HP Storage Mirroring Software User Manual

Page 288

Advertising
background image

286 of 739

Note:

Do not use any special characters in the replica virtual machine name,
including the following:
# / \ : * ? ' " < > |

2. In the Map replica virtual network adapters to target VSwitches area, if there

are multiple target networks, you can select the network on the target to use.

3. In the Number of processors field, select the number of processors for the replica

virtual machine.

Note:

The Processors on the source server field displays the number of
processors on the original source virtual machine.

4. In the Amount of memory field, enter the amount of memory to use for the replica

virtual machine.

Note:

The Memory on the source server field displays the amount of memory (in
MB) on the original source virtual machine.

5. In the Select the resource pool for the replica virtual machine field, select the

resource pool that will be used to allocate host-provided CPU and memory to the
replica virtual machine.

6. When you are finished configuring the replica virtual machine, click Next.

Note:

The target virtual machine is registered on the first replication loop and will
remain registered. To unregister a machine, you must click the Delete
Protection
button and choose the Delete the associated replica virtual
machine
option.

Even though the target machine appears to be available on the ESX box, the
target virtual machine should never be powered on, removed, or otherwise
modified while it is owned by an active protection job. Doing so will corrupt the
target virtual machine and break the protection job.

Modifying protection settings

The first time you access the Protection summary page, it will be populated with
default values that are recommended for a basic environment.

Advertising