Server B, synchronize the SRDB with Server A as
follows:
l Choose Start > Windows Administrative Tools > Services.
l Click Experion PKS System Repository, and then click Stop
l Click Yes to stop the service.
l Go to, C:\ProgramData\Honeywell\ Experion PKS \SRDB.
Delete the file EPKSOperationalDB.sdf
l Go to Start > Windows Administrative Tools > Engineering
Tools > Error Logs > SRDB. Delete the file
EPKSOperationalDB.sdf
10. Close all Windows applications and restart the machine.
ATTENTION:
If detailed displays of L1 modules do not load correctly
after restoring in station, then perform “Load server points”
to associate the correct d displays to the points from
monitoring side.
This procedure WILL cause a momentary LOV. So critical
care should taken accordingly.
Restoring the EMDB for Redundant Experion Server A
Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
1. Start the Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the system name, and then click
Administer the system database. The DBAdmin dialog box
appears.
167
Chapter 16 - Restoring Experion Databases
3. Expand the DBAdmin and Server Node trees, and then click
EMDB Admin tasks.
4. Click Recover Secondary database, and then click Yes.
5. Click OK to acknowledge a successful restore.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge a successful replication.
8. Close the DBAdmin dialog box.
168
Chapter 16 - Restoring Experion Databases
Restoring the EMDB for Redundant Experion Server B
Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
1. Start the Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the system name, and then click
Administer the system database. The DBAdmin dialog box
appears.
3. Expand the DBAdmin and Server Node trees, and then click
EMDB Admin tasks.
4. Click Recover Primary database, and then click Yes.
5. Click OK to acknowledge a successful restore.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge a successful replication.
8. Close the DBAdmin dialog box.
Synchronizing the Experion Server databases
ATTENTION: Automatic check pointing from the primary
Experion Server to the backup Experion Server does not
occur until the two servers are properly synchronized.
Step Action
1 On the primary Experion Server, connect to a Station.
2 Click View > System Status > Server Redundancy to start
the Server Redundancy Status display on the primary
Experion Server.
In the Link Status group, the LEDs must be green and
indicate the following:
n Backup server is running.
n Link is OK.
3 Click Synchronize, and then click Yes.
The Experion database on the primary server is
169
Chapter 16 - Restoring Experion Databases
Step Action
automatically copied to the backup Experion Server. The
synchronization time depends on the size of the system.
After synchronization, the synchronization indicator (first
LED in the Backup Server group) changes from red to
green and then the text changes from Not synchronized to
Synchronized.
ATTENTION:
Before performing Failover check Controller
Subsystem Status on the Server Redundancy status
page. The status should be as follows:
1. Engineering Repository DB : Auto sync
enabled
2. Engineering Repository DB to System
Repository: ERDB SR Synchronized
3. System Repository primary: Running
4. System Repository backup: Synchronized and
Running
If any of the status does not match the above
criteria, contact TAC.
4 If you want the other Experion Server to be the primary
database, click Manual Failover, and then click Yes to start
the failover.
5 After a few minutes, click Synchronize, and then Yes to
resynchronize the databases. (If you start synchronization
immediately after the failover, an error may occur.)
Restoring Controllers from controller
checkpoint files
Restoring the Engineering Repository Database and controllers
CAUTION: Ensure your process is “Off Control” as these
procedures require that the controller be idled and/or a
new database loaded.
170
Chapter 16 - Restoring Experion Databases
After restoring the Experion database, the database and the
controllers may be out-of sync if the control strategy or
controller parameters have changed since the backup was
created.
If the control strategy or the controller parameters remain the
same since the backup, you can update the current parameters
by uploading the controller to the ERDB, and then updating the
project from loaded. In addition, you must save the checkpoint
files again from the controller.
If, the control strategy has changed since the backup or if,
Qualification and Version Control System (QVCS) is licensed
and the QVCS database changed (such as check in and
checkout), you must re-enter the changes to the ERDB project
database after it is restored.
Then, you must update the controller by loading the missing
blocks as follows:
1. Add the new blocks to the project side of the ERDB but do not
load them yet.
2. When the Server database was restored, that would have brought
in the old checkpoint files. For each controller that changed
since the backup, restore this checkpoint file. This action will
delete the controller copies of the new blocks. This is necessary
because the new blocks are “ghost” points and cannot be
deleted directly.
3. Note that if the added blocks were IOMs, the checkpoint load
may fail. In this case, you must bring the controller to the NODB
state by using NTOOLS or pulling the batteries and cycling the
controller power, and then load the checkpoint.
4. Load the newly added blocks from the project side.
5. If there were external connections to the added blocks, any
blocks referencing them in other Control Modules or controllers
(if peer-to-peer) must be reloaded to update the references to
these blocks.
6. When completed, save the controller checkpoint and back up the
updated database.
7. After restoring Experion Server B of a redundant pair, note the
checkpoint files. If the older checkpoint files are restored to
Experion Server B, synchronization attempts to update them
from Experion Server A, causing them to become out-of-sync
171
Chapter 16 - Restoring Experion Databases
with the database. The solution is to delete the checkpoint files
from Experion Server A after replicating the database and before
enabling the ERDB synchronization.
Restoring the events database
Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
ATTENTION: Event restoration can only be run at level
“Database Only”. This cannot be run on Running system.
Step Action
1 Explore
l For Default installation path navigate to,
C:\ProgramData\Honeywell\ Experion PKS
\Server\data\evtarch
l For custom installation path, navigate to,
Userselectedpath\Honeywell\ Experion PKS
\Server\data\evtarch to find the appropriate backup file
to restore. (This is usually the file with the most recent
date and time.) Note the name of this file.
2 Go to Start > Windows system > Microsoft SQL Server 2012
and then click SQL Server Management Studio. The
Connect to Server window appears.
3 Log on to local server and then click Connect. The
Microsoft SQL Server Management Studio page opens.
3 Expand the left tree down the following path:
Local Server Name > Databases > emsevents
4 Right-click EMS Events Database and then click Tasks >
Restore> Database. The Restore Database dialog box
appears.
5 From the Database list select, EMSEvents.
6 k. Select Device: and then browse and add the new
172
Chapter 16 - Restoring Experion Databases
Step Action
device from the following path:
l. C:\ProgramData\Honeywell\ Experion PKS
\Server\data\evtarch
m. Click OK until you return to the Restore Database
dialog box.
7 n. From the left pane, select the Options page.
o. From the right pane, select the Overwrite the existing
database (WITH REPLACE) check box.
p. From the right pane, select the Preserve the replication
settings (WITH KEEP_REPLICATION) check box and
then click OK to run the restore.
8 If any errors occur, stop SQL server, and then restart it to
ensure that no other computer is connected to the
database.
Restoring the EMDB
After restoring the EMDB, it may be out-of-sync with the
Experion Server if changes were made to the server, asset, or
alarm group definitions after the backup was made. For
example, if a server was added or deleted, or an alarm group
hierarchy was changed, such changes must be reconstructed.
If there were no changes to the Enterprise Model after the
backup, no further steps are necessary.
If there were changes to the Enterprise Model after the backup,
the following scenarios are possible:
n Changes were made but not loaded: In this case, the
restored EMDB and the Experion Servers are
synchronized. However, you must reconstruct the
changes that were not present on the backup image.
When the EMDB is complete, it can then be uploaded
to the Experion Servers as usual.
n Changes were made and loaded: In this case, the
EMDB and the Experion Servers are not synchronized.
Consequently, you must reconstruct the changes that
were not present on the backup image. After the
changes, the EMDB and the Experion Servers are
173
Chapter 16 - Restoring Experion Databases
synchronized. However, you must load the Experion
Servers to ensure that everything is synchronized.
174
CHAPTER
17 CONFIGURATION ITEMS IN THE
MANAGEMENT CONSOLE
In this section:
Deleting computers from the EBR Manager 176
Revoking licenses 176
175
Chapter 17 - Configuration items in the Management Console
Deleting computers from the EBR Manager
To delete computers from the EBR Manager:
1. Login to the Acronis Protect home page
NOTE: For more information about connecting to the
management server, see Adding computers to the
management server.
2. Click the All Devices tab where all the devices added to the EBR
Manager are listed.
3. Select the required machine that needs to be deleted from the
EBR Manager.
4. Click Delete from the right side pane popped up against the
selected machine.
5. Click Delete on the confirmation dialog box.
6. The machines are removed from the EBR Manager.
ATTENTION: Only the physical machines added to the EBR
Manager manually can be deleted using this procedure. A
Virtual machine can be deleted from the EBR Manager only
by deleting the associated virtual appliance which intern
removes all the virtual machines associated to that
particular virtual appliance.
Revoking licenses
To revoke licenses:
1. Log On to the EBR Manager node.
2. On the Acronis Cyber Protect 15 home page, click Settings.
3. Select Licenses under Settings which displays the available
licenses and the machines they are assigned to.
4. Click on the required Licenses that needs to be revoked and
click Revoke in the right side pane.
5. Click Revoke on the confirmation dialogue box.
176
Chapter 17 - Configuration items in the Management Console
TIP: The Revoked key will remain in the license list. It can
be assigned to another machine or device.
177
CHAPTER
18 MOVING BETWEEN PHYSICAL NODE AND
VIRTUAL NODE
In this section:
Converting a physical node to virtual node using virtual
appliance 179
Virtual to physical 182
178
Chapter 18 - Moving between physical node and virtual node
Converting a physical node to virtual node
using virtual appliance
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15
3. In the left pane, click Devices > All devices
The All devices page appears.
4. Select the respective physical machine that needs to be
converted to VM.
5. Click Protectin the right pane from the options window
pane for the selected machine.
The New protection plan page appears.
179
Chapter 18 - Moving between physical node and virtual node
6. Next to Convert to VM click Disabled link.
The Convert to VM page appears.
7. Turn on the Conversion option and enable it to ON. By
default, this option will be in OFF stage
8. Click CONVERT TO drop-down arrow and then choose
MWare ESXI.
9. Next to HOST click the Specify link
180
Chapter 18 - Moving between physical node and virtual node
The Select target host page appears.
10. Enter the machine name and Click OK.
Convert to VM page appears.
11. Next to PROVISIONING MODE, select Thin/Thick.
12. Click Done.
NOTE: Make sure that the latest VMware tool is installed.
181
Chapter 18 - Moving between physical node and virtual node
Virtual to physical
ATTENTION: During a restore, the changes made to the
system since the last backup is lost.
Prerequisite
You must have backups of virtual machine in storage node.
Starting up
ATTENTION: The boot sequence must be set to CD/DVD
Drive in BIOS before inserting the CD/DVD.
1. Insert the EBR R520 recovery media into the CD/DVD Drive.
2. Start from the CD/DVD drive.
l The Starting Acronis Loader message appears.
