Examples of using Vmware clusters in English and their translations into Russian
{-}
-
Official
-
Colloquial
Check boxes are selected in the table to the left of the names of protected VMware clusters.
The table columns show information about all VMware clusters managed by a single VMware vCenter server.
SELECT VMWARE CLUSTERS At this step, select the VMware clusters on whose hypervisors you want to upgrade SVMs.
The table columns show the details of all VMware clusters within a single VMware vCenter Server platform.
Removal of SVMs with the Network Attack Blocker component from VMware ESXi hosts belonging to all VMware clusters.
SVMs will be installed in the selected VMware clusters on which the Network threat detection component is not installed.
VIEW DETAILS OF THE SVM IMAGE At this step,the Wizard shows the URL of the OVF file of the SVM deployed on VMware clusters within the selected VMware vCenter Server.
SELECT VMWARE CLUSTERS At this step, select the VMware clusters on whose VMware ESXi hosts you want to upgrade SVMs.
It provides information about virtual machines deployed on VMware ESXi hypervisors, about VMware clusters, the installed services and settings of VMware Distributed Virtual Switches.
SELECT VMWARE CLUSTERS At this step, select the VMware clusters from whose VMware ESXi hosts you want to remove SVMs with the Network Attack Blocker component.
If it is the first time that you are installing the Network Attack Blocker component on VMware clusters within the selected VMware vCenter Server, type the URL of the OVF file of the SVM in the OVF file field.
Selective removal of the Network Attack Blocker component is performed by removing SVMs with the Network Attack Blocker component from VMware ESXi hosts belonging to selected VMware clusters.
If it is the first time that you are installing the Network threat detection component on VMware clusters controlled by the selected VMware vCenter server, specify the path to the OVF file of the SVM in the OVF file field.
If you intend to remove SVMs from all VMware clusters and then unregister the Network Attack Blocker component(the Kaspersky Network Protection service) in VMware vShield Manager, clear check boxes to the left of the names of all distributed virtual port groups.
If the Network Attack Blocker is already installed in one or several VMware clusters within the selected VMware vCenter Server, the OVF file field shows the URL of the OVF file that was used during the previous installation of the Network Attack Blocker component.
Kaspersky Security uses a view of the protected infrastructure of the KSC cluster in the form of a tree of VMware ESXi hosts and VMware clusters(Hosts and Clusters view) for details see VMware product documentation.
If the Network threat detection is already installed in one or several VMware clusters controlled by the selected VMware vCenter server, the OVF file field shows the path to the OVF file that was used during the previous installation of the Network threat detection component.
At this step you can view the settings to be used by VMware vShield Manager for deploying SVMs: details of the SVMimage selected for deployment, details of VMware clusters and VMware Distributed Virtual Port Groups for which Network Attack Blocker will be enabled.
ADMINISTRATOR 'S GUID E 74 If you intend to remove SVMs from all VMware clusters and then unregister the Network Attack Blocker component(the Kaspersky Network Protection service) in VMware vShield Manager, clear check boxes to the left of the names of all VMware clusters in the table.
The VMware virtual infrastructure of a single VMware vCenter Server platform is shown in the table as a tree of objects: VMware vCenter Server,Datacenter objects, VMware clusters, VMware ESXi hosts that are not part of the VMware cluster, resource pools, vApp objects, and virtual machines.
If the Network Attack Blocker component is already installed on one or several VMware clusters within the selected VMware vCenter Server, check boxes are selected to the left of the names of protected VMware clusters in the table.
The protected infrastructure of the KSC cluster is shown in the right part of the window: VMware vCenter server,Datacenter objects, VMware clusters, VMware ESXi hypervisors that are not part of the VMware cluster, resource pools, vApp objects, and virtual machines.
At this step you can view the settings to be used by VMware vShield Manager to upgrade SVMs: details of the SVM image selected for deployment,details of VMware clusters in which SVMs with the new version of the Network Attack Blocker component will be installed, details of VMware Distributed Virtual Port Groups for which Network Attack Blocker will be enabled.
Location- path to a VMware cluster in the VMware virtual infrastructure.
To select a VMware cluster, select the check box to the left of the name of this VMware cluster in the table.
While removing SVMs from VMware ESXi hosts belonging to a VMware cluster, VMware vShield Manager also removes trace files stored on the SVMs.
For example, you can assign identical protection profiles to the virtual machines within a VMware cluster or resource pool.
INSTALLING A ND REMOVING T HE APP LICAT ION 57 After the Network Attack Blocker component has been installed, a resource pool with the name ESX Agents is automatically created for each protected VMware cluster in the vCenter folder of the VMware vSphere Client console.
After the Network threat detection component has been installed, a resource pool with the name ESX Agents is automatically created for each protected VMware cluster in the vCenter folder of the VMware vSphere Client console.