In this video, Sonali Verma introduces the new features of the Power Protect Data Manager 5.14 R three release, focusing on how to quickly configure and set up replication to external Dell Power Protect DD series appliances. The demonstration highlights the steps to add a replication target and configure the replication policy, showcasing the user-friendly interface and efficient process.
Hello and welcome to Power Protect Data Manager plans 5.14 R three release. I'm Sonali Verma from the technical marketing engineering team. And today we are going to see one of the key features introduced in this release. And that is the application to the external Dell Power Protect DD series appliance or Dell Power Protect DD virtual edition. So are you ready for it to see how quick and easy it is to configure and set up the application? Let's see.
So the first step is to add the replication target, that is your external Power Protect DD system. And the second goal is to configure the replication policy. OK. So how quick and easy it would be? Let's see in the demonstration.
So we'll first log in to the Power Protect data manager appliance and then we'll go to infrastructure storage in order to add our replication target. We are going to the replication target tab, click on add, select power protect DD system, provide us FQDN or the management IP address, and click on verify for it to have a certificate exchange and voila! Your replication target has been added successfully.
Then we proceed to the next step. That is to configure our policy. So we'll click on the existing protection policy to add the replication to it. And I click on add over there and we see our storage name is the external Power Protect DD or DDV system that we just added as an application target. Then we can segregate the application traffic through the network interface and we can choose the interface through which we want to send our application traffic.
We'll proceed to the next, we'll verify all the settings as we require, verify the summary of the configuration, and click on finish. Now, let the configuration job complete. We can check its progress in system jobs and go to the details of the job ID and see the step logs. We see our application job completed successfully and that's how your policy looks like now.
So you see how easy it is to set up your application. So now you can have secondary copies to your primary backups. Thank you all for joining.