3. On the Acronis Rescue Media screen, click one of the following
options:
a. Acronis Universal Restore
b. Acronis Cyber Protect (64-bit with UEFI support)
c. Continue OS booting
4. a) Click Acronis Cyber Protect (64-bit with UEFI support) The
Acronis Bootable Agent screen appears.
TIP: Wait for a few minutes before the Acronis recovery
media is loaded.
Configuring the Network
TIP:
You must configure the network only if you are restoring
an image that is on the shared network.
If you are not restoring an image on the network, go to
step 7.
182
Chapter 18 - Moving between physical node and virtual node
5. Click the Configure network button.
l The Network Settings dialog box appears.
6. Enter the following network settings for the target computer:
l IP Address
l Subnet mask
l Default Gateways
TIP: The appropriate network settings are available from
your System Administrator.
7. Click OK
The Acronis Bootable Agent screen appears.
8. Click Manage this machine locally.
ATTENTION:
After Step 7, Remove the EBR Recovery media CD and
insert
The Initialization Media CD.
Use the Initialization Media version that you received with
the computer on which you are restoring the image or the
latest version Initialization Media.
After Step 7, Remove the EBR Recovery media CD and
insert
NOTE:
Please copy following folder from init media
“\PACKAGES\EBR
DRIVERS\” and “\PACKAGES\EBR DRIVERS\Drivers” in an
USB, and install the drivers using USB providing (adding)
the above location via Apply universal restore.
9. On the home page, under Actions, click Recover. The Recover
data page appears.
What to recover
10. For Select Data option, click Required. The Data to recover
selection dialog box appears.
11. Perform one of the following actions:
183
Chapter 18 - Moving between physical node and virtual node
l In the Data Path box, type the location of the backup that
contains the data you want to recover.
Or
l Browse through the folder tree and select the backup that
contains the data you want to recover.
12. Click OK
13. In the Backup contents list, click one of the following:
l Volumes
l Disks
l Files
If you have selected Volume, then continue with Step 13. If you
have selected Disk, then go to Step 15.
For Volume
TIP: If recovering a System volume, recover the MBR
along with the system volume bootable
14. Click Required, and select the required physical volumes to
recover.
For Disks
15. Click Required, and select the required physical disk to recover.
Where to recover
16. The data you want to recover and the selected disks/files appear
under Where to recover.
l Click Required, and choose an appropriate destination for the
recovered data.
TIP: Ensure that the NT Signature option is set to Select
automatically.
NOTE:
If the operating system is installed using Experion
Initialization media then the System Reserved partition
184
Chapter 18 - Moving between physical node and virtual node
may not exist.
If the operating system is installed directly from the
media provided by Microsoft, then the System Reserved
partition may be present.
TIP: Ensure that the Acronis Active Restore option is set
to Default.[No]
17. Click Ok.
Universal restore for Windows
ATTENTION: You must use the Universal Restore feature
only for restoring dissimilar hardware.
18. In the Universal Restore list, select any one of the following:
l Do not use
l Use
l Select Do not use if:
− The restore destination is the same node.
Or
− The restore destination is a similar node.
l Select Use if the restore destination is a dissimilar node.
If you click Use, you must configure settings for Universal
Restore.
To configure settings for Universal Restore, perform the
following steps:
1. Under Automatic driver search, in the Search removable
media list, click On.
2. Click Add Folder.
l The Folder for Search Selection dialog box appears.
3. Browse through the folder tree and then select the
CD/DVD drive to search for missing drivers.
185
Chapter 18 - Moving between physical node and virtual node
NOTE:
Required drivers are located on the Initialization
Media.
Please copy following folder from init media R201.1
“\PACKAGES\EBR DRIVERS\” and
“\PACKAGES\EBR DRIVERS\Drivers” in an USB,
and install the drivers using USB providing (adding)
the above location via Apply universal restore.
4. Click OK.
NOTE:
You can add multiple folders by clicking Add folder.
If you are restoring EPKS R400.x backup image on
to Dell R7610, then add the folder on the external
storage device at which you had copied
“DVD:\PACKAGES\EBR DRIVERS\R7610\32”
contents
19. After recovery completes, the Succeeded message appears. Click
Close.
NOTE: Universal Restore operation on few of the platforms
may complete with “Succeeded with Warnings” status. This
message can be safely ignored.
20. Click the Close button on the upper-right corner of the window to
return to the Acronis Bootable Agent window.
21. Click Reboot.
TIP: If the reboot does not happen automatically, reboot
the system manually.
22. Log on to the computer using appropriate credentials. The
device driver software installation begins.
186
Chapter 18 - Moving between physical node and virtual node
NOTE: If you have restored EPKS R400.x backup image on
to Dell R7610, then perform the below mentioned
additional steps
1. Go to Device Manager
2. Select SAS Controller->Properties->Update Driver
3. Browse to folder on the external storage device at which you
had copied “DVD:\PACKAGES\EBR DRIVERS\R7610\32”
contents.
23. After the installation, the system prompts for restart.
l Click Restart Now.
ATTENTION: This is a mandatory step applicable for
Universal restore only.
187
CHAPTER
19 MIGRATING FROM R501.3 HOTFIX3 OR
HOTFIX4 UPGRADE
NOTE:
l Upgrade from R501.3, R501.3 Hotfix1 and Hotfix2 is not
supported.
l In some cases, Protection plans created in R501 is not
seen after upgrade. The backup plan needs to be
recreated after the upgrade.
To upgrade EBR manager from R501.3 to
R520.1
1. Insert the EBR Installation DVD into the DVD drive. The
AutoPlay dialog box appears.
