RR to RR on AWS Replicate

Hello

It is possible to have a RR replicant RR machine running on AWS? I have a DL4300 and I need to replicate in AWS (I can create a Windows Machine and install RR on that).

Thank you.

Michael.

Hi fdezmichael:

I have a client who replicates on AWS, since AppAssure version 5.2.4 if I remember correctly. I have worked with him several times and none of the themes have been associated with AWS. In my opinion, as long as bandwidth wan is able to support the amount of data you want to replicate, all should be well.

Tags: Dell Tech

Similar Questions

  • Can I replicate folders of e-mail between devices

    I have several devices and use the e-mail and use gmail with an IMAP account.  I don't use gmail webmail.

    On my MBA, I created several folders so I can store emails specific to particular topics.  However, once I moved an email in the Inbox MBA in a folder, if I try to find the email on another device (iMac or iPad), it isn't here.  If I get on the second device, it shows no more.

    Is there anyway that I can replicate these folders of email on all my devices so that if I move an email in my Inbox to a folder, then it appears in this folder on all devices?

    Thank you

    It looks like you created the local mailbox that does not synchronize with devices. Try to create the mailboxes under the account rather than on my Mac. They will be IMAP mailboxes and must synchronize between devices.

    When you create a new mailbox, select as shown below:

  • Replicate defective since the firmware 6.4.0 (RN102)

    Hello

    Since the update of the firmware 6.4.0, replicate defective Internet with exit code 10 (RN102). According to the records of the newspaper the detected connection before the update was relayed (method 5), subsequently LAN (2 Queens). The target NAS is not still on firmware 6.4.0. Does anyone have any suggestions?

    Thank you

    Kim

    Since the the second ReadyNAS upgrade to firmware 6.4.0, the backup replication works again.

  • ReadyNAS 314 ReadyNAS Replicate records do not

    Hello

    I'm trying to record from the ReadyNAS admin console the Cloud ReadyNAS Replicate function. Registration does not work.

    I turn on the ReadyNAS Replicate function and introduced a popup to enter my username and password. I enter the username and password which gives me access to the ReadyNAS Replicate web site, but I am present an error indicating "username or password is invalid.

    The ReadyNAS was recorded before the upgrade to version 6.5 and 6.5.1. Before the update, I was able to see and access the ReadyNAS device from the ReadyNAS Replicate Web site.

    Peripheral ReadyNAS is version: 6.5.1

    My assumption is that the problem is not with the credentials, as the credentials work to connect to the ReadyNAS Replicate site.

    Any ideas on the problem?

    I have an another ReadyNAS just factory reset with a new drive and it is also not able to register for ReadyNAS Replicate. ReadyNAS RN102, Version 6.5.1

    The problem was solved by deleting my existng account and create a new ReadyNAS Remote account.

    Something must have gotten messed up with the existing account in the back-end system.

    Thank you for the help on the private channel.

  • ReadyNAS Replicate

    After the migration of my account ReadyCloud account MyNETGEAR.com that I can not log on the Readynas replicate page. My ReadyCloud works ok after the migration, but when I try to log in my reply nothing happens. Why? I do wrog? The backups work although I get e-mails confirming that.

    Concerning

    Jan

    Hi 55north, MugiMuc, ReneC,.

    You need to use your old account (the one you use to connect before) that is not the ReadyCLOUD migrated / my NETGEAR account.

    Kind regards

    BrianL
    NETGEAR community team

  • T-mobile AWS HSPA + lost connection

    I have a unlocked Atrix HD of Bell Mobility and I use it on t-mobile. first days were great! I have hspa + with speeds of at par with my old feeling. However, ive been stuck on the edge since this morning. I played with my phone checking if tmobile has informed their hspa refarmed pcs network in my area by using the service menu. Since then, I could not bring the AWS HSPA +. Any suggestion or help is very appreciated.

    One last thing - because I see that some use the Atrix HD unlocked on T - mo, the issue could have been connected to your area.

    But there are service menus that are not designed to be user accessible - make changes to some of them are permanent. If you have made a permanent change, you will need to send your phone in service.

    The only way to tell for sure would be to use a Bell SIM card and see if you get 3g. If this isn't the case, then you missed something.

  • The K920 supports the AWS band?

    Tried the search and not getting not direct response. Can anyone who has the international version of the K920 (floppy version I think) check that the phone supports the AWS for example band. 1700/2100 WCDMA or band 4.

    Currently have a K910 is a great phone, which supports AWS, so would like to update. Thank you.

    Hi n1tro

    These are the PRO radios Specifications K920(ROW international version) Z2:

    • 2G network: WCDMA 850 MHz/900 MHz/1800 MHz/1900 MHz

    • Network 3G 850 MHz/900 MHz/1700 MHz/1800 MHz/1900 MHz

    • 4G network: FDD band 1, 3, 7, 20

    • Speed: HSPA + 150 Mbps (DL) / 50 Mbps (UL)

    I hope this helps.

    Kind regards.

  • 4 AWS bands?

    I was not able to find this info anywhere?

    4.4 need activate 4 band AWS on Verizon phones?

    4 band AWS is enabled in my market and it works on the 4 SMS - it doesn't seem to work on TSF Vzw Moto X KK

  • How Google Cloud AWS and Windows Azure to compare to another?

    I am quite familiar with AWS, MS Azure, Google Compute engine and have used Linux virtual machines in three environments without any problem. I often hear this argument: use of blue if you're a .NET shop, otherwise use AWS. I plead for more details. What are the benefits that you get if you use AWS or Google Cloud instead of azure and vice versa?

    Cloud of the seller competition warms to include a price war and new offerings feature in the battle for your business. Amazon is the undisputed leader with more than 8 years on the market with Azure after his fine second with their big push for ARMS.

    Aaron pools

    #iWork4Dell

  • VWorkspace in AWS

    Has anyone tried to run VWorkspace in AWS?

    Are there plans for VWorkspace VDI in the clouds like AWS?

    Hello

    vWorkspace support Microsoft Azure

  • Replicate the Volumes CSV with the virtual machines in Hyper-V by ASM?

    Hello

    We are migrating to VMware, Hyper-v. VMware reproduced us some across the Equallogic HIT VMFS volumes.

    On Hyper-V, I can replicate VMs in Hyper-V, but they may not have comments ISCSI.

    We want comments ISCSI features, I'm trying to reproduce the CSV volumes.

    Is this supported? Is there a document that describes the configuration and usage?

    Hello

    With Windows 2012 and 2012R2, there is a problem that currently prevents the HIT / replica ME volumes CSV.   Until it's resolved, you need to plan the replication of CSV volumes via the user interface of group.  I think this is mentioned in the HIT / ME v4.7.x documentation.

    Kind regards

  • Can I replicate snapshots?

    I have a volume with a number of shots, and I want to copy snapshots of another group of storage; in other words, my ultimate goal is a set of volumes on the destination storage group, each of which is a clone of the respective snapshot.

    I know that I can clone each snapshot on the source storage group and then use replication to move each volume, the storage group destination, but because of the free space on the source group that I do it a snapshot at a time that is going to be slow and painful.

    I was hoping to reproduce the volume, * including * snapshots, on the destination volume, and then clone replica snapshots.  However, it seems not in the GUI to make replication include snapshots.

    Is it possible - from the command line, perhaps--to do replication include existing snapshots?  Or a better way to reach my goal?

    If it makes any difference, the source storage group contains two model PS4000 arrays, and the destination is an array of unique model PS6100.

    No, you can't reproduce a snapshot.  When you create a replica a hidden snapshot is created for you.  So the effect is the same as if replicate you a snapshot.

  • Cisco 1921 - how to configure VPN multiple Tunnels to AWS

    I have a router VPN Cisco 1921. I managed to create tunnel VPN Site to Site with AWS VPN Tunnel 1. AWS offers 2 tunnels, so I created another card Crypto and attaches to the existing policy. But the 2nd tunnel won't come. I don't know what I'm missing... is there a special setup that needs to be done to allow multiple IPsec vpn tunnels on the same physical interface? I have attached a picture and included the configuration of my router, if it helps.

    C1921 #sh run
    Building configuration...

    Current configuration: 2720 bytes
    !
    ! Last configuration change at 02:12:54 UTC Friday, may 6, 2016, by admin
    !
    version 15.5
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    encryption password service
    !
    hostname C1921
    !
    boot-start-marker
    boot-end-marker
    !
    !
    logging buffered 52000
    enable secret 5 $1$ jc6L$ uHH55qNhplouO/N5793oW.
    !
    No aaa new-model
    Ethernet lmi this
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    Research of IP source-interface GigabitEthernet0/1 domain
    IP cef
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    license udi pid CISCO1921/K9 sn FTX1845F03F
    !
    !
    username admin privilege 15 password 7 121A0C041104
    paul privilege 0 7 password username 14141B180F0B
    !
    redundancy
    !
    !
    !
    !
    !
    !
    !
    crypto ISAKMP policy 10
    BA aes
    preshared authentication
    Group 2
    lifetime 28800
    ISAKMP crypto keys secret1 address 52.35.42.787
    ISAKMP crypto keys secret2 address 52.36.15.787
    !
    !
    Crypto ipsec transform-set AWS - VPN aes - esp esp-sha-hmac
    tunnel mode
    !
    !
    !
    map SDM_CMAP_1 1 ipsec-isakmp crypto
    Description Tunnel 1 to 52.35.42.787
    defined by peer 52.35.42.787
    game of transformation-AWS-VPN
    PFS group2 Set
    match address 100
    map SDM_CMAP_1 2 ipsec-isakmp crypto
    Description 2 to 52.36.15.787 Tunnel
    defined by peer 52.36.15.787
    game of transformation-AWS-VPN
    PFS group2 Set
    match address 100
    !
    !
    !
    !
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    Shutdown
    !
    interface GigabitEthernet0/0
    Description connection Wan WAN - ETH$
    IP address 192.168.1.252 255.255.255.0
    automatic duplex
    automatic speed
    map SDM_CMAP_1 crypto
    !
    interface GigabitEthernet0/1
    Description of the connection to the local network
    IP 192.168.0.252 255.255.255.0
    automatic duplex
    automatic speed
    !
    IP forward-Protocol ND
    !
    IP http server
    local IP http authentication
    no ip http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    IP route 0.0.0.0 0.0.0.0 192.168.1.254 permanent

    !
    recording of debug trap
    host 192.168.0.3 record
    host 192.168.0.47 record
    !
    !
    Note access-list 100 permit to AWS Tunnel 1
    Access-list 100 CCP_ACL category = 20 note
    access-list 100 permit ip 192.168.0.0 0.0.0.255 any what newspaper
    Note access-list 101 permit to AWS Tunnel 2
    Note access-list 101 category CCP_ACL = 4
    access-list 101 permit ip 192.168.0.0 0.0.0.255 any logexit
    !
    control plan
    !
    !
    alias con exec conf t
    SIB exec show int short ip alias
    alias exec srb see the race | b
    sri alias exec show run int
    !
    Line con 0
    exec-timeout 0 0
    Synchronous recording
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport output pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    privilege level 15
    local connection
    transport of entry all
    transportation out all
    !
    Scheduler allocate 20000 1000
    !
    end

    There should be no second tunnel.

    I use either a peer or the other, but not both at the same time.

    To display both at the same time, you need to use the Tunnel interfaces.  Amazon would have you sent pretty much the exact commands to copy and paste into.

  • ASA to AWS VPN question

    I have problems with our VPN to AWS. The configuration of the firewall is below:

    Firewall 1

    !
    hostname FW
    activate the password
    names of

    !
    interface GigabitEthernet0/0
    Description Inside_To_SW-DISTRIBUTION-01_Gi1/0/2
    nameif LAN
    security-level 100
    IP address 172.16.x.1 255.255.252.0
    !
    interface GigabitEthernet0/1
    Description Outside_To_SW-DISTRIBUTION-01_Gi1/0/1
    nameif WAN
    security-level 0
    IP address 212.x.x.201 255.255.255.248 watch 212.x.x.202
    !
    !
    interface Management0/0
    management only
    nameif management
    security-level 100
    IP address 10.x.x.x 255.255.255.0
    !
    boot system Disk0: / asa913-smp - k8.bin
    passive FTP mode
    clock timezone GMT/UTC 0
    summer time clock GMT/BDT recurring last Sun Mar 01:00 last Sun Oct 02:00
    DNS domain-lookup LAN
    DNS server-group DefaultDNS
    Name-Server 8.8.8.8
    4.4.4.4 server name
    permit same-security-traffic intra-interface
    network of the object OBJ-LAN-SUB-NETWORK
    subnet 172.x.128.0 255.255.252.0
    object OBJ-POOL-A network
    range 212.x.x.195 212.x.x.196
    object obj-SrcNet network
    subnet 0.0.0.0 0.0.0.0
    network of object obj-amzn
    10.32.0.0 subnet 255.255.0.0

    gamma of network object
    subnet 88.215.48.0 255.255.240.0
    tinet network object
    subnet 89.149.128.0 255.255.192.0

