Veeam Backup and Replication Operations Guide - Volume 1
Veeam Backup and Replication Operations Guide - Volume 1
Replication Operations
Guide
Volume 1
Based on Version 11a
Focused on Microsoft Hyper-V
By:
Dave Kawula Cristal Kawula
Emile Cabot Cary Sun
PUBLISHED BY
MVPDays Publishing
http://www.mvpdays.com
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any
means without the publisher's prior written permission.
ISBN: TBD
Feedback Information
We’d like to hear from you! If you have any comments about how we could improve the quality
of this book, please don’t hesitate to contact us by visiting www.checkyourlogs.net or emailing
feedback@mvpdays.com.
iii
Foreward
Foreward
Here is another book by Dave, Cristal, Cary and Emile; what a significant milestone!
Ask yourself one question: Why? There are so many technologies, but why do we use what we
use? Why do we do what we do? The answer is how. It’s how we use something. I like to explain
sometimes compliance in this way. No product or technology is inherently compliant. It’s how it
is implemented and how it is audited. The same goes for technology implementations; it’s about
how we use them. The how is the why.
Operations are still cool. There are so many razzle-dazzle job titles and buzzwords in the market
today, but in the end, Operations are Operations. DevOps, PlatformOps, SRE (Sire Reliability
Engineer), Platform Engineering… I do not need to go on, but no technology will take care of
itself across all disciplines. How it is used, implemented, monitored, etc., matters today.
Technology still needs humans and their knowledge.
Expert advice is the difference. We all learn from each other. When taking on the next new
challenge, where does one go first? We look for resources to consume. Blogs, books like this, and
social profiles; the established experts are the trusted advisors in the technology space. Call it
community, social sharing, or what you want; we all find ourselves going to the go-to experts of a
particular space.
iii
Foreward
Above and Beyond. What Dave, Cristal, Cary and Emile put forth in this book is outstanding in
their practicing advice for technology. They could easily focus on their professional
responsibilities and keep them narrow. But writing a book is hard work! Editing a book is hard
work! I’ve not discussed this with them, but I’m sure they aren’t doing it for the money of writing
a book. They write this book because they go above and beyond, share, and care.
I’m sure you will enjoy this book, and a big congratulations on this book, Dave, Cristal, Cary and
Emile.
Best Regards,
iv
About the Authors
Dave is well-known as an evangelist for Microsoft, 1E, and Veeam technologies. Locating Dave is
easy as he speaks at conferences and sessions each year, including TechEd, Ignite, MVP Days
Community Roadshow, and VeeamOn.
Recently Dave has been honoured to take on the role of Conference Co-Chair of TechMentor and
Cyber Security & Ransomware Live with fellow MVP Sami Laiho. The lineup of speakers and
attendees attending this conference over the past 20 years is fantastic. Come down to Redmond
or Orlando in 2018 and meet him in person. Checkout his speaking site at
https://sessionize.com/dave-kawula/
He recently tied for 1st place out of 1800 speakers at the Microsoft Ignite Conference in Orlando.
As the founder and Managing Principal Consultant at TriCon Elite Consulting, Dave is a leading
technology expert for local customers and large international enterprises, providing optimal
guidance and methodologies to achieve and maintain an efficient infrastructure.
BLOG: www.checkyourlogs.net
Twitter: @DaveKawula
v
About the Authors
Cristal speaks at Microsoft Ignite, MVPDays, and other local user groups. In addition, she has
been instrumental in founding MVPDays Publishing and has helped author over 25 + books.
At conferences like Microsoft Ignite, she has led community meetups on Women in IT, Parenting
in IT, Diversity in Tech, and becoming a Community Rockstar.
BLOG: http://www.checkyourlogs.net
Twitter: @supercristal1
vi
About the Authors
Cary Sun is a CISCO CERTIFIED INTERNETWORK EXPERT (CCIE No.4531) and MCSE, MCIPT, Citrix
CCA with over twenty years in the planning, design, and implementation of network technologies
and Management and system integration. Background includes hands-on experience with multi-
platform, all LAN/WAN topologies, network administration, E-mail and Internet systems, security
products, PCs and Servers environment. Expertise is analyzing users’ needs and coordinating
system designs from concept through implementation. Exceptional analysis, organization,
communication, and interpersonal skills. Demonstrated ability to work independently or as an
integral part of a team to achieve objectives and goals. Specialties: CCIE /CCNA / MCSE / MCITP /
MCTS / MCSA / Solution Expert / CCA
Cary is a very active blogger at checkyourlogs.net and is permanently available online for
questions from the community. His passion for technology is contagious, improving everyone
around him at what they do.
Blog:http://www.checkyourlogs.net
Twitter:@SifuSun
vii
About the Authors
He actively volunteers as a member of the Canadian Ski Patrol, providing over 250 hours each
year for first aid services and public education at Castle Mountain Resort and in the community.
BLOG: http://www.checkyourlogs.net
Twitter: @ecabot
viii
Contents
Contents
Contents........................................................................................................................ ix
Introduction ................................................................................................................. 15
Sample Files ............................................................................................................. 15
Additional Resources ................................................................................................ 15
Chapter 1...................................................................................................................... 16
Prerequisites................................................................................................................ 16
System Requirements............................................................................................... 16
Veeam Backup and Replication Manager Server ................................................. 16
Veeam Backup and Replication Console Server .................................................. 17
Veeam Backup and Replication Off-Host Backup Proxy Server ........................... 17
Veeam Backup and Replication Proxy Server for NAS Backup ............................ 18
Veeam Backup Repository Server........................................................................ 18
Veeam Tape Server ............................................................................................. 18
ix
Contents
Chapter 2...................................................................................................................... 40
Deployment .................................................................................................................. 40
Install Veeam Backup and Replication v11a ......................................................... 40
Upgrade the Existing Veeam Backup and Replication to v11a ............................. 52
Install Veeam Backup and Replication Console ........................................................... 67
Chapter 3...................................................................................................................... 74
Configuration ............................................................................................................... 74
Configuring Inventory ................................................................................................ 74
Add Microsoft Hyper-V Standalone Hosts ............................................................ 76
Add Microsoft Hyper-V Clusters ........................................................................... 83
Add Veeam Agent to Microsoft Windows Physical machines ............................... 90
Configuring Backup Infrastructure ........................................................................... 104
Adding Microsoft Hyper-V Standalone Servers................................................... 104
Adding Microsoft Hyper-V Clusters..................................................................... 113
Adding Microsoft Windows Servers .................................................................... 120
Adding Linux Server for a hardened repository................................................... 127
Adding Off-Host Backup proxy servers ............................................................... 135
xi
Contents
xii
Contents
Creating a Replication job to replicate the specified VMs at the same site .............. 506
Creating a Replication job without seeding to replicate the specified VMs to the
Disaster Recovery site ............................................................................................ 539
Creating a Replication job with seeding to replicate the specified VMs to the Disaster
Recovery site .......................................................................................................... 577
Failover Virtual Machine to Disaster Recovery Site ................................................. 617
Planned Failover Virtual Machine to Disaster Recovery Site ................................... 622
Failover Undo the Virtual Machine to Production Site ............................................. 626
Failback of the Virtual Machine to the Production Site ............................................ 629
Permanent Failover of the Virtual Machine to the Disaster Recovery Site ............... 639
Join us at MVPDays and meet great MVP’s like this in person .............................. 682
Live Presentations .................................................................................................. 682
Video Training......................................................................................................... 682
Live Instructor-led Classes ...................................................................................... 682
Consulting Services ................................................................................................ 683
xiii
Contents
xiv
Chapter 1 Introduction
Introduction
This book aims to showcase the fantastic expertise of our guest speakers of MVPDays Online.
They have so much passion, expertise, and expert knowledge that it only seemed fitting to write
it down in a book.
This book aims to show how to be operationally proficient using Veeam Backup and Replication,
Veeam One and various other Veeam products and tools. We hope you find immense value in
reviewing this guide and encourage you to share your operational knowledge and skills with
others in the community.
Sample Files
All sample files for this book can be downloaded from http://www.checkyourlogs.net and
www.github.com/mvpdays
Additional Resources
In addition to all the tips and tricks provided in this book, you can find extra resources like
articles and video recordings on our blog http://www.checkyourlogs.net
15
Chapter 1 Prerequisites
Chapter 1
Prerequisites
This chapter will go over the system and port requirements. Before installing the Veeam Backup
and Replication, all conditions must be met.
System Requirements
Before installing Veeam Backup and Replication, please ensure the virtual environment and
servers meet system requirements.
Components Description
16
Chapter 1 Prerequisites
Database Microsoft SQL Server 2019, 2017, 2016, 2014, 2012, 2008
R2, 2008
Components Description
OS Platform Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2
SP1, 11 (version21H2), 10 (from version 1803, 21H1,
21H2), 8.1, 7 SP1
Components Description
OS Platform Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2
SP1
17
Chapter 1 Prerequisites
Components Description
OS Platform Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2
SP1, 11 (version21H2), 10 (from version 1803, 21H1,
21H2), 8.1, 7 SP1
permanently Description
Linux distributions CentOS 7 to 8.3, 8.41, 8.5, CentOS Stream, Debian 9.0 to
10.8, 11.0, Fedora 30 to 33, 34, 35, RHEL 6.0 to 8.3, 8.4,
8.5, openSUSE Leap 15.2, 15.3, Tumbleweed, Oracle Linux
6 (UEK3) to 8.3 (UEK R6 and UEK R6 U2), Oracle Linux 6 to
8.3, 8.4, and 8.5 (RHCK), SLES 11 SP4, 12 SP1-SP5, 15 SP0-
SP2, SP3, Ubuntu 14.04 LTS, 16.04 LTS,
18permanently9.10, 20.04 LTS, 21.04, 21.10,
Components Description
18
Chapter 1 Prerequisites
Windows OS Platform Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2
SP1, 11 (version21H2), 10 (from version 1803, 21H1,
21H2), 8.1, 7 SP1
Components Description
Wi. He has Platform Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2
SP1, 11 (version21H2), 10 (from version 1803, 21H1,
21H2), 8.1, 7 SP1
Components Description
Windows OS Platform Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2
SP1, 11 (version21H2), 10 (from version 1803, 21H1,
21H2), 8.1, 7 SP1
Linux distributions CentOS 7 to 8.3, 8.41, 8.5, CentOS Stream, Debian 9.0 to
10.8, 11.0, Fedora 30 to 33, 34, 35, RHEL 6.0 to 8.3, 8.4,
8.5, openSUSE Leap 15.2, 15.3, Tumbleweed, Oracle Linux
6 (UEK3) to 8.3 (UEK R6 and UEK R6 U2), Oracle Linux 6 to
8.3, 8.4, and 8.5 (RHCK), SLES 11 SP4, 12 SP1-SP5, 15 SP0-
SP2, SP3, Ubuntu 14.04 LTS, 16.04 LTS, 18.04 LTS, 19.10,
20.04 LTS, 21.04, 21.10,
19
Chapter 1 Prerequisites
Supported Applications
Veeam supports the following list of application-aware backups.
Components Description
Active Directory Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008
R2, 2008
Exchange Exchange 2019, 2016, 2013 SP1, 2013, 2010 SP1, 2010
SP2, 2010 SP3
Microsoft SQL Server SQL Server 2005 SP4, 2008 SP4, 2008 R2 SP3, 2012 SP4,
2014 SP3, 2016 SP2, 2017, 2019 2019
Oracle (Windows OS) Oracle Database 11g Release 2, 12c Release 1, 12C Release
2, 18c, 19c, 21c
Oracle (Linux OS) Oracle Database 11g Release 2, 12c Release 1, 12C Release
2, 18c, 19c, 21c
Windows Servers
Windows servers require the following inbound and outbound ports opened. The
inbound/outbound ports must be opened for Windows servers as Veeam backup infrastructure
components or enable application-aware processing.
20
Chapter 1 Prerequisites
Linux Servers
Linux servers require the following inbound and outbound ports opened. The
inbound/outbound ports must be opened for Windows servers as Veeam backup infrastructure
components or enable application-aware processing.
21
Chapter 1 Prerequisites
135
TCP 6160
TCP 6162
TCP 6163
TCP 2500 to
3300
22
Chapter 1 Prerequisites
TCP 49152
to
65535
TCP 9392
23
Chapter 1 Prerequisites
135
24
Chapter 1 Prerequisites
UDP
UDP
TCP lockd_port
UDP lockd_port
26
Chapter 1 Prerequisites
*.blob.core.chinacloudapi.cn
for China region
*.blob.core.usgovcloudapi.net
for Government region
TCP 80
HTTP ocsp.digicert.com
ocsp.msocsp.com
*.d-trust.net
External Repository
The External Repository requires opening the following inbound and outbound ports.
27
Chapter 1 Prerequisites
*.blob.core.chinacloudapi.cn
for China region
*.blob.core.cloudapi.de for
Germany region
*.blob.core.usgovcloudapi.net
for Government region
TCP 80
HTTP ocsp.digicert.com
ocsp.msocsp.com
*.d-trust.net
28
Technet24
Chapter 1 Prerequisites
Veeam SSH 22
gateway
server HTTPS Public/private IPv4 addresses of
Azure appliance
*.blob.core.chinacloudapi.cn
for China region
*.blob.core.cloudapi.de for
Germany region
*.blob.core.usgovcloudapi.net
for Government region
TCP 80
HTTP ocsp.digicert.com
ocsp.msocsp.com
*.d-trust.net
29
Chapter 1 Prerequisites
30
Technet24
Chapter 1 Prerequisites
TCP 6162
TCP 6164
31
Chapter 1 Prerequisites
TCP 445
TCP 49152 to
65535
TCP 6167
TCP 6167
TCP 6173
2500
32
Technet24
Chapter 1 Prerequisites
TCP 6160
TCP 6162
TCP 6170
TCP 49152 to
65535
33
Chapter 1 Prerequisites
TCP 6162
34
Technet24
Chapter 1 Prerequisites
VM Guest OS
The VM Guest OS requires opening the following inbound and outbound ports.
TCP 6160
11731
TCP 6173
35
Chapter 1 Prerequisites
2500
TCP 49152 to
65535
Veeam U-AIR
Veeam U-AIR requires opening the following inbound and outbound ports.
