Axcient Help Center

Protecting with Axcient BRC

This section of the guide describes how to protect devices using an Axcient appliance-based service, and how to configure and reconfigure various protection settings.

The Axcient protection solution should be configured to suit your business protection needs before being implemented. Once these configurations have been made, you can quickly protect multiple devices while ensuring the devices meet the business data protection standards.

The Axcient appliance sits behind the business firewall in order to protect devices without disrupting business operations. You can protect devices by configuring the appliance to query the Active Directory for devices, or by manually entering the network information for a specific device.

Local and Cloud replication jobs can only occur while the Axcient appliance and target device are powered on with a functioning outbound Internet connection.

Types of Devices Protected

Axcient protects the following devices:

  • Windows-based devices—such as laptops, desktops, and servers—are fully protected and can leverage full image and file replication jobs.

  • Linux-based devices can only leverage Granular File Restore tools.

Protection of Encrypted Files

The Axcient protection solution supports protection and recovery of encrypted Windows files using the BitLocker encryption feature. Users will be able to successfully replicate and recover all data using this encryption feature.

Axcient does not support file encryption using another encryption tool, feature, or agent. You will not be able to replicate or recover data encrypted with anything other than BitLocker.

Foreign Characters Support

In AxOS version 6.4.9 and later, the Axcient protection solution supports protection and recovery of foreign characters that are UTF-8 encoded.

Unsupported Files

If a Windows image replication job encounters an unsupported file, the file will be automatically excluded from the replication process, and a warning will be printed to the event log. Despite the warning, the replication job will still complete with a status of SUCCESS.

Please note that unsupported files will not be protected using the Acxient disaster recovery and business continuity features. You must make sure that all critical data is in a supported file format in order to be recoverable.

An unsupported file is one of the following:

  • A file that has been encrypted using Encrypting File System (EFS)

  • A file that has a name that is not supported by Windows, such as ending with a blank or a period

In some instances, a Windows device running a Unix application might rely on posix device files (/dev). While replication jobs will complete successfully, failovers and Bare Metal Restores (BMR) will not.

To resolve this, you must exclude the /dev file from the replication job by following the steps in the File Exclusion section.

Replication Method

To protect devices, the Axcient protection solution will first perform a seed replication job to capture the entire system image of the protected device. Once the initial seed replication job is performed, Axcient leverages Reverse Incremental methods for subsequent replication jobs to achieve rapid replication and rapid recovery, while ensuring that all new data changes are captured and preserved.

This means that after the initial seed replication completes, each successive incremental replication applies the changes to the full replication that was initially performed. This creates a new full restore point each time an incremental replication job completes successfully.

This recovery process is more efficient because each restore point is independent. No incrementals need to be applied to a restore point during a recovery. This ensures that there is never any chain-breaking because each restore point is always available due to each restore point being an independent system image.

Axcient does not support deduplication for Windows 2012.

Required Ports

You will need to have the following outgoing ports open in order to access the Axcient appliance and protected devices, as well as for replication jobs to complete successfully. These are standards ports, but you should confirm the following ports are open:

  • TCP Port 7 - ICMP (Ping)

  • TCP Port 22 - SSH (Inbound)

  • UDP Port 53 - DNS (Outbound)

  • TCP Port 80 - HTTP (Appliance UI)

  • TCP/UDP Port 123 - NTP (Outbound)

  • TCP Port 443 - SSL (HTTPS)

  • (TCP/UDP) Ports 4015 - 4040 - Namespace (Outbound)

It is very important that Ports 4015 - 4040 be open. These are ports Axcient will use to replicate data to the Axcient Cloud. If these ports are not open, cloud replication jobs will not be able to complete successfully.

Deduplication

Axcient does not support deduplication for Windows 2012.