    object-group service DM_INLINE_SERVICE_1
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    object-group service DM_INLINE_SERVICE_2
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    object-group service DM_INLINE_SERVICE_3
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    object-group service DM_INLINE_SERVICE_4
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    DM_INLINE_TCP_1 tcp service object-group
    port-object eq www
    EQ object of the https port
    object-group Protocol TCPUDP
    object-protocol udp
    object-tcp protocol
    object-group service DM_INLINE_SERVICE_5
    SIP service-purpose tcp - udp destination eq
    the purpose of the service tcp destination eq www
    the purpose of the tcp destination eq https service
    the purpose of the tcp destination eq ldap service
    area of service-object udp destination eq
    the purpose of the udp destination eq ntp service
    object-group service tcp imp
    EQ object Port 5222
    rtp udp service object-group
    60000 10000 port-object range
    object-group service tcp sip1
    port-object eq 8011
    object-group service sip2 tcp
    port-object eq 5080
    DM_INLINE_TCP_2 tcp service object-group
    port-object eq ftp
    port-object eq ftp - data
    EQ port ssh object
    object-group service DHCP udp
    port-object eq bootps
    DHCPrange udp service object-group
    ports of DHCP Description
    Beach of port-object bootps bootpc

    object-group grp-voip network
    gamma of network-object object
    network-object object tinet

    LAN_access_in list extended access allowed object-group DM_INLINE_SERVICE_3 object OBJ-LAN-SUB-NETWORK any4
    LAN_access_in list extended access allowed object-group TCPUDP object OBJ-LAN-SUB-NETWORK any eq field
    LAN_access_in list extended access allowed object OBJ-LAN-SUB-NETWORK ip everything
    LAN_access_in list extended access permitted ip 10.x.x.x 255.255.255.0 everything
    LAN_access_in list extended access udp allowed any any DHCP object-group
    list of access TUNNEL of SPLIT standard allowed 172.16.x.0 255.255.252.0

    extended access list acl-amzn allow any4 ip 10.32.0.0 255.255.0.0
    extended access list acl-amzn allow icmp any4 10.32.0.0 255.255.0.0

    global_access deny ip extended access list a whole

    10.32.0.0 IP Access-list extended filter amzn 255.255.0.0 allow 172.16.128.0 255.255.252.0
    refuse the access-list extended ip a whole amzn-filter

    WAN_access_out list extended access allowed object-group DM_INLINE_SERVICE_4 object OBJ-LAN-SUB-NETWORK any4
    WAN_access_out list extended access allowed object-group DM_INLINE_SERVICE_5 object OBJ-SUB-LAN-NETWORK-object-group grp-voip
    WAN_access_out list extended access permitted udp object OBJ-SUB-LAN-NETWORK-object-group grp-voip-group of objects rtp
    permit WAN_access_out to access extensive ip list object OBJ-LAN-SUB-NETWORK object obj-amzn
    WAN_access_out list extended access allowed object-group TCPUDP object OBJ-LAN-SUB-NETWORK any eq field
    WAN_access_out list extended access permitted tcp object OBJ-LAN-SUB-NETWORK any4 object-group DM_INLINE_TCP_1
    WAN_access_out list extended access permit tcp any any DM_INLINE_TCP_2 object-group
    WAN_access_out of access allowed any ip an extended list
    permit access list extended ip host 52.17.201.49 WAN_access_in 212.84.183.201
    permit access list extended ip host 52.18.197.187 WAN_access_in 212.84.183.201

    pager lines 24
    Enable logging
    emergency logging console
    emergency logging monitor
    exploitation forest asdm warnings
    MTU 1500 LAN
    MTU 1500 WAN
    management of MTU 1500

    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow any WAN

    ARP timeout 14400
    no permit-nonconnected arp
    NAT (LAN, WAN) source static obj-SrcNet obj-SrcNet destination static obj-amzn obj-amzn
    NAT (LAN, WAN) static source any any destination static OBJ ANYCONNECT-SUB-NETWORK-OBJ-ANYCONNECT-UNDER-NETWORK non-proxy-arp-search directions
    !
    network of the object OBJ-LAN-SUB-NETWORK
    OBJ-POOL-A dynamic pool pat flat interface include the NAT (LAN, WAN) reserves
    !
    OBJ-ANYCONNECT-SUB-NETWORK dynamic interface source NAT (all, WAN) after the automatic termination
    LAN_access_in access to the LAN by-user-override interface group
    WAN_access_in access to the WAN interface group
    Access-group WAN_access_out WAN interface
    Access-Group global global_access
    Route WAN 0.0.0.0 0.0.0.0 212.x.x.x 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
    Sysopt connection tcpmss 1387
    SLA 1 monitor
    type echo protocol ipIcmpEcho 10.x.x.x WAN interface
    frequency 5
    SLA monitor Appendix 1 point of life to always start-time now

    Crypto ipsec transform-set transform-amzn ikev1 aes - esp esp-sha-hmac
    replay window-size 128 ipsec encryption security association
    Crypto ipsec pmtu aging infinite - the security association
    Crypto ipsec WAN clear-df df - bit

    card crypto amzn_vpn_map 1 match address acl-amzn
    card crypto amzn_vpn_map 1 set pfs
    amzn_vpn_map card crypto peer 52.17.201.x 52.18.197.x 1jeu
    amzn_vpn_map 1 set transform-set transform-amzn ikev1 crypto card
    amzn_vpn_map card crypto 1 lifetime of security set association, 3600 seconds
    card crypto amzn_vpn_map WAN interface
    Crypto ca trustpoint ASDM_TrustPoint0
    Terminal registration
    name of the object CN = FW-INTERNET-LON
    Configure CRL
    trustpool crypto ca policy
    crypto isakmp identity address
    Crypto ikev2 enable port 443 of the WAN-customer service
    Crypto ikev1 enable WAN
    IKEv1 crypto policy 201
    preshared authentication
    aes encryption
    sha hash
    Group 2
    lifetime 28800
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 WAN
    SSH timeout 5
    SSH version 2
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    source of x.x.x.x server NTP WAN
    WebVPN
    Select the WAN
    AnyConnect enable
    tunnel-group-list activate
    GroupPolicy_ANYCONNECT-group-policy PROFILE internal
    attributes of Group Policy GroupPolicy_ANYCONNECT-PROFILE
    value of server DNS 8.8.8.8 4.4.4.4
    client ssl-VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    IPv6-split-tunnel-policy excludespecified
    crowdmix.me value by default-field
    activate dns split-tunnel-all
    internal filter group policy
    attributes to filter group policy
    VPN-value amzn-filter

    tunnel-group ANYCONNECT-PROFILE type remote access
    tunnel-group ANYCONNECT-PROFILE general-attributes
    ANYCONNECT-POOL address pool
    GroupPolicy_ANYCONNECT-PROFILE of default-group-strategy
    tunnel-group ANYCONNECT-PROFILE webvpn-attributes
    enable ANYCONNECT-PROFILE Group-alias
    tunnel-group 52.17.201.x type ipsec-l2l
    tunnel-group 52.17.201.x General-attributes
    filter by default-group-policy
    52.17.201.x group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    ISAKMP keepalive retry threshold 10 3
    tunnel-group 52.18.197.x type ipsec-l2l
    tunnel-group 52.18.197.x General-attributes
    filter by default-group-policy
    52.18.197.x group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    ISAKMP keepalive retry threshold 10 3
    tunnel-group 52.30.177.x type ipsec-l2l
    tunnel-group 52.31.131.x type ipsec-l2l
    !
    ICMP-class class-map
    match default-inspection-traffic
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map icmp_policy
    icmp category
    inspect the icmp
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    global service-policy global_policy
    icmp_policy service-policy interface WAN
    context of prompt hostname
    !
    Booking Jumbo-image
    !
    no remote anonymous reporting call
    Cryptochecksum:ff493f0ff375e83710e6bc9d19476e0e
    : end

    When I add a second VPN connection by using the commands below:

    object obj-amzn2 network

    10.34.0.0 subnet 255.255.0.0

    NAT (LAN, WAN) source static obj-SrcNet obj-SrcNet destination static obj-amzn2 obj-amzn2

    I see the tunnels going up, however, we immediately begin to see the Voip system lose the SIP traffic with its servers, and even if you can still use internet if you have an open socket you can not create a new session. It looks like a problem of routing for me, but I can't seem to find the place where

    Any help greatly appreciated

    So, you want to have two virtual private networks from Amazon to blocks of different destinations, 10.32.0.0/16, and 10.34.0.0/16, correct?

  • multiple connections AWS

    Hi all

    Then MCAK manage multiple connections of AWS in the current version?

    If this is not the case, if there is a plan made me know.

    My customer wants to use several AWS regions (USA and Tokyo) because of the BCP/DR.

    Thank you

    Jun Kojima

    Yes, multi-Cloud is designed to manage multiple connections in the same or multiple platforms. You can even have multiple connections to the same AWS region by using different accounts to facilitate the assignment of chargeback. You also have the option of specifying and area availability.

    PS. a new version of the multi-Cloud kit will be available in late February with the offering of the CIAC Enterprise Edition 3.1.1 complete future scalability. For AWS, it will also support IP elastic, management and distribution of key pairs. The current MCAK for Starter Edition is recommended for the proof of concept only at this time.

Maybe you are looking for