TCP 135
36
Technet24
Chapter 1 Prerequisites
TCP 636
3268
3269
TCP 49152 to
65535
37
Chapter 1 Prerequisites
38
Technet24
Chapter 1 Prerequisites
Azure Stack
Azure Stack requires opening the following inbound and outbound ports.
SMTP Server
The SMTP Server requires opening the following inbound and outbound ports.
39
Chapter 2 Deployment
Chapter 2
Deployment
This chapter will explain installing and upgrading Veeam Backup and Replication components. To
Install or upgrade the machine's Veeam Backup and Replication components, you must ensure
the devices meet the system requirements.
When writing this book, the most current Veeam Backup and replication version is Version
11.0.1.1261 P20220302. However, staying with the latest patching and version cadence provided
by Veeam Software is highly recommended. Critical fixes for both functionality and security are
included in the latest versions.
40
Technet24
Chapter 2 Deployment
3. Mount
VeeamBackup&Replicatio
n_11.0.1.1261_20220302.
iso file.
4. Run Setup.exe.
41
Chapter 2 Deployment
42
Technet24
Chapter 2 Deployment
8. On the License
Agreement page, select I
accept the terms of the
Veeam license agreement
checkbox
9. Select I accept the terms
of the 3rd party
components license
agreements, click Next.
43
Chapter 2 Deployment
44
Technet24
Chapter 2 Deployment
45
Chapter 2 Deployment
46
Technet24
Chapter 2 Deployment
47
Chapter 2 Deployment
48
Technet24
Chapter 2 Deployment
49
Chapter 2 Deployment
50
Technet24
Chapter 2 Deployment
51
Chapter 2 Deployment
Note:
The earlier version must be Veeam Backup and Replication 9.5 Update 4b (build 9.5.4.2866) or
later.
52
Technet24
Chapter 2 Deployment
53
Chapter 2 Deployment
6. On the Configuration
Backup Settings page,
select Backup now to
back up the current
configuration.
7. Click OK to close the
Configuration Backup
Settings after the backup
is completed.
54
Technet24
Chapter 2 Deployment
12. Mount
VeeamBackup&Replicatio
n_11.0.1.1261_20220302.
iso file.
55
Chapter 2 Deployment
56
Technet24
Chapter 2 Deployment
57
Chapter 2 Deployment
58
Technet24
Chapter 2 Deployment
59
Chapter 2 Deployment
60
Technet24
Chapter 2 Deployment
Note:
61
Chapter 2 Deployment
62
Technet24
Chapter 2 Deployment
63
Chapter 2 Deployment
64
Technet24
Chapter 2 Deployment
65
Chapter 2 Deployment
66
Technet24
Chapter 2 Deployment
3. Mount
VeeamBackup&Replicatio
n_11.0.1.1261_20220302.
iso file.
67
Chapter 2 Deployment
4. Run Setup.exe.
68
Technet24
Chapter 2 Deployment
7. On the License
Agreement page, select I
accept the Veeam license
agreement checkbox
terms.
8. Select I accept the terms
of the 3rd party
components license
agreements checkbox.
9. Click Next.
69
Chapter 2 Deployment
70
Technet24
Chapter 2 Deployment
71
Chapter 2 Deployment
Test-NetConnection -
ComputerName
<hostname/ip> -Port 9392
72
Technet24
Chapter 2 Deployment
73
Chapter 3 Configuration
Chapter 3
Configuration
This chapter will review the initial configurations of Veeam Backup for Microsoft Office 365.
These include:
Virtual Infrastructure
Backup Infrastructure
Backup Repositories
Cloud Repositories
These steps must be configured before setting up Backup Jobs, covered in the next chapter.
Configuring Inventory
The Veeam backup and Replication inventory module consists of several components:
Virtual Infrastructure
Physical Infrastructure
File Shares.
The following server and host categories can be added to the virtual infrastructure:
Microsoft Clusters
File Shares
74
Technet24
Chapter 3 Configuration
75
Chapter 3 Configuration
76
Technet24
Chapter 3 Configuration
77
Chapter 3 Configuration
78
Technet24
Chapter 3 Configuration
79
Chapter 3 Configuration
80
Technet24
Chapter 3 Configuration
81
Chapter 3 Configuration
82
Technet24
Chapter 3 Configuration
83
Chapter 3 Configuration
84
Technet24
Chapter 3 Configuration
85
Chapter 3 Configuration
86
Technet24
Chapter 3 Configuration
87
Chapter 3 Configuration
88
Technet24
Chapter 3 Configuration
89
Chapter 3 Configuration
Physical machines running Windows, Linux, Unix, or macOS can be backed up and restored.
Backup agents are installed on each computer by Veeam Backup & Replication.
90
Technet24
Chapter 3 Configuration
91
Chapter 3 Configuration
92
Technet24
Chapter 3 Configuration
93
Chapter 3 Configuration
94
Technet24
Chapter 3 Configuration
95
Chapter 3 Configuration
96
Technet24
Chapter 3 Configuration
Limiting
bandwidth
consumption:
specify the
maximum speed
for transferring
backed-up data
from the Veeam
Agent computer
to the target
location.
Restrict metered
connections
usage: Veeam
Agent
automatically
detects metered
connections and
does not perform
backup when
your computer is
on such
connection.
Restrict VPN
connection usage:
Veeam Agent for
Microsoft
Windows will
97
Chapter 3 Configuration
automatically
detect a VPN
connection and
will not perform a
backup when the
Veeam Agent
computer is on
such a
connection.
Restrict Wi-Fi
usage to these
networks: restrict
usage of wireless
networks for
Veeam Agent
running on
Microsoft
Windows
workstations.
Throttle agent
activity on the
type of
computers to
throttle Veeam
Agent backup
activities:
Workstations
only, Servers only
or All hosts.
98
Technet24
Chapter 3 Configuration
99
Chapter 3 Configuration
100
Technet24
Chapter 3 Configuration
101
Chapter 3 Configuration
102
Technet24
Chapter 3 Configuration
103
Chapter 3 Configuration
You can install Veeam Backup & Replication components on the same physical or virtual
machine. Alternatively, you can set them up separately for a more scalable approach.
104
Technet24
Chapter 3 Configuration
4. On the Backup
Infrastructure page, select
Managed Servers, right-
click Managed Servers
and select Add Server.
105
Chapter 3 Configuration
106
Technet24
Chapter 3 Configuration
107
Chapter 3 Configuration
108
Technet24
Chapter 3 Configuration
109
Chapter 3 Configuration
110
Technet24
Chapter 3 Configuration
111
Chapter 3 Configuration
112
Technet24
Chapter 3 Configuration
113
Chapter 3 Configuration
114
Technet24
Chapter 3 Configuration
115
Chapter 3 Configuration
116
Technet24
Chapter 3 Configuration
117
Chapter 3 Configuration
118
Technet24
Chapter 3 Configuration
119
Chapter 3 Configuration
120
Technet24
Chapter 3 Configuration
4. On the Backup
Infrastructure page, select
Managed Servers, right-
click Managed Servers,
and select Add Server.
121
Chapter 3 Configuration
122
Technet24
Chapter 3 Configuration
123
Chapter 3 Configuration
124
Technet24
Chapter 3 Configuration
125
Chapter 3 Configuration
126
Technet24
Chapter 3 Configuration
127
Chapter 3 Configuration
4. On the Backup
Infrastructure page, select
Managed Servers, right-
click Managed Servers,
and select Add Server.
