beautypg.com

HP Storage Mirroring Software User Manual

Page 23

background image

21

z

Enter the display name—Enter the name you would like to use to identify the replica virtual

machine.

z

Map replica virtual network adapters to target VSwitches—If there are multiple target

networks, you can select the network on the target to use.

z

Number of processors—Select the number of processors for the replica virtual machine.

z

Amount of memory—Enter the amount of memory to use for the replica virtual machine.

When you are finished configuring the replica virtual machine, click Next.

NOTE:

Do not use any special or unique characters in the replica virtual machine name,

including the following:

# / \ : * ? ' " < > |

NOTE:

The Processors on the source server field displays the number of processors on

the original source virtual machine.

NOTE:

The Memory on the source server field displays the amount of memory (in MB) on

the original source virtual machine.

NOTE:

The target virtual machine is registered on the first replication loop and will remain

registered. To unregister a machine, you must click the Delete Protection button and

choose the Delete the associated replica virtual machine option.
Even though the target machine appears to be available on the ESX box, the target virtual

machine should never be powered on, removed, or otherwise modified while it is owned

by an active job. Doing so will corrupt the target virtual machine and break the protection

job.

This manual is related to the following products: