Easing availability through Disaster Recovery improvements

Posted by Admin | 13 September, 2016 | Announces, Technical

In our challenge to ease availability, we’ve been building a new Disaster Recovery tool that permits to setup a ZNA64 3300 Hardware Appliance in less than 3 minutes using just a Pen Drive. Such tool is able to create custom and already configured firmware files for the Hardware Appliances and restore it in less than 3 minutes.

The procedure is simple:
1. Download the tools from the official website (ZNA Deployment USB image and USB bootable generator).
2. Restore the lastest firmware file from the official website.
3. Configure the appliance with your networking setup, farms services and cluster service required.
4. Restart the appliance with the USB device and perform a load of the device as described in the ZNA 3300 User Manual. With this option, you can restore in less than 3 minutes not only your ZNA firmware, but also, your configuration and reduce the down time in case of Disaster.

SHARE ON:

Related Blogs

Posted by reluser | 08 May 2024
The distinction between penetration testing and vulnerability scanning is often blurred. However, understanding their nuanced disparities is crucial for organizations to tailor their security strategies effectively. While both methodologies contribute…
24 LikesComments Off on Key differences between Pen Testing & Vulnerability Scanning
Posted by reluser | 26 March 2024
We are thrilled to announce the release of RELIANOID 7.2.0 (Community Edition), a significant update that introduces new features, improvements, and bugfixes to enhance your load balancing experience. This release,…
59 LikesComments Off on Open Source Load Balancer RELIANOID CE v7.2.0 is released!
Posted by reluser | 22 March 2024
Load balancing is crucial for building reliable distributed systems, optimizing workload allocation across various computing resources like computers, clusters, and network links. Its aim is to enhance resource utilization, maximize…
68 LikesComments Off on Deep dive into Network Load Balancing and Proxying