128
Technet24
Chapter 3 Configuration
129
Chapter 3 Configuration
130
Technet24
Chapter 3 Configuration
131
Chapter 3 Configuration
range 2500-3300 by
default.
132
Technet24
Chapter 3 Configuration
133
Chapter 3 Configuration
134
Technet24
Chapter 3 Configuration
135
Chapter 3 Configuration
4. On the Backup
Infrastructure page, select
Backup Proxies, right-click
Backup Proxies, and
select Add Hyper-V off-
host backup proxy.
136
Technet24
Chapter 3 Configuration
137
Chapter 3 Configuration
138
Technet24
Chapter 3 Configuration
139
Chapter 3 Configuration
140
Technet24
Chapter 3 Configuration
141
Chapter 3 Configuration
142
Technet24
Chapter 3 Configuration
143
Chapter 3 Configuration
You can add the following types of storage to the Microsoft Windows server as a backup
repository:
A local disk.
SCSI/FC SAN LUN in case the server is connected to the SAN fabric.
144
Technet24
Chapter 3 Configuration
145
Chapter 3 Configuration
146
Technet24
Chapter 3 Configuration
147
Chapter 3 Configuration
148
Technet24
Chapter 3 Configuration
Note:
149
Chapter 3 Configuration
150
Technet24
Chapter 3 Configuration
151
Chapter 3 Configuration
You can add the following types of storage to the Linux server as a backup repository:
A local disk.
NFS share.
SCSI/FC SAN LUN in case the server is connected to the SAN fabric.
152
Technet24
Chapter 3 Configuration
153
Chapter 3 Configuration
154
Technet24
Chapter 3 Configuration
155
Chapter 3 Configuration
156
Technet24
Chapter 3 Configuration
157
Chapter 3 Configuration
158
Technet24
Chapter 3 Configuration
159
Chapter 3 Configuration
160
Technet24
Chapter 3 Configuration
161
Chapter 3 Configuration
162
Technet24
Chapter 3 Configuration
163
Chapter 3 Configuration
You can use network-attached storage (SMB or CIFS Shares) as backup repositories with
Veeam Backup and Replication. A network-attached storage (NAS) device can be a shared
folder on your computer or any other physical device accessed via the Server Message Block
(SMB) protocol.
Note:
You must deploy a gateway server because an SMB share cannot host Veeam Data
Movers. However, Veeam Backup & Replication will automatically deploy a Veeam Data
Mover on this gateway server.
It is recommended that you deploy an additional gateway server in the remote site,
closer to the SMB repository, if you plan to move VM data to an off-site SMB repository
over a WAN link,
164
Technet24
Chapter 3 Configuration
165
Chapter 3 Configuration
166
Technet24
Chapter 3 Configuration
167
Chapter 3 Configuration
Note:
168
Technet24
Chapter 3 Configuration
169
Chapter 3 Configuration
170
Technet24
Chapter 3 Configuration
171
Chapter 3 Configuration
Only one repository with rotated drives can be created on a single managed server.
You cannot store archive full backups (GFS backups) created with backup jobs or backup
copy jobs in backup repositories with a rotated drive.
You cannot store per-machine backup files in backup repositories with rotated drives.
Repositories with rotated drives are not supported as primary backup repositories,
archive repositories, and secondary target repositories for NAS backup.
172
Technet24
Chapter 3 Configuration
173
Chapter 3 Configuration
174
Technet24
Chapter 3 Configuration
175
Chapter 3 Configuration
176
Technet24
Chapter 3 Configuration
177
Chapter 3 Configuration
178
Technet24
Chapter 3 Configuration
179
Chapter 3 Configuration
180
Technet24
Chapter 3 Configuration
Note:
The Veeam Universal License includes WAN acceleration. Veeam Backup & Replication Enterprise
or Enterprise Plus editions are required when using a legacy socket-based licence.
181
Chapter 3 Configuration
4. On the Backup
Infrastructure page, select
WAN Accelerators, right-
click WAN Accelerators,
and select Add WAN
Accelerator.
5. Select a Microsoft
Windows server from the
Choose server drop-down
list on the Server page.
182
Technet24
Chapter 3 Configuration
According to tests,
multiplying the link speed
by 1.5 is a good best
practice for estimating
the number of streams
required for high latency.
9. If your network
bandwidth exceeds 100
Mbps, Veeam
recommends using the
High bandwidth mode
option. On WAN links less
than 1 Gbps, this mode
offers significant
bandwidth savings
compared to the direct
method.
183
Chapter 3 Configuration
Note:
184
Technet24
Chapter 3 Configuration
185
Chapter 3 Configuration
186
Technet24
Chapter 3 Configuration
General Settings
All jobs, backup infrastructure components, and other backup server-managed objects have
general settings applied to them.
https://portal.azure.com
187
Chapter 3 Configuration
188
Technet24
Chapter 3 Configuration
189
Chapter 3 Configuration
190
Technet24
Chapter 3 Configuration
7. On the Review +
subscribe page, select I
give Microsoft permission
to use and share my
contact information so
that Microsoft or the
provider can contact me.
191
Chapter 3 Configuration
192
Technet24
Chapter 3 Configuration
193
Chapter 3 Configuration
194
Technet24
Chapter 3 Configuration
195
Chapter 3 Configuration
196
Technet24
Chapter 3 Configuration
197
Chapter 3 Configuration
198
Technet24
Chapter 3 Configuration
199
Chapter 3 Configuration
200
Technet24
Chapter 3 Configuration
201
Chapter 3 Configuration
202
Technet24
Chapter 3 Configuration
203
Chapter 3 Configuration
204
Technet24
Chapter 3 Configuration
205
Chapter 3 Configuration
206
Technet24
Chapter 3 Configuration
207
Chapter 3 Configuration
208
Technet24
Chapter 3 Configuration
209
Chapter 3 Configuration
210
Technet24
Chapter 3 Configuration
211
Chapter 3 Configuration
212
Technet24
Chapter 3 Configuration
213
Chapter 3 Configuration
214
Technet24
Chapter 3 Configuration
215
Chapter 3 Configuration
216
Technet24
Chapter 3 Configuration
217
Chapter 3 Configuration
218
Technet24
Chapter 3 Configuration
219
Chapter 3 Configuration
220
Technet24
Chapter 3 Configuration
221
Chapter 3 Configuration
222
Technet24
Chapter 3 Configuration
223
Chapter 3 Configuration
224
Technet24
Chapter 3 Configuration
225
Chapter 3 Configuration
226
Technet24
Chapter 3 Configuration
227
Chapter 3 Configuration
228
Technet24
Chapter 3 Configuration
229
Chapter 3 Configuration
230
Technet24
Chapter 3 Configuration
231
Chapter 3 Configuration
232
Technet24
Chapter 3 Configuration
233
Chapter 3 Configuration
234
Technet24
Chapter 3 Configuration
235
Chapter 3 Configuration
236
Technet24
Chapter 3 Configuration
237
Chapter 3 Configuration
238
Technet24
Chapter 3 Configuration
239
Chapter 3 Configuration
240
Technet24
Chapter 3 Configuration
241
Chapter 3 Configuration
242
Technet24
Chapter 3 Configuration
243
Chapter 3 Configuration
244
Technet24
Chapter 3 Configuration
245
Chapter 3 Configuration
246
Technet24
Chapter 3 Configuration
247
Chapter 3 Configuration
248
Technet24
Chapter 3 Configuration
249
Chapter 3 Configuration
250
Technet24
Chapter 3 Configuration
251
Chapter 3 Configuration
252
Technet24
Chapter 3 Configuration
253
Chapter 4 Backup and Backup Copy
Chapter 4
Typically, backup technology is used for VMs with shorter RTOs. When the primary virtual
machine fails, restoring VM data from a deduplicated and compressed backup file takes some
time.
