HP X1800sb G2 Network Storage Blade User Manual
Page 3
![background image](/manuals/397221/3/background.png)
Contents
1 Automated Storage Manager Overview........................................................5
Software support.................................................................................................................5
Using ASM with HP StorageWorks Storage Mirroring software..................................................6
2 Configuring Automated Storage Manager.....................................................7
Add an HP Storage System........................................................................................................7
Remove an HP Storage System...................................................................................................7
Configure display options..........................................................................................................7
Configure Application Credentials..............................................................................................8
Configure Storage Networks......................................................................................................8
3 Hosting storage for applications and shared folders......................................10
Entering a name of a server that hosts Exchange....................................................................11
Selecting Exchange storage group components......................................................................11
Local Continuous Replication (LCR).......................................................................................12
Selecting a server that hosts SQL Server................................................................................14
Selecting SQL Server database components..........................................................................14
Selecting a database workload type.....................................................................................15
Choose type of application.................................................................................................16
Entering an application name..............................................................................................17
Selecting data protection.........................................................................................................22
Reviewing task summary and scheduling tasks............................................................................24
Monitoring task completion status.............................................................................................25
Taking and deleting snapshots.............................................................................................27
Exposing a snapshot..........................................................................................................28
Unexposing a snapshot......................................................................................................28
Contents
3