0% found this document useful (0 votes)
381 views227 pages

PMT Hps Experion Backup and Restore User S Guide Epdoc x111 en 520G

Uploaded by

Fernando
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
381 views227 pages

PMT Hps Experion Backup and Restore User S Guide Epdoc x111 en 520G

Uploaded by

Fernando
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 227

Experion Backup and Restore

Release 520

Experion Backup and Restore User Guide


EPDOC-X111-en-520G
August 2024
DISCLAIMER
This document contains Honeywell proprietary information.
Information contained herein is to be used solely for the
purpose submitted, and no part of this document or its
contents shall be reproduced, published, or disclosed to a third
party without the express permission of Honeywell
International Sàrl.
While this information is presented in good faith and believed
to be accurate, Honeywell disclaims the implied warranties of
merchantability and fitness for a purpose and makes no
express warranties except as may be stated in its written
agreement with and for its customer.
In no event is Honeywell liable to anyone for any direct, special,
or consequential damages. The information and specifications
in this document are subject to change without notice.
Copyright 2024 - Honeywell International Sàrl

2
CONTENTS
Chapter 1 - About this guide 11
Chapter 2 - Introduction to EBR 14
Virtualization in EBR 520 16
Experion Backup and Restore Terminologies 16
Experion Backup and Restore Topologies 18
EBR R520 components 20

Chapter 3 - Getting started with EBR installation 21


EBR Software Packages 22
EBR installation environments 22
Hardware and software requirements for EBR Manager 23
Creating EBR user 24

Chapter 4 - All-In-One Virtual Appliance 34


Installing the software 34

Chapter 5 - Installing EBR manager 42


Installing the EBR Manager Software package 43
Adding Licenses to EBR Manager 49
Adding Users to EBR Manager 49

Chapter 6 - Installing EBR agents in physical environment 51


Installing EBR agents manually 52
EBR scripts 56
Installing EBR scripts 56

Chapter 7 - Adding computers to the management server 59


Adding Windows Server to the EBR Manager 60
Adding Windows Workstation to the EBR Manager 60

3
Adding VMware ESXi Virtual Machines to EBR Manager 62

Chapter 8 - Setting up EBR in a virtual environment 65


Virtual appliance 66
Getting started 66
Network router configuration 67
Preparing the list of free IP addresses for agent for ESX(i) host 67
Deploying Agent for ESX(i) from EBR R520 Manager 68
Applying license to the virtual appliance 68
Configuring bindings 68
Removing agent for ESX(i) from EBR manager 69

Chapter 9 - Protection planning 70


Protection considerations 71
Preventing data loss 71
Prerequisites for a backup 72
Centralized backup management 72
File naming guidelines 72
Backup after Windows Update 72
Staggering start times 73
Adding Storage Nodes 73
Storing Backups 74
Offsite storage 75
Backup/restore speed 75
Rebuilding or restoring data 76
Running disk I/O intensive applications 76
Running disk defragmentation software 76
Running general applications 76
Virtual Machines with snapshots 76

4
Data compression 77
Using routers 77
Deduplication 77
Backup recommendations 78
Changing Drive letter for system reserved partition 78
Experion Servers 80
Experion Stations, Console Extension Stations, Flex Stations, TPS
Stations 80
ACE-T, SIM-ACE-T, and SIM-C200 nodes 80
Protection (Backup) types 80
Protection (Backup) schemes 81
Scheduling backups 82
Scheduling considerations 82
Default Backup settings 83
Default backup options 84
Retention rules 86
Setting up a storage node 87
Adding a Managed Location 87
To protect the location with encryption 89
Backup replication 94

Chapter 10 - Backups on a physical node 95


Getting started 96
Table 1. Sample backup configuration form 96
Creating a protection (backup) plan for a physical node 99
Running protection (backup) job manually 100
Editing protection (backup) jobs 100
Deleting protection (backup) plans/jobs 101

5
Backup in a recovery environment 102

Chapter 11 - Protection(Backup) on a virtual node 109


Getting started 110
Sample backup configuration form 110
Creating a protection (backup) plan for a virtual node 113
General recommendations 116

Chapter 12 - Recovery planning 118


General recovery plan considerations 119
Elements of a recovery plan 119
Overview of tasks to develop a recovery plan 120
Analyze the business impact 120
Perform a risk assessment 121
Use the recovery plan 121
Test and audit the plan 121
Restore modes/options 122
Universal Restore option 122
Default recovery options 122

Chapter 13 - Checklists for Restoring Experion Nodes 123


Checklists for restoring nodes with similar hardware 124
Restoring a non-redundant node with similar hardware 124
Restoring redundant Experion Server A with similar hardware 124
Restoring redundant Experion Server B with similar hardware 125
Checklists for restoring nodes after recovery from a virus infection 126
Considerations 126
Restoring a non-redundant node after recovery from a virus
infection 127
Restoring redundant Experion Server B after recovery from a
virus infection 129

6
Checklists for restoring selected files or folders from a backup 131
Considerations using EBR 131
Restoring selected folders or files to a node 131

Chapter 14 - Restoring Physical Nodes 132


Using EBR Recovery Media to restore hard disks and images 133
Prerequisites 133
Restoring a hard disk 133
EBR Recovery on Dell 15G and Dell 16G Platforms 145

Chapter 15 - Restoring Virtual Nodes 151


Methods of restoring a virtual node 151
Restoring to an existing virtual node using EBR recovery media 158
Restoring virtual node using virtual appliance from EBR
Manager 158

Chapter 16 - Restoring Experion Databases 164


Disabling ERDB and/or EMDB replication for Redundant Experion
Server B 165
Disabling ERDB and/or EMDB replication for Redundant
Experion Server B 165
Restoring the ERDB for Redundant Experion Server A 165
Restoring the ERDB for Redundant Experion Server B 166
Restoring the EMDB for Redundant Experion Server A 167
Restoring the EMDB for Redundant Experion Server B 169
Restoring Controllers from controller checkpoint files 170
Restoring the Engineering Repository Database and controllers 170
Restoring the events database 172
Restoring the EMDB 173

Chapter 17 - Configuration items in the Management Console 175


Deleting computers from the EBR Manager 176

7
Revoking licenses 176

Chapter 18 - Moving between physical node and virtual node 178


Converting a physical node to virtual node using virtual appliance 179
Virtual to physical 182
Prerequisite 182

Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade 188


To upgrade EBR manager from R501.3 to R520.1 188
To update All in One Appliance 194
To validate the installation 195
Post installation tasks 196

Chapter 20 - Security 199


Security recommendations 200
Installing the latest antivirus software 200

Chapter 21 - Troubleshooting 203


Manually applying license to the virtual appliance 204
To verify the application of license 204
Manually removing virtual appliance from vCenter 205
Prerequisites 205
Uninstalling the R520 version of EBR Manager, Server, and
Desktop software packages 205
About this section 205
Uninstalling Acronis Cyber Protect 15 205
Network Adapters are not shown in Network Connections Folder 206

Appendix A: Installing FTE MUX adapter 209


Installing FTE MUX adapter after Restore 209

Appendix B: Initialization Media versions 211


Initialization Media versions and their corresponding product
releases 211

8
Appendix C: Configuring and connecting protection devices 212
Prerequisites 213
Setting up the NAS hardware 213
Configuring the physical client to access the subnet of the NAS
device 216
Configuring the physical client to access the subnet of the NAS
device 216
Connecting to the NAS device and configuring DNS, WINS, and
bonding mode 217
Connecting to the NAS device and configuring DNS, WINS, and
bonding mode 217
Configuring networking properties 217
Configuring the physical client to access the management subnet 218
Bonding the network interfaces to support load balancing 218
Identifying NAS devices 219
Adding the NAS device to the DNS server 219
Enabling security 220

Appendix D: Re-adding back the restored node to domain 221


Appendix E: Removing Phantom FTE devices 222
To verify a phantom FTE device 223
To remove a phantom FTE device 224

Notices 226

9
10
CHAPTER

1 ABOUT THIS GUIDE

This guide describes how to install, configure and use Experion


Backup and Restore (EBR) in a Honeywell process control system.
You use EBR to back-up and then restore critical system data for
Experion Process Knowledge System (PKS) nodes.

Revision history
Revision Date Descriptionz

A August Initial release of the document.


2021

B April 2022 Updated for Experion PKS R520.

C August Updated the following section:


2022
l Setting up the NAS hardware
l Added new chapter 19 (EBR R501.3
to 520.1 upgrade)

D December EBR R501.3 HF3 or HF4 update has


2022 been added in Chapter 19.

E February Updated the following sections:


2023 l Installing the EBR Manager Software
package
l Using EBR Recovery Media to restore
hard disks and images
l Universal Restore

F October Update the following section:


2023 l EBR Recovery on Dell 15G Platforms

G August Updated the follwoing sections:


2024 l Prerequisite skills
l Experion Backup and Restore
Terminologies

11
Chapter 1 - About this guide

Revision Date Descriptionz

l EBR Software Packages


l Using EBR Recovery Media to restore
hard disks and images
l EBR Recovery on Dell 15G Platforms
l Setting up the NAS hardware

Intended audience
This guide is intended for engineers, system administrators,
and other technical personnel who are responsible for backing
up and restoring data for Experion PKS nodes.

Prerequisite skills
You must have practical experience with system backup and
restore operations, as well as proficiency with the following
Microsoft® Windows operating systems:
n Embedded Microsoft Windows Server 2016 Standard
n Embedded Microsoft Windows Server 2019 Standard
n Embedded Microsoft Windows Server 2022 Standard
n Embedded Microsoft Windows Server 2016 Datacenter
n Embedded Microsoft Windows Server 2019 Datacenter
n Embedded Microsoft Windows Server 2022 Datacenter
n Embedded Microsoft Windows 10 LTSB Enterprise
n Embedded Microsoft Windows 10 LTSC 2019 Enterprise
n Embedded Microsoft Windows 10 LTSC 2021 Enterprise

References
This publication references various documents for further
information. The Acronis®Cyber Protect 15 User Guide serves
as a key source for material discussed herein.

Abbreviations
The following list defines the special abbreviations used in this
guide.

12
Chapter 1 - About this guide

Abbreviation Definition

ACE Application Control Environment

AMS Acronis Management Server

EBR Experion Backup and Restore

EMDB Enterprise Model Database

ERDB Engineering Repository Database

FTE Fault-Tolerant Ethernet

MBR Master Boot Record

PHD Process History Database

SIM Simulation Interface Module

13
CHAPTER

2 INTRODUCTION TO EBR

In this section:

Virtualization in EBR 520 16


Experion Backup and Restore Terminologies 16
Experion Backup and Restore Topologies 18
EBR R520 components 20

14
Chapter 2 - Introduction to EBR

Experion Backup and Restore (EBR) provides real-time,


continuous backup infrastructure for Experion PKS nodes
within a Honeywell process control system.
During a backup - scheduled or manual, EBR copies the disk
image of a node to a Backup Repository.
During a restore, the disk image restores to the same or a
different node and Experion repositories [Enterprise Model
Database (EMDB) and Engineering Repository Database
(ERDB)].
EBR R520 can be deployed in two types of nodes:
n On physical Nodes
n On virtual nodes
EBR provides the following functionality:
n Console is used for creating backup jobs and monitoring job
status through various event logs and status notifications.
n Restore function uses a bootable media. Using this, the
node can be booted in recovery mode to recover a repaired
or replacement node.
n Creating backup task's function provides an option for
configuring scheduled or manual backup jobs. The backup
job performs a backup of all the node data including the
operating system, drivers, service packs, Experion and node
configuration. The resulting backup is used for restoring the
original node or replacement node (to when it was last
backed up). No post-restore installation or configuration is
required.
n File/folder recovery function provides an option to restore
backups at Files and Folder levels.
n Centralized Management function provides a central user
interface for creating backups and monitoring the status of
multiple nodes.

15
Chapter 2 - Introduction to EBR

Virtualization in EBR 520


Virtual Node Support
EBR R520 supports protection (backup) of virtual nodes by
using Acronis Cyber Protect 15 Virtual Edition. Protection
(Backup) of VMware virtual machines is integrated with other
platform components allowing centralized management,
reporting, cataloguing with search, and other platform features.
For more details on virtualization support in EBR R520, see
Setting up EBR in a virtual environment.

NOTE:
For more details on virtualization, see:
l Experion PKS Software Installation User's Guide
l Experion PKS Virtualization Planning and
Implementation Guide

Experion Backup and Restore Terminologies


The following list defines the EBR terms used in this guide
n Backup and backup image are synonymous terms for an
exact reproduction of the contents of a hard disk. Typically,
the backup image contains the applications, configuration
settings, operating system, and other data that is
compressed and stored as a file. The backup image is used
for restoring a hard disk to the state when it was last backed
up.
n Manager Node is a server computer that uses EBR to
manage backup jobs for multiple server and desktop nodes
in a centrally managed environment. In addition, the
Manager Node contains system configuration information
and maintains a database of backup history. The Operating
system must be Embedded Microsoft Window Server 2022
datacenter / Microsoft Windows Server 2022 Standard /
Embedded Microsoft Windows Server 2019 Standard /
Microsoft Windows Server 2019 Datacenter / Embedded

16
Chapter 2 - Introduction to EBR

Microsoft Windows Server 2016 Standard / Microsoft


Windows Server 2016 Datacenter.
n Agent for ESX(i)host or Virtual Appliance enables Acronis
Cyber Protect 15 enables protection (backup) and recovery
of ESX(i) virtual machines without installing the agents into
the virtual nodes.
n Target Node is a physical node with EBR installed (must be
a Server or Desktop Node) or a virtual node.
n Backup destination is a computer (usually a file server or
NAS device) that stores all of the backup images for the
Target Nodes.
n Management Console is a common GUI for local and central
management tasks which is basically the EBR Manager
itself. You must connect to the management server to be
able to centrally manage the target nodes using the
management console.
n Managed node (Managed host) is a computer where a
Backup Agent and Acronis Protect Management Server is
installed. The target node is added to the management
server and it is operated and monitored from the
management console. A server node, desktop node or ESX(i)
hosts can be added to the management server to make it a
managed node or managed host.
n Restore to same node is taking a backup from a node and
restoring it on the same node. Ex: restoring backup of a
T5810XL machine to the same machine.
n Restore to similar node is taking a backup from a node and
restoring it to another machine of the same physical
configuration. Ex: restoring backup of a T5810XL machine
to another T5810XL machine.
n Restoring virtual machines is taking backup of virtual nodes
and restoring to a virtual node on the same or a different
host.

17
Chapter 2 - Introduction to EBR

Experion Backup and Restore Topologies


EBR topology in a physical environment.

18
Chapter 2 - Introduction to EBR

EBR topology in a virtual environment

19
Chapter 2 - Introduction to EBR

EBR R520 components


The following are the key EBR R520 components:
n EBR Scripts
n Management Server
n Backup Monitor
n Command-Line Tool
n Agent for VMware (Virtual Appliance)
n Bootable Media Builder
n Agent for Windows

Management server
The Management server is a central server that manages
backup and recovery activities. The administrators can connect
from the management console and manage the entire EBR
infrastructure.
n All backup policies and backup and recovery jobs are
managed, executed, and tracked on the management server.
n The Management server maintains a list of registered
storage nodes, vaults and managed computers, and the
respective configuration databases.
n The Management server maintains a centralized log
repository that tracks the results of all activities within the
EBR infrastructure.
The Management server generates reports using the
information from the centralized log repository and the
configuration database.

Management console
The Acronis Backup Management Console is a browser for
managing agents remotely or locally. When the console is
connected to the management server, you can perform central
management tasks such as managing licenses, configuring,
and managing backup policies.

20
CHAPTER

3 GETTING STARTED WITH EBR


INSTALLATION

This chapter provides information on requirements for


installing the EBR Manager and EBR software packages.

In this section:

EBR Software Packages 22


Hardware and software requirements for EBR Manager 23

21
Chapter 3 - Getting started with EBR installation

EBR Software Packages


EBR contains Manager and software packages designed for
installation on nodes with Windows operating systems as
specified in the following tables

Specified
Windows
Software Functional description
operating
package system

Manager Manages the recovery activities, Embedded


monitors real-time status and Microsoft
centrally manages backup Windows Server
2022 Standard /
operations of multiple machines,
Embedded
executes scheduled and on-
Microsoft
demand backup jobs, which Windows Server
includes both physical and virtual 2022
machines. Datacenter.
Embedded
Microsoft
Windows Server
2019 Standard /
Embedded
Microsoft
Windows Server
2019
Datacenter.
Embedded
Microsoft
Windows Server
2016 Standard /
Embedded
Microsoft
Windows Server
2016
Datacenter.

EBR installation environments


EBR must be installed in a centrally or locally managed
environment.
n In a centrally managed environment, the EBR Manager is
installed on a standalone, dedicated server grade machine
(Physical or VM). Backup policies and tasks for all server,

22
Chapter 3 - Getting started with EBR installation

desktop, or virtual machines are created from the


management console/browser from any node by connecting
to the management server.
n In a locally managed environment, EBR is installed on each
server or desktop node to be backed up.

Hardware and software requirements for EBR


Manager
ATTENTION:
The computer used as the Manager Node must meet the
following requirements:
l It must be added to the domain / workgroup.
l It must NOT be: an Experion server, a PHD server, NAS or
an APP node.
l Honeywell recommends installing the Manager on a
dedicated server in both physical and virtual
environments.
l Do NOT install the Manager on a domain controller.

Virtual
Physical Node Virtual Node
Appliance

n Intel® Pentium 4 processor, 2 n EBR n EBR


GHz or more Manager Appliance
n 3300 MHz Agent
n Microsoft Embedded Microsoft
3 Virtual n 3300MHz
Windows Server 2019 Standard n
CPUs n 2 vCPU
n 64 bit operating systems n 8 GB RAM n 8 GB RAM
n 4 GB RAM. n 50 avg n 10 avg
n Free disk space - 60 GB or more IOPs IOPs
(note this is not intended for n 250 max n 10 max
backup storage) IOPs IOPs
n 10 n 10 network
Network n 5GB+1GB
n 60 GB disk disk

23
Chapter 3 - Getting started with EBR installation

ATTENTION:
It is recommended to deploy the EBR Appliance to the
vCenter Server instead of an individual host. In this
configuration, the appliance aware of the entire virtual
machine inventory of the vCenter instead of an isolated
view of the virtual machines running on a specific host.
Each EBR Virtual Appliance must be assigned to only one
vCenter Server, and if more than one vCenter Server exists
in a system, deploy at least one EBR Virtual Appliance to
each vCenter Server instance.
Each EBR Virtual Appliance can perform ten concurrent
backups, and backups beyond this are held in a queue.
Once the first ten backup jobs are complete, the next job in
the queue starts. However, we recommend staggering start
times so that only one node is backed up at a time (to
minimize loading on the network). The ability to manage
and queue multiple concurrent backups means that a
vCenter Server will generally only require one EBR Virtual
Appliance, each configured with a quantity of two virtual
CPUs and 8 GB memory. Therefore, exceeding more than
10 EBR Virtual Appliances is not recommended per vCenter
Server instance.

Creating EBR user


Creating an EBR user involves the following three tasks:

Create the EBR user in the domain controller/workgroup.


1. Add the user to the group.
2. The user should be part of the following groups:
System in workgroup
lAdministrators
System in domain
l Target System Local Administrators
l Domain Users
l Domain Admins
l DCS Administrators
Assign user rights to the EBR user.

24
Chapter 3 - Getting started with EBR installation

NOTE: On a system in workgroup it is local group policy of


that system and on a system in domain, it is group policy in
domain controller.

The user must have the following user rights:


l Access this computer from the network
l Adjust memory quotas for a process
l Impersonate a client after authentication
l Log on as a service
l Create a token object
l Replace a process level token

Creating EBR user in Domain Controller


You should perform the following procedure in the domain
controller.
Prerequisite
Install the Experion domain security package.
Creating a user
1. Type the new username and provide necessary details. The
New Object –User window appears.
2. Right-click and then select New > User.
3. Click Start > Windows Administrative Tools > Computer
Management > Local Users and Groups > Users.

25
Chapter 3 - Getting started with EBR installation

4. Click Next and then type a Password.


5. Select the required check boxes and then click Next.

6. If you want to edit any information regarding the New


Object, click Back
7. Click Finish.
EBR Administrator as a user appears in the Users window.
Adding user to the group
1. Right-click EBR Administrator and click Properties. The EBR
Administrator Properties window appears.

2. Enter the necessary details.


3. Click Apply and then click the Member Of tab.
4. On this tab, you can assign the newly created user to the
required Groups.
5. By default, the new User is assigned to the group, Domain
Users.

26
Chapter 3 - Getting started with EBR installation

6. In the Member Of tab, click Add.


7. The Select Groups window appears.

8. Click Advanced.
9. The window expands to show a Search Results pane.
10. In the Search Results pane, select the following:
l Administrators
l Domain Users

l Domain Admins

l DCS Administrators

11. Click OK.


The selected groups are displayed in the Select Groups
window.

12. Click Apply and then click OK in the EBR Administrator


Properties window.
Assigning user rights to the EBR user in domain controller

27
Chapter 3 - Getting started with EBR installation

n Click Start > Windows Administrative tools > Local Security


Policy > Local Policies > User Rights Assignment.
n The User Rights Assignment window appears.
n Right-click Log on as a service and then click Properties.
The Log on as a service Properties dialog box appears.

n Click Add User or Group.


n The Select Users, Accounts , Service Accounts, or Groups
dialog box appears
n Click Advanced.
n The dialog box expands to show a Search Results pane.
n Click Find Now. The search results are displayed.
n Select EBR Administrator from the list and then click OK.
n The EBR Administrator you chose appears in the Select
Users, Accounts, Service Accounts, or Groups window.

28
Chapter 3 - Getting started with EBR installation

n Click OK
n Repeat steps 2 to 7 for assigning other user rights to the
user.

NOTE: Refer section Creating EBR User for more details on


user rights.

29
Chapter 3 - Getting started with EBR installation

Creating EBR user in a workgroup


Creating an EBR user involves the following four tasks:
Creating a user in the local system where EBR manager will be
installed.
1. Click Start > Windows Administrative Tools > Computer
Management > Local Users and Groups > Users.
2. Right-click and then select New > User.
The New Object – User window appears.
3. Type the new username and provide necessary details. Click
Create.

4. Click Finish.
EBR Administrator as a user appears in the Users window.

Adding user to the group


5. Right-click EBR Administrator and click Properties.
The EBR Administrator Properties window appears

30
Chapter 3 - Getting started with EBR installation

6. Select Password never expires checkbox.


7. Click Apply and then click the Member Of tab.
On this tab, you can assign the newly created user to the
required Groups.

NOTE: By default, the new account is assigned to the


Users group

8. In the Member Of tab, click Add.


The Select Groups window appears.
9. Click Advanced.
The window expands to show a Search Results pane.
10. In the Search Results pane, select the following:
l Administrators
Click OK.
The selected groups are displayed in the Select Groups
window.

31
Chapter 3 - Getting started with EBR installation

11. Click OK.


12. Click Apply and then click OK in the EBR Administrator
Properties window.

NOTE: Make sure the EBR agent installed on Experion


nodes have Administrator and Product Administrator group
added as part of EBR user.

Assigning user rights to the EBR user in workgroup


1. Click Start > Windows Administrative tools > Local Security
Policy > Local Policies > User Rights Assignment.
The User Rights Assignment window appears.
2. Right-click Log on as a service and then click Properties.
The Log on as a service Properties dialog box appears.

n Click Add User or Group.


n The Select Users, Accounts, Service Accounts, or Groups
dialog box appears.

32
Chapter 3 - Getting started with EBR installation

3. Click Advanced.
4. The dialog box expands to show a Search Results pane.
5. Click Find Now. The search results are displayed.
6. Select EBR Administrator from the list and then click OK.
7. The EBR Administrator you chose appears in the Select
Users, Accounts, Service Accounts, or Groups window.

8. Click OK.
9. Repeat steps 2 to 7 for assigning other user rights to the
user.

NOTE: Refer section Creating EBR User for more details on


user rights.

33
CHAPTER

4 ALL-IN-ONE VIRTUAL APPLIANCE

All-in-One Virtual Appliance combines EBR Manager and


Protection (Backup) agent into a single, Linux appliance.
The advantages of All-In-One Virtual Appliance are as follows:
n Easy updates and migration
n Eliminates licensing and simplifies administration.
n Provides the same EBR manager experience as the original
Windows install.
Honeywell provides the choice of whether to utilize the EBR All-
in-One Virtual Appliance with Experion systems. The separate
Windows-based EBR Manager architecture may continue to be
used if preferred.

NOTE: The All-in-One appliance does not support login via


an Active Directory accounts. Local accounts are used for
administration of the All-in-One appliance.

Installing the software


With All-In-One Virtual appliance, you can easily obtain a
virtual machine and do protections (backups).
The following is the software required:
Acronis Protect components:
n Management Server
n Agent for Linux
n Agent for VMware (Linux)
n CentOS
The appliance is provided through DVD. It contains the .ovf and
.iso files. You can deploy the .ovf file to an ESXi host or use the
.iso file to boot an existing virtual machine. It also contains the
.vmdk file that should be placed in the same directory with .ovf.

34
Chapter 4 - All-In-One Virtual Appliance

NOTE:
VMware Host Client (a web client used to manage
standalone ESXi 6.0+) does not allow deploying OVF
templates with an ISO image inside. If this is your case,
create a virtual machine that meets the requirements
below, and then use the .iso file to install the software.
All-In-One virtual Appliance cannot be added to domain.

Requirements for the virtual appliance are as follows:


Minimum system requirements:
n 2 CPUs
n 6 GB RAM
n One 45 GB virtual disk (60 GB recommended)
In VMware virtual machine settings, click Options tab > General
> Configuration Parameters, and then ensure that the
disk.EnableUUID parameter value is true.
After the management server is installed, the virtual appliance's
OVF package is located in the folder
%ProgramFiles%\Acronis\ESXAppliance (in Windows) or
/usr/lib/Acronis/ESXAppliance (in Linux).
The folder contains one .ovf file and two .vmdk files. Ensure
that these files can be accessed from the machine running the
vmware vSphere Client.
Deploying the OVF template
1. Start the vmware vSphere Client and log on to the vCenter
Server.
2. Select Host and right-click. Select Deploy OVF Template.

35
Chapter 4 - All-In-One Virtual Appliance

The Deploy OVF Template dialog box appears.


3. Click the Select an OVF Template, select Local file and
Browse.

4. Select all the files associated with OVF template (ovf, vmdk,
etc.) and then click Open.

5. A tick mark appears after the template has been selected.


On clicking Next, select a name and folder page appears.
Enter a name for the OVF, e.g. AIO-15-Doc, and select a
deployment location as directed. Click Next.

36
Chapter 4 - All-In-One Virtual Appliance

6. Select a computer resource page appears. Select the


destination computer resource for this operation. Click Next.

7. Review Details page appears. Verify the template details.


Click Next to accept the advanced configuration options.

ATTENTION: The OVF package contains advanced


configuration options, which might pose a security
risk. Review the advanced configuration options given.

37
Chapter 4 - All-In-One Virtual Appliance

8. Select storage page appears. Then, select the storage for the
configuration and disk files. Click Thick Provision Lazy
Zeroed, and then click Next.

9. Select networks page appears. In Destination Network drop-


down, select VM Network. Click Next.

38
Chapter 4 - All-In-One Virtual Appliance

10. Finally, Ready to complete page appears. Click Finish.

ATTENTION: Wait for 15 minutes, and then power on


the machine.

39
Chapter 4 - All-In-One Virtual Appliance

Installing/updating Acronis Protect Virtual Appliance


1. After the deployment has been completed, power on the
resulting machine or boot an existing virtual machine from
the .iso.
2. Select Install or update Acronis Cyber Protect, and then
press Enter. Wait for the initial setup window to appear.
3. Scroll down and select Change Settings.
4. Enter the Host name, password for user and enter Network
settings details.

5. Select Install with Current Settings.


6. The Welcome screen will appears.

NOTE: To access All-In-One manager, user needs to use


Acronis Protect Console address shown in the Welcome
screen.

NOTE:
Please follow the below mentioned steps for synchronizing
the time externally:
1. Open the Acronis Virtual Appliance Graphical User
Interface, scroll down to the time zone and change the
time zone to some different time zone.

40
Chapter 4 - All-In-One Virtual Appliance

2. Reboot the Virtual Appliance, scroll down to the time


zone, and then change the time zone to the correct time
zone.
3. Reboot the Virtual Appliance again, press Ctrl+Alt+F2 this
will direct you to the Appliance Shell.
4. Run the command date and verify if the Graphical User
Interface time correlates with Shell time.
5. Open All in One Appliances Manager, login with root and
its password.

6. Run the following command timedatectl set-timezone


<your-time-zone>.
Example: timedatectl set-timezone Asia/Kolkata.

7. Run reboot command to reboot the All In One Appliances


Manager.

8. Now ensure All In One Appliances Manager, All In One


Virtual Appliances Graphical User Interface and Shell
time are same.

41
CHAPTER

5 INSTALLING EBR MANAGER

This chapter describes how to install the EBR Manager


software package to back up and restore your Experion PKS
Nodes in a Honeywell process control system.

ATTENTION:
l If you are installing EBR Manager in domain

environment, login to the EBR Manager node using the


user created in Creating EBR user in Domain Controller
section in Creating EBR user.
l If you are installing EBR Manager in workgroup

environment, login to the EBR Manager node using the


user created in Creating EBR user in a workgroup
section in Creating EBR user.

In this section:

Installing the EBR Manager Software package 43


Adding Licenses to EBR Manager 49
Adding Users to EBR Manager 49

42
Chapter 5 - Installing EBR manager

Installing the EBR Manager Software package


The EBR Manager Software package is designed for installation
on the Manager Node.
The following components are available on the EBR Installation
DVD for installation.
n Acronis Cyber Protect 15
n EBR Scripts

NOTE: Installation of the EBR Manager Software package is


not supported on encrypted file systems.

NOTE: EBR Manager can be installed on Dell PE R350XE


NAS devices.

Leave the computer undisturbed during EBR Manager software


installation (recommended.)

ATTENTION: When installing the EBR Manager, do not


perform any other operation except for the inputs to be
provided to the Manager installation wizard.

To install EBR Manager Software package:


1. Insert the EBR Installation DVD into the DVD drive. The
AutoPlay dialog box appears.
2. Double-click Open Folder to view files.

NOTE:
If the AutoPlay dialog box does not appear, right-click
the DVD/CD drive and then select Open.
or
Open Windows Explorer, and then navigate to the DVD
drive.

43
Chapter 5 - Installing EBR manager

3. Right-click Setup.exe, and select Run as administrator from


the drop-down list.
The User Account Control dialogue box appears.
4. Click Yes.
The Honeywell Experion Backup and Restore window
appears.
5. Click Next.
The License Agreement dialog box appears.
6. Read the license agreement, select I accept the terms in the
License agreement, and click Next.
The License Information dialog box appears.

7. Type the system number in in the System Number field.

44
Chapter 5 - Installing EBR manager

8. Type authorization number in the Authorization Number


Field.

NOTE: The System Number and Authorization Number


are available from the License Authorization of
Honeywell. This information determines which
software packages you are authorized to install.

9. Click Next.
The Features and Options Selection dialogue box appears.

10. Select Acronis Cyber Protect 15 and EBR Scripts, and click
Next.
The Summary dialog box appears.

ATTENTION:
EBR Scripts are applicable to Server nodes.
If Workstation/Servers added as per section “EBR
Scripts” EBR Scripts will not get . In such cases, install
the EBR Scripts per above procedure.
EBR scripts cannot be run as part of the backup policy
of a virtual machine. We recommend creating a
scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
protection (backup) of the virtual machine. Applicable
for Experion Server only.

11. Click Install.


The wizard installs Acronis Cyber Protect 15 page appears.

45
Chapter 5 - Installing EBR manager

NOTE: The check box on left hand column displays the


status of completion after each component
installation.

12. As the installation progresses, the ACRONIS SOFTWARE


LICENSE AGREEMENT dialogue box appears.
13. Select I accept the terms of this license agreement check
box.
14. Click Proceed. The following window appears.

46
Chapter 5 - Installing EBR manager

15. Click Customize Installation settings to customize the


settings.
The Installation settings window appears.
16. Click Change next to What to Install.
The What to install window appears.
17. By default, the following options are selected:
l Management Server
l Components for Remote Installation

l Agent for Windows

l Agent for VMware (windows)

l Command-Line Tool

l Cyber Protect Monitor

Select the below listed options as per your requirement.


Agent for VMware (Virtual Appliance)

18. Click Done.


The Installation settings window appears.
19. Click Specify next to vCenter Server or ESXi host and log in
using the credentials that were created for EBR in domain
environment. For example, domain\user.

47
Chapter 5 - Installing EBR manager

20. Click Done.


21. After the wizard installs Acronis Protect, click Close.

22. The Status Display window appears.


After the wizard installs EBR Scripts, click OK.
This completes the EBR Manager installation. An Acronis
Cyber Protect shortcut will be created on the desktop.

23. Double - click on the Acronis Cyber Protect (Secure


connection) shortcut. It redirects you to the login page.

48
Chapter 5 - Installing EBR manager

24. Click SIGN IN and then enter username and password.

Adding Licenses to EBR Manager


1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. At the left pane of the Acronis Protect home page, click
Settings > Licenses.
The Licenses page appears.
4. Navigate to the EBR_License.txt file in the EBR License
folder.
5. Open the EBR_License.txt file in the EBR License folder of
the EBR Installation DVD.
6. Copy the required server/workstation key from the keys list.
7. Click Add keys tab on the Licenses page.
8. Paste the copied license key.
9. Click Add, and then Done.

Adding Users to EBR Manager


1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand SETTINGS, and then click Account.

49
Chapter 5 - Installing EBR manager

3. Click Add account.

4. The Add account pane appears.


5. In the Add account pane, click the drop-down menu and
choose domain name or system name (for workgroup).

6. Enter Username that needs to be added, and then click


search.
7. Select the user and role for that user.
8. Click Done.

50
CHAPTER

6 INSTALLING EBR AGENTS IN PHYSICAL


ENVIRONMENT

EBR agents can be installed in two ways:


n Installing EBR agents manually.
n Installing through EBR manager (if user adds physical
machine through EBR manager, it pushes EBR agent to the
machine automatically), refer to section “Adding computers
to the management server”.

NOTE: If you are using All-In-One appliance, you need to


follow option 1 (installing EBR agent manually for physical
platforms).

In this section:

Installing EBR agents manually 52


EBR scripts 56

51
Chapter 6 - Installing EBR agents in physical environment

Installing EBR agents manually


1. Open Windows Explorer, and then navigate to the EBR DVD
drive.

2. Right-click Setup.exe, and select Run as administrator from


the drop-down list. The User Account Control dialog box
appears.

3. Click Yes.
The Honeywell Experion Backup and Restore window
appears.
4. Click Next.
The License Agreement dialog box appears.

52
Chapter 6 - Installing EBR agents in physical environment

5. Read the license agreement, select I accept the terms in the


License agreement, and click Next.
The License Information dialog box appears.

6. Type the system numberin in the System Number field.


7. Type authorization number in the Authorization Field.

NOTE: The System Number and Authorization Number


are available from the License Authorization of
Honeywell. This information determines which
software packages you are authorized to install.

8. Click Next.
The Features and Options Selection dialogue box appears.

53
Chapter 6 - Installing EBR agents in physical environment

9. Select Acronis Cyber Protect 15 and EBR Scripts, and click


Next.
The Summary dialog box appears.

ATTENTION:
EBR Scripts are applicable to Server nodes.
If Workstation/Servers added as per section “EBR
Scripts” EBR Scripts will not get . In such cases, install
the EBR Scripts per above procedure.
EBR scripts cannot be run as part of the backup policy
of a virtual machine. We recommend creating a
scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
protection (backup) of the virtual machine. Applicable
for Experion Server only.

10. Click Install.


The wizard installs Acronis Cyber Protect 15.

54
Chapter 6 - Installing EBR agents in physical environment

NOTE: The check box on left hand column displays the


status of completion after each component
installation.

11. As the installation progresses, the ACRONIS SOFTWARE


LICENSE AGREEMENT dialogue box appears.
12. Select I accept the terms of this license agreement check
box.
13. Click Proceed.
14. Select Install a protection agent and enter IP address of
previously installed Management server.

55
Chapter 6 - Installing EBR agents in physical environment

15. Click Install.

16. After the wizard installs Acronis Protect, click Close.


17. The Status Display window appears.
After the wizard installs EBR Scripts, click OK.
This completes the EBR Manager installation.

EBR scripts
Installing EBR scripts

1. Insert the EBR Installation DVD into the DVD drive. The
AutoPlay dialog box appears.
2. Double-click Open Folder to view files.

NOTE:
If the AutoPlay dialog box does not appear, right-click
the DVD drive and then select Open.
Or
Open Windows Explorer, and then navigate to the DVD
drive.

56
Chapter 6 - Installing EBR agents in physical environment

3. Right-click Setup.exe, and select Run as administrator from


the drop-down list. The User Account Control dialogue box
appears.
4. Click Yes.
The Honeywell Experion Backup and Restore window
appears.
5. Click Next.
The License Agreement dialog box appears.
6. Read the license agreement, select I accept the terms in the
License agreement, and click Next. The License Information
dialog box appears.

7. Type the system numberin in the System Number field.


8. Type authorization number in the Authorization Field.

NOTE: The System Number and Authorization Number


are available from the License Authorization of

57
Chapter 6 - Installing EBR agents in physical environment

Honeywell. This information determines which


software packages you are authorized to install.

9. Click Next.
The Features and Options Selection dialogue box appears.

10. Select EBR Scripts and click Next.


The Summary dialogue box appears.
11. Click Install and then once the installation is completed,
click OK.

ATTENTION:
EBR Scripts are applicable to Server nodes.
EBR scripts cannot be run as part of the backup policy of a
virtual machine. We recommend creating a scheduled task
in Windows to run the EBR script locally on the virtual
machine prior to the actual EBR backup of the virtual
machine. Applicable for Experion Server only.

58
CHAPTER

7 ADDING COMPUTERS TO THE


MANAGEMENT SERVER

Adding computers to the management server requires you to


connect the management console to the management server.

In this section:

Adding Windows Server to the EBR Manager 60


Adding Windows Workstation to the EBR Manager 60
Adding VMware ESXi Virtual Machines to EBR Manager 62

59
Chapter 7 - Adding computers to the management server

Adding Windows Server to the EBR Manager


1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand DEVICES, and then click All Devices.
3. Click Add.

4. The Add Devices pane appears.


5. In the Add devices pane, under Servers click Windows.

6. Enter the following details:


a. In the IP address or name field, enter the machine IP
address or the machine name.
b. Enter the username and password in the respective fields.
7. Click Install.
8. After the installation the server appears in the All Devices
page.