The backup copy process is job-driven. Veeam Backup & Replication fully automates backup
copying. It allows you to specify retention settings to keep the desired number of restore points
and full backups for archival purposes.
The primary goal of backup is to protect your data from disasters and virtual or physical machine
failures. On the other hand, having only one backup does not provide the necessary level of
security. The primary backup and production data may be destroyed, leaving you with no
backups from which to restore data.
It is recommended that you follow the 3-2-1 rule when developing a successful data protection
and disaster recovery plan:
3: At least three copies of your data are required: the original production data and two backups.
2: You must store copies of your data on at least two media types: local disc and cloud.
1: At least one backup must be kept off-site, such as in the cloud or a remote location.
As a result, you must have at least two backups, each in a different location. If your production
data and local backup are destroyed in a disaster, you can still recover from your off-site backup.
254
Technet24
Chapter 4 Backup and Backup Copy
255
Chapter 4 Backup and Backup Copy
3. Select Configuration
Backup from the Man
menu.
4. Select Enable
configuration backup to
the following repository
checkbox on the
Configuration Backup
Settings page.
7. Click Notifications.
256
Technet24
Chapter 4 Backup and Backup Copy
257
Chapter 4 Backup and Backup Copy
258
Technet24
Chapter 4 Backup and Backup Copy
259
Chapter 4 Backup and Backup Copy
260
Technet24
Chapter 4 Backup and Backup Copy
7. Click Next.
261
Chapter 4 Backup and Backup Copy
262
Technet24
Chapter 4 Backup and Backup Copy
263
Chapter 4 Backup and Backup Copy
Technet24
Chapter 4 Backup and Backup Copy
proxies available
checkbox, but if off-host
backup proxies are not
available or are not
configured properly, the
job will fail to start.
265
Chapter 4 Backup and Backup Copy
266
Technet24
Chapter 4 Backup and Backup Copy
267
Chapter 4 Backup and Backup Copy
268
Technet24
Chapter 4 Backup and Backup Copy
269
Chapter 4 Backup and Backup Copy
270
Technet24
Chapter 4 Backup and Backup Copy
271
Chapter 4 Backup and Backup Copy
272
Technet24
Chapter 4 Backup and Backup Copy
273
Chapter 4 Backup and Backup Copy
274
Technet24
Chapter 4 Backup and Backup Copy
275
Chapter 4 Backup and Backup Copy
None: if you
intend to keep
backup and
virtual machine
replica files on
storage devices
that support
hardware
compression and
deduplication.
Dedupe-friendly:
if you want to
decrease the load
on the backup
proxy.
Optimal: It
provides the best
ratio between the
276
Technet24
Chapter 4 Backup and Backup Copy
High: provides an
additional 10%
compression ratio
over the Optimal
level at about 10x
higher CPU usage.
Extreme: provides
the smallest file
size but reduces
the performance.
277
Chapter 4 Backup and Backup Copy
278
Technet24
Chapter 4 Backup and Backup Copy
279
Chapter 4 Backup and Backup Copy
280
Technet24
Chapter 4 Backup and Backup Copy
281
Chapter 4 Backup and Backup Copy
282
Technet24
Chapter 4 Backup and Backup Copy
283
Chapter 4 Backup and Backup Copy
284
Technet24
Chapter 4 Backup and Backup Copy
285
Chapter 4 Backup and Backup Copy
286
Technet24
Chapter 4 Backup and Backup Copy
287
Chapter 4 Backup and Backup Copy
288
Technet24
Chapter 4 Backup and Backup Copy
289
Chapter 4 Backup and Backup Copy
290
Technet24
Chapter 4 Backup and Backup Copy
291
Chapter 4 Backup and Backup Copy
292
Technet24
Chapter 4 Backup and Backup Copy
293
Chapter 4 Backup and Backup Copy
294
Technet24
Chapter 4 Backup and Backup Copy
295
Chapter 4 Backup and Backup Copy
296
Technet24
Chapter 4 Backup and Backup Copy
297
Chapter 4 Backup and Backup Copy
298
Technet24
Chapter 4 Backup and Backup Copy
299
Chapter 4 Backup and Backup Copy
300
Technet24
Chapter 4 Backup and Backup Copy
7. Click Next.
301
Chapter 4 Backup and Backup Copy
302
Technet24
Chapter 4 Backup and Backup Copy
303
Chapter 4 Backup and Backup Copy
304
Technet24
Chapter 4 Backup and Backup Copy
if no suitable off-host
proxies available
checkbox, but if off-host
backup proxies are not
available or are not
configured properly, the
job will fail to start.
306
Technet24
Chapter 4 Backup and Backup Copy
307
Chapter 4 Backup and Backup Copy
308
Technet24
Chapter 4 Backup and Backup Copy
309
Chapter 4 Backup and Backup Copy
310
Technet24
Chapter 4 Backup and Backup Copy
Note:
311
Chapter 4 Backup and Backup Copy
312
Technet24
Chapter 4 Backup and Backup Copy
313
Chapter 4 Backup and Backup Copy
314
Technet24
Chapter 4 Backup and Backup Copy
315
Chapter 4 Backup and Backup Copy
316
Technet24
Chapter 4 Backup and Backup Copy
317
Chapter 4 Backup and Backup Copy
318
Technet24
Chapter 4 Backup and Backup Copy
319
Chapter 4 Backup and Backup Copy
320
Technet24
Chapter 4 Backup and Backup Copy
321
Chapter 4 Backup and Backup Copy
322
Technet24
Chapter 4 Backup and Backup Copy
323
Chapter 4 Backup and Backup Copy
324
Technet24
Chapter 4 Backup and Backup Copy
325
Chapter 4 Backup and Backup Copy
326
Technet24
Chapter 4 Backup and Backup Copy
327
Chapter 4 Backup and Backup Copy
328
Technet24
Chapter 4 Backup and Backup Copy
329
Chapter 4 Backup and Backup Copy
330
Technet24
Chapter 4 Backup and Backup Copy
331
Chapter 4 Backup and Backup Copy
332
Technet24
Chapter 4 Backup and Backup Copy
333
Chapter 4 Backup and Backup Copy
334
Technet24
Chapter 4 Backup and Backup Copy
335
Chapter 4 Backup and Backup Copy
336
Technet24
Chapter 4 Backup and Backup Copy
337
Chapter 4 Backup and Backup Copy
338
Technet24
Chapter 4 Backup and Backup Copy
339
Chapter 4 Backup and Backup Copy
340
Technet24
Chapter 4 Backup and Backup Copy
341
Chapter 4 Backup and Backup Copy
342
Technet24
Chapter 4 Backup and Backup Copy
343
Chapter 4 Backup and Backup Copy
344
Technet24
Chapter 4 Backup and Backup Copy
345
Chapter 4 Backup and Backup Copy
346
Technet24
Chapter 4 Backup and Backup Copy
347
Chapter 4 Backup and Backup Copy
348
Technet24
Chapter 4 Backup and Backup Copy
349
Chapter 4 Backup and Backup Copy
350
Technet24
Chapter 4 Backup and Backup Copy
351
Chapter 4 Backup and Backup Copy
352
Technet24
Chapter 4 Backup and Backup Copy
353
Chapter 4 Backup and Backup Copy
354
Technet24
Chapter 4 Backup and Backup Copy
355
Chapter 4 Backup and Backup Copy
356
Technet24
Chapter 4 Backup and Backup Copy
357
Chapter 4 Backup and Backup Copy
358
Technet24
Chapter 4 Backup and Backup Copy
359
Chapter 4 Backup and Backup Copy
360
Technet24
Chapter 4 Backup and Backup Copy
361
Chapter 4 Backup and Backup Copy
362
Technet24
Chapter 4 Backup and Backup Copy
363
Chapter 4 Backup and Backup Copy
364
Technet24
Chapter 4 Backup and Backup Copy
365
Chapter 4 Backup and Backup Copy
366
Technet24
Chapter 4 Backup and Backup Copy
367
Chapter 4 Backup and Backup Copy
368
Technet24
Chapter 4 Backup and Backup Copy
369
Chapter 4 Backup and Backup Copy
370
Technet24
Chapter 4 Backup and Backup Copy
371
Chapter 4 Backup and Backup Copy
372
Technet24
Chapter 4 Backup and Backup Copy
373
Chapter 4 Backup and Backup Copy
374
Technet24
Chapter 4 Backup and Backup Copy
375
Chapter 4 Backup and Backup Copy
376
Technet24
Chapter 4 Backup and Backup Copy
377
Chapter 4 Backup and Backup Copy
378
Technet24
Chapter 4 Backup and Backup Copy
379
Chapter 4 Backup and Backup Copy
380
Technet24
Chapter 4 Backup and Backup Copy
381
Chapter 4 Backup and Backup Copy
382
Technet24
Chapter 4 Backup and Backup Copy
383
Chapter 4 Backup and Backup Copy
384
Technet24
Chapter 4 Backup and Backup Copy
protected computer in
the Folder field.
385
Chapter 4 Backup and Backup Copy
386
Technet24
Chapter 4 Backup and Backup Copy
387
Chapter 4 Backup and Backup Copy
388
Technet24
Chapter 4 Backup and Backup Copy
389
Chapter 4 Backup and Backup Copy
390
Technet24
Chapter 4 Backup and Backup Copy
391
Chapter 4 Backup and Backup Copy
392
Technet24
Chapter 4 Backup and Backup Copy
393
Chapter 4 Backup and Backup Copy
394
Technet24
Chapter 4 Backup and Backup Copy
395
Chapter 4 Backup and Backup Copy
396
Technet24
Chapter 4 Backup and Backup Copy
397
Chapter 4 Backup and Backup Copy
398
Technet24
Chapter 4 Backup and Backup Copy
7. Click Next.
399
Chapter 4 Backup and Backup Copy
400
Technet24
Chapter 4 Backup and Backup Copy
401
Chapter 4 Backup and Backup Copy
402
Technet24
Chapter 4 Backup and Backup Copy
403
Chapter 4 Backup and Backup Copy
proxies available
checkbox, but if off-host
backup proxies are not
available or are not
configured properly, the
job will fail to start.
404
Technet24
Chapter 4 Backup and Backup Copy
405
Chapter 4 Backup and Backup Copy
406
Technet24
Chapter 4 Backup and Backup Copy
407
Chapter 4 Backup and Backup Copy
408
Technet24
Chapter 4 Backup and Backup Copy
409
Chapter 4 Backup and Backup Copy
410
Technet24
Chapter 4 Backup and Backup Copy
411
Chapter 4 Backup and Backup Copy
412
Technet24
Chapter 4 Backup and Backup Copy
413
Chapter 4 Backup and Backup Copy
414
Technet24
Chapter 4 Backup and Backup Copy
415
Chapter 4 Backup and Backup Copy
416
Technet24
Chapter 4 Backup and Backup Copy
417
Chapter 4 Backup and Backup Copy
418
Technet24
Chapter 4 Backup and Backup Copy
419
Chapter 4 Backup and Backup Copy
420
Technet24
Chapter 4 Backup and Backup Copy
421
Chapter 4 Backup and Backup Copy
422
Technet24
Chapter 4 Backup and Backup Copy
423
Chapter 4 Backup and Backup Copy
7. Click Next.
424
Technet24
Chapter 4 Backup and Backup Copy
425
Chapter 4 Backup and Backup Copy
426
Technet24
Chapter 4 Backup and Backup Copy
427
Chapter 4 Backup and Backup Copy
428
Technet24
Chapter 4 Backup and Backup Copy
429
Chapter 4 Backup and Backup Copy
430
Technet24
Chapter 4 Backup and Backup Copy
431
Chapter 4 Backup and Backup Copy
proxies available
checkbox, but if off-host
backup proxies are not
available or are not
configured properly, the
job will fail to start.
432
Technet24
Chapter 4 Backup and Backup Copy
433
Chapter 4 Backup and Backup Copy
434
Technet24
Chapter 4 Backup and Backup Copy
435
Chapter 4 Backup and Backup Copy
436
Technet24
Chapter 4 Backup and Backup Copy
437
Chapter 4 Backup and Backup Copy
438
Technet24
Chapter 4 Backup and Backup Copy
439
Chapter 4 Backup and Backup Copy
440
Technet24
Chapter 4 Backup and Backup Copy
441
Chapter 4 Backup and Backup Copy
442
Technet24
Chapter 4 Backup and Backup Copy
443
Chapter 4 Backup and Backup Copy
444
Technet24
Chapter 4 Backup and Backup Copy
445
Chapter 4 Backup and Backup Copy
446
Technet24
Chapter 4 Backup and Backup Copy
447
Chapter 4 Backup and Backup Copy
448
Technet24
Chapter 4 Backup and Backup Copy
449
Chapter 4 Backup and Backup Copy
450
Technet24
Chapter 4 Backup and Backup Copy
451
Chapter 4 Backup and Backup Copy
7. Click Next.
452
Technet24
Chapter 4 Backup and Backup Copy
453
Chapter 4 Backup and Backup Copy
454
Technet24
Chapter 4 Backup and Backup Copy
455
Chapter 4 Backup and Backup Copy
456
Technet24
Chapter 4 Backup and Backup Copy
proxies available
checkbox, but if off-host
backup proxies are not
available or are not
configured properly, the
job will fail to start.
