Chat now with support
Chat with Support

NetVault Plug-in for Exchange 10.0.5 - User Guide

Introducing Dell™ NetVault™ Backup Plug-in for Exchange Defining an Exchange data protection strategy Planning your Exchange Server deployment Installing and removing the plug-in Configuring the plug-in Backing up data Restoring data Troubleshooting

Single Copy Cluster (SCC) or Failover Cluster

Plug‑in for Exchange License Required: Plug‑in for Exchange Enterprise Edition Cluster Support
In an SCC deployment, the plug-in is installed on the Exchange Virtual Server. The Exchange Virtual Server is a group of nodes and hosts that make up the cluster. The NetVault Backup Server sees the cluster as a single client, which is called a Virtual Client. When installing the Plug‑in for Exchange on the Virtual Server, the plug-in is installed on all nodes by using NetVault Backup’s Cluster Support. NetVault Backup’s Virtual Client is used to back up a single clustered resource, which in this example is the Exchange Virtual Server.
Figure 4. SCC deployment

Cluster Continuous Replication (CCR)

Supported Backup Methods: ESE (Active Copy only) and VSS (Active or Passive Copy)
Plug‑in for Exchange License Required: Plug‑in for Exchange Enterprise Edition Cluster Support
In a CCR deployment, the plug-in is installed on the Exchange Virtual Server. The Exchange Virtual Server is a group of nodes and hosts that make up the cluster. The NetVault Backup Server sees the cluster as a single client, which is called a Virtual Client. When installing the Plug‑in for Exchange on the Virtual Server, the plug-in is installed on all nodes by using NetVault Backup’s Cluster Support. NetVault Backup’s Virtual Client is used to back up either the Active or Passive node, which in this example is the Exchange Virtual Server.
Figure 5. CCR deployment

Installing and removing the plug-in

Installation prerequisites

If either an Incremental or Differential Backup type is to be created, ensure that Circular Logging is disabled. The Exchange Server overwrites files if Circular Logging is enabled, making it impossible to reliably restore from the transaction logs. For more information on Backup Types, see Reviewing the backup types. To disable Circular Logging, perform the steps in the applicable section:
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating