Select source and target servers, Select source and target servers -3 – HP Storage Mirroring V4.5 Software User Manual
Page 25
3 - 3
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format NetBIOS domain name\username or username.
If you enter a non-qualified name, the default domain will be used.
Select source and target servers
The Application Manager will automatically attempt to populate the Source Server and Target
Server lists with any servers in the specified domain that are running Exchange.
If you select a source/target pair for which you have previously enabled and disabled protection, you
may use the existing configuration settings (provided that the source/target connection is not
currently active, in which case the existing settings will always be used). When you select Configure
or Validate, a prompt will appear asking if you want to re-use the previous configuration information.
Click Yes to re-use the previous information, or click No to revert to the Application Manager default
settings.
1.
In the Source Server field, select the Exchange server that you want to protect. If this is your
first time to log in to the selected server, you will be prompted to enter server login information.
For more information about logging in to servers, see
Enter server login information
on
page 3-4.
2.
In the Target Server field, select the backup Exchange server that will protect the source
server in the event of a failure. The target must be in the same Exchange admin group as the
source.
NOTE:
When the Application Manager launches, it selects the forest root automatically. The
domain that is entered MUST be the root of the forest domain, since this is where all
Exchange server objects reside (even if the Exchange server is a member of a child
domain).
NOTE:
If the IP address(es) for the source or target server have changed since you originally
configured protection (for example, if you configure the source or target in a staging area
and then send it to a production location), you must re-configure the protection settings.
When you are prompted to re-use the previous protection configuration, click No, then
click the Configure Protection button.
NOTE:
You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear
stating that the source is not available and that if the source is failed over, you should
first select the target.
If you select the target, then select the source (as recommended in the prompt), the
same prompt appears (though you would expect to get a prompt to failover). The
ability to failover using the Application Manager will not be available until a failover
condition has been met in accordance with the failover monitor settings set on the
Monitoring tab.