Configuring the virtual appliance

After deploying the virtual appliance, you need to configure it so that it can reach both the Scale Computing HC3 cluster that it will protect and the Cyber Protection service.

To configure the virtual appliance

  1. Log in to your Scale Computing HC3 account.
  2. Select the appliance virtual machine that you need to configure, and then click the Console icon.
  3. In the eth0 field, configure the network interfaces of the appliance.

    Ensure that automatically assigned DHCP addresses (if any) are valid within the networks that your virtual machine uses or assign them manually. Depending on the number of networks that the appliance uses, there may be one or more interfaces to configure.

  4. In the Scale Computing field, click Change to specify the Scale Computing HC3 cluster address and credentials for accessing it:

    1. In the Server name/IP field, enter the DNS name or IP address of the cluster.
    2. In the User name and Password fields, enter the credentials for the Scale Computing HC3 administrator account.

      Ensure that this account has the roles required for operations with Scale Computing HC3 virtual machines. For more information about these roles, refer to Agent for Scale Computing HC3 – required roles.

    3. Click Check connection to ensure that the provided credentials are correct.

    4. Click OK.

  5. In the Management Server field, click Change to specify the Cyber Protection service address and credentials for accessing it.

    1. In the Server name/IP field, select Cloud, and then specify the Cyber Protection service address.

    2. In the User name and Password fields, enter the credentials for your account in the Cyber Protection service.

    3. Click OK.

  6. In the Name field, click Change to edit the default name for the virtual appliance, which is localhost. This name is shown in the Cyber Protection service console.

  7. [Optional] In the Time field, click Change, and then select the time zone of your location to ensure that the scheduled operations run at the appropriate time.

To protect virtual machines in the Scale Computing HC3 cluster

  1. Log in to your Cyber Protection account.
  2. Navigate to Devices > Scale Computing HC3> <your cluster> or find your machines in Devices > All devices.
  3. Select the desired machines and apply a protection plan for them.