2. Double-click Open Folder to view files.
NOTE:
If the AutoPlay dialog box does not appear, right-click
the DVD/CD drive and then select Open.
Or
Open Windows Explorer, and then navigate to the DVD
drive.
3. Right-click Setup.exe, and select Run as administrator from
the dropdown list.
The User Account Control dialog box appears.
188
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
4. Click Yes.
The Honeywell Experion Backup and Restore window
189
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
appears.
5. Click Next.
The License Agreement dialog box appears.
6. Read the license agreement, select I accept the terms in the
License agreement, and click Next.
The License Information dialog box appears.
190
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
7. Type the system number in in the System Number field.
8. Type authorization number in the Authorization Field.
NOTE: The System Number and Authorization Number
are available from the License Authorization of
Honeywell. This information determines which
software packages you are authorized to install.
9. Click Next.
The Features and Options Selection dialog box appears.
191
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
10. Select Acronis Backup 15 and EBR Scripts (if needed), and
click Next. The Summary dialog box appears. Click Install.
11. The wizard installs Acronis Backup 15.
NOTE: The checkbox on left-hand column displays the
status of completion after each component
installation.
192
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
12. If Acronis is earlier installed, click Update.
Acronis Backup screen appears.
13. Provide the username and password credentials. Click done.
193
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
14. Click Restart.
After the installation is complete, message appears.
15. Click Close.
To update All in One Appliance
Perform the following steps to update All In One Appliance.
1. Copy the folder All-in-one_appliancefrom EBR R520.1
media to a folder accessible by the All-in-One Acronis
Virtual Machine (VM).
2. From the folder, boot the All-in-One Acronis VM with
AcronisBackupAppliance.iso.
3. After reboot, the Setup page appears.
ATTENTION: Make sure to verify if the ISO file version
appearing under “Current settings” of the setup page
194
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
is the version you want to update.
4. Select Update. The Welcome to Cyber Backup appliance
page appears.
5. To access the dashboard, click on the link under Acronis
Cyber Backup console.
To validate the installation
Perform the following steps to validate the installation on the
node.
1. Launch Acronis Backup & Recovery 15.
2. Click Help icon at the top right corner.
195
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
Result: The About page appears. The version on the node
should be Build 15.0.26172.
Post installation tasks
Perform the following steps after the installation:
1. Launch Acronis Backup & Recovery 15.
2. On the left pane, under Settings, click Agents.
3. Select the Hostname and double-click on Agent version.
4. On the right pane, select the Hostname and click Upgrade
agent.
196
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
The Specify credentials dialog box appears.
5. Type the credentials and click OK.
6. After the installation is complete, Agent version displays the
latest version.
7. On the left pane, under Plans, click Backup.
8. On the right pane, click Enable.
197
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade
NOTE: If you don’t see the Protection plans after upgrade
or newly created plans cannot be started, then recreate the
backup plans.
198
CHAPTER
20 SECURITY
In this section:
Security recommendations 200
Installing the latest antivirus software 200
199
Chapter 20 - Security
Security recommendations
n Honeywell recommends encrypting all protectionss using
AES-Advanced
l Encryption Standard , especially if they are stored
offsite.
n There is no way to recover encrypted protections (backup)
if you lose or forget the password.
n After a protection (backup) plan is applied, the encryption
settings cannot be modified.
n For securing the data, Honeywell recommends AES-256
encryption.
n To secure this communication channel, Honeywell
recommends launching with Acronis Cyber Protect
(Secure connection) forcing HTTPS in the Web interface.
n Acronis logs are present under “C:\programdata\acronis”
folder which may contain user data. You can delete these
logs if needed.
n Honeywell discourages the use of self-signed certificates.
NOTE: For more information on Network and Security, see
the Network and Security Planning Guide
Installing the latest antivirus software
Verify that the latest antivirus software is installed and patched
to the proper version for your operating system. You can find
the latest antivirus solution information at.
https://process.honeywell.com
ATTENTION:
l You must access the from a secured computer, rather
than from a node within your Experion system.
l To access zip file, save the file in the local drive and then
open.
To access the Honeywell Process Solutions website
200
Chapter 20 - Security
1. In the web browser, type the following
URL.https://process.honeywell.com/supportThe Product
Support page appears.
2. If you are a new user, register for access at this site. Click
Register, and follow the instructions on the screen.
3. If you are already registered, type your username and
password, and then click Login.Your account login name
appears in the top-right of the page.
To apply the latest antivirus notification
1. Open the Product Support page.
2. To view and download the latest antivirus notifications, click
Latest Notifications.OrIn addition, you can search for the
latest notification using the search modes available in the
Product Support page. The following table describes the
search options. Choose any one of the following option and
then perform the corresponding steps.
Option Description
Search Support a. Click Advanced.The
DocumentationTo use this Advanced Support
option you must have an Document Search page is
active support contract. displayed.
b. Type all the details about
the document or use
wildcards to search for the
notification. Click
Search.For example, if you
are searching for Anti-virus
Software Guidelines, type
the information and click
Search. The document is
displayed.
Search by Product and a. Type the name of the
Subscribe to NotificationsThis product.The related
provides the complete products are displayed.
information about a specific b. Click the required product
product. In addition you can with the release.The
also subscribe to this page for Documentation,
alerts where a notification is Notifications, Software
Downloads and Security
201
Chapter 20 - Security
Option Description
sent to you about the Updates for the particular
published document. product are displayed.
3. Locate the required notification.
4. Once you locate the required notification, click
Download.The required notification is downloaded on your
computer.
202
CHAPTER
21 TROUBLESHOOTING
In this section:
Manually applying license to the virtual appliance 204
Manually removing virtual appliance from vCenter 205
Uninstalling the R520 version of EBR Manager, Server, and
Desktop software packages 205
Network Adapters are not shown in Network Connections
Folder 206
203
Chapter 21 - Troubleshooting
Manually applying license to the virtual
appliance
1. Connect to the management server.
NOTE: For more information about connecting to the
management server, see Adding computers to the
management server.
1. From the Navigation pane, click Machines with agents and
select All machines with agents. The All machines with agents
page appears.
2. From the toolbar, click Actions and select Change license server.
The Change license server dialog box appears.
3. In the Machine field, provide the IP of the machine where the
license server has been installed and then click OK.
4. In the All machines with agents page, select the virtual
appliance to which the license needs to be applied. The < name
of the selected virtual appliance> actions button appears in the
toolbar.
5. Click the button with the name of the selected virtual appliance
and the suffix actions, and then select Change license. The
Licenses dialog box appears.
6. In the License for backup of disks/files field, click Specify. The
License change for <IP address of ESX(i) host> dialog box
appears.
7. From the Available licenses: list, select Acronis Cyber Protect 15
Virtual Edition for VMware vSphere and then click OK. The
Licenses dialog box appears.
8. Click Close.
To verify the application of license
9. From the Navigation pane, click Licenses. The License server on
<machine IP where server is installed> page appears.
10. Expand the Acronis Cyber Protect 15 Virtual Edition for VMware
vSphere list.
11. Verify that the required host machine has been assigned a
license.
204
Chapter 21 - Troubleshooting
Manually removing virtual appliance from
vCenter
Prerequisites
Log on to the vCenter host with the administrative privileges
from the vSphere client.
1. In the left pane of the vSphere home page, select the required
virtual appliance to be deleted.
NOTE: The name format is AcronisESXAppliance[N] where
N is the number assigned to the virtual appliance.
2. Right-click, select Power and then Power Off the virtual
appliance.
TIP: In the recent tasks section, check for the progress of
the Powering off of the appliance.
3. After the virtual appliance is powered off, right click the virtual
appliance again and select Delete from Disk and then Click OK.
Uninstalling the R520 version of EBR Manager,
Server, and Desktop software packages
About this section
This section describes the procedure to uninstall R520 version
of EBR Manager, Server, and Desktop software packages. The
procedure for uninstallation is the same for the EBR manager,
Server and desktop software packages.
Uninstalling Acronis Cyber Protect 15
1. Click Start > Settings > System > Apps & Features. Click and
uninstall Acronis Protect.
2. Select “Remove the logs and configuration settings” if they are to
be removed too.
3. Click Uninstall.
205
Chapter 21 - Troubleshooting
Network Adapters are not shown in Network
Connections Folder
After you perform Universal restore of Windows node, network
adapters might not be shown in Network Connections Folder.
ATTENTION: Backup the registry before performing this
operation.
Follow the below steps to bring back the network adapters for
Windows:
1. Type regedit in RUN or Start search box and press Enter. The
Registry Editor window appears.
2. To Clean up registry:
l Delete the Network Cards at the below location:
l HKEY_ LOCAL_
MACHINE\SOFTWARE\Microsoft\Windows
l NT\CurrentVersion\NetworkCards
206
Chapter 21 - Troubleshooting
3. Then Delete the Config Key at the below location:
l HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Control\Network
4. Then Delete the Interfaces and Adapters at the below
location:
l HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Pa
ramete
207
Chapter 21 - Troubleshooting
5. Once the above steps are completed, run the below
commands via administrator login to command prompt:
n netsh int ip reset
n netsh winsock reset catalog
n netsh int tcp reset
6. Reboot the system and follow the below steps:
a. Remove the NIC Drivers from the Add/Remove
Programs (appwiz.cpl)
b. Once completed, remove the Driver from the NIC in the
Device Manager Console.
l (If you see – “Delete the Driver software for this
device”, put a check mark on it.)
c. Now, reboot the Server and wait for 5 minutes to see if
NIC cards are visible. If not visible, then follow the next
step.
d. Install the Driver from the Source.
7. Later Uninstall the Honeywell FTE MUX if NIC cards are still
attach to it (from NIC cards as well as appwiz.cpl) and Install
the Honeywell FTE MUX. For more information on installing
FTE MUX, refer Installing FTE MUX adapter after Restore
section.
208
CHAPTER
A APPENDIX A: INSTALLING FTE MUX
ADAPTER
Installing FTE MUX adapter after Restore
Installing the FTE MUX adapter on a Embedded Microsoft
Windows 10 LTSC Enterprise and Embedded Microsoft
Windows Server 2019 Standard computer.
NOTE: For EHG node, ensure that heights MAC address
network adapter is not used for FTE.
1. Log on with local account which has local administrator and
product administrator privileges.
2. Click Start > Windows System > Control Panel > Network and
Internet. The Network and Internet page appears.
3. Click Network and Sharing Center. The Network and Sharing
page appears.
4. In the left pane click Change adapter settings.
5. Perform one of the following actions:
n For Embedded Microsoft Windows Server 2019 Standard,
select Manage network Connections.
n For Embedded Microsoft Windows 10 LTSC Enterprise ,
select Change Adapter Settings.
The Verify Networks Connection window appears.
ATTENTION: After Universal restore, Honeywell FTE
Adapter may not be present. So FTE adapter should
be installed.
209
Appendix A: Installing FTE MUX adapter
6. Right-click FTE Yellow and select Properties. The FTE Yellow
Properties dialog box appears.
TIP: If the User Account Control message appears,
click Continue.
7. Select Honeywell FTE Mux-IM Protocol Driver. Click
Uninstall.
8. Reboot the machine.
9. Repeat steps 1 to 4.
10. Select Internet Protocol Version 4 (TCP/IPv4) and then click
Properties.
l The Internet Protocol Version 4 (TCP/IPv4) properties
dialog box appears.
11. Type the required details and then click OK.
12. Click Install. The Select Network Feature Type dialog box
appears.
13. Select Protocol and click Add.
l The Select Network Protocol window appears.
14. Under Manufacturer, click Honeywell. The Select Network
Protocol dialog box appears.
15. Under Network Protocol, select Honeywell FTE Mux-IM
Protocol Driver and then click OK.
16. After the installation is complete, reboot the machine.
17. Repeat steps 1 to 4.
18. Select Honeywell FTE Mux-IM Protocol Driver and then click
Properties.
19. The Honeywell FTE Mux-IM Protocol Driver Properties page
appears.
20. Click the Configure tab, type the required Device Index and
IPMC Destination Address and then click OK.
210
CHAPTER
B APPENDIX B: INITIALIZATION MEDIA
VERSIONS
Initialization Media versions and their
corresponding product releases
The following table shows Initialization Media versions with
their corresponding Experion PKS releases:
Initialization Media version Experion PKS release
EXPPlus 201.x or later R501
EXPPlus 200.2 or later R500
EXPPlus 220.x or later R520
EXPPlus 230.x or later R530
211
CHAPTER
C APPENDIX C: CONFIGURING AND
CONNECTING PROTECTION DEVICES
This appendix guides you through installing and configuring a
Network Attached Storage (NAS) that will be used to store
backups.
In this section:
Prerequisites 213
Setting up the NAS hardware 213
Configuring the physical client to access the subnet of the
NAS device 216
Connecting to the NAS device and configuring DNS, WINS,
and bonding mode 217
Configuring networking properties 217
Configuring the physical client to access the management
subnet 218
Bonding the network interfaces to support load balancing 218
Identifying NAS devices 219
Adding the NAS device to the DNS server 219
Enabling security 220
212
Appendix C: Configuring and connecting protection devices
Prerequisites
You Must ;
n Have a NAS device with sufficient space to store backups.
n Have allocated one or more IP addresses on the
Management Network for the NAS device.
n Have network switch ports available to connect the NAS to
the management network.
n Have DNS and WINS information for the system.
n Have an IP Address for a Domain controller or a time source
to be used for time synchronization.
n Have available and enabled ports on the management
switch (a free port on each management switch if using
redundant Level 2.5 switches as part of the Management
Network).
n Have established a naming convention for the NAS device,
for example:
o − BackupScope = System, L3, L2, Cluster
o − NAS Device Name = BackupScope_NAS01
Setting up the NAS hardware
Supported NAS devices:
Honeywell Model
Dell NAS Model
No
MZ-NWSTR2 DELL NX400 HONEYWELL NAS, 8TB, 1U
RACK
MZ-NWSTR3 NETWORK STORAGE DELL NX430 1U RACK
MZ-NWSTR4 NETWORK STORAGE DELL NX440 1U STD
RACK
MZ-NWSTR5 NETWORK STORAGE DELL NX440 1U PERF
RACK
MZ-NWSTR6 NETWORK STORAGE DELL R350XE STD
MZ-NWSTR7 NETWORK STORAGE DELL R350XE PERF
213
Appendix C: Configuring and connecting protection devices
Honeywell Model
Dell NAS Model
No
MZ-NWSTR8 NETWORK STORAGE DELL R360XE STD
MZ-NWSTR9 NETWORK STORAGE DELL R360XE PERF
The NAS device comes with preconfigured disk alignment
which has 3 different drives (C drive, D drive and E drive). If you
want to merge the drive space available on D drive and E drive
for better management of available drive space, then perform
the following procedure to merge D drive and E drive (Note: C
drive is the operating system drive).
1. Launch the Server Manager window from left corner of system
tray.
2. Click Tools in the upper-right corner of the Server Manager
window.
3. Select Computer Management from the drop-down list.
Computer Management window appears.
4. Double-click on Disk management under storage. Disk type of
Disk 0 and Disk 1 appear as “Static”.
5. Right-click on Disk 0 and then select covert to dynamic disk.
214
Appendix C: Configuring and connecting protection devices
6. Restart the system and then open the computer management
window again by following the procedure as described earlier.
7. Right-click on Drive D and then select delete volume.
8. Right-click on Drive E and then select delete volume.
NOTE: It is assumed that both the drives are empty and
that all content is on the operating system partition,
which is C drive.
Result: Both partitions should now appear as unallocated
space.
9. Right-click on Drive E of Disk1 and select New Spanned
volumes.
10. Add the unallocated space from what was in the D drive.
215
Appendix C: Configuring and connecting protection devices
11. After the operation is completed, one volume letter (for
example, G:) appears that spans across multiple partitions.
NOTE: Disk 0 and Disk 1 can be converted to dynamic disk
by performing this operation.
Configuring the physical client to access the
subnet of the NAS device
Configuring the physical client to access the subnet of the NAS device
1. Log on to the physical client node connected to the
management network.
ATTENTION: The client node must be connected to the
same switch as the NAS device.
2. Write down the IP address of the client node.
3. Using the Network Connection Properties dialog box,
change the IP address of the client node to the value
captured for the NAS hardware, but add 2 to the final value.
l For example, if the NAS IP address is 169.254.10.10, use
169.254.10.12 for the client node.
4. A warning about the default gateway appears.
5. Click Yes to save the configuration.
216
Appendix C: Configuring and connecting protection devices
Connecting to the NAS device and configuring
DNS, WINS, and bonding mode
Connecting to the NAS device and configuring DNS, WINS, and bonding mode
Step Action
1. On the physical client node, open Internet Explorer and navigate
to the NAS IP address. The Management Console for the Iomega
StorCenter appears.
2. Click Network in the left hand pane.
3. Click Network in the main display. The Change Network Settings
page appears.
4. Click Modify network settings. The Network Settings dialog
appears.
5. Clear the Automatically configure DNS, WINS and all IP
addresses check box.
6. Type IP address values in the DNS Servers and WINS Servers
boxes.
7. Select Adaptive Load Balance in the Bonding Mode list.
8. Click Apply.
9. Click Yes when prompted to continue the connection.
Configuring networking properties
1. From the Change Network Settings page of the Management
Console, expand the details for the first interface in the Network
Interface column.
2. Clear the Automatically acquire network address check box.
3. Type values for the IP Address, Subnet Mask, and Gateway for
the management network in the boxes provided.
4. In the Jumbo Frames list, select None.
5. Click Apply.
6. Click Yes when prompted to continue the connection.
l The new IP address appears in the NAS display. The NAS is
now in the management network, and it is no longer
connected to the physical client. You now need to change the
217
Appendix C: Configuring and connecting protection devices
IP Address for the Physical Client back to the management
network so that you can reconnect to the NAS.
Configuring the physical client to access the
management subnet
To configure the physical client to access the management
subnet:
Step Action
1. From the Network Connection Properties dialog box, change the
IP Address back to its original address as mentioned in step 2 of
"procedure for configuring Physical Client to access the subnet of
the NAS device".
2. On the physical client node, open Internet Explorer and navigate
to the NAS IP address. The Management Console appears.
3. If you have a second NIC connected to the Management switch,
complete the next procedure. Otherwise, move ahead to
procedure for Identifying the NAS Devices.
Bonding the network interfaces to support load
balancing
Bonding is similar to the VMWare concept of "NIC Teaming" in
that it configures or bonds two NICs so they provide
redundancy with the option of distributing or balancing a load.
Iomega’s bonding has three modes:
l Adaptive load balance - no switch configuration required
l Link aggregation - switch configuration required
l Failover only - redundancy without load balancing
Bonding was previously configured with the DNS and WINS
settings and is only useful when both network interfaces are
connected to the management network.
To bond the network interfaces to support load balancing:
1. From the Management Console, click Network in the left hand
pane.
2. Click Network in the main display.
218
Appendix C: Configuring and connecting protection devices
The Network Configuration dialog appears.
3. Expand the first interface in the Network Interface column and
expand Bond Network Interface.
4. In the Bonded column, select the check box for the second NIC.
5. Click Apply.
6. Click OK when prompted that both NICs were configured on the
same subnet.
7. Click Yes when prompted to continue the connection.
Identifying NAS devices
This procedure gives the NAS device a network name and a
descriptive name. The default configuration of the NAS device
has it in a workgroup, which has the following advantages:
l It allows you to create and manage user accounts locally.
l By using local accounts you will avoid connection issues
encountered with Windows Domain accounts when a domain
controller is unavailable.
To identify NAS devices:
1. From the Management Console, click Network in the left hand
pane.
2. Click Device Identification in the main display.
3. In the Device Name box, type a name for the NAS device that
identifies the scope of the system for which it holds the backup.
For example,
Scope_NAS01, where SCOPE could be System, Level3.5, Level3,
Level2, or Cluster.
4. Click Apply.
5. Click Yes when prompted to continue the connection.
Adding the NAS device to the DNS server
Adding the name and IP address of the NAS device to your DNS
server makes it accessible by both methods.
To add the NAS device to the DNS server:
1. Using the NAS device name and its IP address, create a new
‘HOST A’ record in your DNS server.
219
Appendix C: Configuring and connecting protection devices
l The domain name server (DNS) must contain the name of the
NAS.
2. Manually add the device name to the DNS server, by adding a
‘Host A’ record to the appropriate Forward Lookup zone.
Enabling security
Enabling security on the NAS device defines the account and
password required for NAS administration. It also allows the
NAS administrator to create user accounts to restrict access to
shares.
To enable security:
1. From the Management Console, click System in the left
hand pane.
2. Click Security in the main display.
3. Click On.
The Enable Security dialog box appears.
4. Type a Username and Password in the boxes provided.
These will be used to administer the NAS device. Record
them for future reference.
5. Select the Encrypt network communication using SSL check
box if it applies to your network.
6. Click Apply.
220
CHAPTER
D APPENDIX D: RE-ADDING BACK THE
RESTORED NODE TO DOMAIN
If the cluster is in domain environment, and if you restore the
EBR backed up image to the node which is added to domain,
then perform the following steps:
1. Re-add the restored node to the workgroup.
2. Reboot the node.
3. Add the rebooted node to the domain.
4. Run Link Domain Groups.
221
CHAPTER
E APPENDIX E: REMOVING PHANTOM FTE
DEVICES
You must perform this task on all nodes (Server B, Flex,
Console, and Sever A).
Devices installed on the computer and later removed,
sometimes remain as a configured device in the registry. For
example, an on-board Network Interface Card (NIC) that was
once used on the computer may still exist in the registry even
though it is removed and disabled in the BIOS, to allow the
installation of a dual NIC adapter for FTE support.
The Add/Remove Hardware utility retains the removed device
configuration in the
Windows registry and so the FTE service binds to this phantom
or removed device. For
Experion migration and installation, this presents a problem for
the FTE service. To avoid any probable issue due to phantom
devices, perform the following procedure to remove these
phantom devices from the computer.
ATTENTION: Record device index, multicast address, and so
on before performing the procedure to remove the
phantom devices.
In this section:
To verify a phantom FTE device 223
To remove a phantom FTE device 224
222
Appendix E: Removing Phantom FTE devices
To verify a phantom FTE device
Perform the following steps:
1. Choose Start > Run and in the Run dialog box, type cmd.
2. On the Command Prompt type: set devmgr_show_nonpresent_
devices=1 and press ENTER.
3. Type start devmgmt.mscand press ENTER.
4. From the Device Manager, choose View > Show hidden devices.
5. Expand Network adapters tree.
223
Appendix E: Removing Phantom FTE devices
To remove a phantom FTE device
Perform the following steps:
1. Choose Start > Settings > Network and Internet > Change
Adapter options.
The Network Connections dialog box is displayed.
2. Right-click Yellow Ethernet adapter and select Properties.
3. Select Honeywell Fault Tolerant Ethernet Service.
4. Click Uninstall. If a confirmation message appears as following,
click Yes.
5. If you are prompted to restart the computer, click No.
6. Click Close and then No to restart the computer.
7. To remove the phantom FTE device perform the steps
mentioned in “To verify a phantom FTE device” procedure.
8. Right-click a non-present device and then click uninstall.
Following confirmation message is displayed.
9. Click OK to confirm the removal of the device.
10. Ensure that you restart the computer.
11. Log on as Administrator to reinstall FTE Driver service on the
network adapter.
224
Appendix E: Removing Phantom FTE devices
12. Select My Network Properties and right-click the Yellow
Ethernet adapter and select properties.
13. In the Yellow Adapter Properties dialog box, select Install.
14. In the Network Component Types, select Service and select Add.
15. Click Network Service and then click Have disk
16. Install from Disk and click Browse.
Locate file at C:\Program Files\Honeywell\FTE_Driver.
17. Click Open.
18. Install from Disk, and click OK.
19. Select Network Service. Select Honeywell Fault Tolerant
Ethernet.
20. Click OK.
21. On the Yellow Adapter Properties dialog box, select Honeywell
Fault Tolerant Ethernet Service and then select Properties.
22. Select the Yellow and Green adapter check boxes. Enter or
verify the correct device index, Multicast address, and other
settings.
23. Click OK.
24. Return to the Yellow Adapter Properties dialog box.
25. Click Close.
26. Restart the system.
225
Notices
NOTICES
Trademarks
Experion®, PlantScape®, SafeBrowse®, TotalPlant®, and TDC
3000® are registered trademarks of Honeywell International,
Inc.
Experion®, PlantScape®, SafeBrowse®, TotalPlant®, and TDC
3000® are registered trademarks of Honeywell International,
Inc.
ControlEdge™ is a trademark of Honeywell International, Inc.
OneWireless™ is a trademark of Honeywell International, Inc.
Matrikon® and MatrikonOPC™ are trademarks of Matrikon
International. Matrikon International is a business unit of
Honeywell International, Inc.
Movilizer® is a registered trademark of Movilizer GmbH.
Movilizer GmbH is a business unit of Honeywell International,
Inc.
Other trademarks
Microsoft and SQL Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States
and/or other countries.
Trademarks that appear in this document are used only to the
benefit of the trademark owner, with no intention of trademark
infringement.
Third-party licenses
This product may contain or be derived from materials,
including software, of third parties. The third party materials
may be subject to licenses, notices, restrictions and obligations
imposed by the licensor. The licenses, notices, restrictions and
obligations, if any, may be found in the materials
accompanying the product, in the documents or files
accompanying such third party materials, in a file named third_
party_licenses on the media containing the product, or at
http://www.honeywell.com/ps/thirdpartylicenses.
226
Notices
Documentation feedback
You can find the most up-to-date documents in the Support
section of the Honeywell Process Solutions website at:
https://process.honeywell.com
If you have comments about Honeywell Process Solutions
documentation, send your feedback to:
[email protected]
Use this email address to provide feedback, or to report errors
and omissions in the documentation. For immediate help with
a technical problem, contact your local Honeywell Process
Solutions Customer Contact Center (CCC) or Honeywell
Technical Assistance Center (TAC).
How to report a security vulnerability
For the purpose of submission, a security vulnerability is
defined as a software defect or weakness that can be exploited
to reduce the operational or security capabilities of the
software.
Honeywell investigates all reports of security vulnerabilities
affecting Honeywell products and services.
To report a potential security vulnerability against any
Honeywell product, please follow the instructions at:
https://www.honeywell.com/us/en/product-security.
Support
For support, contact your local Honeywell Process Solutions
Customer Contact Center (CCC). To find your local CCC visit the
website, https://process.honeywell.com/us/en/contact-us.
Training classes
Honeywell holds technical training classes that are taught by
process control systems experts. For more information about
these classes, contact your Honeywell representative, or see
https://process.honeywell.com/us/en/services/training.
227