Adding Windows Workstation to the EBR


Manager
1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand DEVICES, and then click All Devices

60
Chapter 7 - Adding computers to the management server

3. Click Add.
4. The Add Devices pane appears.
5. In the Add devices pane, under WORKSTATIONS click
Windows.

6. Enter the following details:


a. In the IP address or name box type the machine IP
address or the machine name.
b. In the Username box, type the username the to connect
to the machine.
c. In the Password box type the password to connect to the
machine.
7. Click Install.
8. After installation the workstation appears in the All Devices
page.

ATTENTION: Refer to the Setting up EBR in a virtual


environment section, before you perform the steps given in
the Adding VMware ESXi virtual machines to EBR Manager
section.

ATTENTION:
If user adds a machine (workgroup) that is not a member of
an Active Directory domain and EBR Manager is in domain,
User Account Control (UAC) must be disabled. To disable
UAC, do one of the following depending on the operating
system:

61
Chapter 7 - Adding computers to the management server

l In any Windows operating system:


1. Open Registry Editor.
2. Locate the following registry key: HKEY_LOCAL_
MACHINE\Software\Microsoft\Windows\CurrentVe
rsion\Policies\System
3. For the EnableLUA value, change the setting to 0.
4. Restart the system.

Adding VMware ESXi Virtual Machines to EBR


Manager
1. Login to the home page of Acronis Cyber Protect 15.
2. In the left pane expand DEVICES, and then click All Devices.
3. Click Add.

4. The Add devices pane appears.

5. In the Add devices pane, under the VIRTUALIZATION HOSTS


section, click VMware ESXi.

62
Chapter 7 - Adding computers to the management server

6. The VMware ESXi pane appears.


7. Click Deploy as a virtual appliance to each host of a vCente.
The Add VMWare ESXi virtual machines window appears.
8. Enter the following details:
a. In the IP address or name box, type the machine IP
address or the machine name.
b. In the Username box, type the username used to connect
to the virtual machine.
c. In the Password box type the password to connect to the
virtual machine.
9. Click the drop-down menu and choose the management
server that is used to access the server.
10. Click Settings.

Deploy virtual appliances to ESXI hosts screen appears.


11. Ensure that the Deploy a virtual appliance options set to
Yes.
12. The Virtual appliance name, Data source, and Resource
fields are automatically populated.

63
Chapter 7 - Adding computers to the management server

13. Click the Network drop-down menu, and then select VM


Network.
14. Ensure that the Obtain settings from DHCP server check
box is not selected.

15. Enter the following details:


a. IP address
b. Subnet mask
c. Default gateway
d. DNS Servers
e. DNS suffix
f. WNS servers
16. Click Deploy.

NOTE:
Please follow the below mentioned steps for synchronizing
the time externally:
1. Open the Acronis Virtual Appliance Graphical User
Interface, scroll down to the time zone and change the
time zone to some different time zone.
2. Reboot the Virtual Appliance, scroll down to the time
zone, and then change the time zone to the correct time
zone.
3. Reboot the Virtual Appliance again, press Ctrl+Alt+F2 this
will direct you to the Appliance Shell.
4. Run the command date and verify if the Graphical User
Interface time correlates with Shell time.

NOTE: Please ensure that the both shell timing and


server timings are synchronized.

64
CHAPTER

8 SETTING UP EBR IN A VIRTUAL


ENVIRONMENT

In EBR R520, Management Server, a machine is considered


virtual if it can be backed up from the virtualization host
without installing an agent on the machine. Such machine
appears in the Virtual machines section.
See the EBR SCN for VMware vSphere versions supported by
EBR R520.

In this section:

Virtual appliance 66
Getting started 66
Deploying Agent for ESX(i) from EBR R520 Manager 68
Applying license to the virtual appliance 68
Configuring bindings 68
Removing agent for ESX(i) from EBR manager 69

65
Chapter 8 - Setting up EBR in a virtual environment

Virtual appliance
Acronis Cyber Protect 15 enables protection (backup) and
recovery of ESX(i) virtual machines without installing the
agents into the guest systems. This backup method is known as
agent-less backup.
Agent for VMware vSphere ESX(i) (Virtual Appliance) can be
imported or deployed to a VMware ESX(i) host.

NOTE: Backup of ESXi configuration is not supported with


EBR.

ATTENTION:
It is recommended to deploy the EBR Appliance to the
vCenter Server instead of an individual host. In this
configuration, the appliance aware of the entire virtual
machine inventory of the vCenter instead of an isolated
view of the virtual machines running on a specific host.
Each EBR Virtual Appliance must be assigned to only one
vCenter Server, and if more than one vCenter Server exists
in a system, deploy at least one EBR Virtual Appliance to
each vCenter Server instance.
Each EBR Virtual Appliance can perform 10 concurrent
backups, and backups beyond this are held in a queue.
Once the first 10 backup jobs completes, the next job in the
queue starts. However, we recommend to stagger start
times so that only one node is backed up at a time (to
minimize loading on the network). The ability to manage
and queue multiple concurrent backups means that a
vCenter Server will generally only require one EBR Virtual
Appliance, each configured with quantity 2 virtual CPU and
8 GB memory. It is not recommended to exceed more than
10 EBR Virtual Appliances per vCenter Server instance.

Getting started
Prior to taking protection (backup) of virtual machines, you
must do the following:
1. Install latest VMware Tools on every virtual machine to be
backed up

66
Chapter 8 - Setting up EBR in a virtual environment

2. Configure Network router


3. Prepare list of free IP addresses available for each host. This
is required to allocate an IP address from management
network subnet to agents for each ESX(i) host.
4. Collect user credentials for vCenter and ESX(i) Hosts
Network router configuration

The router or a similar network device must not block traffic


from the management server through the device.
Recommended ACLs to be set on the management interface of
the gateway router in the outbound direction are as follows:
n 443
n 902
n 9876

ATTENTION:
Best Practices.
https://www.process.honeywell.com/library/support/Docu
ments/Trusted/Experion/NetworkRouterConfigurationBP.p
df
For assistance related to network router configuration,
contact your System Administrator.
Contact your Network Administrator to ensure that the
changes are implemented if ACLs are being applied to the
router.

Preparing the list of free IP addresses for agent for ESX(i) host

The agent for ESX(i) host uses an IP. Before deploying the
appliance ensure there are free IPs on the management
network subnet. Make a list of free IP addresses for each ESX(i)
host.
For Example:

IP Address of the
ESXi Host Virtual Appliance Name
Virtual Appliance
Experion AcronisVirtualApplianceES1 10.1.21.222
Server ESXi

67
Chapter 8 - Setting up EBR in a virtual environment

ATTENTION: You can prepare a table for your site as shown


in the above example.

Administrator credentials for vCenter and ESX(i) Hosts


You should know the administrator credentials for vCenter and
ESX(i) Hosts.

Deploying Agent for ESX(i) from EBR R520


Manager
Adding VMware ESX(i) virtual machines to the EBR Manager
automatically deploys Virtual Appliance to each host of
VCenter. Refer to Section Adding VMware ESXi virtual machines
to EBR Manager for more details.

Applying license to the virtual appliance


Licenses are assigned automatically to the virtual appliances
by the license server. If this does not happen, see security.
1. Log On to the EBR Manager node.
2. On the Acronis Cyber Protect 15 home page, click Settings.
3. Select Licenses under Settings which displays the available
licenses and the machines they are assigned to.
4. Click Assign.
5. The software displays the machines that the selected key to
be assigned.
6. Select the machine, and then click Done.

Configuring bindings
In cases where less Agents have been deployed than there are
hosts or where more granular control of Agent to VM workloads
is desired Agent bindings can be customized.

68
Chapter 8 - Setting up EBR in a virtual environment

ATTENTION: If the number of VMS are considerably more,


then this binding concept will help to balance the load
between the virtual appliances.

Removing agent for ESX(i) from EBR manager


To remove Agent for ESX(i) from EBR manager:
1. Connect to the EBR Manager.
2. In the home page, click All Devices. The All Devices page
appears.
3. Under Devices, click Machines with agents.
The Machines with Agents window appears.
4. From the list choose the virtual appliances that you want to
remove.
The options window pane for the selected Virtual Appliance
appears.
5. From the right pane click Delete.
The Delete Machine window appears.

6. Click Delete to remove the ESX(i) host from the EBR


Manager.

69
CHAPTER

9 PROTECTION PLANNING

In this section:

Protection considerations 71
Deduplication 77
Backup recommendations 78
Protection (Backup) types 80
Protection (Backup) schemes 81
Scheduling backups 82
Default Backup settings 83
Retention rules 86
Setting up a storage node 87
Backup replication 94

70
Chapter 9 - Protection planning

Protection considerations
When developing a protection plan, consider the following:
n What are the prerequisites (if any) before protections
(backups) are started?
n Which system nodes and data repositories are backed
up?
n Are the protections (backups) hourly, daily, weekly, or
monthly? What time of the day, is the protection
(backup) performed?
n What type of protection (backup) is required for each
node—full, incremental, or differential?
n How are the protections (backups) tracked when
developing the protection plan?
n Where are the protections (backups) stored?
n Are the protections (backups) performed correctly?
n How can the protection (backup) plan effectively
manage the following unexpected events?
− Natural events: Fire, flood, earthquake, storms, and
extreme weather conditions.
− Technological events: Hardware, software, power
failure, virus, and service denial.
− Human events: Judgment error, theft, vandalism,
misconduct, and security breach.
Preventing data loss

One method of preventing data loss due to unexpected events


is to perform regularly scheduled system protections. You must
analyze the importance of your data and systems and ensure
that an appropriate protection (backup) plan is established and
performed regularly.
You can monitor system usage and other controls to check the
load on system resources such as hard disks and networks.
This enables you to perform needed upgrades and preventive
scheduled maintenance before a hardware or software failure
occurs.

71
Chapter 9 - Protection planning

The integrity of your data and systems must be maintained by


regularly running virus scans to ensure your systems are not
infected.

NOTE: Honeywell recommends adhering to the Acronis 3-


2-1 backup rule by maintaining three copies of your data:
one primary copy in production and two backups on
different types of storage media. One of these backup
copies should be stored offsite in protected storage that
cannot be deleted.

Prerequisites for a backup

You must know the nodes and node types in your system to
determine the following:
n Which nodes are backed up?
n Which drives in each node are backed up?
n Which server is used as the archive for the backup?
Centralized backup management

Administrative activities include creating and scheduling


protection (backup) jobs, monitoring the progress and results
of those jobs through logs and event notifications, and
controlling the protection (backup) jobs. You can accomplish
these activities using the Management Console to manage
locally, centrally, or remotely.
File naming guidelines

Be consistent with naming backup files. In addition, the names


must be clear and meaningful. This makes the task of restoring
data easier. For example, for a node named “ESVR_1,” a good
backup filename would be “ESVR_1_C” rather than “C_Drive.”
This provides proper identification of the backup file when you
copy or export the file to another location.
Backup after Windows Update

It is recommended to protect (backup) the machine prior to and


after loading Windows updates to the system.

72
Chapter 9 - Protection planning

Staggering start times

When scheduling protection (backup) jobs for multiple nodes,


stagger start times (recommended) so that only one node is
backed up at a time (to minimize loading on the network).
Adding Storage Nodes

A storage node is a server designed to optimize the usage of


various resources (such as the corporate storage capacity, the
network bandwidth, and the production servers' CPU load) that
are required to protect enterprise data. This goal is achieved by
organizing and managing the locations that serve as dedicated
storages of the enterprise backups.

ATTENTION: Storage nodes need to be manually added.


Please refer section Installing the EBR Manager Software
package. Follow the steps until step 18 and select Storage
Node. Then, add the storage node as explained in the steps
below. Then, follow through until the last step, step 24, in
4.3: Installing the EBR Manager Software package.

1. Select the check boxes Storage Nodes and Agent for


Windows.

2. Click Done.
3. Select Acronis Cyber Protect Management Server.

73
Chapter 9 - Protection planning

4. Enter Server name or IP address. Enter account details.


5. Click Done

Storing Backups

ATTENTION:
Do not use the local hard disk of the node being backed up
to store backup images. If the hard disk becomes full, it can
impede the node’s performance.
Do not use the shared storage of Honeywell Premium
Platform for Virtualization for storing backups.

Typically, a Target Node does not contain sufficient space to


store all backups. Storing a backup on a Target Node may
degrade the performance of the node. In addition, if the hard
disk drive in the Target Node fails, all backups are lost.
For security purposes, the server that stores the backups must
be located in the most physically secure location.
The number of nodes in your system determines the number of
servers required.
The primary guideline is that each full backup requires about
half the amount of space as the hard disk being backed up.

74
Chapter 9 - Protection planning

Offsite storage

The frequencies of the backups are determined by the


importance of the data and systems. Any mission-critical
systems or data (those that must be recovered within minutes
or hours of the system failure) must be backed up and taken
offsite at least daily. The location you choose is important. The
backups must not only be safe and secure, but must be easily
accessible in the event of a disaster.
It is recommended that you transfer backup images onto a DVD
or tape (a CD may not contain sufficient capacity) on a
regularly-scheduled basis. You can store the media offsite in a
secure temperature-controlled environment for long-term
storage. In addition, you can define the protection (backup)
retention rules for the media.
EBR also offers the ability to Export —copying backup images
from one location to another.

Backup/restore speed

Both the backup and restore procedures transfer data at a rate


of 1Gigabit per minute to a network drive (based on the
uncompressed disk space in use). Backup to a USB hard disk
mounted locally has similar performance. However, the
recovery time is nearly twice as fast.
Network speed depends on:
Network destination: Device type (NAS), network bandwidth
(1GB or bonded with 2GB) and the source or traffic that is
traversing a router. For example: If the source is a 100Mb
physical machine, it would be slower than a 1GB virtual
machine backup from a host.
Network throttling setting: A setting that limits available
bandwidth utilization.
For older platforms, the transfer rate may be 0.5 Gigabits per
minute to a network drive.
Scanning a hard disk with anti-virus software may require up to
75 percent longer time to complete if performed concurrently
with a backup job.

75
Chapter 9 - Protection planning

In each of these cases, the impact on the time required for the
backup is less than 10 percent.

NOTE: The approximate data provided is valid in ideal


conditions.

Rebuilding or restoring data

Do not rebuild or restore a database at the same time that a


backup is being performed. Database corruption can occur
when the node is low on hard disk space and you are
performing a database rebuild when a backup is in progress.
Running disk I/O intensive applications

Running disk I/O intensive applications at the same time a


backup is being performed can cause a significant
performance impact on the time required to complete the
backup and/or to complete the other application. It is best to
avoid using these applications at the same time.
Controller checkpointing should not be performed when an
EBR backup job is running.
Running disk defragmentation software

Do not run disk defragmentation software when a backup is in


progress. It causes the backup image to be invalid and you are
not allowed to restore the hard drive. In addition, do not run any
partitioning software at the same time when a backup is being
performed.
Running general applications

Some general applications must be disabled when a backup is


in progress. For example, ScanDisk, as this is a disk intensive
activity. In addition, you must avoid Honeywell specific actions
such as Experion Server synchronization, archiving/restoring
to/from a tape, and file transfer to/from the LCN.
Virtual Machines with snapshots

VMs with snapshots will have performance issues, which could


cause Experion server issues. We do not recommend running
ON process VMs with snapshots. Also, snapshots should not

76
Chapter 9 - Protection planning

last more than 48 hours, due to the performance issues to the


machine.
Data compression

Using data compression, you can save recovery points in a


smaller size file.

TIP: It is recommended that you use the Normal option


for data compression, as it provides the best overall
performance results.

EBR R520 provides the following compression options:


Normal – Honeywell recommends this option.
None – Data is copied as is without any compression.
High – The backup size is typically less than a normal
compression.
Maximum – Compresses the Data to the maximum possible
level and takes the maximum duration to complete the backup.
Using routers

Although you can backup a device through a router, this could


affect the routed traffic. It is recommended that you check with
the local IT department regarding any possible impact on
traffic. Where possible, it is recommended that the backup
images be stored on a device that is on the same LAN segment
as the Target Nodes.

Deduplication
Deduplication is the process of minimizing storage space taken
by the backed-up data by detecting backup data repetition and
storing identical backup data only once. Acronis deduplicates
backups saved to a managed vault if you enable deduplication
during the vault creation. A vault where deduplication is
enabled is called a deduplicating vault.

77
Chapter 9 - Protection planning

ATTENTION:
The storage node component must be installed for using
deduplication.
Deduplication is possible only when the backup is stored to
a managed vault.

The most important factors that influence deduplication speed


are:
n The speed of access to the deduplication database
n The RAM capacity of the storage node
n The number of deduplicating locations created on the
storage node.

NOTE: For more information about Deduplication see,


chapter Deduplication best practices in the Acronis Cyber
Protect 15 User’s Guide.

Backup recommendations
Changing Drive letter for system reserved partition

1. Click This Pc.


l The This PC windowappearsdisplaying System reserved
partition with a drive letter assigned to it.

2. Right-click Start > Disk Management.


l The Disk Management window appears.

78
Chapter 9 - Protection planning

3. Right-click the System Reserved drive and then click


Change Drive Letter and Paths.
The Change Drive Letter and Paths for System Reserved
dialog box appears.

4. Click Remove to remove the Drive letter of the System


Reserved drive.
A confirmation message appears.
5. Click Yes.
The following warning message appears.

79
Chapter 9 - Protection planning

6. Click Yes.
The Drive Letter is removed from the System Reserved
partition of the Disk Management window.
Experion Servers

n Full backups run weekly.


n Incremental backups run every 8 hours.
Experion Stations, Console Extension Stations, Flex Stations, TPS Stations

n Full backups run weekly


ACE-T, SIM-ACE-T, and SIM-C200 nodes

n Full backups run weekly.


n Incremental backups run every shift change.

ATTENTION: Do not schedule backup from 0:00 to 2:00 AM,


as Experion default queries are launched at that time.

Protection (Backup) types


With EBR R520, three types of protections (backups) are
available:
l Full Backup: A self-sufficient backup containing all data
chosen for protection (backup). You do not need access to
any other backup to recover the data from a full backup.
l Incremental Backup: A backup that stores changes to the
data against the latest protection (backup). You need access

80
Chapter 9 - Protection planning

to other backups from the same archive to recover data from


an incremental backup.
l Differential Backup: A differential backup stores changes to
the data against the latest full backup. You need access to
the corresponding full backup to recover the data from a
differential backup.

Protection (Backup) schemes


When creating a protection (backup) plan, the following
protection (backup) schemes are available:
n Always incremental (Single – File)
Under this protection (backup) scheme, incremental
backups can be scheduled on Monthly, Weekly, Daily, or
Hourly basis.
1. The Monthly option has sub provisions to schedule the
backups by Days of Month or Days of Week.
2. The Weekly option allows the user to schedule backups
for Days of Week.
3. The Daily option allows the user to schedule the backups
to Run Every Day or to Run Monday to Friday.
4. The Hourly option allows user to schedule the backups to
run on hourly basis or within the specified time.

NOTE: The user can select the date range to run the
protection (backup) plan based on requirement

n Always full
n Same as Always incremental (Single – File), this protection
(backup) scheme too can be scheduled on Monthly, Weekly,
Daily, or Hourly basis, but for full backups.
1. The Monthly option has sub provisions to schedule the
backups by Days of Month or Days of Week.
2. The Weekly option allows the user to schedule backups
for Days of Week.
3. The Daily option allows the user to schedule the backups
to Run Every Day or to Run Monday to Friday.

81
Chapter 9 - Protection planning

4. The Hourly option allows user to schedule the backups to


run on hourly basis or within the specified time.

NOTE: The user can select the date range to run the
protection (backup) plan based on requirement.

n Weekly full, Daily incremental


This protection (backup) scheme provides provision for the
user to schedule full backups on weekly basis and
incremental backups on daily basis.

NOTE: The user can select the date range to run the
protection (backup) plan based on requirement.

Custom
This protection (backup) scheme provides provision for the user
to schedule full, differential, and incremental backups on
Monthly, Weekly, Daily, or Hourly basis based on requirement.
The user can add multiple schedules under each protection
(backup) types.

Scheduling backups
You can set a schedule for backup tasks. This helps in running
the backup tasks systematically.
The scheduler uses the local time of that particular computer in
which the protection (backup) plan exists.
Scheduling considerations

ATTENTION:
When scheduling backup jobs for multiple nodes,
Honeywell recommends backing up only one node at a time
by staggering the start times.
It is better to schedule backup operations on a
predetermined time slot to avoid any inconvenience or
interruption.

82
Chapter 9 - Protection planning

Scheduling the frequency of backups depends on the following


factors:
n Rate of data change (configured data)
n Database availability
n Value of the data to the company

Default Backup settings


Each Acronis agent has default backup options. The default
options have pre-defined values. When creating a protection
(backup) plan, you can use a default option, or use a custom
value applicable to that particular plan.
In addition, you can customize a default option by changing the
default values. The new value is used by default for all the
protection (backup) plans that are created on that computer.
To view and change default backup options:

1. Log on to the EBR Manager node.


2. Launch Acronis Cyber Protect 15.
3. In the left pane, expand SETTINGS, and then click System
Settings.
4. For more information on the backup options, refer to the
Default backup options table below.

NOTE: For more information about connecting to the


management server, see Adding computers to the
management server.

83
Chapter 9 - Protection planning

Default backup options

Available default backup options for EBR R520 and Honeywell


recommendations for these options are listed in the following
table:

Default setting Honeywell


Default backup option
(Preset) recommendation
Alerts No Select if required

Yes No
Changed Block Tracking
(CBT)

Compression Level Normal Normal

Email Notifications No No

Error Handling Yes Yes

Fast Yes Yes


Incremental/differential
backup

Automatic Automatic selection


selection
File filters

File - level backup Automatic Automatic selection


snapshot selection

File - level security Automatic Automatic selection


selection

LVM snapshotting Automatic Automatic selection


selection

84
Chapter 9 - Protection planning

Default setting Honeywell


Default backup option
(Preset) recommendation

Log truncation Yes Yes

Mount points No No

Multi-volume snapshot Yes Yes

No Select if required
Performance and backup
window

No Select if required
Pre-post commands

No Select if required
Pre-post data capture
commands

Scheduling Automatic Automatic selection


selection

No No
Sector-by-sector backup

Splitting Automatic Automatic selection


selection

Tape Management Automatic Automatic selection


selection

Task failure handling No No

Task start conditions Automatic Automatic selection


selection

Volume Shadow Copy Yes Yes


Service (VSS)

85
Chapter 9 - Protection planning

Default setting Honeywell


Default backup option
(Preset) recommendation
Yes No
Volume Shadow Copy
Service (VSS) for virtual
machines

Weekly backup Automatic Select if required


selection

Windows event log No No

ATTENTION:
For more information about Backup options see, chapter
Backup in the Acronis® Cyber Protect 15 User’s Guide.
For Tape Management settings see section Tape
Management in the Acronis® Cyber Protect 15 User’s
Guide.
Due to the wide range of tape options that exist on the
market, Honeywell is unable to provide technical support
for using tape drives in conjunction with Experion Backup
and Restore. All references are provided for informational
purposes only. Honeywell customers should contact the
tape drive manufacturer for all technical support required
for the use of this interface.
For Configuring EBR Backups without VSS for Experion
nodes, refer HPS Technical Support, Article No. 89808.

Retention rules
With EBR R520, you can set two types of retention rules for
your protection (backup) archives. They are based on:
a. Click on HOW LONG TO KEEP in the protection plan pane to
open the Cleanup pane where the following options can be

86
Chapter 9 - Protection planning

selected as per user requirement.

Cleanup by Backup age.


Under this option, the Monthly, Weekly & Daily backups
retention time can be individually selected based on user
requirement.

Cleanup by number of backups


Under this option, backups can be set to retain till it reaches
the desired maximum number configured here based on user
requirement.

Keep backups indefinitely


By selecting this option, the backups will be retained for an
indefinite time.
b. Switch to single rule for all backup sets option available at
the bottom of the cleanup pane provides provision for the
user to create single rule for all backup sets by setting the
number of hours, days, weeks, months, or years to retain the
backup files.
c. Click Done.

NOTE: Honeywell recommends maintaining backups to


cover at least six months of data. It may be necessary to
have multiple options for recovery points in the event more
recent backups are not usable.

Setting up a storage node


Adding a Managed Location

1. Log on to the EBR Manager node.


2. Launch Acronis Cyber Protect 15
3. In the left pane, click BACKUP STORAGE
It is recommended to always add location
(managed/Unmanaged) via clicking Backup Storage>Add
location on the left panel of home page.

87
Chapter 9 - Protection planning

4. Click Add location.

The Specify folder page appears.


5. Click Storage Node.

The Location managed by storage node page appears.


6. In the Name box, enter the applicable name.
7. In the Path box, enter the respective path or click Browse
and locate the applicable folder.

88
Chapter 9 - Protection planning

8. Click Done.

ATTENTION: There is no limitation for Acronis Storage


Nodes that can be registered on Acronis Management
Server. Regarding the vaults - the non-deduplication
vaults must not affect the Acronis Storage Node
performance but for the vault with deduplication - we
recommend to use one vault per Acronis Storage
Node.

To protect the location with encryption

1. Log on to the EBR Manager node.


2. Launch Acronis Cyber Protect 15
3. In the left pane, under All Devices click Devices.

The All Devices page appears.


4. Select the respective machine that needs to be encrypted.

89
Chapter 9 - Protection planning

5. Click Protect.

The New Protection plan page appears.


6. Turn on the Encryption.

The Encryption page appears.


7. Create a Password and confirm the password and choose
the Encryption algorithm. The default algorithm is AES256.

8. Click OK.

NOTE:
l Make sure Active Protection and Vulnerability

assessment under Protection plan is turned off.

90
Chapter 9 - Protection planning

l Acronis Active Protection Service and Acronis Cyber


Protection Service need to be Disabled in agent
machines. Reboot machine once with both services
are disabled, so they are also stopped and not
working.

l Windows GUI may not allow you to disable services.


These could still be disabled in registry as follows:
l Open regedit.exe from Windows search or
command prompt with administrative privilege
l Navigate to both keys shown below and set Start
value to 4 under both of them
l HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Servic
es \AcronisActiveProtectionService
l HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Servic
es \AcronisCyberProtectionService
l Reboot node
Disabling Acronis Active Protection and Cyber
Protection services is expected to cause alerts
about Cyber Protection / Active Protection
services on Acronis dashboard. These are safe to
ignore / clear.
Customers could follow Acronis article ( link ) to
change priority or disable alerts for

91
Chapter 9 - Protection planning

l Active Protection Service Not Available


l Active Protection Service Not Running

Deduplication
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. In the left pane, click BACKUP STORAGE, and then click Add
location.

NOTE: It is recommended to always add location (managed /


unmanaged) via clicking BACKUP STORAGE>Add location on
the left panel of home page.

4. The Add location page appears.

92
Chapter 9 - Protection planning

5. Click Storage Node

The Location Managed by Storage Node page appears.


6. In the Name box, type name for the storage node.
7. Click the Address drop-down arrow and choose the address.
8. Under Path click Browse and choose the storage path.
9. Under Deduplication database path click Browse and choose the
database path.
10. Click Deduplication button to ON. By default, this option will be in
OFF stage.

ATTENTION:
l Only if deduplication is enabled specify or change the

Deduplication database path field value.


l This must be a folder on a hard drive local to the storage

node. To improve the system performance, we recommend

93
Chapter 9 - Protection planning

that you create the deduplication database and the


managed location on different disks.

11. Click Done.

Backup replication
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. Click Create plan.

4. The Create plan page appears.


5. Enter the following details:
a. Specify the AGENT.
b. Specify the DESTINATION.
c. Click How to Replace drop-down arrow and choose the desired
option.

6. Click CREATE.

94
CHAPTER

10 BACKUPS ON A PHYSICAL NODE

In this section:

Getting started 96
Creating a protection (backup) plan for a physical node 99
Running protection (backup) job manually 100
Editing protection (backup) jobs 100
Deleting protection (backup) plans/jobs 101
Backup in a recovery environment 102

95
Chapter 10 - Backups on a physical node

Getting started
Sample backup configuration form Table is a sample backup
configuration form that you can create as a spreadsheet to
simplify backup scheduling by having all the data in one place.
After entering the data, you can use the spreadsheet data to
configure backups for each node.
Table 1. Sample backup configuration form

Configuration Node Node


Range/Options/Notes
Information A B
Node Number

Node Name

Node Type

Hardware Platform
(optional)

Drives to be backed up

General backup
information:

• Network file name Name of backup file

• Network folder name


of backup

MAC Address

IP Addresses:

• Node (Yellow FTE)

• Default Gateway

• File Server

• Access credentials for


Vault

Scheduling backups l Once


(Full or Base with l Weekly
incrementals):
l Monthly
l No schedule

96
Chapter 10 - Backups on a physical node

.Sample backup configuration form Table is a sample backup


configuration form that you can create as a spreadsheet to
simplify backup scheduling by having all the data in one place.
After entering the data, you can use the spreadsheet data to
configure bac.

Configuration Node Node


Range/Options/Notes
Information A B
• Weekly:

− Day of the week Sun, Mon, Tue, Wed, Thu, Fri,


Sat

− Start time Hours: Minutes AM/PM

− First backup of Hours: Minutes AM/PM


each day

− Last backup of Hours: Minutes AM/PM


each day

• Monthly:

− Day of the 1–31


month

− Start time Hours: Minutes AM/PM

− Number of 1–8
hours between
incrementals

Data l Normal (recommended)


compression: l High
l Maximum
l None

Validate backup Not recommended.


after creation Verification doubles the time
to finish a backup.

Configuration Node Node


Range/Options/Notes
Information A B
• File descriptor

97
Chapter 10 - Backups on a physical node

Configuration Node Node


Range/Options/Notes
Information A B
(For each node
backup)

• File size • Blu-ray Disc • Tape:

Limit number of 5 backups maximum per


backups for each week are recommended.
hard disk
1 backup at month-end is
recommended.

User credentials for backup plan and vault


You must know the credentials of the EBR User Account and
the credentials for the Vault before creating a protection
(backup) plan.

98
Chapter 10 - Backups on a physical node

Creating a protection (backup) plan for a


physical node
To create a protection (backup) plan for a physical machine
1. From the Home page of Acronis Cyber Protect 15, click ADD
option to add the required physical node to the All devices
list by specifying the respective machine name or IP address
and entering the login credentials.
2. Select the required physical machine from the all devices
tab of the Acronis Cyber Protect 15 home page.
3. Select the option Protect from the right side menu of the
Acronis Cyber Protect 15 home page for the selected
physical node.
4. Use the Create Plan option to create a new protection
(backup) plan for the selected physical node and provide a
name for it by clicking the Edit icon.

ATTENTION:
While selecting the volumes to be backed up for nodes
loaded with Embedded Microsoft Windows 10 LTSC
Enterprise and Embedded Microsoft Windows Server
2019 Standard operating systems:
l Select the C drive (or other drive if CIP is used) as
well as the System Reserved partition (if present).
l If you used Custom Install Path for any software
installation, then select that drives as well.

5. Click What to protect (backup) to select entire machine or


disks / volumes.
l The Entire machine option is used to take the entire
machine protection (backup).

NOTE: The user can enable or disable the


application protection (backup) for selected entire
machine protection (backup) of the physical node.

99
Chapter 10 - Backups on a physical node

When the option disks / volumes is selected, the Items to


backup option is enabled .beneath where the user can
add rules and select what item to be backed up. Press OK.

ATTENTION: If your operating system and its loader


reside on different volumes, always include both the
volumes in the backup. Recover the volumes
together; otherwise there is a high risk of the
operating system failing to start.

Running protection (backup) job manually


Run a Protection (backup) job on demand. The Run option
allows you to run any protection (backup) job when required,
even if the protection (backup) job is scheduled.

1. Click Start > Acronis > Acronis Protection. The Acronis Protect
window appears.
2. Under Devices, select devices for protection.
3. Click Protection on right pane.
4. Select the Applied protection plan.
5. Click RUN NOW to start the protection.

Editing protection (backup) jobs


You can edit or modify the protection (backup) job settings. To
edit or modify protection (backup) job settings:

1. Log on to the EBR Manager node.


2. Launch Acronis Cyber Protect 15.
3. In the left pane, click PLANS.

100
Chapter 10 - Backups on a physical node

4. Under PLANS, click Protection.


5. The New protection plan page appears.
6. Review and change the required protection plan settings.
7. Click Save.

Deleting protection (backup) plans/jobs


Disabling a protection (backup) job locally using
Server/Desktop console:
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15.
3. In the left pane, click BACKUP STORAGE.

4. Select the plan that you want to delete.


The Remove from list pop-up appears.

101
Chapter 10 - Backups on a physical node

5. Click DELETE.

Backup in a recovery environment


To backup in a recovery environment:
1. Insert the EBR Recovery DVD into the DVD drive.

ATTENTION: Ensure that the computer starts from the


DVD drive.

2. Restart the computer using the EBR Recovery DVD.


3. After the computer hardware analysis is completed in the
EBR recovery environment, the computer restarts within 5–7
minutes.
The Starting Acronis Loader message appears, followed by
the Acronis Cyber Protect Bootable Agent Screen.

102
Chapter 10 - Backups on a physical node

Click Manage this machine locally.


4. The Network Settings dialog box appears. Enter the
appropriate network settings and then click OK.

5. The Acronis Bootable Agent dialog box appears. Click


Manage this machine locally.

103
Chapter 10 - Backups on a physical node

6. The Management console appears. On the home page,


under Actions, click Back up now. The Back up now page
appears.

104
Chapter 10 - Backups on a physical node

What to backup
1. Click Items to back up.

l The Data to Back Up dialog box appears.


l In the Data to back up list, select Disks/volumes or files

to back up.
2. Perform any one of the following, as necessary:
3. If you are selecting Disks/volumes, select the check box
corresponding to disk/volume you want to back up.

105
Chapter 10 - Backups on a physical node

4. If you are selecting files, select the location from the left
pane and then select the file folders from the right pane.
5. Click OK.

6. Click Location.

106
Chapter 10 - Backups on a physical node

The Location dialog box appears.


7. a. Select the Location from the left pane.
b. Provide a name for the new backup archive. Click OK.

107
Chapter 10 - Backups on a physical node

How to back up
1. In the Backup type list, select a suitable option.
Validation
1. In the Validation list, select a suitable option.
Parameters
1. Click Backup options to edit the default backup options.
The Options dialog box appears.

2. Select a suitable option and then click OK. The Back up now
page appears.
3. Click OK.

108
CHAPTER

11 PROTECTION(BACKUP) ON A VIRTUAL
NODE

In this section:

Getting started 110


Creating a protection (backup) plan for a virtual node 113
General recommendations 116

109
Chapter 11 - Protection(Backup) on a virtual node

Getting started
Prerequisite: You should have completed the procedures
mentioned in Chapter 8. Setting up EBR in a virtual
environment.
n Maintain a backup configuration form
Sample backup configuration form

Table 2 is a sample protection (backup) configuration form that


you can create as a spreadsheet to simplify backup scheduling
by having all the data in one place. After entering the data, you
can use the spreadsheet data to configure backups for each
node.

Configuration Node Node


Range/Options/Notes
Information A B
Node Number

Node Name

Node Type

Hardware Platform
(optional)

Drives to be backed up

General backup
information:

• Network file name Name of backup file

• Network folder name


of backup

110
Chapter 11 - Protection(Backup) on a virtual node

Configuration Node Node


Range/Options/Notes
Information A B
MAC Address

IP Addresses:

• Node (Yellow FTE)

• Default Gateway

• File Server

Access credentials
for Vault

Scheduling n Once
backups (Full or n Weekly
Base with
incrementals): n Monthly
n No schedule

• Weekly:

− Day of the week Sun, Mon, Tue, Wed, Thu,


Fri, Sat

− Start time Hours: Minutes AM/PM

− First backup of Hours: Minutes AM/PM


each day

− Last backup of Hours: Minutes AM/PM


each day

• Monthly:

− Day of the month 1–31

− Start time Hours: Minutes AM/PM

− Number of hours 1–8


between
incrementals

Data compression: n Normal (recommended)


n High
n Maximum

111
Chapter 11 - Protection(Backup) on a virtual node

Configuration Node Node


Range/Options/Notes
Information A B

n None

Validate backup Not recommended.


after creation Verification doubles the
time to finish a backup.

• File descriptor
(for each node
backup)

• File size • Blu-ray Disc • Tape:

Limit number of 5 backups maximum per


backups for each week are recommended.
hard disk
1 backup at month-end is
recommended.

112
Chapter 11 - Protection(Backup) on a virtual node

Creating a protection (backup) plan for a virtual


node
To create a protection plan for a virtual node:
Step Action
1. From the Home page of Acronis Cyber Protect 15, click ADD
option to add the required VMware ESXi to the All devices list by
specifying the respective host name or IP address and entering
the login credentials which adds the virtual machines that it
contains.
2. Select the required virtual machine from the All devices tab of
the Acronis Cyber Protect 15 home page.
3. Select the option Protect from the right side menu of the
Acronis Cyber Protect 15 home page for the selected virtual
node.
4. Use the Create plan option to create a new protection (backup)
plan for the selected virtual node and provide a name for it by
clicking the Edit icon.

ATTENTION:
While selecting the volumes to be backed up for nodes
loaded with Embedded Microsoft Windows 10 LTSC
Enterprise and Embedded Microsoft Windows Server 2019
Standard operating systems:
l Select the C drive (or other drive if CIP is used) as well
as the System Reserved partition (if present).
l If you used Custom Install Path for any software
installation, then select that drives as well.

5. Click What to back up to select entire machine or disks /


volumes.
The Entire machine option is used to take the entire machine
backup.

NOTE: The user can enable or disable the application


backup for selected entire machine backup of the physical
node.

113
Chapter 11 - Protection(Backup) on a virtual node

When the option disks / volumes is selected, the Items to


backup option is enabled beneath where the user can add rules
and select what item to be backed up. Press OK.

ATTENTION: If your operating system and its loader reside


on different volumes, always include both the volumes in
the backup. Recover the volumes together; otherwise there
is a high risk of the operating system failing to start.

Where to back up

ATTENTION: Ensure that the disk has sufficient space


before starting the backup.

6. Click Where to backup option to specify the location where the


backup needs to be saved.
l The Location dialog box appears.

7. Select any of the following as necessary:


a. Browse Local folders to save the backup in a local folder.
b. Browse Network folder using the respective login credentials to
save the backup in a network location
c. Click Done.
How to back up
8. Select the appropriate Protection (Backup) Scheme to schedule the
required backup plan under schedule option. Please refer the
Section Backup Schemes for more details. The schedule option can
be turned ON or OFF as per requirement.
Click Done.

TIP:
It is recommended to use the Custom back up scheme.
When you schedule the task to run, the following options are
available:
l Add schedule : Use this option to create more than one
schedule.
l Delete: Use this option to delete a schedule.
l Change: Use this option to edit the schedule.

