If protected objects are FusionSphere VMs and host-based replication is used for DR, you need to add a VRG to the site.
One VRG can be added only to one site on UltraVR.
Resources.


Parameter |
Description |
Value |
|---|---|---|
IP Address |
IPv4 address of the VRG's first network adapter |
[Example] 192.168.10.11 |
Port |
VRG communication port |
[Value range] 1 to 65535 [Default value] 8080 |
Username |
Username: admin |
- |
Password |
Password of user admin |
It can be obtained from an administrator. |
If an added VRG does not need to be detected, click Delete. The default information row cannot be deleted.
in the operation button area where the VRG information row resides, and set the reporting parameters as described in Table 2.
Parameter |
Description |
Value |
|---|---|---|
Type |
Type of the SNMP protocol. The default version is SNMP v3. This parameter cannot be changed. |
The system uses SNMP v3 for communication by default. |
Retry Count |
Times for resending the SNMP operations. If this number of times is exceeded, the SNMP operation will be abandoned. |
[Value range] 0 to 5 [Default value] 3 |
Timeout Duration |
Time that needs to be waited after the protocol message is sent. |
[Value range] 0 to 5 [Default value] 5 |
Port |
Port used by UltraVR to receive VRG alarms. |
[Value range] 1 to 65535 [Default value] 161 |
Username |
Username: admin |
admin |
Environment Name |
This parameter does not need to be configured. |
- |
Environment Engine ID |
This parameter does not need to be configured. |
- |
Authentication Protocol |
Protocol used for verifying messages. |
NOTE:
They system uses HMAC_SHA by default. This parameter cannot be modified. |
Authentication Password |
If the authentication protocol is used to verify messages, you need to set the authentication password. |
It must be the same as the authentication password set during the VRG configuration. |
Data Encryption Protocol |
Encryption protocol used for encapsulating data. |
NOTE:
They system uses AES by default. This parameter cannot be modified. |
Data Encryption Password |
If the encryption algorithm is used for encapsulating data, you need to set the data encryption password. |
It must be the same as the data encryption password set during the VRG configuration. |
After the VRG is added, you can refresh, modify, and delete VRG information. For details about subsequent operations, see Table 3.
Related Operations |
Prerequisite and Result |
|---|---|
Select the host or host group that you want to modify and click More > Modify on the Operation list.In the Modify Device Information dialog box that is displayed, change the name, authentication information, or alarm reporting parameters of the VRG. |
If you change the authentication or alarm reporting information about the VRG, synchronize the latest information to UltraVR in time to ensure successful running of subsequent DR protection services. |
In the row where the VRG resides, click More > Delete on the Operation list. |
Perform this operation when a VRG is no longer needed. |
In the row where the VRG resides, click Refresh on the Operation list.. |
If the VRG information is changed, update the changes to UltraVR. |