Log in to the Axcient Web Application. In the Dashboard, expand the Activities of Interest section and to view the New Service activity. Expand this activity and click the Start Protecting link.
Step 1 – The user will be prompted to perform an initial service configuration on the first log in to the Web Application once the service is provisioned.To begin, press the Let’s Do It button. | ![]() |
Step 2 – The user will be presented with the End User License Agreement. Please review this agreement in its entirety.Once ready, click the I Agree button. | ![]() |
Step 3 – The user will be taken to the Settings Review screen.The user can configure the Service Alias and Bandwidth Limitation settings.The default QoS settings are 10 Mbps during business hours, and Unlimited during non-business hours.To edit the Service Alias, click the Edit link in the appropriate field and continue to Step 3a.To edit the Bandwidth Limitation settings, click the Edit link in the appropriate field and continue to Step 3b.To continue the initial protection process, click the Next button and continue to Step 4. | ![]() |
Step 3a – Alias Configuration – In the Service Alias field, enter the preferred Service alias.The Entitlement field cannot be edited because it is a paid for feature. To increase or otherwise change entitlements, please contact an Axcient sales representatives. These changes will be applied automatically.Once ready, click the Save link. | ![]() |
Step 3b – Bandwidth Configuration – Configure the WAN bandwidth usage for replication jobs during business and non-business hours.For business hours, Axcient recommends setting a bandwidth that will not interefere with day-to-day business operations.For non-business hours, Axcient recommends setting the limit to Unlimited so replication jobs complete quickly.Once configured, click the Save button to save all changes and return to the Settings Review screen in Step 3. | ![]() |
Step 4 – Configure when the initial seed replication job will occur. The initial seeding may take a long time to complete for large devices, and can impact day-to-day operations.The user has the following options:
Once configured, click the Next button. |
![]() |
Step 5 – Configure the alert thresholds that determine when an Axcient Virtual Manager (AVM) and a device fall out of the protection threshold.
Once configured, click the Next button. |
![]() |
Step 6 – The user has finished the initial service setup process and is presented with a link to download the Axcient Virtual Manager (AVM).The AVM must be deployed on the ESX on on which all the target VM devices are located. The AVM acts as a middle man, transmitting the replicated from the protected devices to the Axcient Cloud.Copy the link to download the AVM agent, and proceed to the How to Deploy the AVM Agent section for more information. | ![]() |
Comments
0 comments
Article is closed for comments.