114
Chapter 11 - Protection(Backup) on a virtual node

9. In the HOW LONG TO KEEP option, select a scheme that suits your
requirement.
e. Cleanup by backup age
l In this cleanup option, individual rule for each backup

sets can be selected on Monthly, Weekly, or Daily basis.


l OR

l Single rule for all backup sets can be selected.

f. Cleanup by number of backups


l Schedule cleanup when the maximum number of
backups is reached.
g. Keep backups indefinitely
h. Click Done.
10. Encryption option can be used to protect the backup files by
providing case sensitive passwords and selecting encryption
algorithms.
11. Click Apply.

ATTENTION: The Passwords set for the backup files using


Encryption option in the backup plan must be secured, as
the same needs to be provided during Recovery procedure.

ATTENTION: EBR scripts cannot be run as part of the


backup policy of a virtual machine. We recommend
creating a scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR

Enter EBR Administrator credentials when prompted.

Server synchronization may corrupt a backup. Ensure


CAUTION that the servers do not synchronize during the
backup.
• Backups must not be scheduled when internal checks
and procedures are being performed by the Experion
system. Scheduling a backup during this period may
corrupt the backup. To ensure your backup does not
conflict with this time period, avoid scheduling

115
Chapter 11 - Protection(Backup) on a virtual node

Server synchronization may corrupt a backup. Ensure


CAUTION that the servers do not synchronize during the
backup.
backups between midnight and 3 AM. The backup
timings must be reviewed against the plant operating
and administration policies as they could change
based on the operating environment and operations
specific to your plant.

• During the backup, ensure that Controller Checkpoint


saves are not running in the background or scheduled
to run. To check this, choose Control Builder Menus
Controller > Checkpoint > Schedule Checkpoint Tasks.
Then, click Stop to cancel all the running and
scheduled tasks.

• Ensure event archiving is not occurring.

General recommendations
n Periodically check for logs to see if they are consistent
with the overall protection job status and backup
status of the node. It ensures that warnings and errors
are consistent with the overall status and are not
ignored.
n Files and Folder backup cannot be done for Virtual
machines. If it is required to take a backup of files and
folders on a virtual machine, then EBR Desktop
software or EBR Server software must be installed on
the Virtual node. It will use a workstation/server
license. However, if you intend to restore only files and
folders from a backup image, you can do so by
mounting the backup image.
n EBR scripts cannot be run as part of the backup policy
of a virtual machine. We recommend creating a
scheduled task in Windows to run the EBR script
locally on the virtual machine prior to the actual EBR
backup of the virtual machine. Applicable for Experion
Server only.

116
Chapter 11 - Protection(Backup) on a virtual node

TIP: The procedures for Running protection


(backup) job manually, disabling & deleting
protection (backup) jobs, mounting an image
and validating backups are same for Physical
nodes and Virtual nodes. For details, see chapter
Backups on a physical node.

117
CHAPTER

12 RECOVERY PLANNING

This chapter provides instructions for restoring system data to


Experion nodes after recovering from an unexpected event. It
would be beneficial to include system administrators and users
in developing the recovery plan. You can then incorporate the
completed protection (backup)/recovery plan into your
Operations Policy.

In this section:

General recovery plan considerations 119


Overview of tasks to develop a recovery plan 120
Restore modes/options 122

118
Chapter 12 - Recovery planning

General recovery plan considerations


When developing recovery plan, consider the following:
l What are the possible unexpected events that can affect your
process and system?
l Depending on the unexpected events, what are the possible
recovery procedures?
l What is the recovery procedure for each scenario?
l Do you have to develop a plan for each of the possible
recovery scenarios?
l Who performs the recovery tasks?
l If your plant is divided into operational areas, is there a
hierarchy of operational areas to be restarted?
l What is the order in which the system nodes within a cluster
or operating area have to be restarted?
l Where are your backups stored? Are they available from a
nearby secure, temperature-controlled off-site location?

TIP: It is recommended to document the system


recovery plan and make it available to all the
participants.

Elements of a recovery plan

The recovery plan is a comprehensive set of measures and


procedures that are implemented to maintain critical resources
and infrastructure. This ensures that you have backup
alternatives in place, in case of an unexpected event.
The recovery plan must contain a comprehensive list of actions
that you must take before, during, and after an unexpected
event. Having a recovery plan means that your organization
implemented actions that allow you to respond to and recover
from an unexpected event in an organized and efficient
manner. The recovery plan must be documented, tested, and
approved to ensure the actions work as planned.
The recovery plan can protect the organization in several ways,
including:

119
Chapter 12 - Recovery planning

l Providing a sense of security.


l Ensuring system and resource stability during an
unexpected event.
l Minimizing system downtime and recovery.
l Minimizing the risk of permanent loss of critical systems and
data.
l Minimizing confusion during an event.
l Minimizing the amount of decision making after the event.
l Providing a platform on which to test various disaster
recovery scenarios.
l Ensuring the reliability of secondary systems such as mirror
servers and uninterruptible power supply (UPS) systems.
When developing a recovery plan, you must remember that its
instructions may be carried out in extremely stressful
conditions. Therefore, it is essential that the plan contains
easy-to-follow instructions written in a chronological order.
You must perform the following tasks when you begin
developing the recovery plan:
l Analyze the business impact
l Perform a risk assessment
l Develop the recovery plan
l Test and audit the plan

Overview of tasks to develop a recovery plan


Analyze the business impact

Identify the critical systems, applications, and business


processes and prioritize them in order of importance. You must
include:
l System software
l Experion application software
l Control strategies
l History and event archives
l Displays

120
Chapter 12 - Recovery planning

You must then evaluate the impact of an interruption on each


of the systems, applications, and processes you identified as
being critical.

Perform a risk assessment


Assessing the risks to your organization help to identify any
weaknesses to your critical systems, including the physical
security of your building, data security, and the likelihood of a
disaster occurring. The risk assessment may help to identify
potential risks to your organization and minimize certain
threats by identifying system vulnerabilities, which you can
then address.

Use the recovery plan


Recovery plans help to minimize downtime of your critical
systems. The recovery plans must outline how each of the
critical systems, applications, and processes are restored, and
provide a list of resources required for plan implementation.
The recovery teams must be prepared to quickly deal with the
unexpected event. With this in mind, you must ensure that the
recovery plan is concise and clearly written.
After the plan has been written and tested, employees must be
notified of its existence and key personnel must be trained in
its use. It is important to keep copies of the entire plan in a
secure offsite location. The plan must be stored in hard-copy
format, as well as electronically, in case computer systems are
unavailable.

Test and audit the plan


You must audit and test the plan periodically to ensure that it
continues to meet the organization’s procedures, practices, and
policies.

121
Chapter 12 - Recovery planning

Restore modes/options
Universal Restore option

Default recovery options

Available default recovery options for EBR R520 and Honeywell


recommendations for these options are listed in the following
table:
Default recovery option Default setting (Preset) Honeywell
recommendation

Backup
No Yes
Validation
Date and Time Yes Yes
for files

Error handling Yes Yes


(less number of attempts and less
interval between attempts
recommended)

File Exclusions Empty Provide file Exclusions as per


requirement.

File-level Yes Yes


security

Full path No No
recovery

Mount points No No

Performance Normal Normal

Pre-post Disabled Enabled based on requirement.


commands

Windows Disabled Enabled based on requirement.


event log

122
CHAPTER

13 CHECKLISTS FOR RESTORING EXPERION


NODES

In this section:

Checklists for restoring nodes with similar hardware 124


Checklists for restoring nodes after recovery from a virus
infection 126
Checklists for restoring selected files or folders from a
backup 131

123
Chapter 13 - Checklists for Restoring Experion Nodes

Checklists for restoring nodes with similar


hardware
Restoring a non-redundant node with similar hardware

Step Task Go to Done?

1 Replace the failed hard disk / Not


failed node and replace the hard applicable
disk / reconnect the related
cables.
Note: While replacing a failed hard
disk ensure the address pinning is
identical to the original unit.

2 Use EBR Recovery Media to restore the hard disk. page 119

Restoring redundant Experion Server A with similar hardware

Step Task Go to Done?

1 Replace the failed hard disk / Not


failed node and replace the hard applicable
disk / reconnect the related
cables.
Note: While replacing a failed hard
disk ensure the address pinning is
identical to the original unit.

2 Use EBR Recovery Media to Chapter 14


restore the hard disk.

3 Disable ERDB/EMDB replication Chapter 16


from Experion Server B.

4 Delete the contents of this folder Not


on Experion Server A: applicable
• For Experion R5xx
The default path is:
C:\Programdata\Honeywell\
Experion PKS \Checkpoint

124
Chapter 13 - Checklists for Restoring Experion Nodes

Step Task Go to Done?

For custom installation path,


navigate to
User selected path\Honeywell\
Experion PKS \Checkpoint

5 Restore the ERDB for Redundant Section


Experion Server A. 16.2

6 Restore the EMDB for Redundant Section


Experion Server A. 16.2

7 Use a Station to connect to the Section


primary Experion 16.2
Server, and then synchronize both
Experion Servers.

Restoring redundant Experion Server B with similar hardware

Step Task Go to Done?

1 Replace the failed hard disk / Not


failed node and replace the hard applicable
disk / reconnect the related
cables.
Note: While replacing a failed hard
disk ensure the address pinning is
identical to the original unit.

2 Use EBR Recovery Media to Chapter 14


restore the hard disk.

Ensure you disconnect the node from the network before


proceeding to the next step to avoid the redundant servers
communicating with each other immediately.

3 Delete the contents of this folder on Experion Not


Server B:
applicable
l For Experion R5xx
The default path is:

125
Chapter 13 - Checklists for Restoring Experion Nodes

C:\Programdata\Honeywell\ Experion PKS


\Checkpoint
For custom installation path, navigate to
User selectedpath\Honeywell\ Experion PKS
\Checkpoint

4 Restore the ERDB for Experion Server B. Section


16.2

5 Restore the EMDB for Experion Server B. Section


16.2

6 Use a Station to connect to the primary Section


Experion Server, and then synchronize both 16.2
Experion Servers.

Checklists for restoring nodes after recovery


from a virus infection
Considerations
n Depending on your local Operations Policy about
viruses, you may want to disconnect the infected
nodes from all the networks and restore them from
removable media to avoid infecting the rest of the
network.
n Recovery from a virus infection may require restoring
an entire hard disk or set of hard disks, or it may
simply require recovery of a few quarantined files.
n This procedure can confirm whether the backup image
contains the virus, but it cannot remove the infected
file from the backup image.
If a backup image is infected, some uninfected files
can be safely recovered, but the backup image must
not be used for a full disk recovery. For this task, you
do not need to reformat the hard disk, as EBR
restoration overwrites the entire hard disk.

126
Chapter 13 - Checklists for Restoring Experion Nodes

Restoring a non-redundant node after recovery from a virus infection

Step Task . Go to Done?

1 Remove the computer from


the network. Not applicable

2 Use EBR Recovery Media to


restore the hard page 162
disk.

TIP: Accessing data on


an infected disk can
also infect the local
machine.

3 Use the virus scan software Virus scan


to scan the drive specified in software
step 2 documentation

4 If the virus scan detects a Not applicable


virus in the backup image,
use a previously archived,
virus-free image to restore
the hard disk.

5 Use EBR Recovery Media to Section 16.2


restore the hard disk.

6 Add the computer back to the Not applicable


network.

Restoring redundant Experion Server A after recovery


from a virus infection

Step Task Go to Done?

1 Remove the computer from Not applicable


the network.

2 Reformat the hard disk. Microsoft


documentation

3 Use EBR Recovery Media to Chapter 14

127
Chapter 13 - Checklists for Restoring Experion Nodes

Step Task Go to Done?

restore the hard disk.

4 Use the virus scan software to Virus scan


scan the selected disk drive. software
documentation

5 If the virus scan detects a Not applicable


virus in the backup image, use
a previously archived backup
image to restore the hard disk.

6 Disable ERDB/EMDB Section 16.2


replication for Experion Server
B.

7 Delete the contents of this Not applicable


folder on Experion Server A:
• For Experion R5xx
The default path is:
C:\Programdata\Honeywell\
Experion PKS \Checkpoint
For custom installation path,
navigate to
Userselectedpath\Honeywell\
Experion PKS \Checkpoint

8 Restore the ERDB for Experion Section 16.2


Server A.

9 Restore the EMDB for Section 16.2


Experion Server A

10 Use a Station to connect to the Section 16.2


primary Experion Server, and
then synchronize both the
Experion Servers.

128
Chapter 13 - Checklists for Restoring Experion Nodes

Restoring redundant Experion Server B after recovery


from a virus infection

Step Task Go to Done?

1 Remove the computer from the Not


network. applicable

2 Reformat the hard disk. Microsoft


documentat
ion

3 Use EBR Recovery Media to Chapter 14


restore the hard disk.

4 Use your virus scan software to Virus scan


scan the selected disk drive. software
documentat
ion

5 If the virus scan detects a virus Not


in the backup image, use a applicable
previously archived backup
image to restore the hard disk.

6 Disable ERDB/EMDB replication Section 16.2


for Experion Server B.

7 Delete the contents of this folder Not


on Experion Server B: applicable
• For Experion R5xx
The default path is:
C:\Programdata\Honeywell\
Experion PKS \Checkpoint
For custom installation path,
navigate to
Userselectedpath\Honeywell\
Experion PKS \Checkpoint

8 Restore the ERDB for Experion Section 16.2


Server B.

129
Chapter 13 - Checklists for Restoring Experion Nodes

Step Task Go to Done?

9 Restore the EMDB for Experion Section 16.2


Server B.

10 Use a Station to connect to the Section 16.2


primary Experion Server, and
then synchronize both the
Experion Servers.

130
Chapter 13 - Checklists for Restoring Experion Nodes

Checklists for restoring selected files or folders


from a backup
If you can start the node from its operating system, but have
lost data or program files on the hard disk (excluding some
operating system files), you can recover selected files or folders
from a backup image without restoring the entire hard disk.
This recovery method is useful when the node failures are
traced to a specific file or folder, or important data files are lost
and you do not want to use the Mount Image feature to restore
an entire backup image.

Considerations using EBR


If you are restoring from an incremental backup, the restore
process automatically detects any previous incremental backup
and the base backup image associated with the selected
incremental backup.

ATTENTION: Recovery of selected files and folders does not


recover the associated registry settings.

Restoring selected folders or files to a node

Task Go to Done?

Use EBR Recovery Media to restore the Chapter


selected files or folders. 14

131
CHAPTER

14 RESTORING PHYSICAL NODES

In this section:

Using EBR Recovery Media to restore hard disks and


images 133
EBR Recovery on Dell 15G and Dell 16G Platforms 145

132
Chapter 14 - Restoring Physical Nodes

Using EBR Recovery Media to restore hard


disks and images
Prerequisites

Configure backup for the nodes before restoring the hard disk
using EBR. For more information about backup configuration
form, see
Sample backup configuration form.
Restoring a hard disk

Starting up

ATTENTION: The boot sequence must be set to DVD Drive


in BIOS before inserting the DVD.

Step Action

1 Insert the EBR R520 recovery media into the DVD Drive.

NOTE: Check for the latest version from Experion


Update Matrix or local TAC.

2 Start from the DVD drive.

3 The Acronis Cyber Protect Bootable Agent screen


appears.

133
Chapter 14 - Restoring Physical Nodes

Step Action

ATTENTION: Wait for a few minutes before the


Acronis recovery media is loaded.

Configuring the Network

TIP: You must configure the network only if you


are restoring an image that is on the shared
network.
If you are not restoring an image on the network,
go to step 7.

4 Click the Configure network.

134
Chapter 14 - Restoring Physical Nodes

Step Action

The Network Settings dialog box appears.

5 Enter the following network settings for the target


computer:

n IP Address
n Subnet mask
n Default Gateways

135
Chapter 14 - Restoring Physical Nodes

Step Action

TIP: The appropriate network settings are


available from your System Administrator.

6 Click OK.
The Acronis Bootable Agent screen appears.

7 Click Manage this machine locally.

136
Chapter 14 - Restoring Physical Nodes

Step Action

On the home page, under Actions, click Recover.

The Recover data page appears.

What to recover

8 For Select data option, click Required.

137
Chapter 14 - Restoring Physical Nodes

Step Action

The Data to recover selection dialog box appears.

9 Perform one of the following actions:

n In the Data Path box, type the location of the


backup that contains the data you want to
recover.

Or
Browse through the folder tree and select the

138
Chapter 14 - Restoring Physical Nodes

Step Action

backup that contains the data you want to


recover.

10 Click OK

11 In the Backup contents list, click one of the following


options:

l Volumes
l Disks
l Files

139
Chapter 14 - Restoring Physical Nodes

Step Action

If you have selected Volume, then continue with Step


14. If you have selected Disk, then go to Step 15.

For Volume

TIP: If recovering a System volume, recover the


MBR along with the system volume to make the
recovered volume bootable

12 Click Required, and select the required physical volumes


to recover.

For Disks

13 Click Required, and select the required physical disk to


recover.

Where to recover

NOTE: If you are performing recovery of image taken from


platform with BOOT mode legacy to platform with BOOT
mode legacy, follow the step below.

140
Chapter 14 - Restoring Physical Nodes

Step Action

14 The data you want to recover and the selected


disks/files appear under Where to recover. Click
Required, and choose an appropriate destination for the
recovered data.

TIP: Ensure that the NT Signature option is set to


Select automatically.

NOTE: If the operating system is installed using


Experion Initialization media then the System
Reserved partition may not exist.

If the operating system is installed directly from the


media provided by Microsoft, then the System Reserved
partition may be present.

TIP: Ensure that the Acronis Active Restore option


is set to Select automatically.

Where to recover

NOTE: If you are performing recovery of image taken from


platform with BOOT mode legacy to platform with BOOT
mode UEFI (GPT), follow the step below.

15 The data you want to recover and the selected


disks/files appear under Where to recover.
1. Before recovery, click on the "Clear All" option.
2. Select Reserve, and assign MBR to PERC storage.
3. Set the path to System Reserved.
4. Set the path for restoring NTFS.
With all the above steps, the MBR to GPT conversion will
be complete.

TIP: Ensure that the Acronis Active Restore option

141
Chapter 14 - Restoring Physical Nodes

Step Action

is set to Select automatically.

16 Click OK

Restoring selected folders or files

ATTENTION: File and folder level restoration from a


backup is not possible in a virtual environment.

1. Open the Acronis Cyber Protect 15 and select the machine


that needs to be recovered.
2. Click Recovery on the pane popped up at the right side of
the home page against the selected machine.
l The available backup files related to the selected machine

are listed down.


3. Select the required backup file which is listed down based
on the time of backup.
l Click Recover.

What to recover
1. Select Files/Folders from the dropdown menu.
2. Select the required Files/Folders to be recovered and click
Recover on the right side pane.
Where to recover (path)
1. Select any of the following based on the requirement.
a. Original location:
l To recover the selected Files/Folders to their original

location.
b. Custom location:
l To browse and select a Custom location to recover the

selected Files/Folders.
l Click Start Recovery.

142
Chapter 14 - Restoring Physical Nodes

l Recovery options can be changed as per requirement. For


more details, please refer the Section Restore
modes/options.

Universal Restore
n If user wants to apply Universal Restore , click Stop after
Recovery.

n Click Apply Universal Restore.

Else, reboot the machine with EBR Recovery Media. Click


Acronis Universal Restore.

143
Chapter 14 - Restoring Physical Nodes

In Apply Universal Restore, click Add folder under Automatic


Driver search option and locate to the EBR Driver folder
available in INIT media and click OK.

NOTE: If using INIT media DVD, remove the Acronis DVD


and insert the INIT media DVD (R250.1 or R222.1 based on
Experion R530.1 release or prior) and locate to following
location: D_EXP\PACKAGES\EBR Drivers
If using USB where “EBR drivers” folder is already copied,
locate to same path in USB.

Once Apply Universal Restore completes, reboot the system


and login to the machine.
Run the INIT media to install and update all the drivers.

144
Chapter 14 - Restoring Physical Nodes

EBR Recovery on Dell 15G and Dell 16G


Platforms
NOTE: While Dell 15G and Dell 16G platforms use UEFI
BIOS mode, the steps following must be followed in order
for backups made in legacy mode to be seamlessly
recovered on Dell 15G and Dell 16G servers.

1. Verify the BIOS setting as mentioned in Planning


Installation and Service guide. (Refer Experion Update
Matrix for PISG links).
2. Boot from the EBR R520.1 Hotfix3 (Build 37420) recovery
media.
3. After booting with the EBR Recovery DVD, click Recover as
shown below.

4. Select data (browse path for .tibx file which is required to


restore).

145
Chapter 14 - Restoring Physical Nodes

5. When the "Select what you want to Recover" dialogue box


appears, select the partitions you want to recover.

6. The Initial Recovery Screen what to recover.

7. Click "Clear All".

146
Chapter 14 - Restoring Physical Nodes

8. Enter Values in "Where to recover" section as below for each


of line in left hand side row.

9. When recovery is close to 81% it will show the below


attention. (These observations may vary between AMT
images and physical platform backup).

10. Click show details, the below screen will be displayed.

11. Once Restore is completed, click universal restore (do not


reboot server\workstation).

147
Chapter 14 - Restoring Physical Nodes

12. Locate the row "Automatic driver search" (2nd row) and
ensure that search removable media is turned ON.
13. Select "Add Folder" in the next row, enter the location of the
chipset driver and then click OK.

NOTE: This procedure may not be necessary for


workstations.

14. Select last option add storage drive give path (the drivers
are provided along with the media).

S
Dell RAID Controll
l.
Platf Controll Driver location on Init Media er to
N
orm er Select
o.

1 Dell PERC <IM_DVD>:\PACKAGES\EBR PERC


T550 H755 Drivers\PERC_H755_T550_ H755
/ R450_XR11_R740\payload Adapte
R450 r, PERC
H755
Front

2 Dell PERC <IM_DVD>:\PACKAGES\EBR PERC


T150 H355 Drivers\PERCH355_T150_ H355
/ R250
R250
/
R350
/
XR11

3 Dell Intel <IM_DVD>:\ Intel


T582 SATA PACKAGES\DRIVERS\STORAG eSATA
0XL RAID co ECONTROLLER\T5820_ /
MLK ntroller R7920\DRIVERS\RSTE_F6_ sSATA
/ IASTORE_WIN8_64) / VROC
R792 controll
0XL er

4 HP Intel <IM_DVD>:\ Intel


Z4G4 SATA PACKAGES\DRIVERS\STORAG SATA

148
Chapter 14 - Restoring Physical Nodes

S
Dell RAID Controll
l.
Platf Controll Driver location on Init Media er to
N
orm er Select
o.

MLK RAID co ECONTROLLER\INTEL RSTE Control


ntroller Z4G4 DRIVER\DRIVERS ler

5 T586 <IM_DVD>:\PACKAGES\EBR Intel


0 Drivers\16G_Chipset\T5860XL Volume
manag
<IM_DVD>: \PACKAGES\EBR ement
Drivers\T5860_Z4G5_R7960_ device
DL320Gen11\VROC_ NVMe
8.2.0.2005 RAID
Control
ler

6 R796 <IM_DVD>:\PACKAGES\EBR Intel


0 Drivers\16G_Chipset\R7960XL Volume
<IM_DVD>:\PACKAGES\EBR manag
Drivers\T5860_Z4G5_R7960_ ement
DL320Gen11\VROC_ device
8.2.0.2005 NVMe
RAID
Control
ler

7 HP <IM_DVD>:\PACKAGES\EBR MR408
DL3 Drivers\T5860_Z4G5_R7960_ i
20 DL320Gen11\Chipset_ adapter
DL320Gen11
Gen
11 <IM_DVD>:\PACKAGES\EBR
Drivers\T5860_Z4G5_R7960_
DL320Gen11\Storage_MR408i

15. Click Ok to complete universal restore.


16. Once universal restore is completed, click OK and Reboot.
17. After rebooting, the system will Reboot at least twice, so wait
for at least 5 minutes.

149
Chapter 14 - Restoring Physical Nodes

18. Once logged in, look for device manager and examine if the
chipset driver is installed; for example, in the system device
section, the user should not notice any "other devices" line
item.

150
CHAPTER

15 RESTORING VIRTUAL NODES

Methods of restoring a virtual node


A virtual machine can be restored using the following methods:
n Restoring using EBR recovery media
o Restoring to a new virtual machine using EBR recovery media

o Restoring to an existing virtual machine using EBR recovery media

n Restoring virtual machine using virtual appliance from EBR Manager

Restoring to a new virtual machine using EBR


recovery media
1. Create a new virtual machine.

NOTE: For detailed information about creating a new


virtual machine, see the latest version of the Experion
PKS R520 Software Installation User’s Guide.

ATTENTION: Automatic check pointing from the


primary Experion Server to the backup Experion Server
does not occur until the two servers are properly
synchronized

2. Add CD/DVD drive to the virtual machine if not already


performed as part of step 1.
To add the CD/DVD drive, perform the following steps:
a. Power OFF the virtual machine.
b. In vSphere Client, select the virtual machine, right-click
and then choose Edit Settings.
c. Click Add. The Add Hardware dialog box appears.
d. In the list of available devices, click CD/DVD Drive and
then click Next.
e. Select Use physical drive.
f. Click Next.

151
Chapter 15 - Restoring Virtual Nodes

g. Select Host and then click Next.


h. Click Next.
i. Click Finish.
j. Click OK.
3. Power ON the new virtual machine from EBR R520 recovery
media.
4. In the vSphereClient page, right-click on the virtual machine
and open console.
5. Go to Boot Menu and select CD-ROM Drive.
6. The Starting Acronis Loader message appears.
7. The Acronis Cyber Protect Bootable Agent screen appears.

Click Manage this machine locally.

TIP: Wait for a few minutes before the Acronis recovery


media is loaded.

Configuring the Network

TIP: You must configure the network only if you are


restoring an image that is on the shared network.
If you are not restoring an image on the network, go to
step 7.

8. Click the Configure network.

152
Chapter 15 - Restoring Virtual Nodes

The Network Settings dialog box appears.


9. Enter the following network settings for the target computer:
l IP address
l Subnet mask
l Default Gateways

TIP: The appropriate network settings are available


from your System Administrator.

10. Click OK.


The Acronis Bootable Agent screen appears.
11. Click Manage this machine locally

153
Chapter 15 - Restoring Virtual Nodes

12. On the home page, under Actions, click Recover.

The Recover data page appears.


What to recover

154
Chapter 15 - Restoring Virtual Nodes

13. For Select data option, click Required.

The Data to recover selection dialog box appears.


14. Perform one of the following actions:
l In the Data Path box, type the location of the backup that
contains the data you want to recover.

Or
l Browse through the folder tree and select the backup that

155
Chapter 15 - Restoring Virtual Nodes

contains the data you want to recover.

15. Click OK.


16. In the Backup contents list, click one of the following:
l Volumes
l Disks
l Files

If you have selected Volume, then continue with Step 18.


If you have selected Disk, then go to Step 19.
For Volume

156
Chapter 15 - Restoring Virtual Nodes

TIP: If recovering a System volume, recover the MBR


along with the system volume to make the recovered
volume bootable

17. Click Required, and select the required physical volumes to


recover.
For Disks
18. Click Required, and select the required physical disk to
recover.
Where to recover
19. The data you want to recover and the selected disks/files
appear under Where to recover.
l Click Required, and choose an appropriate destination for

the recovered data.

TIP: Ensure that the NT Signature option is set to Select


automatically.

NOTE: If the operating system is installed using Experion


Initialization media then the System Reserved partition may
not exist.
If the operating system is installed directly from the media
provided by Microsoft, then the System Reserved partition
may be present.

20. Click OK.


21. After recovery completes, the Succeeded message appears.
Click Close.
22. Click the Close button on the upper-right corner of the
window to return to the Acronis Bootable Agent window.
23. Click Reboot.

TIP: If the reboot does not happen automatically,


reboot the system manually.

157
Chapter 15 - Restoring Virtual Nodes

24. Log on to the computer using appropriate credentials. The


device driver software installation begins.
25. After the installation, the system prompts for restart.
Click Restart Now.

ATTENTION: This is a mandatory step applicable for


Universal restore only.

TIP: To resolve the problem on replication not working


after an EBR image is restored back, see Appendix D: Re-
adding back the restored node to domain.

Restoring to an existing virtual node using EBR


recovery media
The procedure for restoring to an existing virtual node using
EBR recovery media is similar to the procedure for restoring to
a new virtual node using EBR recovery media.
To restore to an existing virtual node using EBR recovery
media, perform steps 2 to 26 of Restoring to a new virtual node.

Restoring virtual node using virtual appliance from


EBR Manager

Prerequisites
Virtual appliance must be deployed to the ESX(i) host on which
the recovery needs to be done which takes place when a
VMware host machine is added to the devices list in the EBR
Manager. Virtual machines must comply with
recommendations given in the Experion PKS Virtualization
Planning and Implementation Guide.
1. Login to the EBR Manager.

NOTE: For more information about connecting to the


management server, see Adding computers to the
management server.

158
Chapter 15 - Restoring Virtual Nodes

2. From the All devices list, choose the required virtual machine
that you want to restore. The right pane appears. Click Recovery.

3. All the available protections for the respective Virtual machine


are listed down with respect to their time of protect.
4. Select any of the following available options based on
requirement:
a. Recover:
This option can be used to recover the selected backup file to
the same Virtual machine with Entire machine or Files/Folders
options.

Click Recover and select any of the following options based on


the requirement.

159
Chapter 15 - Restoring Virtual Nodes

i. Entire Machine
n Use this option to recover the entire machine protection from the
selected backup file to any existing machine or new machine.

n Click Entire machine.

n The Specify credentials page appears.


n Enter the username and Password. Click OK.

n Click Start Recovery.


ii. Files/Folders
n Use this option to recover only the selected files/folders from the
selected backup file to any custom location as per requirement

160
Chapter 15 - Restoring Virtual Nodes

n Click the Files/Folders option to open the window where the


contents of the backup file can be browsed and the required
files/folders can be selected.

After selecting the required files/folders, click Recover on the


right-side pane.

n Click Browse under PATH to provide the custom location where


the selected files/folders need to be restored.
n Provide the necessary recovery options based on requirement.
Click Done.
n Click Start Recovery.

161
Chapter 15 - Restoring Virtual Nodes

b. Run as VM:
With this option a new virtual machine can be deployed to the required
Data Store using the selected backup file from the list directly.
The following details should be entered to execute the same.
a. Target Machine:
Browse and select the vCenter/VMware host where the new virtual
machine needs to be deployed.
Provide a name for the new Virtual machine, and then click OK.

b. Data Store:
Select the data store with which the new virtual machine needs to be
created.
Click OK.

c. VM Settings:
Select the required Memory and assign the applicable network
adaptors.
Click OK

162
Chapter 15 - Restoring Virtual Nodes

d. Power State:
Select the power state ON/OFF to set the state of the new VM after
deployment.

Click Run now.

163
CHAPTER

16 RESTORING EXPERION DATABASES

This chapter provides instructions for restoring various nodes


and Experion Server databases after recovery from a failure,
such as a hardware failure, virus infection, or database
corruption.
The sections describe node restoration based on whether the
node is being restored to dissimilar computer hardware from
the computer from which the backup was made, or to similar
computer hardware.
In addition, this section provides instructions for restoring the
EMDB and ERDB databases for Experion Servers.

CAUTION: If you are not sure about the partition mapping,


then it is recommended that you format the existing drives
and then delete all the partitions so that the entire hard
disk becomes an un-allocated space.

ATTENTION:
Use the appropriate checklists to restore nodes and
databases after recovery from an unexpected event. These
checklists specify the correct sequence of tasks for a
successful restoration.
It is recommended that the Experion server shouldn't be
primary when its database restore operation is carried out.

In this section:

Disabling ERDB and/or EMDB replication for Redundant


Experion Server B 165
Restoring Controllers from controller checkpoint files 170

164
Chapter 16 - Restoring Experion Databases

Disabling ERDB and/or EMDB replication for


Redundant Experion Server B
ATTENTION: This procedure is applicable only to Experion
Server B of a redundant server.

Prerequisites
Ensure that you login with a local account that has local
administrator and product administrator privileges.
Disabling ERDB and/or EMDB replication for Redundant Experion Server B

1. Start Configuration Studio and connect to the system with


Experion Server.
2. For the ERDB:
l In Configuration Explorer , click the server name, and then

click Administer the control strategy database.


l For the EMDB:

l In Configuration Explorer , click the server name, and then

click Administer the control strategy database.


3. Expand the DBAdmin and Server Node trees.
4. Click ERDB/EMDB Admin Tasks. The ERDB Admin Tasks page
opens.
5. Click Disable Replication, and then click Yes.
6. Click OK to acknowledge the Disable replication succeeded
message.
7. Close the DBAdmin dialog box.
Restoring the ERDB for Redundant Experion Server A

Use this procedure after restoring a backup of Experion Server


A to update it with the latest ERDB from Experion Server B.
This procedure can also be used to replace a corrupted ERDB
on Experion Server A with a valid ERDB from Experion Server B.
1. Start Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the server name, and then click
Administer the control strategy database.

165
Chapter 16 - Restoring Experion Databases

l The DBAdmin dialog box appears.


3. Expand the DBAdmin and Server Node trees, and then click
ERDB Admin tasks.
4. Select Recover Secondary Database, and then click Yes.
5. Click OK to acknowledge that the recovery is complete.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge the replication successful message.
8. Close the DBAdmin dialog box.
9. On Experion Server A, synchronize the SRDB with Server B as
follows:
n Choose Start > Windows Administrative Tools > Services.
n Click Experion PKS System Repository, and then click Stop
n Click Yes to stop the service.
n Go to, C:\ProgramData\Honeywell\ Experion PKS \SRDB.
Delete the file
n EPKSOperationalDB.sdf
Go to Start > Windows Administrative Tools > Engineering Tools
> Error Logs > SRDB. Delete the file EPKSOperationalDB.sdf
10. Close all Windows applications and restart the machine.
Restoring the ERDB for Redundant Experion Server B

Use this procedure after restoring a backup of Experion Server


B to update it with the latest ERDB from Experion Server A.
You can use this procedure to replace a corrupted ERDB on
Experion Server B with a valid ERDB from Experion Server A.

Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
1. Start Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the server name, and then click
Administer the control strategy database.
l The DBAdmin dialog box appears.

166
Chapter 16 - Restoring Experion Databases

3. Expand the DBAdmin and Server Node trees, and then click
ERDB Admin tasks.
4. Select Recover Secondary Database, and then click Yes.
5. Click OK to acknowledge that the recovery is complete.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge the replication successful message.
8. Close the DBAdmin dialog box.
9. On Experion Server B, synchronize the SRDB with Server A as
follows:
l Choose Start > Windows Administrative Tools > Services.

l Click Experion PKS System Repository, and then click Stop

l Click Yes to stop the service.

l Go to, C:\ProgramData\Honeywell\ Experion PKS \SRDB.


Delete the file EPKSOperationalDB.sdf
l Go to Start > Windows Administrative Tools > Engineering

Tools > Error Logs > SRDB. Delete the file


EPKSOperationalDB.sdf
10. Close all Windows applications and restart the machine.

ATTENTION:
If detailed displays of L1 modules do not load correctly
after restoring in station, then perform “Load server points”
to associate the correct d displays to the points from
monitoring side.
This procedure WILL cause a momentary LOV. So critical
care should taken accordingly.

Restoring the EMDB for Redundant Experion Server A

Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
1. Start the Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the system name, and then click
Administer the system database. The DBAdmin dialog box
appears.

167
Chapter 16 - Restoring Experion Databases

3. Expand the DBAdmin and Server Node trees, and then click
EMDB Admin tasks.
4. Click Recover Secondary database, and then click Yes.
5. Click OK to acknowledge a successful restore.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge a successful replication.
8. Close the DBAdmin dialog box.

168
Chapter 16 - Restoring Experion Databases

Restoring the EMDB for Redundant Experion Server B

Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.
1. Start the Configuration Studio and connect to the system with
Experion Server B.
2. In Configuration Explorer, click the system name, and then click
Administer the system database. The DBAdmin dialog box
appears.
3. Expand the DBAdmin and Server Node trees, and then click
EMDB Admin tasks.
4. Click Recover Primary database, and then click Yes.
5. Click OK to acknowledge a successful restore.
6. Click Enable Replication, and then click Yes.
7. Click OK to acknowledge a successful replication.
8. Close the DBAdmin dialog box.

Synchronizing the Experion Server databases

ATTENTION: Automatic check pointing from the primary


Experion Server to the backup Experion Server does not
occur until the two servers are properly synchronized.

Step Action

1 On the primary Experion Server, connect to a Station.

2 Click View > System Status > Server Redundancy to start


the Server Redundancy Status display on the primary
Experion Server.
In the Link Status group, the LEDs must be green and
indicate the following:

n Backup server is running.


n Link is OK.

3 Click Synchronize, and then click Yes.


The Experion database on the primary server is

169
Chapter 16 - Restoring Experion Databases

Step Action

automatically copied to the backup Experion Server. The


synchronization time depends on the size of the system.
After synchronization, the synchronization indicator (first
LED in the Backup Server group) changes from red to
green and then the text changes from Not synchronized to
Synchronized.

ATTENTION:
Before performing Failover check Controller
Subsystem Status on the Server Redundancy status
page. The status should be as follows:

1. Engineering Repository DB : Auto sync


enabled
2. Engineering Repository DB to System
Repository: ERDB SR Synchronized
3. System Repository primary: Running
4. System Repository backup: Synchronized and
Running
If any of the status does not match the above
criteria, contact TAC.

4 If you want the other Experion Server to be the primary


database, click Manual Failover, and then click Yes to start
the failover.

5 After a few minutes, click Synchronize, and then Yes to


resynchronize the databases. (If you start synchronization
immediately after the failover, an error may occur.)

Restoring Controllers from controller


checkpoint files
Restoring the Engineering Repository Database and controllers

CAUTION: Ensure your process is “Off Control” as these


procedures require that the controller be idled and/or a
new database loaded.

