Select source and target servers, Select source and target servers -3 – HP Storage Mirroring V4.5 Software User Manual

Page 25

Advertising
background image

3 - 3

You may enter a user name for a different domain by entering a fully-qualified user name. The

fully-qualified user name must be in the format NetBIOS domain name\username or username.

If you enter a non-qualified name, the default domain will be used.

Select source and target servers

The Application Manager will automatically attempt to populate the Source Server and Target

Server lists with any servers in the specified domain that are running Exchange.
If you select a source/target pair for which you have previously enabled and disabled protection, you

may use the existing configuration settings (provided that the source/target connection is not

currently active, in which case the existing settings will always be used). When you select Configure

or Validate, a prompt will appear asking if you want to re-use the previous configuration information.

Click Yes to re-use the previous information, or click No to revert to the Application Manager default

settings.

1.

In the Source Server field, select the Exchange server that you want to protect. If this is your

first time to log in to the selected server, you will be prompted to enter server login information.

For more information about logging in to servers, see

Enter server login information

on

page 3-4.

2.

In the Target Server field, select the backup Exchange server that will protect the source

server in the event of a failure. The target must be in the same Exchange admin group as the

source.

NOTE:

When the Application Manager launches, it selects the forest root automatically. The

domain that is entered MUST be the root of the forest domain, since this is where all

Exchange server objects reside (even if the Exchange server is a member of a child

domain).

NOTE:

If the IP address(es) for the source or target server have changed since you originally

configured protection (for example, if you configure the source or target in a staging area

and then send it to a production location), you must re-configure the protection settings.

When you are prompted to re-use the previous protection configuration, click No, then

click the Configure Protection button.

NOTE:

You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear

stating that the source is not available and that if the source is failed over, you should

first select the target.
If you select the target, then select the source (as recommended in the prompt), the

same prompt appears (though you would expect to get a prompt to failover). The

ability to failover using the Application Manager will not be available until a failover

condition has been met in accordance with the failover monitor settings set on the

Monitoring tab.

Advertising
This manual is related to the following products: