• Basic disksThe supported mount types include:• Shared drives that are connected as drive letters (for example, D:)• Simple dynamic volumes on a single physical disk (not striped, mirrored, or spanned volumes)• Shared drives that are connected as mount pointsProtecting a clusterThis topic describes how to add a cluster for protection in AppAssure. When you add a cluster toprotection, you need to specify the host name or IP address of the cluster, the cluster application, or oneof the cluster nodes or machines that includes the AppAssure Agent.NOTE: A repository is used to store the snapshots of data that are captured from your protectednodes. Before you start protecting data in your cluster, set up at least one repository that isassociated with your AppAssure Core.For information about setting up repositories, see About Repositories.To protect a cluster:1. Do one of the following:• In the Core Console, navigate to the Home tab, and then click the Protect Cluster button.• In the Core Console, on the Machines tab, click Actions, and then click Protect Cluster.2. In the Connect to Cluster dialog box, enter the following information:Text Box DescriptionHost The host name or IP address of the cluster, the cluster application, or one ofthe cluster nodes that you want to protect.NOTE: If you use the IP address of one of the nodes, this node needs tohave an AppAssure agent installed and started.Port The port number on the machine on which the AppAssure Corecommunicates with the agent.User name The user name of the domain administrator used to connect to this machine:for example, domain_name\administrator oradministrator@domain_name.comNOTE: The domain name is mandatory. You cannot connect to thecluster using the local administrator username.Password The password used to connect to this machine.3. In the Protect Cluster dialog box, select a repository for this cluster.4. To protect the cluster based on default settings, select the nodes for default protection, and clickProtect.NOTE: The default settings ensure that all volumes are protected with a schedule of every 60minutes.5. To enter custom settings for the cluster (for example, to customize the protection schedule for theshared volumes), do the following:a. Click settings.141