170
Chapter 16 - Restoring Experion Databases

After restoring the Experion database, the database and the


controllers may be out-of sync if the control strategy or
controller parameters have changed since the backup was
created.
If the control strategy or the controller parameters remain the
same since the backup, you can update the current parameters
by uploading the controller to the ERDB, and then updating the
project from loaded. In addition, you must save the checkpoint
files again from the controller.
If, the control strategy has changed since the backup or if,
Qualification and Version Control System (QVCS) is licensed
and the QVCS database changed (such as check in and
checkout), you must re-enter the changes to the ERDB project
database after it is restored.
Then, you must update the controller by loading the missing
blocks as follows:
1. Add the new blocks to the project side of the ERDB but do not
load them yet.
2. When the Server database was restored, that would have brought
in the old checkpoint files. For each controller that changed
since the backup, restore this checkpoint file. This action will
delete the controller copies of the new blocks. This is necessary
because the new blocks are “ghost” points and cannot be
deleted directly.
3. Note that if the added blocks were IOMs, the checkpoint load
may fail. In this case, you must bring the controller to the NODB
state by using NTOOLS or pulling the batteries and cycling the
controller power, and then load the checkpoint.
4. Load the newly added blocks from the project side.
5. If there were external connections to the added blocks, any
blocks referencing them in other Control Modules or controllers
(if peer-to-peer) must be reloaded to update the references to
these blocks.
6. When completed, save the controller checkpoint and back up the
updated database.
7. After restoring Experion Server B of a redundant pair, note the
checkpoint files. If the older checkpoint files are restored to
Experion Server B, synchronization attempts to update them
from Experion Server A, causing them to become out-of-sync

171
Chapter 16 - Restoring Experion Databases

with the database. The solution is to delete the checkpoint files


from Experion Server A after replicating the database and before
enabling the ERDB synchronization.
Restoring the events database

Prerequisites
Ensure that you login with local account which has local
administrator and product administrator privileges.

ATTENTION: Event restoration can only be run at level


“Database Only”. This cannot be run on Running system.

Step Action

1 Explore
l For Default installation path navigate to,
C:\ProgramData\Honeywell\ Experion PKS
\Server\data\evtarch
l For custom installation path, navigate to,
Userselectedpath\Honeywell\ Experion PKS
\Server\data\evtarch to find the appropriate backup file
to restore. (This is usually the file with the most recent
date and time.) Note the name of this file.

2 Go to Start > Windows system > Microsoft SQL Server 2012


and then click SQL Server Management Studio. The
Connect to Server window appears.

3 Log on to local server and then click Connect. The


Microsoft SQL Server Management Studio page opens.

3 Expand the left tree down the following path:


Local Server Name > Databases > emsevents

4 Right-click EMS Events Database and then click Tasks >


Restore> Database. The Restore Database dialog box
appears.

5 From the Database list select, EMSEvents.

6 k. Select Device: and then browse and add the new

172
Chapter 16 - Restoring Experion Databases

Step Action

device from the following path:


l. C:\ProgramData\Honeywell\ Experion PKS
\Server\data\evtarch
m. Click OK until you return to the Restore Database
dialog box.

7 n. From the left pane, select the Options page.


o. From the right pane, select the Overwrite the existing
database (WITH REPLACE) check box.
p. From the right pane, select the Preserve the replication
settings (WITH KEEP_REPLICATION) check box and
then click OK to run the restore.

8 If any errors occur, stop SQL server, and then restart it to


ensure that no other computer is connected to the
database.

Restoring the EMDB


After restoring the EMDB, it may be out-of-sync with the
Experion Server if changes were made to the server, asset, or
alarm group definitions after the backup was made. For
example, if a server was added or deleted, or an alarm group
hierarchy was changed, such changes must be reconstructed.
If there were no changes to the Enterprise Model after the
backup, no further steps are necessary.
If there were changes to the Enterprise Model after the backup,
the following scenarios are possible:
n Changes were made but not loaded: In this case, the
restored EMDB and the Experion Servers are
synchronized. However, you must reconstruct the
changes that were not present on the backup image.
When the EMDB is complete, it can then be uploaded
to the Experion Servers as usual.
n Changes were made and loaded: In this case, the
EMDB and the Experion Servers are not synchronized.
Consequently, you must reconstruct the changes that
were not present on the backup image. After the
changes, the EMDB and the Experion Servers are

173
Chapter 16 - Restoring Experion Databases

synchronized. However, you must load the Experion


Servers to ensure that everything is synchronized.

174
CHAPTER

17 CONFIGURATION ITEMS IN THE


MANAGEMENT CONSOLE

In this section:

Deleting computers from the EBR Manager 176


Revoking licenses 176

175
Chapter 17 - Configuration items in the Management Console

Deleting computers from the EBR Manager


To delete computers from the EBR Manager:
1. Login to the Acronis Protect home page

NOTE: For more information about connecting to the


management server, see Adding computers to the
management server.

2. Click the All Devices tab where all the devices added to the EBR
Manager are listed.
3. Select the required machine that needs to be deleted from the
EBR Manager.
4. Click Delete from the right side pane popped up against the
selected machine.
5. Click Delete on the confirmation dialog box.
6. The machines are removed from the EBR Manager.

ATTENTION: Only the physical machines added to the EBR


Manager manually can be deleted using this procedure. A
Virtual machine can be deleted from the EBR Manager only
by deleting the associated virtual appliance which intern
removes all the virtual machines associated to that
particular virtual appliance.

Revoking licenses
To revoke licenses:
1. Log On to the EBR Manager node.
2. On the Acronis Cyber Protect 15 home page, click Settings.
3. Select Licenses under Settings which displays the available
licenses and the machines they are assigned to.
4. Click on the required Licenses that needs to be revoked and
click Revoke in the right side pane.
5. Click Revoke on the confirmation dialogue box.

176
Chapter 17 - Configuration items in the Management Console

TIP: The Revoked key will remain in the license list. It can
be assigned to another machine or device.

177
CHAPTER

18 MOVING BETWEEN PHYSICAL NODE AND


VIRTUAL NODE

In this section:

Converting a physical node to virtual node using virtual


appliance 179
Virtual to physical 182

178
Chapter 18 - Moving between physical node and virtual node

Converting a physical node to virtual node


using virtual appliance
1. Log on to the EBR Manager node.
2. Launch Acronis Cyber Protect 15
3. In the left pane, click Devices > All devices

The All devices page appears.


4. Select the respective physical machine that needs to be
converted to VM.
5. Click Protectin the right pane from the options window
pane for the selected machine.

The New protection plan page appears.

179
Chapter 18 - Moving between physical node and virtual node

6. Next to Convert to VM click Disabled link.

The Convert to VM page appears.


7. Turn on the Conversion option and enable it to ON. By
default, this option will be in OFF stage

8. Click CONVERT TO drop-down arrow and then choose


MWare ESXI.

9. Next to HOST click the Specify link

180
Chapter 18 - Moving between physical node and virtual node

The Select target host page appears.


10. Enter the machine name and Click OK.

Convert to VM page appears.


11. Next to PROVISIONING MODE, select Thin/Thick.

12. Click Done.

NOTE: Make sure that the latest VMware tool is installed.

181
Chapter 18 - Moving between physical node and virtual node

Virtual to physical
ATTENTION: During a restore, the changes made to the
system since the last backup is lost.

Prerequisite

You must have backups of virtual machine in storage node.


Starting up

ATTENTION: The boot sequence must be set to CD/DVD


Drive in BIOS before inserting the CD/DVD.

1. Insert the EBR R520 recovery media into the CD/DVD Drive.
2. Start from the CD/DVD drive.
l The Starting Acronis Loader message appears.

3. On the Acronis Rescue Media screen, click one of the following


options:
a. Acronis Universal Restore
b. Acronis Cyber Protect (64-bit with UEFI support)
c. Continue OS booting
4. a) Click Acronis Cyber Protect (64-bit with UEFI support) The
Acronis Bootable Agent screen appears.

TIP: Wait for a few minutes before the Acronis recovery


media is loaded.

Configuring the Network

TIP:
You must configure the network only if you are restoring
an image that is on the shared network.
If you are not restoring an image on the network, go to
step 7.

182
Chapter 18 - Moving between physical node and virtual node

5. Click the Configure network button.


l The Network Settings dialog box appears.

6. Enter the following network settings for the target computer:


l IP Address

l Subnet mask

l Default Gateways

TIP: The appropriate network settings are available from


your System Administrator.

7. Click OK
The Acronis Bootable Agent screen appears.
8. Click Manage this machine locally.

ATTENTION:
After Step 7, Remove the EBR Recovery media CD and
insert
The Initialization Media CD.
Use the Initialization Media version that you received with
the computer on which you are restoring the image or the
latest version Initialization Media.
After Step 7, Remove the EBR Recovery media CD and
insert

NOTE:
Please copy following folder from init media
“\PACKAGES\EBR
DRIVERS\” and “\PACKAGES\EBR DRIVERS\Drivers” in an
USB, and install the drivers using USB providing (adding)
the above location via Apply universal restore.

9. On the home page, under Actions, click Recover. The Recover


data page appears.
What to recover
10. For Select Data option, click Required. The Data to recover
selection dialog box appears.
11. Perform one of the following actions:

183
Chapter 18 - Moving between physical node and virtual node

l In the Data Path box, type the location of the backup that
contains the data you want to recover.
Or
l Browse through the folder tree and select the backup that
contains the data you want to recover.
12. Click OK
13. In the Backup contents list, click one of the following:
l Volumes
l Disks
l Files
If you have selected Volume, then continue with Step 13. If you
have selected Disk, then go to Step 15.
For Volume

TIP: If recovering a System volume, recover the MBR


along with the system volume bootable

14. Click Required, and select the required physical volumes to


recover.
For Disks
15. Click Required, and select the required physical disk to recover.
Where to recover
16. The data you want to recover and the selected disks/files appear
under Where to recover.
l Click Required, and choose an appropriate destination for the
recovered data.

TIP: Ensure that the NT Signature option is set to Select


automatically.

NOTE:
If the operating system is installed using Experion
Initialization media then the System Reserved partition

184
Chapter 18 - Moving between physical node and virtual node

may not exist.


If the operating system is installed directly from the
media provided by Microsoft, then the System Reserved
partition may be present.

TIP: Ensure that the Acronis Active Restore option is set


to Default.[No]

17. Click Ok.


Universal restore for Windows

ATTENTION: You must use the Universal Restore feature


only for restoring dissimilar hardware.

18. In the Universal Restore list, select any one of the following:
l Do not use
l Use
l Select Do not use if:
− The restore destination is the same node.
Or
− The restore destination is a similar node.
l Select Use if the restore destination is a dissimilar node.
If you click Use, you must configure settings for Universal
Restore.
To configure settings for Universal Restore, perform the
following steps:
1. Under Automatic driver search, in the Search removable
media list, click On.
2. Click Add Folder.
l The Folder for Search Selection dialog box appears.

3. Browse through the folder tree and then select the


CD/DVD drive to search for missing drivers.

185
Chapter 18 - Moving between physical node and virtual node

NOTE:
Required drivers are located on the Initialization
Media.
Please copy following folder from init media R201.1
“\PACKAGES\EBR DRIVERS\” and
“\PACKAGES\EBR DRIVERS\Drivers” in an USB,
and install the drivers using USB providing (adding)
the above location via Apply universal restore.

4. Click OK.

NOTE:
You can add multiple folders by clicking Add folder.
If you are restoring EPKS R400.x backup image on
to Dell R7610, then add the folder on the external
storage device at which you had copied
“DVD:\PACKAGES\EBR DRIVERS\R7610\32”
contents

19. After recovery completes, the Succeeded message appears. Click


Close.

NOTE: Universal Restore operation on few of the platforms


may complete with “Succeeded with Warnings” status. This
message can be safely ignored.

20. Click the Close button on the upper-right corner of the window to
return to the Acronis Bootable Agent window.
21. Click Reboot.

TIP: If the reboot does not happen automatically, reboot


the system manually.

22. Log on to the computer using appropriate credentials. The


device driver software installation begins.

186
Chapter 18 - Moving between physical node and virtual node

NOTE: If you have restored EPKS R400.x backup image on


to Dell R7610, then perform the below mentioned
additional steps

1. Go to Device Manager
2. Select SAS Controller->Properties->Update Driver
3. Browse to folder on the external storage device at which you
had copied “DVD:\PACKAGES\EBR DRIVERS\R7610\32”
contents.
23. After the installation, the system prompts for restart.
l Click Restart Now.

ATTENTION: This is a mandatory step applicable for


Universal restore only.

187
CHAPTER

19 MIGRATING FROM R501.3 HOTFIX3 OR


HOTFIX4 UPGRADE

NOTE:
l Upgrade from R501.3, R501.3 Hotfix1 and Hotfix2 is not

supported.
l In some cases, Protection plans created in R501 is not

seen after upgrade. The backup plan needs to be


recreated after the upgrade.

To upgrade EBR manager from R501.3 to


R520.1
1. Insert the EBR Installation DVD into the DVD drive. The
AutoPlay dialog box appears.
2. Double-click Open Folder to view files.

NOTE:
If the AutoPlay dialog box does not appear, right-click
the DVD/CD drive and then select Open.
Or
Open Windows Explorer, and then navigate to the DVD
drive.

3. Right-click Setup.exe, and select Run as administrator from


the dropdown list.
The User Account Control dialog box appears.

188
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

4. Click Yes.
The Honeywell Experion Backup and Restore window

189
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

appears.

5. Click Next.
The License Agreement dialog box appears.

6. Read the license agreement, select I accept the terms in the


License agreement, and click Next.
The License Information dialog box appears.

190
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

7. Type the system number in in the System Number field.


8. Type authorization number in the Authorization Field.

NOTE: The System Number and Authorization Number


are available from the License Authorization of
Honeywell. This information determines which
software packages you are authorized to install.

9. Click Next.
The Features and Options Selection dialog box appears.

191
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

10. Select Acronis Backup 15 and EBR Scripts (if needed), and
click Next. The Summary dialog box appears. Click Install.

11. The wizard installs Acronis Backup 15.

NOTE: The checkbox on left-hand column displays the


status of completion after each component
installation.

192
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

12. If Acronis is earlier installed, click Update.

Acronis Backup screen appears.


13. Provide the username and password credentials. Click done.

193
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

14. Click Restart.

After the installation is complete, message appears.


15. Click Close.

To update All in One Appliance


Perform the following steps to update All In One Appliance.
1. Copy the folder All-in-one_appliancefrom EBR R520.1
media to a folder accessible by the All-in-One Acronis
Virtual Machine (VM).
2. From the folder, boot the All-in-One Acronis VM with
AcronisBackupAppliance.iso.
3. After reboot, the Setup page appears.

ATTENTION: Make sure to verify if the ISO file version


appearing under “Current settings” of the setup page

194
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

is the version you want to update.

4. Select Update. The Welcome to Cyber Backup appliance


page appears.

5. To access the dashboard, click on the link under Acronis


Cyber Backup console.

To validate the installation


Perform the following steps to validate the installation on the
node.
1. Launch Acronis Backup & Recovery 15.
2. Click Help icon at the top right corner.

195
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

Result: The About page appears. The version on the node


should be Build 15.0.26172.

Post installation tasks


Perform the following steps after the installation:
1. Launch Acronis Backup & Recovery 15.
2. On the left pane, under Settings, click Agents.

3. Select the Hostname and double-click on Agent version.


4. On the right pane, select the Hostname and click Upgrade
agent.

196
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

The Specify credentials dialog box appears.


5. Type the credentials and click OK.
6. After the installation is complete, Agent version displays the
latest version.

7. On the left pane, under Plans, click Backup.


8. On the right pane, click Enable.

197
Chapter 19 - Migrating from R501.3 Hotfix3 or Hotfix4 Upgrade

NOTE: If you don’t see the Protection plans after upgrade


or newly created plans cannot be started, then recreate the
backup plans.

198
CHAPTER

20 SECURITY

In this section:

Security recommendations 200


Installing the latest antivirus software 200

199
Chapter 20 - Security

Security recommendations
n Honeywell recommends encrypting all protectionss using
AES-Advanced
l Encryption Standard , especially if they are stored

offsite.
n There is no way to recover encrypted protections (backup)
if you lose or forget the password.
n After a protection (backup) plan is applied, the encryption
settings cannot be modified.
n For securing the data, Honeywell recommends AES-256
encryption.
n To secure this communication channel, Honeywell
recommends launching with Acronis Cyber Protect
(Secure connection) forcing HTTPS in the Web interface.
n Acronis logs are present under “C:\programdata\acronis”
folder which may contain user data. You can delete these
logs if needed.
n Honeywell discourages the use of self-signed certificates.

NOTE: For more information on Network and Security, see


the Network and Security Planning Guide

Installing the latest antivirus software


Verify that the latest antivirus software is installed and patched
to the proper version for your operating system. You can find
the latest antivirus solution information at.
https://process.honeywell.com

ATTENTION:
l You must access the from a secured computer, rather

than from a node within your Experion system.


l To access zip file, save the file in the local drive and then

open.

To access the Honeywell Process Solutions website

200
Chapter 20 - Security

1. In the web browser, type the following


URL.https://process.honeywell.com/supportThe Product
Support page appears.
2. If you are a new user, register for access at this site. Click
Register, and follow the instructions on the screen.
3. If you are already registered, type your username and
password, and then click Login.Your account login name
appears in the top-right of the page.
To apply the latest antivirus notification
1. Open the Product Support page.
2. To view and download the latest antivirus notifications, click
Latest Notifications.OrIn addition, you can search for the
latest notification using the search modes available in the
Product Support page. The following table describes the
search options. Choose any one of the following option and
then perform the corresponding steps.

Option Description

Search Support a. Click Advanced.The


DocumentationTo use this Advanced Support
option you must have an Document Search page is
active support contract. displayed.
b. Type all the details about
the document or use
wildcards to search for the
notification. Click
Search.For example, if you
are searching for Anti-virus
Software Guidelines, type
the information and click
Search. The document is
displayed.

Search by Product and a. Type the name of the


Subscribe to NotificationsThis product.The related
provides the complete products are displayed.
information about a specific b. Click the required product
product. In addition you can with the release.The
also subscribe to this page for Documentation,
alerts where a notification is Notifications, Software
Downloads and Security

201
Chapter 20 - Security

Option Description

sent to you about the Updates for the particular


published document. product are displayed.
3. Locate the required notification.
4. Once you locate the required notification, click
Download.The required notification is downloaded on your
computer.

202
CHAPTER

21 TROUBLESHOOTING

In this section:

Manually applying license to the virtual appliance 204


Manually removing virtual appliance from vCenter 205
Uninstalling the R520 version of EBR Manager, Server, and
Desktop software packages 205
Network Adapters are not shown in Network Connections
Folder 206

203
Chapter 21 - Troubleshooting

Manually applying license to the virtual


appliance
1. Connect to the management server.

NOTE: For more information about connecting to the


management server, see Adding computers to the
management server.

1. From the Navigation pane, click Machines with agents and


select All machines with agents. The All machines with agents
page appears.
2. From the toolbar, click Actions and select Change license server.
The Change license server dialog box appears.
3. In the Machine field, provide the IP of the machine where the
license server has been installed and then click OK.
4. In the All machines with agents page, select the virtual
appliance to which the license needs to be applied. The < name
of the selected virtual appliance> actions button appears in the
toolbar.
5. Click the button with the name of the selected virtual appliance
and the suffix actions, and then select Change license. The
Licenses dialog box appears.
6. In the License for backup of disks/files field, click Specify. The
License change for <IP address of ESX(i) host> dialog box
appears.
7. From the Available licenses: list, select Acronis Cyber Protect 15
Virtual Edition for VMware vSphere and then click OK. The
Licenses dialog box appears.
8. Click Close.
To verify the application of license

9. From the Navigation pane, click Licenses. The License server on


<machine IP where server is installed> page appears.
10. Expand the Acronis Cyber Protect 15 Virtual Edition for VMware
vSphere list.
11. Verify that the required host machine has been assigned a
license.

204
Chapter 21 - Troubleshooting

Manually removing virtual appliance from


vCenter
Prerequisites

Log on to the vCenter host with the administrative privileges


from the vSphere client.
1. In the left pane of the vSphere home page, select the required
virtual appliance to be deleted.

NOTE: The name format is AcronisESXAppliance[N] where


N is the number assigned to the virtual appliance.

2. Right-click, select Power and then Power Off the virtual


appliance.

TIP: In the recent tasks section, check for the progress of


the Powering off of the appliance.

3. After the virtual appliance is powered off, right click the virtual
appliance again and select Delete from Disk and then Click OK.

Uninstalling the R520 version of EBR Manager,


Server, and Desktop software packages
About this section

This section describes the procedure to uninstall R520 version


of EBR Manager, Server, and Desktop software packages. The
procedure for uninstallation is the same for the EBR manager,
Server and desktop software packages.
Uninstalling Acronis Cyber Protect 15

1. Click Start > Settings > System > Apps & Features. Click and
uninstall Acronis Protect.
2. Select “Remove the logs and configuration settings” if they are to
be removed too.
3. Click Uninstall.

205
Chapter 21 - Troubleshooting

Network Adapters are not shown in Network


Connections Folder
After you perform Universal restore of Windows node, network
adapters might not be shown in Network Connections Folder.

ATTENTION: Backup the registry before performing this


operation.

Follow the below steps to bring back the network adapters for
Windows:
1. Type regedit in RUN or Start search box and press Enter. The
Registry Editor window appears.
2. To Clean up registry:
l Delete the Network Cards at the below location:
l HKEY_ LOCAL_
MACHINE\SOFTWARE\Microsoft\Windows
l NT\CurrentVersion\NetworkCards

206
Chapter 21 - Troubleshooting

3. Then Delete the Config Key at the below location:


l HKEY_LOCAL_

MACHINE\SYSTEM\CurrentControlSet\Control\Network

4. Then Delete the Interfaces and Adapters at the below


location:
l HKEY_LOCAL_

MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Pa
ramete

207
Chapter 21 - Troubleshooting

5. Once the above steps are completed, run the below


commands via administrator login to command prompt:
n netsh int ip reset
n netsh winsock reset catalog
n netsh int tcp reset

6. Reboot the system and follow the below steps:

a. Remove the NIC Drivers from the Add/Remove


Programs (appwiz.cpl)
b. Once completed, remove the Driver from the NIC in the
Device Manager Console.
l (If you see – “Delete the Driver software for this

device”, put a check mark on it.)


c. Now, reboot the Server and wait for 5 minutes to see if
NIC cards are visible. If not visible, then follow the next
step.
d. Install the Driver from the Source.

7. Later Uninstall the Honeywell FTE MUX if NIC cards are still
attach to it (from NIC cards as well as appwiz.cpl) and Install
the Honeywell FTE MUX. For more information on installing
FTE MUX, refer Installing FTE MUX adapter after Restore
section.

208
CHAPTER

A APPENDIX A: INSTALLING FTE MUX

ADAPTER

Installing FTE MUX adapter after Restore


Installing the FTE MUX adapter on a Embedded Microsoft
Windows 10 LTSC Enterprise and Embedded Microsoft
Windows Server 2019 Standard computer.

NOTE: For EHG node, ensure that heights MAC address


network adapter is not used for FTE.

1. Log on with local account which has local administrator and


product administrator privileges.
2. Click Start > Windows System > Control Panel > Network and
Internet. The Network and Internet page appears.
3. Click Network and Sharing Center. The Network and Sharing
page appears.
4. In the left pane click Change adapter settings.
5. Perform one of the following actions:
n For Embedded Microsoft Windows Server 2019 Standard,
select Manage network Connections.
n For Embedded Microsoft Windows 10 LTSC Enterprise ,
select Change Adapter Settings.
The Verify Networks Connection window appears.

ATTENTION: After Universal restore, Honeywell FTE


Adapter may not be present. So FTE adapter should
be installed.

209
Appendix A: Installing FTE MUX adapter

6. Right-click FTE Yellow and select Properties. The FTE Yellow


Properties dialog box appears.

TIP: If the User Account Control message appears,


click Continue.

7. Select Honeywell FTE Mux-IM Protocol Driver. Click


Uninstall.
8. Reboot the machine.
9. Repeat steps 1 to 4.
10. Select Internet Protocol Version 4 (TCP/IPv4) and then click
Properties.
l The Internet Protocol Version 4 (TCP/IPv4) properties

dialog box appears.


11. Type the required details and then click OK.
12. Click Install. The Select Network Feature Type dialog box
appears.
13. Select Protocol and click Add.
l The Select Network Protocol window appears.

14. Under Manufacturer, click Honeywell. The Select Network


Protocol dialog box appears.
15. Under Network Protocol, select Honeywell FTE Mux-IM
Protocol Driver and then click OK.
16. After the installation is complete, reboot the machine.
17. Repeat steps 1 to 4.
18. Select Honeywell FTE Mux-IM Protocol Driver and then click
Properties.
19. The Honeywell FTE Mux-IM Protocol Driver Properties page
appears.
20. Click the Configure tab, type the required Device Index and
IPMC Destination Address and then click OK.

210
CHAPTER

B APPENDIX B: INITIALIZATION MEDIA

VERSIONS

Initialization Media versions and their


corresponding product releases
The following table shows Initialization Media versions with
their corresponding Experion PKS releases:

Initialization Media version Experion PKS release

EXPPlus 201.x or later R501

EXPPlus 200.2 or later R500

EXPPlus 220.x or later R520

EXPPlus 230.x or later R530

211
CHAPTER

C APPENDIX C: CONFIGURING AND

CONNECTING PROTECTION DEVICES


This appendix guides you through installing and configuring a
Network Attached Storage (NAS) that will be used to store
backups.

In this section:

Prerequisites 213
Setting up the NAS hardware 213
Configuring the physical client to access the subnet of the
NAS device 216
Connecting to the NAS device and configuring DNS, WINS,
and bonding mode 217
Configuring networking properties 217
Configuring the physical client to access the management
subnet 218
Bonding the network interfaces to support load balancing 218
Identifying NAS devices 219
Adding the NAS device to the DNS server 219
Enabling security 220

212
Appendix C: Configuring and connecting protection devices

Prerequisites
You Must ;
n Have a NAS device with sufficient space to store backups.
n Have allocated one or more IP addresses on the
Management Network for the NAS device.
n Have network switch ports available to connect the NAS to
the management network.
n Have DNS and WINS information for the system.
n Have an IP Address for a Domain controller or a time source
to be used for time synchronization.
n Have available and enabled ports on the management
switch (a free port on each management switch if using
redundant Level 2.5 switches as part of the Management
Network).
n Have established a naming convention for the NAS device,
for example:
o − BackupScope = System, L3, L2, Cluster

o − NAS Device Name = BackupScope_NAS01

Setting up the NAS hardware


Supported NAS devices:

Honeywell Model
Dell NAS Model
No

MZ-NWSTR2 DELL NX400 HONEYWELL NAS, 8TB, 1U


RACK

MZ-NWSTR3 NETWORK STORAGE DELL NX430 1U RACK

MZ-NWSTR4 NETWORK STORAGE DELL NX440 1U STD


RACK

MZ-NWSTR5 NETWORK STORAGE DELL NX440 1U PERF


RACK

MZ-NWSTR6 NETWORK STORAGE DELL R350XE STD

MZ-NWSTR7 NETWORK STORAGE DELL R350XE PERF

213
Appendix C: Configuring and connecting protection devices

Honeywell Model
Dell NAS Model
No

MZ-NWSTR8 NETWORK STORAGE DELL R360XE STD

MZ-NWSTR9 NETWORK STORAGE DELL R360XE PERF

The NAS device comes with preconfigured disk alignment


which has 3 different drives (C drive, D drive and E drive). If you
want to merge the drive space available on D drive and E drive
for better management of available drive space, then perform
the following procedure to merge D drive and E drive (Note: C
drive is the operating system drive).
1. Launch the Server Manager window from left corner of system
tray.
2. Click Tools in the upper-right corner of the Server Manager
window.

3. Select Computer Management from the drop-down list.


Computer Management window appears.
4. Double-click on Disk management under storage. Disk type of
Disk 0 and Disk 1 appear as “Static”.
5. Right-click on Disk 0 and then select covert to dynamic disk.

214
Appendix C: Configuring and connecting protection devices

6. Restart the system and then open the computer management


window again by following the procedure as described earlier.
7. Right-click on Drive D and then select delete volume.
8. Right-click on Drive E and then select delete volume.

NOTE: It is assumed that both the drives are empty and


that all content is on the operating system partition,
which is C drive.

Result: Both partitions should now appear as unallocated


space.
9. Right-click on Drive E of Disk1 and select New Spanned
volumes.

10. Add the unallocated space from what was in the D drive.

215
Appendix C: Configuring and connecting protection devices

11. After the operation is completed, one volume letter (for


example, G:) appears that spans across multiple partitions.

NOTE: Disk 0 and Disk 1 can be converted to dynamic disk


by performing this operation.

Configuring the physical client to access the


subnet of the NAS device
Configuring the physical client to access the subnet of the NAS device

1. Log on to the physical client node connected to the


management network.

ATTENTION: The client node must be connected to the


same switch as the NAS device.

2. Write down the IP address of the client node.


3. Using the Network Connection Properties dialog box,
change the IP address of the client node to the value
captured for the NAS hardware, but add 2 to the final value.
l For example, if the NAS IP address is 169.254.10.10, use

169.254.10.12 for the client node.


4. A warning about the default gateway appears.
5. Click Yes to save the configuration.

216
Appendix C: Configuring and connecting protection devices

Connecting to the NAS device and configuring


DNS, WINS, and bonding mode
Connecting to the NAS device and configuring DNS, WINS, and bonding mode

Step Action
1. On the physical client node, open Internet Explorer and navigate
to the NAS IP address. The Management Console for the Iomega
StorCenter appears.
2. Click Network in the left hand pane.
3. Click Network in the main display. The Change Network Settings
page appears.
4. Click Modify network settings. The Network Settings dialog
appears.
5. Clear the Automatically configure DNS, WINS and all IP
addresses check box.
6. Type IP address values in the DNS Servers and WINS Servers
boxes.
7. Select Adaptive Load Balance in the Bonding Mode list.
8. Click Apply.
9. Click Yes when prompted to continue the connection.

Configuring networking properties


1. From the Change Network Settings page of the Management
Console, expand the details for the first interface in the Network
Interface column.
2. Clear the Automatically acquire network address check box.
3. Type values for the IP Address, Subnet Mask, and Gateway for
the management network in the boxes provided.
4. In the Jumbo Frames list, select None.
5. Click Apply.
6. Click Yes when prompted to continue the connection.
l The new IP address appears in the NAS display. The NAS is

now in the management network, and it is no longer


connected to the physical client. You now need to change the

217
Appendix C: Configuring and connecting protection devices

IP Address for the Physical Client back to the management


network so that you can reconnect to the NAS.

Configuring the physical client to access the


management subnet
To configure the physical client to access the management
subnet:
Step Action
1. From the Network Connection Properties dialog box, change the
IP Address back to its original address as mentioned in step 2 of
"procedure for configuring Physical Client to access the subnet of
the NAS device".
2. On the physical client node, open Internet Explorer and navigate
to the NAS IP address. The Management Console appears.
3. If you have a second NIC connected to the Management switch,
complete the next procedure. Otherwise, move ahead to
procedure for Identifying the NAS Devices.

Bonding the network interfaces to support load


balancing
Bonding is similar to the VMWare concept of "NIC Teaming" in
that it configures or bonds two NICs so they provide
redundancy with the option of distributing or balancing a load.
Iomega’s bonding has three modes:
l Adaptive load balance - no switch configuration required
l Link aggregation - switch configuration required
l Failover only - redundancy without load balancing
Bonding was previously configured with the DNS and WINS
settings and is only useful when both network interfaces are
connected to the management network.
To bond the network interfaces to support load balancing:
1. From the Management Console, click Network in the left hand
pane.
2. Click Network in the main display.

218
Appendix C: Configuring and connecting protection devices

The Network Configuration dialog appears.


3. Expand the first interface in the Network Interface column and
expand Bond Network Interface.
4. In the Bonded column, select the check box for the second NIC.
5. Click Apply.
6. Click OK when prompted that both NICs were configured on the
same subnet.
7. Click Yes when prompted to continue the connection.

Identifying NAS devices


This procedure gives the NAS device a network name and a
descriptive name. The default configuration of the NAS device
has it in a workgroup, which has the following advantages:
l It allows you to create and manage user accounts locally.
l By using local accounts you will avoid connection issues
encountered with Windows Domain accounts when a domain
controller is unavailable.
To identify NAS devices:
1. From the Management Console, click Network in the left hand
pane.
2. Click Device Identification in the main display.
3. In the Device Name box, type a name for the NAS device that
identifies the scope of the system for which it holds the backup.
For example,
Scope_NAS01, where SCOPE could be System, Level3.5, Level3,
Level2, or Cluster.
4. Click Apply.
5. Click Yes when prompted to continue the connection.

Adding the NAS device to the DNS server


Adding the name and IP address of the NAS device to your DNS
server makes it accessible by both methods.
To add the NAS device to the DNS server:
1. Using the NAS device name and its IP address, create a new
‘HOST A’ record in your DNS server.

219
Appendix C: Configuring and connecting protection devices

l The domain name server (DNS) must contain the name of the
NAS.
2. Manually add the device name to the DNS server, by adding a
‘Host A’ record to the appropriate Forward Lookup zone.

Enabling security
Enabling security on the NAS device defines the account and
password required for NAS administration. It also allows the
NAS administrator to create user accounts to restrict access to
shares.
To enable security:
1. From the Management Console, click System in the left
hand pane.
2. Click Security in the main display.
3. Click On.
The Enable Security dialog box appears.
4. Type a Username and Password in the boxes provided.
These will be used to administer the NAS device. Record
them for future reference.
5. Select the Encrypt network communication using SSL check
box if it applies to your network.
6. Click Apply.

220
CHAPTER

D APPENDIX D: RE-ADDING BACK THE

RESTORED NODE TO DOMAIN


If the cluster is in domain environment, and if you restore the
EBR backed up image to the node which is added to domain,
then perform the following steps:

1. Re-add the restored node to the workgroup.


2. Reboot the node.
3. Add the rebooted node to the domain.
4. Run Link Domain Groups.

221
CHAPTER

E APPENDIX E: REMOVING PHANTOM FTE

DEVICES
You must perform this task on all nodes (Server B, Flex,
Console, and Sever A).
Devices installed on the computer and later removed,
sometimes remain as a configured device in the registry. For
example, an on-board Network Interface Card (NIC) that was
once used on the computer may still exist in the registry even
though it is removed and disabled in the BIOS, to allow the
installation of a dual NIC adapter for FTE support.
The Add/Remove Hardware utility retains the removed device
configuration in the
Windows registry and so the FTE service binds to this phantom
or removed device. For
Experion migration and installation, this presents a problem for
the FTE service. To avoid any probable issue due to phantom
devices, perform the following procedure to remove these
phantom devices from the computer.

ATTENTION: Record device index, multicast address, and so


on before performing the procedure to remove the
phantom devices.

In this section:

To verify a phantom FTE device 223


To remove a phantom FTE device 224

222
Appendix E: Removing Phantom FTE devices

To verify a phantom FTE device


Perform the following steps:
1. Choose Start > Run and in the Run dialog box, type cmd.
2. On the Command Prompt type: set devmgr_show_nonpresent_
devices=1 and press ENTER.
3. Type start devmgmt.mscand press ENTER.
4. From the Device Manager, choose View > Show hidden devices.
5. Expand Network adapters tree.

223
Appendix E: Removing Phantom FTE devices

To remove a phantom FTE device


Perform the following steps:
1. Choose Start > Settings > Network and Internet > Change
Adapter options.
The Network Connections dialog box is displayed.
2. Right-click Yellow Ethernet adapter and select Properties.
3. Select Honeywell Fault Tolerant Ethernet Service.
4. Click Uninstall. If a confirmation message appears as following,
click Yes.

5. If you are prompted to restart the computer, click No.


6. Click Close and then No to restart the computer.
7. To remove the phantom FTE device perform the steps
mentioned in “To verify a phantom FTE device” procedure.
8. Right-click a non-present device and then click uninstall.
Following confirmation message is displayed.

9. Click OK to confirm the removal of the device.


10. Ensure that you restart the computer.
11. Log on as Administrator to reinstall FTE Driver service on the
network adapter.

224
Appendix E: Removing Phantom FTE devices

12. Select My Network Properties and right-click the Yellow


Ethernet adapter and select properties.
13. In the Yellow Adapter Properties dialog box, select Install.
14. In the Network Component Types, select Service and select Add.
15. Click Network Service and then click Have disk
16. Install from Disk and click Browse.
Locate file at C:\Program Files\Honeywell\FTE_Driver.
17. Click Open.
18. Install from Disk, and click OK.
19. Select Network Service. Select Honeywell Fault Tolerant
Ethernet.
20. Click OK.
21. On the Yellow Adapter Properties dialog box, select Honeywell
Fault Tolerant Ethernet Service and then select Properties.
22. Select the Yellow and Green adapter check boxes. Enter or
verify the correct device index, Multicast address, and other
settings.
23. Click OK.
24. Return to the Yellow Adapter Properties dialog box.
25. Click Close.
26. Restart the system.

225
Notices

NOTICES
Trademarks
Experion®, PlantScape®, SafeBrowse®, TotalPlant®, and TDC
3000® are registered trademarks of Honeywell International,
Inc.
Experion®, PlantScape®, SafeBrowse®, TotalPlant®, and TDC
3000® are registered trademarks of Honeywell International,
Inc.
ControlEdge™ is a trademark of Honeywell International, Inc.
OneWireless™ is a trademark of Honeywell International, Inc.
Matrikon® and MatrikonOPC™ are trademarks of Matrikon
International. Matrikon International is a business unit of
Honeywell International, Inc.
Movilizer® is a registered trademark of Movilizer GmbH.
Movilizer GmbH is a business unit of Honeywell International,
Inc.

Other trademarks
Microsoft and SQL Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States
and/or other countries.
Trademarks that appear in this document are used only to the
benefit of the trademark owner, with no intention of trademark
infringement.

Third-party licenses
This product may contain or be derived from materials,
including software, of third parties. The third party materials
may be subject to licenses, notices, restrictions and obligations
imposed by the licensor. The licenses, notices, restrictions and
obligations, if any, may be found in the materials
accompanying the product, in the documents or files
accompanying such third party materials, in a file named third_
party_licenses on the media containing the product, or at
http://www.honeywell.com/ps/thirdpartylicenses.

226
Notices

Documentation feedback
You can find the most up-to-date documents in the Support
section of the Honeywell Process Solutions website at:
https://process.honeywell.com
If you have comments about Honeywell Process Solutions
documentation, send your feedback to:
[email protected]
Use this email address to provide feedback, or to report errors
and omissions in the documentation. For immediate help with
a technical problem, contact your local Honeywell Process
Solutions Customer Contact Center (CCC) or Honeywell
Technical Assistance Center (TAC).

How to report a security vulnerability


For the purpose of submission, a security vulnerability is
defined as a software defect or weakness that can be exploited
to reduce the operational or security capabilities of the
software.
Honeywell investigates all reports of security vulnerabilities
affecting Honeywell products and services.
To report a potential security vulnerability against any
Honeywell product, please follow the instructions at:
https://www.honeywell.com/us/en/product-security.

Support
For support, contact your local Honeywell Process Solutions
Customer Contact Center (CCC). To find your local CCC visit the
website, https://process.honeywell.com/us/en/contact-us.

Training classes
Honeywell holds technical training classes that are taught by
process control systems experts. For more information about
these classes, contact your Honeywell representative, or see
https://process.honeywell.com/us/en/services/training.

227

You might also like