HP Storage Mirroring Software User Manual

Page 261

Advertising
background image

Workload protection

Page 260 of 677

Your source can have no more than four NICs enabled, except if your
source is ESX version 4.x. In that case, you can have up to ten NICs.

l

User name—Specify a user that is a member of the Double-Take Admin and
local administrator security groups on the source. If you want to use a domain
user account, enter a fully-qualified domain name in the format
domain\username or username@domain.

l

Password—Specify the password associated with the User name you
entered.

6. Click Next to continue.

7. Choose the volumes on the source server that you want to protect.

l

Select the volumes to protect—By default the system volume will be
selected for protection. You will be unable to deselect the system volume.
Select any other volumes on the source that you want to protect.

l

Exclude these paths—If there are specific paths on a volume that you do
not want to protect, specify those locations. Keep in mind that missing data
may impact the integrity of your applications. Specify any paths to exclude
from protection and click Add. If you need to remove a path from being
excluded, select the path and click Remove.

8. Click Next to continue.

9. Specify the target server. If you are protecting to a Hyper-V server, this is the name

of the Hyper-V server. If you are protecting to a ESX server, this is the host name of
your

virtual recovery appliance

.

Advertising