beautypg.com

Evaluating data protection – HP Storage Mirroring Software User Manual

Page 724

background image

722 of 739

Evaluating data protection

The following evaluation procedure has eleven tasks containing step-by-step
instructions for evaluating the data protection functionality of Storage Mirroring Recover.

Before starting this evaluation procedure, make sure you have reviewed the

server

requirements

and that you have

installed the software

on both the source and target.

Also, you should have approximately 500 MB to 1 GB of data on the source for testing. If
you are going to be protecting application data, make sure the application is pre-
installed on the target, but the application is not running on the target. If the application is
running on the target, the files will be held open and Storage Mirroring Recover will not
be able to write to the files. In the event of a source failure, the application can be started
on the target and the files can then be accessed.

Note:

For the evaluation, you should install in a test environment. Do no use actual
production servers because you will be forcing a failure during the evaluation.

This evaluation consists of the following tasks.

1. Establishing a connection

1.

Open the Replication Console

.

2. Click Make a connection from the right pane of the Replication Console. If that

quick launch screen is no longer visible, select Tools, Connection Wizard.

Note:

If the Storge Mirroring Servers root is highlighted in the left pane of the
Replication Console, the Connection Wizard menu option will not be
available. To access the menu, expand the server tree in the left pane,
and highlight a server in the tree.

3. The Connection Wizard opens to the Welcome screen. Review this screen and

click Next to continue.

Note:

At any time while using the Connection Wizard, click Back to return to
previous screens and review your selections.

4. If you highlighted a source in the Replication Console, the source will already be

selected. If it is not, select the Storage Mirroring Recover source. This is the server
that you want to protect. Click Next to continue.

Note:

Storage Mirroring Recover will automatically attempt to log on to the
selected source using the identification of the user logged on to the local