457
Chapter 4 Backup and Backup Copy
458
Technet24
Chapter 4 Backup and Backup Copy
459
Chapter 4 Backup and Backup Copy
460
Technet24
Chapter 4 Backup and Backup Copy
461
Chapter 4 Backup and Backup Copy
462
Technet24
Chapter 4 Backup and Backup Copy
463
Chapter 4 Backup and Backup Copy
464
Technet24
Chapter 4 Backup and Backup Copy
465
Chapter 4 Backup and Backup Copy
466
Technet24
Chapter 4 Backup and Backup Copy
467
Chapter 4 Backup and Backup Copy
468
Technet24
Chapter 4 Backup and Backup Copy
469
Chapter 4 Backup and Backup Copy
470
Technet24
Chapter 4 Backup and Backup Copy
471
Chapter 4 Backup and Backup Copy
472
Technet24
Chapter 4 Backup and Backup Copy
473
Chapter 4 Backup and Backup Copy
474
Technet24
Chapter 4 Backup and Backup Copy
475
Chapter 4 Backup and Backup Copy
476
Technet24
Chapter 4 Backup and Backup Copy
477
Chapter 4 Backup and Backup Copy
478
Technet24
Chapter 4 Backup and Backup Copy
479
Chapter 4 Backup and Backup Copy
480
Technet24
Chapter 4 Backup and Backup Copy
481
Chapter 4 Backup and Backup Copy
482
Technet24
Chapter 4 Backup and Backup Copy
483
Chapter 4 Backup and Backup Copy
484
Technet24
Chapter 4 Backup and Backup Copy
485
Chapter 4 Backup and Backup Copy
486
Technet24
Chapter 4 Backup and Backup Copy
487
Chapter 4 Backup and Backup Copy
488
Technet24
Chapter 4 Backup and Backup Copy
7. Click Next.
489
Chapter 4 Backup and Backup Copy
490
Technet24
Chapter 4 Backup and Backup Copy
491
Chapter 4 Backup and Backup Copy
492
Technet24
Chapter 4 Backup and Backup Copy
493
Chapter 4 Backup and Backup Copy
494
Technet24
Chapter 4 Backup and Backup Copy
495
Chapter 4 Backup and Backup Copy
496
Technet24
Chapter 4 Backup and Backup Copy
497
Chapter 4 Backup and Backup Copy
498
Technet24
Chapter 4 Backup and Backup Copy
499
Chapter 4 Backup and Backup Copy
500
Technet24
Chapter 4 Backup and Backup Copy
501
Chapter 4 Backup and Backup Copy
502
Technet24
Chapter 4 Backup and Backup Copy
503
Chapter 4 Backup and Backup Copy
accelerator drop-down
list.
504
Technet24
Chapter 5 Replication
Chapter 5
Replication
Veeam replication is a data protection and disaster recovery solution that enables businesses to
replicate virtual machines (VMs) and their data in an offsite location. This helps to ensure that
critical data is protected and available in case of a disaster or other unexpected events that could
disrupt business operations.
Veeam replication creates a copy of the virtual machine and its data on a remote server in
another data center or a cloud environment. This copy is then kept in sync with the original VM
so that any changes made to the original are also reflected in the replica.
The replica can be quickly activated in a disaster to restore services and minimize downtime.
Veeam replication also provides several features to ensure the reliability and security of the
replicated data, including encryption, compression, and bandwidth throttling.
Veeam replication is a powerful tool for businesses that must ensure their critical data's
availability and reliability. In addition, it can help minimize the impact of disasters and other
unexpected events.
505
Chapter 5 Replication
A replication job must be configured before you can create VM replicas. The replication job
specifies how, where, and when VM data is replicated. A single job can process one or more
virtual machines.
This procedure creates a replication job to replicate the specified production virtual machines at
the same production site.
506
Technet24
Chapter 5 Replication
9. Click Next.
507
Chapter 5 Replication
508
Technet24
Chapter 5 Replication
509
Chapter 5 Replication
510
Technet24
Chapter 5 Replication
511
Chapter 5 Replication
512
Technet24
Chapter 5 Replication
513
Chapter 5 Replication
514
Technet24
Chapter 5 Replication
515
Chapter 5 Replication
Note:
516
Technet24
Chapter 5 Replication
517
Chapter 5 Replication
518
Technet24
Chapter 5 Replication
519
Chapter 5 Replication
520
Technet24
Chapter 5 Replication
521
Chapter 5 Replication
522
Technet24
Chapter 5 Replication
523
Chapter 5 Replication
524
Technet24
Chapter 5 Replication
525
Chapter 5 Replication
accelerator drop-down
list.
526
Technet24
Chapter 5 Replication
527
Chapter 5 Replication
528
Technet24
Chapter 5 Replication
529
Chapter 5 Replication
530
Technet24
Chapter 5 Replication
531
Chapter 5 Replication
532
Technet24
Chapter 5 Replication
533
Chapter 5 Replication
534
Technet24
Chapter 5 Replication
535
Chapter 5 Replication
536
Technet24
Chapter 5 Replication
the production
environment.
537
Chapter 5 Replication
538
Technet24
Chapter 5 Replication
539
Chapter 5 Replication
6. Select Network
remapping (for DR sites
with different virtual
networks).
540
Technet24
Chapter 5 Replication
9. Click Next.
541
Chapter 5 Replication
542
Technet24
Chapter 5 Replication
543
Chapter 5 Replication
544
Technet24
Chapter 5 Replication
545
Chapter 5 Replication
546
Technet24
Chapter 5 Replication
547
Chapter 5 Replication
548
Technet24
Chapter 5 Replication
549
Chapter 5 Replication
550
Technet24
Chapter 5 Replication
551
Chapter 5 Replication
552
Technet24
Chapter 5 Replication
553
Chapter 5 Replication
554
Technet24
Chapter 5 Replication
Note:
555
Chapter 5 Replication
556
Technet24
Chapter 5 Replication
557
Chapter 5 Replication
558
Technet24
Chapter 5 Replication
559
Chapter 5 Replication
560
Technet24
Chapter 5 Replication
561
Chapter 5 Replication
562
Technet24
Chapter 5 Replication
563
Chapter 5 Replication
564
Technet24
Chapter 5 Replication
accelerator drop-down
list.
565
Chapter 5 Replication
566
Technet24
Chapter 5 Replication
567
Chapter 5 Replication
568
Technet24
Chapter 5 Replication
569
Chapter 5 Replication
570
Technet24
Chapter 5 Replication
571
Chapter 5 Replication
572
Technet24
Chapter 5 Replication
573
Chapter 5 Replication
574
Technet24
Chapter 5 Replication
575
Chapter 5 Replication
the production
environment.
576
Technet24
Chapter 5 Replication
As a prerequisite for replica seeding, you must create a backup of the VM you intend to replicate.
Replica seeding and mapping are two technologies that help to reduce network traffic. Veeam
Backup & Replication does not need to transfer all VM data from the source host to the target
host across sites during the first session of a replication job using these technologies (during the
initial replication).
Configure replica mapping if you have ready-to-use copies of the original VMs on the host in the
DR site. These can be restored virtual machines (VMs) or replicas created by other replication
jobs. Veeam Backup & Replication will use these ready-to-use VMs as replicas after synchronizing
their states with the most current state of the original VMs. You can also use replica mapping to
reconfigure or recreate replication jobs, such as splitting one replication job into multiple jobs.
If seeding or mapping is enabled in a replication job, it must be applied to all VMs. It will be
skipped if a VM does not have a seed or is not mapped to an existing VM.
577
Chapter 5 Replication
578
Technet24
Chapter 5 Replication
Note:
7. Select Network
remapping (for DR sites
with different virtual
networks).
579
Chapter 5 Replication
580
Technet24
Chapter 5 Replication
581
Chapter 5 Replication
582
Technet24
Chapter 5 Replication
583
Chapter 5 Replication
584
Technet24
Chapter 5 Replication
585
Chapter 5 Replication
586
Technet24
Chapter 5 Replication
587
Chapter 5 Replication
588
Technet24
Chapter 5 Replication
589
Chapter 5 Replication
590
Technet24
Chapter 5 Replication
591
Chapter 5 Replication
592
Technet24
Chapter 5 Replication
593
Chapter 5 Replication
Note:
594
Technet24
Chapter 5 Replication
595
Chapter 5 Replication
596
Technet24
Chapter 5 Replication
597
Chapter 5 Replication
598
Technet24
Chapter 5 Replication
599
Chapter 5 Replication
600
Technet24
Chapter 5 Replication
601
Chapter 5 Replication
602
Technet24
Chapter 5 Replication
603
Chapter 5 Replication
accelerator drop-down
list.
604
Technet24
Chapter 5 Replication
mapping to reconfigure or
recreate replication jobs,
such as splitting one
replication job into
multiple jobs.
605
Chapter 5 Replication
606
Technet24
Chapter 5 Replication
607
Chapter 5 Replication
608
Technet24
Chapter 5 Replication
609
Chapter 5 Replication
610
Technet24
Chapter 5 Replication
611
Chapter 5 Replication
612
Technet24
Chapter 5 Replication
613
Chapter 5 Replication
614
Technet24
Chapter 5 Replication
615
Chapter 5 Replication
the production
environment.
616
Technet24
Chapter 5 Replication
617
Chapter 5 Replication
618
Technet24
Chapter 5 Replication
619
Chapter 5 Replication
620
Technet24
Chapter 5 Replication
621
Chapter 5 Replication
622
Technet24
Chapter 5 Replication
623
Chapter 5 Replication
624
Technet24
Chapter 5 Replication
625
Chapter 5 Replication
626
Technet24
Chapter 5 Replication
627
Chapter 5 Replication
628
Technet24
Chapter 5 Replication
Because Veeam Backup & Replication only needs to transfer differences between the
original/recovered VM and VM replica, the first two options help reduce recovery time and
network traffic. Veeam Backup & Replication must transfer the entire VM data, including its
configuration and virtual disc content, for the third option. Choose the third option if you cannot
use the original VM or restore it from a backup.
629
Chapter 5 Replication
630
Technet24
Chapter 5 Replication
9. Click Next.
631
Chapter 5 Replication
Note:
632
Technet24
Chapter 5 Replication
633
Chapter 5 Replication
634
Technet24
Chapter 5 Replication
635
Chapter 5 Replication
636
Technet24
Chapter 5 Replication
637
Chapter 5 Replication
638
Technet24
Chapter 5 Replication
The VM replica ceases to be a replica due to permanent failover and becomes the production
VM.
639
Chapter 5 Replication
640
Technet24
Chapter 5 Replication
641
Chapter 6 Data Restore
Chapter 6
Data Restore
Veeam Backup & Replication supports the following recovery methods:
VM recovery entails restoring entire virtual machines (VMs) to various data protection
environments, such as VMware vSphere, Hyper-V, Amazon EC2, etc.
Disk export enables you to convert discs from various workloads (EC2 instances,
Microsoft Azure VMs, and so on) to VMDK, VHD, or VHDX formats.
Veeam Data Integration API — to retrieve backup content via iSCSI or FUSE and analyze
data stored in this backup.
Secure restore entails scanning data with antivirus software before restoring it to
production.
Note:
Backward compatibility is provided by Veeam Backup & Replication: backups created with
previous product versions can be restored with later product versions. Backups created with
later product versions, on the other hand, cannot be restored with previous product versions.
642
Technet24
Chapter 6 Data Restore
Before the entire VM restore can occur, the VM image must be fully extracted to the production
storage. Veeam Backup & Replication copies the VM data from the backup repository to the
chosen storage, registers the VM on the desired Hyper-V host, and, if necessary, powers it on.
643
Chapter 6 Data Restore
644
Technet24
Chapter 6 Data Restore
645
Chapter 6 Data Restore
Support Microsoft
Windows only.
The antivirus
configuration file
must be configured
on the mount server.
646
Technet24
Chapter 6 Data Restore
perform malware
scans for disks or
volumes that cannot
be mounted to the
mount server.
647
Chapter 6 Data Restore
648
Technet24
Chapter 6 Data Restore
649
Chapter 6 Data Restore
650
Technet24
Chapter 6 Data Restore
651
Chapter 6 Data Restore
652
Technet24
Chapter 6 Data Restore
653
Chapter 6 Data Restore
654
Technet24
Chapter 6 Data Restore
655
Chapter 6 Data Restore
656
Technet24
Chapter 6 Data Restore
657
Chapter 6 Data Restore
658
Technet24
Chapter 6 Data Restore
659
Chapter 6 Data Restore
660
Technet24
Chapter 6 Data Restore
661
Chapter 6 Data Restore
662
Technet24
Chapter 6 Data Restore
663
Chapter 6 Data Restore
664
Technet24
Chapter 6 Data Restore
Restore VM Files
If corrupted, you can restore VM files (.XML. VMCX, VMRS,.VMGS,.VHD,.VHDX). This option is an
excellent alternative to restoring the entire VM. However, you can only restore a single VM file.
When you perform a VM file restore, the VM file is restored directly from regular image-level
backups without de-staging VM images from backups first. VM files can be converted to either
the original or a new location.
Note:
If you recover a .VMCX file and import it to Microsoft Hyper-V, the VM will be registered under
the Veeam Recovery Checkpoint-(<GUID>) name. After import, you can rename the VM if
required.
665
Chapter 6 Data Restore
666
Technet24
Chapter 6 Data Restore
667
Chapter 6 Data Restore
668
Technet24
Chapter 6 Data Restore
669
Chapter 6 Data Restore
670
Technet24
Chapter 6 Data Restore
671
Chapter 6 Data Restore
672
Technet24
Chapter 6 Data Restore
You can restore files to their original or new location, use Microsoft Windows File Explorer to
work with the converted files or launch application item restore for the files.
673
Chapter 6 Data Restore
674
Technet24
Chapter 6 Data Restore
675
Chapter 6 Data Restore
676
Technet24
Chapter 6 Data Restore
677
Chapter 6 Data Restore
678
Technet24
Chapter 6 Data Restore
679
Chapter 6 Data Restore
680
Technet24
Chapter 6 Data Restore
681
Chapter 7 Join us at MVPDays and meet great MVPs like this in person
Chapter 7
Live Presentations
Dave frequently speaks at Microsoft conferences around North America, such as TechEd,
VeeamOn, TechDays, and MVPDays Community Roadshow.
www.checkyourlogs.net
www.mvpdays.com
Video Training
For video-based training, see the following site:
www.mvpdays.com
682
Technet24
Chapter 7 Join us at MVPDays and meet great MVPs like this in person
www.truesec.com
www.checkyourlogs.net
Consulting Services
Dave and Cristal have worked with some of the largest companies in the world and have a
wealth of experience and expertise. Customer engagements are typically between two weeks
and six months.
683
Chapter 7 Join us at MVPDays and meet great MVPs like this in person
684
Technet24